networks Crossword Puzzles

Cyber Security 2017-05-12

Cyber Security crossword puzzle
Across
  1. software that is designed to protect a computer system/network.
  2. A cyber attack that where you send so much traffic that it slows the system or eventually crash it.
  3. decoy servers or computer systems that are set up to gather information on intruders or attackers of computer system/network.
  4. protects data from unauthorized modification.
Down
  1. a method that is used to test the security of the software
  2. this is a security method for separating running programs on a computer system or network. it is often used to run untested code or programs from unknown sources such as suppliers, untrusted users, and websites.
  3. malicious software which is capable of copying itself and corrupting computer systems and networks or destroying data.

7 Clues: protects data from unauthorized modification.a method that is used to test the security of the softwaresoftware that is designed to protect a computer system/network.A cyber attack that where you send so much traffic that it slows the system or eventually crash it....

UVC 1 2014-05-26

UVC 1 crossword puzzle
Across
  1. The literal, face-value meaning of a sign (438)
  2. The broad but indispensable shared sets of values and beliefs through which individuals live out their complex relations in a range of social networks (23)
  3. All the social, cultural, and historical meanings that are added to a signs literal meaning (436)
  4. The general term we use for words, sounds or images which carry meaning (Hall, 18).
Down
  1. The ideological meaning of a sign that is expressed through connotation. It allows the connotative meaning of a particular thing or image to appear to be denotative, hence literal or natural (450)
  2. The use of language and images to create meaning about the world around us (12)
  3. The production of meaning in cultural products (439)

7 Clues: The literal, face-value meaning of a sign (438)The production of meaning in cultural products (439)The use of language and images to create meaning about the world around us (12)The general term we use for words, sounds or images which carry meaning (Hall, 18)....

Cyber Security 2022-07-07

Cyber Security crossword puzzle
Across
  1. The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
  2. A cyber attack intended to redirect a website's traffic to another, fake site.
  3. A broad terms that covers all software written to cause loss of data, encryption of data, fraud and identity theft.
  4. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Down
  1. Observing a person's private information over their shoulder eg cashpoint machine PINs.
  2. A computer program or system intended to distinguish human from machine input
  3. A form of identification and authentication which relies on comparing scans of e.g. your face

7 Clues: A computer program or system intended to distinguish human from machine inputA cyber attack intended to redirect a website's traffic to another, fake site.Observing a person's private information over their shoulder eg cashpoint machine PINs.A form of identification and authentication which relies on comparing scans of e.g. your face...

ieee photonics 2024-03-03

ieee photonics crossword puzzle
Across
  1. Celebrated annually in the state of Kerala, this festival features traditional boat races and cultural performances.
  2. South Indian dessert made from rice, milk, sugar, and flavored with cardamom and nuts.
  3. Popular South Indian breakfast dish made from semolina, vegetables, and spices
Down
  1. South Indian film industry based in Chennai produces movies primarily in Tamil but also in other languages
  2. Located in Karnataka, this UNESCO World Heritage Site is known for its well-preserved ruins of ancient temples and monuments, including the iconic Stone Chariot
  3. South Indian state known as the "Land of Spices," famous for its rich cultural heritage and backwater networks
  4. Indian classical dance form known for its graceful movements and intricate footwork

7 Clues: Popular South Indian breakfast dish made from semolina, vegetables, and spicesIndian classical dance form known for its graceful movements and intricate footworkSouth Indian dessert made from rice, milk, sugar, and flavored with cardamom and nuts....

Internet layers crossword 2022-10-02

Internet layers crossword crossword puzzle
Across
  1. CSMA/CD uses this to ensure a WiFi device can only transmit when there is a free channel available
  2. a peer that downloads many files but does not make available any new content for the community as a whole
  3. a set of data that describes and gives information about other data
Down
  1. protocol used in peer-to-peer networks when sharing files between peers
  2. this is a central server that stores details about other computers that make up the swarm
  3. splitting up of a file when using peer-to-peer
  4. a peer that has downloaded a file (or pieces of a file) and has then made it available to other peers in the swarm

7 Clues: splitting up of a file when using peer-to-peera set of data that describes and gives information about other dataprotocol used in peer-to-peer networks when sharing files between peersthis is a central server that stores details about other computers that make up the swarm...

Overview and Medical Environment 2023-08-15

Overview and Medical Environment crossword puzzle
Across
  1. CVO _________ a specific Healthcare Organization Handles Organization-Specific credentialing, bigger the system the more customers - part of a not-for-profit organization - may be for-profit and have customers outside of the organization
  2. More than 40 years - vision is to advance healthcare environment that maximizes patient experience- recognition for professionals
  3. __________Care, Medical Office/Surgical Center Structures vary widely depending on size
Down
  1. COV ________ Contracts with many outside organizations - typically for-profit company - must satisfy the accreditation requirements/needs of customers
  2. __________Environment consists of Board of Trustees - Medical Staff Executive Committee - Departments - Committees
  3. ___________ Collectively describe commercial third-party payers, healthcare networks and healthplans
  4. ___________ Consists of Directors - Contract/Sales - Credentialing Staff - Human Resources - Bus. Intel/IT/Data Analyst

7 Clues: __________Care, Medical Office/Surgical Center Structures vary widely depending on size___________ Collectively describe commercial third-party payers, healthcare networks and healthplans__________Environment consists of Board of Trustees - Medical Staff Executive Committee - Departments - Committees...

Happy ageing! 2019-04-17

Happy ageing! crossword puzzle
Across
  1. A method in which cyber criminals use to fraudulently obtain your personal and financial information such as your login details, bank account numbers and credit card numbers.
  2. _______ is also known as for malicious software.
  3. There are 6 different categories of NSA courses: 1) Health & Wellness, 2) IT & Science, 3) Media, Arts & Design, 4) Ageing & Life Skills, 5) Finance & Business and 6)________
  4. What kind of software should I install to prevent malware infection?
Down
  1. NSA has ad-hoc learning opportunities such as ________ Learning Programme that match youths and seniors in a group learning environment.
  2. A "guitar" that has 4 strings instead of 6.
  3. ______ Nation is a national initiative to harness infocomm technologies, networks and big data to create tech-enabled solutions.
  4. Singapore has recently introduced the sixth pillar of Total Defense: _______ Defense.

8 Clues: A "guitar" that has 4 strings instead of 6._______ is also known as for malicious software.What kind of software should I install to prevent malware infection?Singapore has recently introduced the sixth pillar of Total Defense: _______ Defense....

Stay Compliant: Crossword Challenge 2024-09-20

Stay Compliant: Crossword Challenge crossword puzzle
Across
  1. Is a “type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return (1 point)
  2. The best practice when receiving email from external party (2 points)
  3. Any information that when used alone or combine with other information, identifies an individual (1 point)
  4. The practice of manipulating people to gain confidential information through deception (1 point)
Down
  1. Lilly’s code of business conduct (2 points)
  2. Combines several methods of authentication (e.g., a password and a token) to provide greater security when proving your identity (1 point)
  3. Fraudulent attempts to trick individuals into revealing sensitive information through fake emails or websites (1 point)
  4. A program that was established to identify & manage potential risk posed to Lilly by associated third party (1 point)

8 Clues: Lilly’s code of business conduct (2 points)The best practice when receiving email from external party (2 points)The practice of manipulating people to gain confidential information through deception (1 point)Any information that when used alone or combine with other information, identifies an individual (1 point)...

Stay Compliance: Crossword Challenge 2024-10-03

Stay Compliance: Crossword Challenge crossword puzzle
Across
  1. A program that was established to identify & manage potential risk posed to Lilly by associated third party (1 point)
  2. The practice of manipulating people to gain confidential information through deception (1 point)
  3. Is a “type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return (1 point)
  4. Lilly’s code of business conduct (2 points)
  5. Combines several methods of authentication (e.g., a password and a token) to provide greater security when proving your identity (1 point)
  6. Fraudulent attempts to trick individuals into revealing sensitive information through fake emails or websites (1 point)
Down
  1. The best practice when receiving email from external party (2 points)
  2. Any information that when used alone or combine with other information, identifies an individual (1 point)

8 Clues: Lilly’s code of business conduct (2 points)The best practice when receiving email from external party (2 points)The practice of manipulating people to gain confidential information through deception (1 point)Any information that when used alone or combine with other information, identifies an individual (1 point)...

LIVING ONLINE 2015-08-24

LIVING ONLINE crossword puzzle
Across
  1. Process where files, data or e-mail messages are intentionally made unreadable without a mechanism to decode it.
  2. Copying something created by someone else not giving credit
  3. Malicious program installed with¬out the user’s knowledge while surfing the Internet that tracks the user’s activities and gathers other information.
  4. Wireless technology used to network computers together and to other devices like printers or servers.
  5. Password with at least eight characters containing a mixture of uppercase and lowercase letters, numbers and punctuation or symbol characters.
  6. Any field in a form on a Web page or other document where the user can enter text.
  7. Saved URL
  8. Unique name given to each network and used to identify specific e-mail and Web servers.
  9. Buying and selling products and ser¬vices by bidding over the Internet
  10. Sending an existing e-mail message on to a new recipient
  11. Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network.
  12. Program that combs the Internet, cataloging all the Web pages it finds and storing the results in a search¬able database.
  13. Malicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload comput¬ers and networks.
  14. Standards used to control how data is sent over a network
  15. Characters created using the colon or semicolon keys for eyes to express emotion in a text or e-mail message, such as :) or :(.
  16. Boolean search operator that requires both search terms to be included in the search results
  17. Concept that says you don’t need permission to include limited excerpts from another author’s work when reviewing or analyzing it
  18. E-mail attack or scam designed to gather information from a user while appearing to be safe
  19. Disposing of paper and other products so they can be processed for reuse
Down
  1. Pieces of text that are stored on the computer as you surf the Internet that help Web sites track your activities.
  2. Password that contains anything that could be easy to guess, such as birthdays, names, or strings of fewer than eight characters.
  3. Businesses that have a physical location.
  4. Area at the top of a Web browser that displays the URL of the current site or the site a user is about to access.
  5. A program or feature used to block spam or e-mail messages from specific senders
  6. Any machine attached to a network: client, server, printer, and so on.
  7. Most popular search engine.
  8. Security devices that read finger¬prints, analyze a user’s voice, and so on to provide secure access.
  9. Part of an IP address that defines the network from which a user is then accessing the Internet.
  10. Bad hacker who creates malicious programs to break into computers and do harm
  11. Microsoft’s dedicated e-mail soft¬ware program.
  12. Default Web page that opens when a browser is launched.
  13. Used by machines like an ATM to conduct secure transactions.
  14. Unsolicited e-mail message sent by someone you don’t know.
  15. Boolean operator that excludes specific words from search results.
  16. Feature that enables a user quickly look through files or e-mail mes¬sages for a key word or phrase.
  17. A delivered e-mail message has been ___________.

36 Clues: Saved URLMost popular search engine.Businesses that have a physical location.Microsoft’s dedicated e-mail soft¬ware program.A delivered e-mail message has been ___________.Default Web page that opens when a browser is launched.Sending an existing e-mail message on to a new recipientStandards used to control how data is sent over a network...

LIVING ONLINE 2015-08-17

LIVING ONLINE crossword puzzle
Across
  1. Used by machines like an ATM to conduct secure transactions.
  2. Saved URL
  3. Sending an existing e-mail message on to a new recipient
  4. Default Web page that opens when a browser is launched.
  5. Malicious program installed with¬out the user’s knowledge while surfing the Internet that tracks the user’s activities and gathers other information.
  6. Copying something created by someone else not giving credit
  7. Password that contains anything that could be easy to guess, such as birthdays, names, or strings of fewer than eight characters.
  8. Businesses that have a physical location.
  9. Pieces of text that are stored on the computer as you surf the Internet that help Web sites track your activities.
  10. Wireless technology used to network computers together and to other devices like printers or servers.
  11. Bad hacker who creates malicious programs to break into computers and do harm
  12. Area at the top of a Web browser that displays the URL of the current site or the site a user is about to access.
  13. E-mail attack or scam designed to gather information from a user while appearing to be safe
  14. Feature that enables a user quickly look through files or e-mail mes¬sages for a key word or phrase.
  15. Security devices that read finger¬prints, analyze a user’s voice, and so on to provide secure access.
  16. Characters created using the colon or semicolon keys for eyes to express emotion in a text or e-mail message, such as :) or :(.
  17. Any machine attached to a network: client, server, printer, and so on.
  18. Boolean search operator that requires both search terms to be included in the search results
Down
  1. Standards used to control how data is sent over a network
  2. Program that combs the Internet, cataloging all the Web pages it finds and storing the results in a search¬able database.
  3. Password with at least eight characters containing a mixture of uppercase and lowercase letters, numbers and punctuation or symbol characters.
  4. Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network.
  5. Unsolicited e-mail message sent by someone you don’t know.
  6. Malicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload comput¬ers and networks.
  7. A program or feature used to block spam or e-mail messages from specific senders
  8. Concept that says you don’t need permission to include limited excerpts from another author’s work when reviewing or analyzing it
  9. Most popular search engine.
  10. Process where files, data or e-mail messages are intentionally made unreadable without a mechanism to decode it.
  11. Microsoft’s dedicated e-mail soft¬ware program.
  12. Boolean operator that excludes specific words from search results.
  13. Any field in a form on a Web page or other document where the user can enter text.
  14. Part of an IP address that defines the network from which a user is then accessing the Internet.
  15. Buying and selling products and ser¬vices by bidding over the Internet
  16. Disposing of paper and other products so they can be processed for reuse
  17. Unique name given to each network and used to identify specific e-mail and Web servers.
  18. A delivered e-mail message has been ___________.

36 Clues: Saved URLMost popular search engine.Businesses that have a physical location.Microsoft’s dedicated e-mail soft¬ware program.A delivered e-mail message has been ___________.Default Web page that opens when a browser is launched.Sending an existing e-mail message on to a new recipientStandards used to control how data is sent over a network...

Tencho Definitions 2022-02-25

Tencho Definitions crossword puzzle
Across
  1. Data data that contains greater variety, arriving in increasing volumes and with more velocity
  2. a course of study made available over the internet without charge to a very large number of people.
  3. posting a single message or piece of content to multiple destinations.
  4. Networks a computer system modeled on the human brain and nervous system.
  5. the state or quality of being efficient.
  6. 360 video recordings where a view in every direction is recorded at the same time, shot using an omnidirectional camera or a collection of cameras.
  7. the formation of ideas or concepts.
  8. Computing a rapidly-emerging technology that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.
  9. a form of entertainment
  10. business model in which a company offers basic or limited features to users at no cost and then charges a premium for supplemental or advanced features.
  11. Audio high-resolution audio files are superior sound quality over compressed audio formats such as MP3 and AAC.
  12. Solar Systems permits electricity to be harnessed by solar panels and stored inside a battery without direct connection to the utility grid.
  13. content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page.
  14. the state, fact, quality, or condition of being singular.
  15. someone who would like to start a business and thinks and talks about doing so, but never gets started.
Down
  1. a mobile device used while watching television especially to access supplementary content or applications
  2. a person, company, or technology that changes the way an industry operates.
  3. reuse (discarded objects or material) in such a way as to create a product of higher quality or value than the original.
  4. fusion the process of combining sensor data or data derived from disparate sources such that the resulting information has less uncertainty than.
  5. the correct or acceptable way of communicating on the internet
  6. Leader one whose views on a subject are taken to be authoritative and influential.
  7. a person who introduces new methods, ideas, or products.
  8. denoting or relating to a period of a thousand years.
  9. Fatigue the feeling experienced by many people who are required to remember an excessive number of passwords as part of their daily routine.
  10. a standards-based wireless technology developed to enable low-cost, low-power wireless machines a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
  11. take (something) illicitly; steal.
  12. an image, video, advertisement, etc., that is circulated rapidly on the internet.
  13. Optimization the process of ensuring that visitors who access your site from mobile devices have an experience optimized for the device.
  14. the application of typical elements of game playing (e.g. point scoring, competition with others, rules of play) to other areas of activity, typically as an online marketing technique to encourage engagement with a product or service.
  15. is King you should focus on putting out good content frequently and consistently.
  16. a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
  17. short for key performance indicator.
  18. or Radio detection and ranging: a detection system that uses radio waves to determine the distance (ranging), angle, or velocity of objects.

33 Clues: a form of entertainmenttake (something) illicitly; steal.the formation of ideas or concepts.short for key performance indicator.the state or quality of being efficient.denoting or relating to a period of a thousand years.a person who introduces new methods, ideas, or products.the state, fact, quality, or condition of being singular....

Network Security Fundamentals 2022-04-25

Network Security Fundamentals crossword puzzle
Across
  1. This type of vulnerability might include TCP/IP Protocol weaknesses, Operating System Weaknesses, and Network Equipment weaknesses.
  2. A type of access attack that is implemented using brute force, trojan horse, and packet sniffers.
  3. This physical threat includes physical damage to servers, routers, switches, cabling plant, and workstations
  4. A type of network attack that is defined by the unauthorized manipulation of data, system access, or user privileges.
  5. Similar to a virus in that it replicates functional copies of itself, but it is standalone software and does not require a host program or human help to propagate.
  6. The degree of weakness in a network or a device.
  7. An infected host.
  8. Short for "malicious software".
  9. A network of zombies.
  10. A harmful piece of software that looks legitimate. They self-replicate and must spread through user interaction such as opening an email attachment or downloading and running a file from the internet.
  11. Similar to a DoS attack, but it originates from multiple, coordinated sources.
  12. A type of access attack where a threat actor uses a compromised system as a base for attacks against other targets.
  13. This type of vulnerability might include lack of a written security policy, politics, lack of authentication continuity, logical access controls not applied, software and hardware installation and changes not following policy, and a nonexistence disaster recovery plan.
  14. This physical threat includes poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling.
Down
  1. This physical threat includes voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
  2. A type of network attack that is defined by the discovery and mapping of systems, services, or vulnerabilities.
  3. A type of malware that propagates by inserting a copu of itself into, and becoming part of, another program. It spread from one computer to the other.
  4. Prevents or allows access by specific application types based on port numbers.
  5. A type of access attack where the threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.
  6. This type of vulnerability might include unsecured user accounts, system accounts, with easily guessed password, misconfigured internet services, unsecure default settings, and misconfigured network equipment.
  7. Prevents or allows access based on IP or MAC addresses.
  8. An internet tool used to easily determine the IP address space assigned to a given corportation or entity.
  9. Has the capability to recognize and filter out specific types of attacks, such as a denial of service (DoS).
  10. This physical threat includes temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
  11. Also called a host. It is an individual computer system or devices that acts as a network client.
  12. A type of access attack where a threat actor uses aunauthorized privileges to gain access to a system, possibily compromisng the target.
  13. A type of network attach that is defined by the disabling or corruption of networks, systems, or services.
  14. Resides between two or more networks, controls the traffic between them, and helps prevent unauthorized access.
  15. Prevents or allows access to websites based on specific URLs or keywords.
  16. Enables a network administrator to apply specific policies for hosts connected to that network.

30 Clues: An infected host.A network of zombies.Short for "malicious software".The degree of weakness in a network or a device.Prevents or allows access based on IP or MAC addresses.Prevents or allows access to websites based on specific URLs or keywords.Prevents or allows access by specific application types based on port numbers....

Cyber Defense Terms 2023-11-20

Cyber Defense Terms crossword puzzle
Across
  1. a program that uses virus detection technology to protect users from viruses, spyware, trojans, and worms that can infect equipment through email or internet browsing
  2. the process of verifying the identity of a user or piece of information and the veracity of information provided, e.g. with a password or other credential
  3. a bit of code that provides additional, revised, or updated data for an operating system or application
  4. cybersecurity services that operate from within a network and not at the endpoint and can therefore protect any connected device regardless of model or operating system
  5. features which may be included in digital television services, computer and video games, mobile devices, and software that allow parents to restrict the access of content to their children
  6. the concept of continuing to operate without interruption despite an emergency situation
  7. Secure __________ Layer is the standard security technology for establishing an encrypted link between a web server and a browser
  8. Indicators of ___________ are bits of forensic data from system log entries or files that identify potentially malicious activity on a system or network
  9. An Intrusion ____________ System is a network security system designed to prevent network penetration by malicious actors
  10. __________ Assessment is a structured process used to identify and evaluate various risks that an organization might be exposed to
  11. the concept of ensuring that data and systems have not been accessed or modified and are therefore accurate and trustworthy
Down
  1. a control list that allows and denies elements such as email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc. through the system
  2. Completely Automated Public Turing test to tell Computers and Humans Apart - a challenge-response test commonly used by websites to verify the user is a real human and not a bot
  3. a program designed to protect computers and networks against any threats or attacks from viruses such as adware, spyware, and any such other malicious programs
  4. a process of maintaining data confidentiality by converting plain data into secret code with the help of an algorithm
  5. ____________ Authentication combines a static password with an external authentication device such as a phone or email for added security
  6. Security __________ Response is a planned approach to addressing and managing the reaction after a cyber attack or network security breach
  7. a list of permitted items that are automatically let through whatever gate is being used, e.g. allowed sites, users, email addresses
  8. creating an isolated environment on a network that mimics a regular computer in order to safely execute suspicious code without risking harm
  9. a digital boundary that is defined for a system or domain and within which a specified security policy is applied
  10. extends a private network across a public network - essentially a virtual, secure corridor
  11. a facility where information systems (websites, applications, databases, data centers and servers, networks, desktops, and other endpoints) are monitored, assessed, and defended by analysts
  12. a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating
  13. the practice of intentionally challenging the security of a computer system, network, or web application to discover vulnerabilities that an attacker or hacker could exploit

24 Clues: the concept of continuing to operate without interruption despite an emergency situationextends a private network across a public network - essentially a virtual, secure corridora bit of code that provides additional, revised, or updated data for an operating system or application...

Technology 2024-01-10

Technology crossword puzzle
Across
  1. person who receives something
  2. a device which copies pictures and documents so that they can be stored on a computer
  3. person that a letter, etc. is addressed to
  4. mobile phone that also has some of the functions of a computer, for example the facility to use apps and the internet
  5. designed to do a particular job
  6. a system for connecting to the internet or sending data over computer networks using radio waves instead of wires
  7. move your finger quickly across the screen of an electronic device such as a mobile phone or small computer in order to move text, pictures, etc. or give commands
  8. made to appear to exist by the use of computer software, for example on the internet
  9. device that is placed inside a car engine, clock, radio, etc. and that produces the electricity that makes it work
  10. act of putting electricity into a battery; the electricity in a battery
  11. small computer that is easy to carry, with a large touch screen and usually without a physical keyboard
  12. ​connected with technology
  13. series of electrical waves that carry sounds, pictures or messages, for example to a radio, television or mobile phone
  14. piece of software that you can download to a device such as a smartphone or tablet, for example to look up information or to play a game,
  15. number of computers and other devices that are connected together so that equipment and information can be shared
  16. the set of letters that you can touch to write on a smartphone or tablet
Down
  1. screen on a computer, phone, etc. that allows you to give instructions to the device by touching areas on it
  2. available on or done using the internet or other computer network
  3. object or a piece of equipment that has been designed to do a particular job
  4. process of keeping information, etc. on a computer; the way it is kept
  5. a machine for printing text on paper, especially one connected to a computer
  6. person who receives something
  7. join something to the main supply of electricity, gas, water, etc. or to another piece of equipment
  8. act of giving wrong information about something; the wrong information that is given
  9. send data to another computer
  10. small computer that can work with a battery and be easily carried
  11. international computer network connecting other networks and computers that allows people to share information around the world
  12. message sent using the Twitter™ social media service
  13. small device on which you can store and read texts taken from the internet; an application on a device that enables you to do this
  14. place the thumb and a finger of one hand on the screen of an electronic device such as a mobile phone or small computer and move them together or apart, to make the image on the screen appear smaller or larger
  15. UP move higher through text or graphics on a computer
  16. get data from another computer, usually using the internet
  17. DOWN move lower through text or graphics on a computer
  18. phone connection that uses wires carried on poles or under the ground, in contrast to a mobile phone
  19. MEDIA software programs used for social networking
  20. hit something quickly and lightly
  21. official system used for sending and delivering letters, packages, etc.

37 Clues: ​connected with technologyperson who receives somethingperson who receives somethingsend data to another computerdesigned to do a particular jobhit something quickly and lightlyperson that a letter, etc. is addressed toMEDIA software programs used for social networkingmessage sent using the Twitter™ social media service...

Chapter 7: Vocabulary 2023-12-04

Chapter 7: Vocabulary crossword puzzle
Across
  1. ,closed communication systems in which individual beliefs are amplified or reinforced by repetition; they may increase social and political polarization because users do not encounter opposing views
  2. ,the tendency to favor information that confirms a person's existing beliefs; it involves discounting evidence that could disprove or challenge those beliefs
  3. ,political blogs and talk shows where the writer or host provides highly opinionated personal commentary, usually through conversations with guests; these formats blur the boundaries between objective journalism and subjective reporting
  4. ,organizations that adhere to the principles of journalism by doing original, balanced, factual reporting; using unpaid, credible sources; conducting interviews ethically; and avoiding personal bias by editors or reporters
  5. ,communication methods such as television and radio; they tend to take the form of one publisher (e.g., a television station) to many (viewers)
  6. ,the media's designation of some issues, events, or people as important and others not
  7. ,false, inaccurate, or misleading information in the media, especially social media; often targeting political candidates and leaders, mis_information can include mani_pulated or fabricated content, satire, and parody content to the public via airwaves on electromagnetic frequencies
  8. ,the putting forth of opinion and information that is consistent with the consumer's preexisting beliefs
  9. ,news reporting and political commentary by ordinary citizens and bystanders, advocacy groups, and eyewitnesses to crises, often using cell phone images or video and distributed via social media
  10. ,giant, often global, corporations that control a wide array of media, including television networks, movie studios, record companies, cable channels, book and newspaper publishers, and digital media outlets
Down
  1. ,websites that pull together news from a wide range of online sources and make them available on one platform or page; news aggregators can be a way to avoid partisan or filtered news, providing a broad overview of the news of the day from many sources
  2. ,digital sites that are owned and managed by newspapers, follow the principles of journalism, and deliver content like that of print newspapers, with similar story layout for all users regardless of location, demographic characteristics, partisanship, or friend networks
  3. ,the process of calling attention to some issues, and not others, when reporting on political events and officials
  4. ,reporting that involves being as accurate, fair, and balanced as possible, relying on original sources, being transparent about citing sources, and presenting multiple viewpoints
  5. ,news organizations that mix opinion-driven journalism with factual reporting in order to appeal to consumers who are ideologically liberal or conservative; often characterized by ideological agenda setting, priming, and framing
  6. ,the publishing or broadcasting of information or opinion as quickly as possible, with minimal fact-checking
  7. ,software programs that analyze the viewing, liking, and commenting data of all of a platform's users, as well as individual users' prior data, to present users with additional content tailored to their individual interests instead of ordering posts based on the most recently published (as broadcast media do)
  8. ,partisan media environments in which users are exposed primarily to opinions and information that conform to their existing beliefs; constructed by algorithms that analyze and then personalize each user's online experience
  9. ,a form of reporting in which the media adopt a skeptical or hostile posture toward the government and public officials
  10. ,print and digital forms of communication—including television, newspapers, radio, the internet, and social media sites—that convey information to large audiences
  11. ,the process of presenting information from a certain perspective in order to shape the audience's understanding of that information

21 Clues: ,the media's designation of some issues, events, or people as important and others not,the putting forth of opinion and information that is consistent with the consumer's preexisting beliefs,the publishing or broadcasting of information or opinion as quickly as possible, with minimal fact-checking...

Computer Acronyms RT 2026-02-07

Computer Acronyms RT crossword puzzle
Across
  1. Digital visual interface(Interface used to connect computer [graphics card] to a display monitor[videos, images, ect[video source to interface])
  2. redundant array of independent disks (used in computing to improve data storage reliability and performance across multiple drives)
  3. network interface card (expansion card or integrated circuit that connect copmuter/device to a network enabling wired(ethernet) and or wireless[wifi] communication)
  4. control unit(manages and coordinates computers operations by interpretation instructions, directing data flow, generating signals to control other hardware)
  5. advanced technology system (interface for connecting storage devices like hard drives to computers)
  6. basic input and output system(foundational hardware that initializes test and configurates hardware during computer start up process)
  7. all-flash array(data storage in system that contains only flash memory or solid state drives)
  8. micro processor (acts as a CPU, which functions as the brian as the computers semi conductor that fetches, examines, decodes, and executes program instructions[type of CPU])
  9. liquid crystal display ( flat-panel visual displays in a wide range of electronic devices, chosen for its ability to produce sharp, vibrant images while being thin, lightweight, and energy-efficient)
  10. high definition multimedia interface (universal digital standard for sending high quality uncompressed audio and video from a course device[example xbox] to a display[tv])
  11. read only memory ( non violate hardware meaning it retains data without power, stores essential and permanent instruction and data)
  12. serial advanced technology attachment (a computer bus interface that connects host bus adapters (like those on motherboards) to mass storage devices)
Down
  1. Mini integrated network interface (Provides space convinced devices[computer, phones] with high speed reliable network connectivity without requiring full size heavy expansion car0
  2. hard disk drive (an external storage drive)
  3. vital information resources under siege (malicious software [malware] designed to damage and corrupt, or steal info from computers and networks by replicating itself)
  4. character user interface(a text based system where users interact with software solely by typing commands via a key board)
  5. graphic processing unit(Specialized processing units used to accelerate tasks like high end gaming, video editing, 3d rendering, ect)
  6. video graphics array (connects computers, and electronics to monitors)
  7. universal serial bus (connects computers, devices, and electronics for data transmission between devices)
  8. new technology file system (storing, organizing, and retrieving files on hard disk drives (HDDs) and solid-state drives (SSDs).
  9. arithmetic logic unit(foundational digital circuit that performs all mathematical equations/subtraction and addition)
  10. solid state drive (non volatile high-speed data storage devices to provide fast, durable, and energy-efficient, non-volatile storage for operating systems, applications, and data, replacing traditional hard disk drives)
  11. random access memory (violate high speed hardware in computer and devices that provides temporary storage for short term data)
  12. computer processing unit(interprets and executes instruction from hardware and software)
  13. (Abbreviations): ENET( standard technology for wired local area networks. Provides a secure, high speed wired connection for data transmission between devices[uses physical cable unlike wifi])
  14. multi media card (storing digital data in early mobile phones, digital cameras, MP3 players, and PDAs, acting as a compact, removable, and rewritable storage medium) portable lower power devices used as flash memory drive

26 Clues: hard disk drive (an external storage drive)video graphics array (connects computers, and electronics to monitors)computer processing unit(interprets and executes instruction from hardware and software)all-flash array(data storage in system that contains only flash memory or solid state drives)...

AP US History Period 9 2024-04-29

AP US History Period 9 crossword puzzle
Across
  1. The simulation of human intelligence by computer systems, enabling tasks such as problem-solving, learning, and decision-making, with applications ranging from robotics to data analysis.
  2. A landmark healthcare reform law signed by President Barack Obama in 2010, aimed at expanding access to healthcare coverage, reducing healthcare costs, and improving the quality of care in the United States.
  3. A grassroots movement advocating for racial justice and equality, particularly in response to police brutality and systemic racism against Black communities, sparked by the acquittal of Trayvon Martin's killer in 2013.
  4. A social movement that emerged in the wake of sexual harassment and assault allegations against high-profile individuals, aiming to raise awareness about sexual violence, support survivors, and advocate for institutional change.
  5. The process of increasing interconnectedness and interdependence among countries, economies, and cultures, facilitated by advances in technology, transportation, and communication.
  6. Digital or virtual currencies that use cryptography for security and operate independently of central banks or governments
  7. The use of violence, intimidation, or coercion for political, religious, or ideological purposes, often targeting civilians or non-combatants
  8. The process of urban redevelopment or revitalization, often resulting in the displacement of lower-income residents and the transformation of neighborhoods into higher-income, more affluent areas.
  9. a political ideology characterized by its advocacy for assertive foreign policy, promotion of democracy, and belief in the use of military force to spread American values and interests abroad.
  10. Online platforms and technologies that enable users to create, share, and exchange information and content
Down
  1. The economic policies implemented during the presidency of Ronald Reagan, characterized by tax cuts, deregulation, and a focus on supply-side economics to stimulate economic growth.
  2. The disproportionate imprisonment of individuals, particularly from marginalized communities such as Black and Hispanic populations, resulting from harsh sentencing laws, racial bias, and socioeconomic factors.
  3. The manipulation of an organism's genetic material using biotechnology techniques
  4. A military campaign initiated by President George W. Bush in response to the 9/11 attacks, aimed at combating terrorism, eliminating terrorist networks, and promoting democracy and stability in the Middle East and beyond.
  5. A federal agency established in 2002 in response to the 9/11 attacks, tasked with protecting the United States from terrorist threats, securing borders, and coordinating emergency response efforts.
  6. Measures and practices aimed at protecting computer systems, networks, and data from cyber threats such as hacking, malware, and data breaches
  7. A conservative political movement that emerged in the early 21st century, characterized by opposition to government spending, taxation, and regulation, and advocating for limited government and fiscal responsibility.
  8. known for being the first African American president, his healthcare reform initiative (Affordable Care Act), and efforts to address economic recovery and climate change.
  9. A public health crisis involving the misuse, addiction, and overdose deaths related to prescription opioids, heroin, and synthetic opioids such as fentanyl, leading to widespread social and economic consequences.
  10. The eighth and final leader of the Soviet Union, serving as General Secretary of the Communist Party from 1985 until 1991 and is widely known for his policies of glasnost (openness) and perestroika (restructuring), which aimed to reform the Soviet political and economic systems, but ultimately led to the dissolution of the Soviet Union and the end of the Cold War.

20 Clues: The manipulation of an organism's genetic material using biotechnology techniquesOnline platforms and technologies that enable users to create, share, and exchange information and contentDigital or virtual currencies that use cryptography for security and operate independently of central banks or governments...

Chapter 12 Culture 2016-04-25

Chapter 12 Culture crossword puzzle
Across
  1. an unjustified negative attitude toward an individual because of the individual's membership in a group
  2. emphasizes values that serve the self and gives priority to personal goals rather than group goals
  3. emphasizes values that serve the group by subordinating personal goals to preserve group integrity
  4. the core of computer-mediated communication. The internet system is worldwide and connects thousands of computer networks, providing and incredible array of information-both positive and negative- that adolescents can access
Down
  1. a tendency to favor one's own group over other groups
  2. refers to a grouping of people with similar occupational, educational, and economic characteristics
  3. the behavior, patterns, beliefs, and all other products of a particular group of people that re passed on from generation to genration
  4. a dimension of culture based on cultural heritage, national characteristics, race, religion, and language

8 Clues: a tendency to favor one's own group over other groupsemphasizes values that serve the self and gives priority to personal goals rather than group goalsemphasizes values that serve the group by subordinating personal goals to preserve group integrityrefers to a grouping of people with similar occupational, educational, and economic characteristics...

The Fall of Rome 2017-02-03

The Fall of Rome crossword puzzle
Across
  1. The result of trading over trade networks
Down
  1. Emperor who divided Rome in half, and east and west half
  2. Group that attacked Rome in 410 BCE

3 Clues: Group that attacked Rome in 410 BCEThe result of trading over trade networksEmperor who divided Rome in half, and east and west half

6th Grade Computers Vocabulary 3 2017-11-08

6th Grade Computers Vocabulary 3 crossword puzzle
Across
  1. an online journal where people post about their experiences
  2. a worldwide network of computer networks
  3. a method of transmitting or receiving data over a computer network as a steady, continuous flow, allowing playback to start while still downloading
  4. used for any high speed Internet Access that is always on and faster than dial up access
  5. to give something electronically to someone else on the internet
  6. the branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information
  7. the symbolic arrangement of data in a computer program
Down
  1. taking something in print and using a computer device, like a scanner to put it on your computer
  2. a computer program that retrieves documents or files or data from a database or from a computer network (especially from the internet)
  3. a point of interaction between a computer system and a user
  4. transfer a file to your computer from another computer
  5. distribute (multimedia files) over the internet for playback on a mobile device or a personal computer. You Tube is an example

12 Clues: a worldwide network of computer networkstransfer a file to your computer from another computerthe symbolic arrangement of data in a computer programan online journal where people post about their experiencesa point of interaction between a computer system and a userto give something electronically to someone else on the internet...

Computer Crossword Puzzle 2018-10-11

Computer Crossword Puzzle crossword puzzle
Across
  1. is a software application for accessing information on the World Wide Web.
  2. is a device that captures images from photographic prints, posters, magazine pages, and similar sources for computer editing and display.
  3. is the smallest unit of measurement greater than a byte. It precedes the megabyte, which contains 1,000,000 bytes.
  4. refers to the creation of a virtual resource such as a server, desktop, operating system, file, storage or network.
  5. is the most common format for storing and transmitting photographic images on the World Wide Web.
Down
  1. is a computer-aided manufacturing (CAM) device that creates three-dimensional objects.
  2. the process of converting information or data into a code, especially to prevent unauthorized access.
  3. is a networking device that forwards data packets between computer networks.
  4. uniform resource locator (URL) is the address of a resource on the Internet.
  5. A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication.
  6. to arrange (something, such as material to be printed or stored data).
  7. is a programming language that produces software for multiple platforms.

12 Clues: to arrange (something, such as material to be printed or stored data).is a programming language that produces software for multiple platforms.is a software application for accessing information on the World Wide Web.is a networking device that forwards data packets between computer networks....

IC3 Lesson 30 2015-05-18

IC3 Lesson 30 crossword puzzle
Across
  1. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
  2. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
  3. Deciphers the information in an SSL Certificate.
  4. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  5. Hackers using spyware to control your browser.
  6. Security feature used for larger networks that controls computers from one point.
Down
  1. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  2. Encrypts the information in an SSL Certificate.
  3. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  4. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
  5. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
  6. A malicious program that records keystrokes.
  7. A program that hackers use to capture IDs and passwords on a network.

13 Clues: A malicious program that records keystrokes.Hackers using spyware to control your browser.Encrypts the information in an SSL Certificate.Deciphers the information in an SSL Certificate.A program that hackers use to capture IDs and passwords on a network.Security feature used for larger networks that controls computers from one point....

Chem 2023-11-16

Chem crossword puzzle
Across
  1. A molecule is a group of two or more atoms held together by attractive forces known as chemical bonds
  2. the process of becoming an acid or the act of making something become an acid
  3. the science of studying networks of interacting molecules, to create new functions from a set of molecules with different hierarchical levels and emergent properties
  4. H₂CO₃
  5. the plants, animals, and other organisms that live in the salt water of seas or oceans
Down
  1. When a change is made to an equilibrium system, the system moves to counteract the imposed change and restore the system to a new equilibrium.
  2. a principle of chemistry used to predict the rates of chemical reactions
  3. the abundance of a constituent divided by the total volume of a mixture
  4. CO2
  5. A state in which the rate of the forward reaction equals the rate of the backward reaction
  6. a measure of how acidic/basic water is
  7. a process that leads to the chemical transformation of one set of chemical substances to another.

12 Clues: CO2H₂CO₃a measure of how acidic/basic water isthe abundance of a constituent divided by the total volume of a mixturea principle of chemistry used to predict the rates of chemical reactionsthe process of becoming an acid or the act of making something become an acid...

Chem 2023-11-16

Chem crossword puzzle
Across
  1. A molecule is a group of two or more atoms held together by attractive forces known as chemical bonds
  2. the process of becoming an acid or the act of making something become an acid
  3. the science of studying networks of interacting molecules, to create new functions from a set of molecules with different hierarchical levels and emergent properties
  4. H₂CO₃
  5. the plants, animals, and other organisms that live in the salt water of seas or oceans
Down
  1. When a change is made to an equilibrium system, the system moves to counteract the imposed change and restore the system to a new equilibrium.
  2. a principle of chemistry used to predict the rates of chemical reactions
  3. the abundance of a constituent divided by the total volume of a mixture
  4. CO2
  5. A state in which the rate of the forward reaction equals the rate of the backward reaction
  6. a measure of how acidic/basic water is
  7. a process that leads to the chemical transformation of one set of chemical substances to another.

12 Clues: CO2H₂CO₃a measure of how acidic/basic water isthe abundance of a constituent divided by the total volume of a mixturea principle of chemistry used to predict the rates of chemical reactionsthe process of becoming an acid or the act of making something become an acid...

Chem 2023-11-16

Chem crossword puzzle
Across
  1. A molecule is a group of two or more atoms held together by attractive forces known as chemical bonds
  2. the process of becoming an acid or the act of making something become an acid
  3. the science of studying networks of interacting molecules, to create new functions from a set of molecules with different hierarchical levels and emergent properties
  4. H₂CO₃
  5. the plants, animals, and other organisms that live in the salt water of seas or oceans
Down
  1. When a change is made to an equilibrium system, the system moves to counteract the imposed change and restore the system to a new equilibrium.
  2. a principle of chemistry used to predict the rates of chemical reactions
  3. the abundance of a constituent divided by the total volume of a mixture
  4. CO2
  5. A state in which the rate of the forward reaction equals the rate of the backward reaction
  6. a measure of how acidic/basic water is
  7. a process that leads to the chemical transformation of one set of chemical substances to another.

12 Clues: CO2H₂CO₃a measure of how acidic/basic water isthe abundance of a constituent divided by the total volume of a mixturea principle of chemistry used to predict the rates of chemical reactionsthe process of becoming an acid or the act of making something become an acid...

Internet 2023-12-18

Internet crossword puzzle
Across
  1. Transfer data from a computer to a central computer or website
  2. Media Websites and applications that enable users to create and share content or participate in social networking
  3. Copying data from one computer to another or to a device
  4. A global computer network providing a variety of information and communication facilities
  5. A location connected to the Internet that maintains one or more pages on the World Wide Web
  6. A program with a graphical user interface for displaying HTML files, used to navigate the internet
  7. A facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly
Down
  1. Engine A program that searches for and identifies items in a database matching keywords provided by the user
  2. Software specifically designed to harm or exploit devices, networks, or data
  3. A secret word or phrase that must be used to gain access to something
  4. Transmitting or receiving data, especially video and audio, over a computer network in real-time
  5. A network security system that monitors and controls incoming and outgoing network traffic

12 Clues: Copying data from one computer to another or to a deviceTransfer data from a computer to a central computer or websiteA secret word or phrase that must be used to gain access to somethingSoftware specifically designed to harm or exploit devices, networks, or data...

13 Facts of Chapter 17.1 2019-04-17

13 Facts of Chapter 17.1 crossword puzzle
Across
  1. Every ___ years, national elections are held to select all representatives and one-third of the senators.
  2. The most important communication tool for a presidential candidate is __________.
  3. Direct _________ to candidates or parties also come from political action committees, or PACs.
  4. To be elected president, a candidate must win 270 of the 538 available _________ votes.
  5. The 1974 campaign finance law established public funding for presidential _________.
  6. The BRCA banned soft money donations to national _________ parties, but it raised the limit for individual direct donations to $2,000.
Down
  1. In the 2008 elections, presidential and congressional candidates spent more than $4 _______.
  2. President Obama used social networks such as YouTube and ________
  3. ____________________ (two words, no spaces) are one of the possibilities that television offers for a candidate to shape his or her image to voters.
  4. The __________ Campaign Reform Act (BRCA) targeted issue advertising and soft money donations to national political parties.
  5. _______ races in the spring help narrow the field of candidates.
  6. In 2004, Howard Dean was the first to raise significant contributions on the Web and to gain support through www.______.com.

12 Clues: _______ races in the spring help narrow the field of candidates.President Obama used social networks such as YouTube and ________The most important communication tool for a presidential candidate is __________.The 1974 campaign finance law established public funding for presidential _________....

Redalert ICS CTF 2019-07-23

Redalert ICS CTF crossword puzzle
Across
  1. This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
  2. This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
  3. May sometime be known as Industroyer
  4. Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
  5. This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
Down
  1. A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
  2. This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
  3. The world’s most murderous malware
  4. A network security measure employed on one or more computers to physically isolated from another network.
  5. This malware was reported to be involved with the 2015 cyber attacks in Ukraine
  6. A RAT targeting the ICS industry by the hacking group Dragonfly
  7. This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.

12 Clues: The world’s most murderous malwareMay sometime be known as IndustroyerA RAT targeting the ICS industry by the hacking group DragonflyThis malware was reported to be involved with the 2015 cyber attacks in UkraineThis is an attack on bluetooth connections which allows for complete takeover of targeted devices....

HTHSCI 3GG3 - Policy Development (3I+E Model) Crossword 2020-12-04

HTHSCI 3GG3 - Policy Development (3I+E Model) Crossword crossword puzzle
Across
  1. ____ cake federalism, where there exists shared powers between the federal and state/provincial government
  2. The ability to overturn government decisions
  3. Type of influence which can include money (e.g., political donations) and in-kind benefits (e.g, foot soldiers). Common example with physicians where they can voice their opposition to patients
  4. _____ cake federalism, where there exists reserved powers delegated to provinces/states
  5. Type of influence which can include engendering an anticipatory reaction and influencing public opinion
  6. Encompasses knowledge/beliefs about "what is" and values/mass opinion about "what ought to be"
  7. Factors that can trigger action towards policy development, examples include political, economical, or technological changes
Down
  1. The OMA is considered a ___ pluralist policy network
  2. A policy is more likely to be developed if influential interest groups face _____ benefits
  3. A policy is more likely to be developed if influential interest groups face _____ costs
  4. A change to the private delivery model of healthcare services in Ontario (core-bargain) would be considered a highly ___ change
  5. Part of the 3I+E model that encompasses government structures, policy legacies, and policy networks

12 Clues: The ability to overturn government decisionsThe OMA is considered a ___ pluralist policy networkA policy is more likely to be developed if influential interest groups face _____ costs_____ cake federalism, where there exists reserved powers delegated to provinces/states...

Safety Online 2024-04-20

Safety Online crossword puzzle
Across
  1. a self-replicating type of malware that spreads across computer networks by exploiting vulnerabilities in operating systems or network protocols
  2. unauthorized access to computer systems, typically with the intention of stealing or destroying data
  3. a type of software designed to detect and remove malicious software from computer systems
  4. a type of malicious software that replicates itself and spreads to other computer systems or files by attaching its code to host programs or documents
  5. unwanted electronic messages, typically sent in bulk
  6. malicious software
  7. malicious software designed to secretly monitor and collect information about a user's activities on an electronic device
Down
  1. a type of malware that masquerades as legitimate software to deceive users into installing it on their systems
  2. a software patch or release containing fixes, improvements, or new features designed to enhance the performance of a program
  3. a type of cyber attack in which attackers attempt to deceive individuals by posing as trustworthy entities in electronic communications
  4. a security system that monitors and controls incoming and outgoing network traffic
  5. a secret combination of characters, used to authenticate a user's identity and grant access to a computer system

12 Clues: malicious softwareunwanted electronic messages, typically sent in bulka security system that monitors and controls incoming and outgoing network traffica type of software designed to detect and remove malicious software from computer systemsunauthorized access to computer systems, typically with the intention of stealing or destroying data...

Datawarehousing and Data Mining Crossword Puzzle 2024-04-13

Datawarehousing and Data Mining Crossword Puzzle crossword puzzle
Across
  1. DM functionality of summarization DM functionality of the general characteristics or features of a target class of data
  2. _____________ database stores sequences of ordered events, with or without a concrete notion of time.
  3. database typically stores relational data that include time-related attributes
  4. Data pre-processing step in which multiple data sources may be combined
  5. DM functionality of comparison of the target class with one or a set of comparative classes
  6. Data pre-processing step to remove noise and inconsistent data
Down
  1. A __________ database that stores spatial objects that change with time is called a spatiotemporal database
  2. ______________ analysis describes and models regularities or trends for objects whose behavior changes over time.
  3. Geographical Maps can be represented in _________ format, where roads, bridges, buildings, and lakes are represented as unions or overlays of basic geometric constructs, such as points,lines, polygons, and the partitions and networks formed by these components.
  4. Data pre-processing step in which Data relevant to the analysis task are retrieved from the database
  5. ___________________ databases store image, audio, and video data.
  6. Data objects that do not comply with the general behavior or model of the data.

12 Clues: Data pre-processing step to remove noise and inconsistent data___________________ databases store image, audio, and video data.Data pre-processing step in which multiple data sources may be combineddatabase typically stores relational data that include time-related attributes...

18CSE455T-Database Security and Privacy Crossword2 2024-05-30

18CSE455T-Database Security and Privacy Crossword2 crossword puzzle
Across
  1. Structured collection of data organized into rows and columns, forming the foundation for database (5)
  2. Process of restoring database functionality and data integrity after a security incident or failure (8)
  3. Method of encoding data to prevent unauthorized access, ensuring confidentiality (10)
  4. Unauthorized access or breach into a database system, posing a threat to its security (9)
  5. Secret code used to authenticate and grant access to a database system, often paired with a username (8)
  6. Unauthorized attempt to gain access to a database system or exploit its vulnerabilities (7)
  7. Deceptive technique used to trick users into revealing sensitive information, often via fraudulent emails or websites (8)
Down
  1. Unauthorized access or leakage of sensitive data from a database system, compromising its integrity (6)
  2. Process of granting or denying access rights to users based on their authenticated identity (13)
  3. Barrier preventing unauthorized access to a database system from external networks, controlling traffic (8)
  4. Process of verifying user identity for accessing database resources (13)
  5. The process of decoding encrypted data to make it readable, often requiring an encryption key (10)

12 Clues: Process of verifying user identity for accessing database resources (13)Method of encoding data to prevent unauthorized access, ensuring confidentiality (10)Unauthorized access or breach into a database system, posing a threat to its security (9)Unauthorized attempt to gain access to a database system or exploit its vulnerabilities (7)...

Crossword for Examen de Mesa2 2023-06-27

Crossword for  Examen de Mesa2 crossword puzzle
Across
  1. It is a digital ledger of transactions that is duplicated and distributed across the network of computer systems.(10)
  2. It refers to the set of instructions, or a system of rules, written in a particular programming language.(4)
  3. A generic term describing all kinds of computer programs, applications and operating systems.(8)
  4. It is an interdisciplinary science with multiple approaches in machine learning.(2)
  5. It is the science and engineering that focuses on the design and manufacture of extremely small devices .(14)
  6. It allows us to describe how information will be displayed on web pages.(4)
  7. Robot vision that allow gather information about its environment.(6)
Down
  1. Concurrent execution of two or more tasks by a processor.(12)
  2. It is the process of protecting the computer systems, networks, devices, and programs.(13)
  3. It is the fundamental part of an OS responsible of management and file access .(6)
  4. Its role is to respond with maximum relevance to questions asked by internet users .(7)
  5. Converts a program to a language that the computer understands.(8)

12 Clues: Concurrent execution of two or more tasks by a processor.(12)Converts a program to a language that the computer understands.(8)Robot vision that allow gather information about its environment.(6)It allows us to describe how information will be displayed on web pages.(4)...

Chapter 1: Exercise 1 2023-04-04

Chapter 1: Exercise 1 crossword puzzle
Across
  1. _________ digitally enabled of transactions and processes within a firm, involving information systems under the control of the firm.
  2. _________ is a marketplace extended beyond traditional boundaries and removed from temporal and geographic location.
  3. _________ is the technology allow the targeting of marketing message to a person’s name, interests, and past purchases.
  4. _________ available just about everywhere, at all times: at work, at home and elsewhere via mobile devices, anytime.
  5. _________ digitally enabled commercial transactions between and among organizations and individuals.
  6. _________ technology is when it allow content generation and social networks.
  7. _________ richness is when it allow the complexity and content of a message for example we can include video, audio and text messages into the website.
Down
  1. _________ reach is when the technology allow reaches across national boundaries, around the earth.
  2. _________ is the technology that allows for two-way communication between merchant and consumer
  3. _________ density is a condition when the total amount and quality of information available to all market participants.
  4. In traditional commerce, a _________ is a physical place you visit in order to transact. For example, furniture and television typically motivate the consumer to go someplace to make a purchase
  5. E-business does not include commercial _________.
  6. _________ standards is when there is only one set of technology standards used, namely internet standards.

13 Clues: E-business does not include commercial _________._________ technology is when it allow content generation and social networks._________ is the technology that allows for two-way communication between merchant and consumer_________ reach is when the technology allow reaches across national boundaries, around the earth....

Employee Selection 2023-08-04

Employee Selection crossword puzzle
Across
  1. Legal documents that set out the terms of an agreement between two or more parties
  2. The feeling of contentment or pleasure that someone experiences when they have met their needs or expectations
  3. A global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link billions of devices worldwide
  4. A process of discussion and bargaining between two or more parties in order to reach an agreement
  5. A computer program that models a real-world situation Simulations can be used to train employees or to test new products or services
  6. Marks made by people to indicate that they have read and agreed to the terms of a document
Down
  1. The act of ending someone's employment
  2. A written document that outlines the terms and conditions of employment for a potential employee
  3. Successes that someone has achieved
  4. The act of formally quitting a job
  5. Relating to the law system
  6. A way for potential employees to learn more about a company and its culture by visiting the workplace and meeting with employees

12 Clues: Relating to the law systemThe act of formally quitting a jobSuccesses that someone has achievedThe act of ending someone's employmentLegal documents that set out the terms of an agreement between two or more partiesMarks made by people to indicate that they have read and agreed to the terms of a document...

Topic 8 2020-11-25

Topic 8 crossword puzzle
Across
  1. Provide legislation either friendly or oversight to a interest group.
  2. Networks, consist of people in Washington-based interest groups, congressional staffs, universities, think tanks & media who debate government policy on a certain subject.
  3. of Defense, Increase or decrease spending, fund research, military, security measure around the nation.
Down
  1. groups, Gather electoral support for a congressional candidate by encouraging to vote or money to the candidate.
  2. Door, the movement of individuals back and forth between the private sector and the public sector
  3. of Agriculture, Serves as an advocate for those in the farming business.
  4. a person who tries to influence legislation on behalf of a special interest or a member of a lobby.
  5. system of government in which most of the important decisions are made by state officials rather than by elected representatives.
  6. Triangle, policy making relationship between an interest group, congressional committee and bureaucratic agency.

9 Clues: Provide legislation either friendly or oversight to a interest group.of Agriculture, Serves as an advocate for those in the farming business.Door, the movement of individuals back and forth between the private sector and the public sectora person who tries to influence legislation on behalf of a special interest or a member of a lobby....

tim 2013-09-08

tim crossword puzzle
Across
  1. Authorising to perform a particular task or make use of a particular software
  2. Uniform Resource Locator-an internet address
  3. Software Commercial software, usually packaged in cellophane wrapping and usually having a higher price tag
  4. Software that can be freely distributed and used
  5. 'Try before you buy' software. Software that is provided free and can be copied and distributed, but the licence agreement requires the to pay for the software if they continue using it after a specified period. Some shareware automatically becomes disabled after the free testing period has expired
Down
  1. A connected set of computers (networks)
  2. A kind of shareware that allows the user to try the software, but some of the features are disabled
  3. The right to use, copy or control the work of authors or artists, including software developers

8 Clues: A connected set of computers (networks)Uniform Resource Locator-an internet addressSoftware that can be freely distributed and usedAuthorising to perform a particular task or make use of a particular softwareThe right to use, copy or control the work of authors or artists, including software developers...

Computer Concepts 2013-11-14

Computer Concepts crossword puzzle
Across
  1. Local or restricted communication networks, based on TCP/IP and is usually used in organizations or corporations.
  2. A system designed to prevent unauthorized acces to or from a private network
  3. When the computer does not have enough RAM,it uses this to compensate for this shortfall.
  4. It is the intelligent part of the system. Interprets the instructions of the user program and query the status of the inputs.
Down
  1. A network device that recieves and retransmits amplified signals so that they can retain the necessary strenght to reach their destination.
  2. Type of communication channel that is transmitted as pulses of light.
  3. Is 2 or more computers that are linked in order to share resources, exchange files, or allow electronic communications.
  4. A description os the arrangement of a network including its nodes and connecting lines.

8 Clues: Type of communication channel that is transmitted as pulses of light.A system designed to prevent unauthorized acces to or from a private networkA description os the arrangement of a network including its nodes and connecting lines.When the computer does not have enough RAM,it uses this to compensate for this shortfall....

Security Awareness Month - Week 1 2022-10-01

Security Awareness Month - Week 1 crossword puzzle
Across
  1. ____ authentication enables password-only logins to be replaced with secure, fast login experiences across websites and apps.
  2. Our current password manager.
  3. Any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  4. ____ security automatically recognizes people based on their biological characteristics. (Hint: fingerprint).
Down
  1. Flaws in a computer system that weaken the overall security of the device/system.
  2. Phase of an attack where an attacker finds new systems, maps out networks, and probes for specific, exploitable vulnerabilities.
  3. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  4. ____ authentication requires multiple methods of authentication from independent categories of credentials to verify a user's identity for a login or other transaction.

8 Clues: Our current password manager.Flaws in a computer system that weaken the overall security of the device/system.Any kind of unwanted, unsolicited digital communication that gets sent out in bulk.____ security automatically recognizes people based on their biological characteristics. (Hint: fingerprint)....

Security Awareness Month - Week 1 2022-09-30

Security Awareness Month - Week 1 crossword puzzle
Across
  1. ____ authentication enables password-only logins to be replaced with secure, fast login experiences across websites and apps.
  2. Our current password manager.
  3. Any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  4. ____ security automatically recognizes people based on their biological characteristics. (Hint: fingerprint).
Down
  1. Flaws in a computer system that weaken the overall security of the device/system.
  2. Phase of an attack where an attacker finds new systems, maps out networks, and probes for specific, exploitable vulnerabilities.
  3. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  4. ____ authentication requires multiple methods of authentication from independent categories of credentials to verify a user's identity for a login or other transaction.

8 Clues: Our current password manager.Flaws in a computer system that weaken the overall security of the device/system.Any kind of unwanted, unsolicited digital communication that gets sent out in bulk.____ security automatically recognizes people based on their biological characteristics. (Hint: fingerprint)....

Objective 1N: Comparing Some Era 1 States 2024-11-15

Objective 1N: Comparing Some Era 1 States crossword puzzle
Across
  1. A Mesoamerican state that utilized a tribute system to control its territories and reinforce state authority.
  2. A South American empire with a centralized government and labor systems like the mit’a to support its vast territory.
  3. A political structure with autonomous regions or local governance, as seen in the Swahili Coast and some Hindu states.
Down
  1. A West African empire that controlled trade networks and centralized political authority to maintain power.
  2. An Islamic state that blended traditional practices with administrative innovations to govern a diverse empire.
  3. Independent city-states in East Africa that served as major hubs in the Indian Ocean trade network.
  4. A governance structure where power and authority are concentrated, seen in states like the Inca and Mali Empires.
  5. A Chinese dynasty that relied on Confucian principles and a bureaucratic system to maintain centralized governance.

8 Clues: Independent city-states in East Africa that served as major hubs in the Indian Ocean trade network.A West African empire that controlled trade networks and centralized political authority to maintain power.A Mesoamerican state that utilized a tribute system to control its territories and reinforce state authority....

Marketing 2015-10-05

Marketing crossword puzzle
Across
  1. all the individuals and households that buy or acquire goods and services for personal computer
  2. company growth through starting up or acquiring businesses outside the company's current products and market
  3. the study of human population in terms of size,density,location,age etc
  4. human wants that are hacked by buying power
  5. the art and science of choosing target markets and building profitable relationship with them
  6. a statement of the organization purpose, what it wants to accomplish in the larger environment
  7. the form humans needs take as they are shaped by culture and individual personality
  8. factors that are close to the company that can affect it's ability to serve it's customer
  9. a data that already exists somewhere else
  10. states of felt deprivation
  11. a person's pattern of living as expressed in his or her activities,interest, and opinions
  12. a vast public web of computer networks that connect users all around the world
Down
  1. the larger societal forces that affect the environment
  2. the extent in which a product's perceived performance matches a buyers expectation
  3. the market offering to create superior customer value
  4. data collected for the specific purpose at hand
  5. the set of all actual and potential buyers of product or service
  6. two or more people who interact to accomplish individual or mutual goals
  7. a research to test hypotheses about cause-and-effect relationship
  8. obtaining a desired object from someone by offering something in return

20 Clues: states of felt deprivationa data that already exists somewhere elsehuman wants that are hacked by buying powerdata collected for the specific purpose at handthe market offering to create superior customer valuethe larger societal forces that affect the environmentthe set of all actual and potential buyers of product or service...

Marketing 2015-10-05

Marketing crossword puzzle
Across
  1. the set of all actual and potential buyers of product or service
  2. a person's pattern of living as expressed in his or her activities,interest, and opinions
  3. data collected for the specific purpose at hand
  4. a vast public web of computer networks that connect users all around the world
  5. a data that already exists somewhere else
  6. the larger societal forces that affect the environment
  7. the art and science of choosing target markets and building profitable relationship with them
  8. the market offering to create superior customer value
  9. a research to test hypotheses about cause-and-effect relationship
  10. company growth through starting up or acquiring businesses outside the company's current products and market
Down
  1. a statement of the organization purpose, what it wants to accomplish in the larger environment
  2. two or more people who interact to accomplish individual or mutual goals
  3. factors that are close to the company that can affect it's ability to serve it's customer
  4. all the individuals and households that buy or acquire goods and services for personal computer
  5. human wants that are hacked by buying power
  6. the extent in which a product's perceived performance matches a buyers expectation
  7. the study of human population in terms of size,density,location,age etc
  8. the form humans needs take as they are shaped by culture and individual personality
  9. obtaining a desired object from someone by offering something in return
  10. states of felt deprivation

20 Clues: states of felt deprivationa data that already exists somewhere elsehuman wants that are hacked by buying powerdata collected for the specific purpose at handthe market offering to create superior customer valuethe larger societal forces that affect the environmentthe set of all actual and potential buyers of product or service...

Computers Crossword Puzzle 2017-06-01

Computers Crossword Puzzle crossword puzzle
Across
  1. Device used for modulation and demodulation
  2. Presents data
  3. / A part of a computer that displays images, videos, etc.,
  4. Short for personal computer
  5. Gives the power to the computer
  6. Another drive that can read and write things
  7. A high-capacity storage device that can read and write things
  8. Data sent to a browser to track the user's info
  9. A device that allows things that do things with audio do things
  10. A device used to store data and perform actions and functions
  11. Absorbs unneeded heat
  12. A peripheral device that moves the curser around the screen
  13. A port where you can plug usbs and peripheral devices into
Down
  1. Device that connect two or more networks together
  2. DRIVE Portable storage device like usbs
  3. Place where energy and information goes into a system
  4. A flash drive used to store data
  5. Device that is able to be attached to a computer
  6. Where the power leaves the computer
  7. A circuit board that has the most necessary parts of the computer
  8. Controls what goes on the display screen
  9. Programs that harm your computer
  10. Short for Random Access Memory
  11. code Coding language made up of 1s and 0s
  12. Cools the computer
  13. The brain of the computer
  14. Stores data, connects peripheral devices to the computer
  15. Devices connectable to the computers that display sounds
  16. Software that is made to harm your computer
  17. DISK Flexible removable magnetic disk

30 Clues: Presents dataCools the computerAbsorbs unneeded heatThe brain of the computerShort for personal computerGives the power to the computerShort for Random Access MemoryA flash drive used to store dataPrograms that harm your computerWhere the power leaves the computerControls what goes on the display screenDISK Flexible removable magnetic disk...

FIT E: Vocab Word Quest 2013-05-16

FIT E: Vocab Word Quest crossword puzzle
Across
  1. protection for any published worked
  2. 1000 yottabyte
  3. 1000 terabyte
  4. Ex: DSL, Cable
  5. Ex:Comcast
  6. a program the allows you to interact with the computer
  7. Ex: google
  8. way to save a file created in word
  9. responsible rules and behavior to keep you save
  10. 1000 exabyte
  11. 1000 zetabyte
  12. RAM
  13. personal conduct online
  14. computer screen
  15. Ex: optical, mechanical, touch pad
  16. a short memorable phrase used in advertising
  17. 1000 kilobyte
  18. 1000 bytes
  19. two programs that can work together
  20. eight bits
  21. a online, zoomable presentation program
  22. 1000 megabyte
  23. allows equipment to handle information that continuously changes
  24. the process of powering on a computer
Down
  1. the overall appearance of a document
  2. a symbol or other design adopted by an organization to identify its product
  3. the smallest amount of data
  4. the overall way of how a computer is setup
  5. CPU
  6. LCD
  7. LED
  8. RTF
  9. NCSA
  10. 1000 petabyte
  11. Ex: mouse, flash drive
  12. heart of the computer
  13. 1000 brontobyte
  14. a close up or preview of a template
  15. protection of information on computer/networks
  16. Ex: printer, monitor
  17. the overall layout of a document
  18. a brief summery of ones work experience
  19. an electronic signal that is sent as binary digits
  20. a way to save a file in adobe
  21. 1000 gigabyte
  22. a standard for the short-range wireless interconnection of cellular phones, computers, and other electronic devices
  23. a pre developed format

47 Clues: CPULCDLEDRTFRAMNCSAEx:ComcastEx: google1000 byteseight bits1000 exabyte1000 terabyte1000 petabyte1000 zetabyte1000 kilobyte1000 gigabyte1000 megabyte1000 yottabyteEx: DSL, Cable1000 brontobytecomputer screenEx: printer, monitorheart of the computerEx: mouse, flash drivea pre developed formatpersonal conduct onlinethe smallest amount of data...

Programming 2015-01-21

Programming crossword puzzle
Across
  1. The person's first name who made this crossword.
  2. A process that leads from an original formulation of a computing problem to executable computer programs.
  3. Code which contains numbers like 1's and 0's.
  4. A list of instructions that tell a computer what to do.
  5. Relating to or using a system of numerical notation that has 16 rather than 10 as its base.
  6. A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
  7. World Wide Web
  8. Console that has access to the internet.
  9. A notation resembling a simplified programming language, used in program design.
  10. A global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.
Down
  1. American Standard Code for Information Interchange.
  2. Movie that has to do with hacking and black coated people.
  3. A type of software that allows you to perform specific tasks.
  4. Built the .net framework.
  5. Client side programming language that runs inside a client browser and processes commands on client computer rather than server.
  6. Software framework developed by Microsoft that runs primarily on Microsoft Windows.
  7. IDE and RAD tool written in wxWidgets.
  8. A graphical representation of a computer program in relation to its sequence of functions (as distinct from the data it processes).
  9. A quantity or amount.
  10. The programs and other operating information used by a computer.

20 Clues: World Wide WebA quantity or amount.Built the .net framework.IDE and RAD tool written in wxWidgets.Console that has access to the internet.Code which contains numbers like 1's and 0's.The person's first name who made this crossword.American Standard Code for Information Interchange.A list of instructions that tell a computer what to do....

Computers 2015-05-15

Computers crossword puzzle
Across
  1. produce data in legible alphanumeric or graphic form
  2. follows a program, designed to compute
  3. founded Facebook
  4. city in California that is headquarter for Yahoo
  5. name of browser Marc Anderson and Jim Clark founded in 1994
  6. system a system which information can be be expressed by combinations of the digits of 1 and 0
  7. a small visual display of the app
  8. a set of codes designed to allow certain task to happen
  9. internal storage location
  10. name of person who first introduced email in 1972
  11. coping for one computer system to another
  12. random access memory
  13. digit number
  14. expands the window to full screen
  15. search for something or someone on the internet
  16. software/ hardware that allows connections to other networks
Down
  1. physical objects of the system
  2. displays a menu of commands for opening, saving, and printing
  3. to operate interactively
  4. lower and upper limits of data
  5. allows more than one application
  6. related commands that are divided into tabs
  7. a program that is loaded onto your computer without you knowing and hinders the normal function of the computer
  8. when the computer performs more than one task at a time
  9. the person that tells the computer what to do
  10. a precise sequence of instructions for successfully carrying out a task
  11. a particular order
  12. a system or set of principles underlying the arrangements of elements in a computer
  13. software/hardware protection between network and outside world
  14. an error

30 Clues: an errordigit numberfounded Facebooka particular orderrandom access memoryto operate interactivelyinternal storage locationphysical objects of the systemlower and upper limits of dataallows more than one applicationa small visual display of the appexpands the window to full screenfollows a program, designed to compute...

Proteins 2020-12-16

Proteins crossword puzzle
Across
  1. the reversible process of adding oxygen
  2. term used for the 11 nonessential amino acids made by the body
  3. a mixture of fluids locked in a tangled 3D mesh of denatured and coagulated protein
  4. proteins made from strong, elastic, helix-shaped strands that form networks
  5. the 3D structure of an entire amino acid chain
  6. nutrient with a structure composed of carbon, hydrogen, oxygen, nitrogen, and usually sulfur
  7. the order the amino acids occur in a chain
  8. the result of oxidation or dehydrogenation of an alcohol
  9. the iron-building protein pigment in muscle that provides color
  10. formed by bubbling gas through a mixture, beating or whipping, and depressurization
  11. a permanent denaturation that results when liquid or semi-liquid proteins form solid or semisoft clots
Down
  1. the shape of sections of an amino acid
  2. covalent bonds between 2 protein molecules at side chains containing sulfur
  3. a chain of amino acids bound together by peptide bonds
  4. any change in shape of a protein molecule without breaking the peptide bonds
  5. organic subunits of proteins
  6. type of bond formed when 2 amino acids combine and water is released
  7. the reversible process of removing oxygen
  8. water-repelling
  9. side chains that are less soluble in water and are attached to another compound of the same type, such as lipids or cholesterol
  10. term used for the 9 essential amino acids that are not made by the body and must be supplied by the diet

21 Clues: water-repellingorganic subunits of proteinsthe shape of sections of an amino acidthe reversible process of adding oxygenthe reversible process of removing oxygenthe order the amino acids occur in a chainthe 3D structure of an entire amino acid chaina chain of amino acids bound together by peptide bonds...

Proteins 2020-12-16

Proteins crossword puzzle
Across
  1. proteins made from strong, elastic, helix-shaped strands that form networks
  2. the 3D structure of an entire amino acid chain
  3. the reversible process of adding oxygen
  4. a permanent denaturation that results when liquid or semi-liquid proteins form solid or semisoft clots
  5. the reversible process of removing oxygen
  6. any change in shape of a protein molecule without breaking the peptide bonds
  7. a mixture of fluids locked in a tangled 3D mesh of denatured and coagulated protein
  8. term used for the 11 nonessential amino acids made by the body
  9. the iron-building protein pigment in muscle that provides color
  10. type of bond formed when 2 amino acids combine and water is released
  11. side chains that are less soluble in water and are attached to another compound of the same type, such as lipids or cholesterol
Down
  1. covalent bonds between 2 protein molecules at side chains containing sulfur
  2. the order the amino acids occur in a chain
  3. the shape of sections of an amino acid
  4. a chain of amino acids bound together by peptide bonds
  5. formed by bubbling gas through a mixture, beating or whipping, and depressurization
  6. organic subunits of proteins
  7. water-repelling
  8. the result of oxidation or dehydrogenation of an alcohol
  9. term used for the 9 essential amino acids that are not made by the body and must be supplied by the diet
  10. nutrient with a structure composed of carbon, hydrogen, oxygen, nitrogen, and usually sulfur

21 Clues: water-repellingorganic subunits of proteinsthe shape of sections of an amino acidthe reversible process of adding oxygenthe reversible process of removing oxygenthe order the amino acids occur in a chainthe 3D structure of an entire amino acid chaina chain of amino acids bound together by peptide bonds...

Government 2022-04-04

Government crossword puzzle
Across
  1. of order rules that are usually applied in floor debates to make the system move a little quicker
  2. Congress giving agencies powers to operate
  3. members of Congress trying to be both representatives and policymakers
  4. a leader awaiting their replacement
  5. when a president uses powers like executive orders, the “Bully-Pulpit”, and “war-making”
  6. Congress votes of appropriation spending
  7. an annual plan by Congress to spend more than it collects in tax revenues
  8. Congress’ main method of controlling the power of the bureaucratic agencies
  9. removing a federal official from office
Down
  1. members of Congress are expected to serve the needs of their constituents
  2. what political leaders who want the Supreme Court to only follow a strict and historically narrow interpretation of the Constitution and the powers of the judiciary prefer
  3. Senate de-facto leader
  4. the total of all prior spending by all Congresses in the past that spent in excess of revenues
  5. what happens when a president refuses to sign a bill during the last 9 days of a Congressional session
  6. powers given to Congress to have individuals give evidence
  7. members of Congress are expected to work for their party affiliation
  8. votes by Congress to allow the old budget to continue before the new one is voted upon
  9. power networks
  10. the leaders of Congress who have the duty of connecting the House and Senate leaders to the regular members
  11. amendments attached to bills that do not pertain to the main goal of the bill

20 Clues: power networksSenate de-facto leadera leader awaiting their replacementremoving a federal official from officeCongress votes of appropriation spendingCongress giving agencies powers to operatepowers given to Congress to have individuals give evidencemembers of Congress are expected to work for their party affiliation...

Cisco CyberHunt Crossword 2022-04-06

Cisco CyberHunt Crossword crossword puzzle
Across
  1. Usually consists of eight bits
  2. What indicates your computer's virtual location in a network?
  3. Sending an email, posting photos on a social media site and using your webcam
  4. The act of working from a remote location bu using computers and networking technology.
  5. What is used to connect multiple devices on the same network within a building or campus?
  6. The password is sent to the server using ________ command
  7. What is SMTP's (Simple Mail transfer Protocol) most common form?
  8. What are a group of computers in a small geographic area a part of?
  9. The amount of data that is transferred under real life conditions.
  10. most expensive wired media
  11. example of wireless communication device
  12. Device which converts between digital and analogue signals, e.g. telephone line to computer.
  13. Nodes are another name of
Down
  1. A private network that is set up similarly to the internet and is accesses via a Web browser
  2. A method of transmitting data in which data is sent out to all nodes on a network and is retrieved only by the intended recipient.
  3. The purpose of scrambling data so it can be sent securely over networks.
  4. A network that uses a central device connected directly to several other devices
  5. A computer and network connection
  6. Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape.
  7. Multipoint topology is called
  8. What is the most basic networking device that connects multiple computers or network devices together?

21 Clues: Nodes are another name ofmost expensive wired mediaMultipoint topology is calledUsually consists of eight bitsA computer and network connectionexample of wireless communication deviceThe password is sent to the server using ________ commandWhat indicates your computer's virtual location in a network?...

Vietnam War Crossword 2022-04-22

Vietnam War Crossword crossword puzzle
Across
  1. Orange, A chemical sent in orange barrels used to defoliate the jungle and fine the enemy’s hiding spots which led to serious health problems in humans and animals
  2. Type of warfare used
  3. Who helped out the Vietcong grow
  4. What would they bake to hide bombs inside
  5. A war policy in Vietnam initiated by Nixon in June of 1969.
  6. Parallel, How was Vietnam divided
  7. The burden of the war fell on who
  8. Acronym for 2,000 unaccounted soldiers
  9. US helicopter type used in Vietnam
  10. Chi Minh, Who controlled North Vietnam
  11. Anticommunist Dictator of South Vietnam
  12. Vietnam, What was the Democratic French controlled part of Vietnam
Down
  1. Who led South Vietnam after Diems overthrow and death
  2. of Tonkin, Where did 2 U.S. ships allegedly get attacked by North Vietnam
  3. Who had control over Vietnam before WW2
  4. North Vietnamese Radicals
  5. Who controlled South Vietnam
  6. Theory, The US theory that stated if one country would fall to communism then they all would
  7. State, Where did the national guard open fire on student protesters
  8. Who was elected in 1969 and promised to withdraw troops in Vietnam
  9. palm, Jelly substance dropped from airplanes which stuck to things, burned off clothes and skin
  10. Lai Massacre, In 1968 American troops massacred women and children in Vietnamese village My Lai
  11. Where did 20,000 boat people die
  12. Vietnam, Which part of Vietnam did communism influence
  13. What did the Vietcong build to connect village and city networks

25 Clues: Type of warfare usedNorth Vietnamese RadicalsWho controlled South VietnamWho helped out the Vietcong growWhere did 20,000 boat people dieParallel, How was Vietnam dividedThe burden of the war fell on whoUS helicopter type used in VietnamAcronym for 2,000 unaccounted soldiersChi Minh, Who controlled North Vietnam...

Computer Studies Crossword 2022-04-27

Computer Studies Crossword crossword puzzle
Across
  1. is this crossword good?
  2. where a LAN cable connects to
  3. a secret word or phrase that must be used to gain admission to a place
  4. acronym for the computer component that manages the graphics in a game
  5. network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  6. what is smaller than a byte
  7. the speed of a monitor is measured in this
  8. short term memory storage device and is volotile
  9. a technique of loading a program into a ncomputer by means of a few initial instructions which enable the introduction of the rest of the program from an input device.
  10. a networking device that forwards data packets between computer networks
  11. memory content that is lost when the power is interrupted or switched off.
Down
  1. what we use to type
  2. the acronym for a fast storage device
  3. what we use to browse for data
  4. the acronym of one of the most components in a computer that manages the computer components
  5. networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
  6. a small segment of a larger message
  7. the most popular OS
  8. a portable storage device
  9. what programming language usually starts with public static void main(String[] args) {...
  10. used to get a physical copy of a digital document
  11. what measuring unit is internet speed usually measured in?

22 Clues: what we use to typethe most popular OSis this crossword good?a portable storage devicewhat is smaller than a bytewhere a LAN cable connects towhat we use to browse for dataa small segment of a larger messagethe acronym for a fast storage devicethe speed of a monitor is measured in thisshort term memory storage device and is volotile...

Geography Crossword 2022-07-09

Geography Crossword crossword puzzle
Across
  1. What is the pollution related to and primarily caused by unnecessary honking called?
  2. area What is a place called when it's below sea level.
  3. What is the increase in the proportion of people living in urban areas called?
  4. What are the advantages of going to a city called?
  5. What is the movement of people from rural to urban areas called?
  6. refers to our surroundings and can either be physical or human.
  7. What job opportunities are called?
  8. What is a multicultural society with many people from diverse cultural backgrounds called?
  9. areas What is an area with dense transport networks and densely packed buildings called
  10. What is a physical area on the earth’s surface called?
  11. What is a physical area on the Earth’ surface called?
Down
  1. What is the pollution caused by an increase in LED usage?
  2. What is the number of people living in a unit area of land called?
  3. What is the environment that has not been affected by people?
  4. What is poor air quality affecting half the world’s urban population called?
  5. What is a built up area called?
  6. Consist of living and non-living things that are found naturally.
  7. What are the disadvantages of going to a city called?
  8. What is the environment where people live on farms and villages called?
  9. What is the pollution caused by leakage fuel storage tanks into rivers?
  10. What is the area of the earth’s surface that holds special meaning for people?

21 Clues: What is a built up area called?What job opportunities are called?What are the advantages of going to a city called?What are the disadvantages of going to a city called?What is a physical area on the Earth’ surface called?area What is a place called when it's below sea level.What is a physical area on the earth’s surface called?...

Cyber quiz 2022-09-12

Cyber quiz crossword puzzle
Across
  1. a cyber attacker who uses software and other methods to steal information
  2. An error, flaw, failure, or fault in a computer program.
  3. Programs that automatically execute tasks as ordered by the creator
  4. Cryptocurrency, a form of electronic cash
  5. any kind of software designed to damage, or enable unauthorized access, to computer systems.
  6. Attaching a phone number or email address to an account for heightened security
  7. secret word or phrase that is used to access a computer system
  8. Confirmation of someone's identity using a password or fingerprint
  9. previously unknown, bug, flaw, or backdoor in software can lead to attacks and damage.
  10. allows you to create a secure connection to another network using the internet.
  11. programs and other operating systems used by a computer.
Down
  1. protecting computers, networks, programs, and data from unauthorized access
  2. taking advantage of human trust to gain access to private information
  3. An alternative way to access software typically unauthorized.
  4. The physical and tangible parts of a computer
  5. typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded they can piggybank onto programs to corrupt data or do other damage.
  6. Creating a fake identity on a social network account to target a specific victim
  7. Hacking that is meant to do minimal damage
  8. string of numbers used to identify each computer using the internet on a network.
  9. predate viruses and have infected systems since mainframes were the only computers in existence. capable of self-replication

20 Clues: Cryptocurrency, a form of electronic cashHacking that is meant to do minimal damageThe physical and tangible parts of a computerAn error, flaw, failure, or fault in a computer program.programs and other operating systems used by a computer.An alternative way to access software typically unauthorized....

SLA crossword 2021-04-08

SLA crossword crossword puzzle
Across
  1. "how" knowledge
  2. a student's anxiety, low self esteem, or lack of motivation can cause mental block for successful learning
  3. to converse with and exchange ideas with someone.
  4. expresses how sentient or alive the referent of a noun is
  5. Language learners produce, either in speaking or writing
  6. Stresses neural networks – the ability to make connections/associations between various related concepts.
  7. hypothesis which holds nothing is learned until it has been noticed
  8. theory proposing that humans possess innate faculties related to the acquisition of language
  9. a hypothesis that holds acquired knowledge acts as internal editor for learner's utterance
Down
  1. metaphorical place where learner co-construct knowledge in collaboration with an interlocutor
  2. a theory that holds that there are conscious and sub-conscious processes for learning languages
  3. simplified version of a language that's sometimes used by native speakers when addressing non-native speakers
  4. ___ awareness (the ability to see language as a code and separate it from its symbolic meaning)
  5. "that" knowledge
  6. a theory which states all behaviors are learned through interaction with the environment
  7. a method of language teaching inspired by behaviourism and based around the repetition of correct sentences
  8. (appropriate processing) How you learn it is similar to how you remember it
  9. claimed that all the errors made in learning the L2 could be attributed to 'interference' by the L1
  10. a hypothesis that holds learners' acquire language when exposed to linguistically higher input
  11. According to the theory, people use language cues for communication.

20 Clues: "how" knowledge"that" knowledgeto converse with and exchange ideas with someone.Language learners produce, either in speaking or writingexpresses how sentient or alive the referent of a noun ishypothesis which holds nothing is learned until it has been noticedAccording to the theory, people use language cues for communication....

ICT Crossword Puzzle 2022-10-14

ICT Crossword Puzzle crossword puzzle
Across
  1. An output device that is like a tv
  2. Puts information including letters, words and numbers into your computer
  3. plays DVDs produced under both the DVD-Video and DVD-Audio
  4. To point to a place on a display screen
  5. An output hardware device that connects to a computer to generate sound
  6. a computer software package that performs a specific function directly for an end user or, in some cases, for another application
  7. Copies to the clipboard
  8. a personal computing device designed to fit on top of a typical office desk
  9. The backbone of the computer
  10. receives data and permanently writes it on a chip
  11. To keep the inner mechanics cooled off
  12. Pastes from the clipboard
Down
  1. A silvery-gray substance that you apply to a processor before installing a cooling solution
  2. to render graphics
  3. a worldwide system of computer networks
  4. a removable magnetic storage medium that allows recording of data
  5. a unit that measures display device performance in video captures and playback and video games
  6. generates the video signal sent to a computer display
  7. Where all your permanent computer data is stored
  8. a personal computer generally smaller than a briefcase that can easily be transported
  9. Provides components with electric power
  10. The heart of the computer
  11. to click, scroll, zoom in and out, switch between tab on your laptop
  12. faster than regular hard drives
  13. Stores short term memory in the processor

25 Clues: to render graphicsCopies to the clipboardThe heart of the computerPastes from the clipboardThe backbone of the computerfaster than regular hard drivesAn output device that is like a tvTo keep the inner mechanics cooled offa worldwide system of computer networksTo point to a place on a display screenProvides components with electric power...

Amaze - November 23 2023-11-15

Amaze - November 23 crossword puzzle
Across
  1. Temporary storage of frequently accessed data for quick access
  2. Unit of digital information storage
  3. Network point that acts as an entrance to another network
  4. Storage's virtual counterpart
  5. Software distribution model in which a service provider hosts applications
  6. Machine Emulation of a computer system
  7. Key element in network topology
  8. Ring Type of computer network technology
  9. Backbone of any computer network
  10. Networking device that connects devices together
  11. Network security system that monitors and controls incoming and outgoing network traffic
  12. Process of converting information or data into a code to prevent unauthorised access
  13. Essential for 24/7 IT operations
  14. Networking utility tool used to test the reachability of a host
  15. Data centre facility where a business can rent space for servers and other computing hardware
  16. Common method of networking computers in a LAN
Down
  1. Creation of a virtual version of something, like a server or network
  2. Basic unit of digital data
  3. Software designed to disrupt, damage, or gain unauthorised access
  4. Permanent software programmed into a hardware device
  5. Centralised data storage system
  6. Time taken for a packet to reach its destination
  7. High-speed internet initials
  8. Measure of data transfer speed
  9. Set of rules governing the exchange or transmission of data
  10. Essential for data redundancy
  11. Place where internet networks connect
  12. Technique to minimise data loss
  13. Tunnel Encrypted, secure pathway through a public network
  14. Common connection point for devices in a network

30 Clues: Basic unit of digital dataHigh-speed internet initialsStorage's virtual counterpartEssential for data redundancyMeasure of data transfer speedCentralised data storage systemKey element in network topologyTechnique to minimise data lossBackbone of any computer networkEssential for 24/7 IT operationsUnit of digital information storage...

Homeostasis/Skeletal 2023-10-11

Homeostasis/Skeletal crossword puzzle
Across
  1. smooth, white tissue that covers the ends of the bones where they come together to form joints; found in diarthrodial joints
  2. this system usually takes the body out of homeostasis during childbirth
  3. a struture of the body that monitors the values of your body's variables;
  4. this is an example of a flat bone that protects the heart
  5. upper jaw bone which is a paired facial bone
  6. skull encloses the brain which assists in this function of the skeletal system
  7. a structure of the body that can change the value of a variable in response to a signal from the control center
  8. bone that looks like a butterfly
  9. strongest bone on the face
  10. this suture divides the parietal bones
  11. this is visible during a growing long bone; afterwards, it changes to a line.
  12. bone that attaches to the tongue
  13. patella is this type of bone
Down
  1. these are short bones of the hand;
  2. shell-shaped bones in the lower part of the nose
  3. bone growth
  4. networks of bone with many marrow filled spaces
  5. bone located near the tear ducts
  6. type of tissue that lines the digestive tract and respiratory tract
  7. process of manufacturing blood cells; starts with an "h"
  8. phalanges are this type of bone
  9. an example of irregular bone that sits superior to the coccyx
  10. red blood cells are made here in which it some of it turns to yellow when matured.

23 Clues: bone growthstrongest bone on the facepatella is this type of bonephalanges are this type of bonebone located near the tear ductsbone that looks like a butterflybone that attaches to the tonguethese are short bones of the hand;this suture divides the parietal bonesupper jaw bone which is a paired facial bone...

A mango shaped space 2019-04-10

A mango shaped space crossword puzzle
Across
  1. the notional environment in which communication over computer networks occurs.
  2. a system of complementary medicine in which fine needles are inserted in the skin at specific points along what are considered to be lines of energy (meridians), used in the treatment of various physical and mental conditions.
  3. an instruction written by a medical practitioner that authorizes a patient to be issued with a medicine or treatment.
  4. remove (a substance) from the surface of a liquid.
  5. finely experienced and aware
  6. having a harshly concussive, disagreeable, or discordant effect
  7. relating to the ability to interpret or become aware of something through the senses.
  8. depending on the will or pleasure of another
  9. attractive or interesting.
  10. a regulation requiring people to remain indoors between specified hours, typically at night.
  11. something that is sent out
Down
  1. a religious song or poem of praise to God or a god.
  2. to affect with visions or imaginary perceptions
  3. an interesting and exciting quality.
  4. a person's emotional state or the atmosphere of a place as communicated to and felt by others.
  5. the immaterial essence, animating principle, or actuating cause of an individual life
  6. a chemical substance that is usually produced by an animal
  7. full of yearning or desire
  8. a strip of wood or stone forming the bottom of a doorway and crossed in entering a house or room.
  9. a classroom where pupils report especially at the beginning of each school day
  10. walk or move around with ostentatious, exaggerated movements.

21 Clues: full of yearning or desireattractive or interesting.something that is sent outfinely experienced and awarean interesting and exciting quality.depending on the will or pleasure of anotherto affect with visions or imaginary perceptionsremove (a substance) from the surface of a liquid.a religious song or poem of praise to God or a god....

Technology 2019-08-25

Technology crossword puzzle
Across
  1. set of things working together to make a meaningful result
  2. a message given to the web browser by the web server
  3. a network security system
  4. protects computer networks from unauthorized access
  5. a facility that allows electronics to be connected with internet
  6. the nature of electronic technology
  7. the situation when devices are ready to exchange data
  8. a robot with a human appearance
  9. a small device which sends wifi to other devices nearby
  10. means of communication between two devices
  11. stores and processes data
  12. a transmission of data for using the internet to electronic devices
  13. retrieving something from the internet
  14. facts or numbers collected for analysis
  15. a computer program which navigates through web pages
Down
  1. made or adapted for a particular purpose
  2. a program language used in smartphone industries earlier
  3. something that can be plugged into a multi-plug
  4. something that produces current
  5. a self-contained component
  6. a global computer network
  7. a private computer network for communication
  8. to move something from one device to another
  9. to assign something specific
  10. a short rang e wireless connection to any electronic device
  11. coded instructions to run something
  12. set of instructions use to operate a computer
  13. a file format developed by adobe including text formatting and image
  14. Some thing that connects electronic machines
  15. a small device by which data can be stored and plugged in with a computer

30 Clues: a network security systema global computer networkstores and processes dataa self-contained componentto assign something specificsomething that produces currenta robot with a human appearancethe nature of electronic technologycoded instructions to run somethingretrieving something from the internetfacts or numbers collected for analysis...

Bilingual Speech Perception 2019-12-02

Bilingual Speech Perception crossword puzzle
Across
  1. control, Bilinguals seem to recruit cognitive control networks associated with the processing of effortful speech and executive functioning
  2. Sequential, bilinguals exposed to L2 at an older age
  3. switching, top-down controlled and can be modulated by language dominance. It is typically more effortful to switch back to the dominant language (L1)
  4. switching, global switching across full language competences
  5. bilinguals, unbalanced degree of proficiency and behavioral performance across language competences
  6. of primary perceptual cues from the dominant language background; Very common in unbalanced early bilinguals and long-term immigrants
  7. local switching "my laptop no function"
  8. context-specific selection of language norms; common in coordinated bilinguals
  9. system, identical items are represented in a single underlying neural substrate common to both, but different items have own-language representations
  10. bilinguals, L1 and L2 share contextual frames
  11. period, Back-frontal cortical development in infants
  12. system, undifferentiated representations
  13. system, each language represented in separate systems
Down
  1. of secondary perceptual cues; common in unbalanced late bilinguals
  2. bilinguals, L1 and L2 are used in different contexts
  3. speech, systematic deviation of a particular native speech norm; Determined by phonetic differences and similarities between the native norm of the foreign-accented speaker and the native listener; Phonetically-based speech distortion
  4. bilinguals, a similar degree of proficiency and behavioral performance
  5. Listeners adapt easily to accents
  6. system, larger language system contains two subsystems
  7. Simultaneous, bilinguals exposed to L2 since a young age

20 Clues: Listeners adapt easily to accentslocal switching "my laptop no function"system, undifferentiated representationsbilinguals, L1 and L2 share contextual framesbilinguals, L1 and L2 are used in different contextsSequential, bilinguals exposed to L2 at an older ageperiod, Back-frontal cortical development in infants...

DTIN The Internet 2024-09-09

DTIN The Internet crossword puzzle
Across
  1. The part of a web address that leads to a specific file
  2. A call made over the internet
  3. The last part of a domain name like .com or .edu
  4. Enables speaking to others over the internet
  5. A collection of related web pages
  6. Saving a web link for future reference
  7. Business transactions over the internet
  8. An internet system for sending messages
  9. To transfer data from the internet to a device
  10. A website that connects people for interaction
  11. A global network of networks
  12. An electronic document on the web
  13. A clickable text or image that links to another web page
  14. Translates domain names to IP addresses
  15. A method for securing data on the internet
  16. A program to view web pages
Down
  1. To send data from a device to the internet
  2. A platform for real-time typed conversation
  3. The first page displayed by a website
  4. Unique numbers identifying a device's location
  5. A unique address of a page on the web
  6. A protocol for file transfer on the network
  7. Internet-based platform for financial transactions
  8. A website used to find information on the web
  9. A text-based name corresponding to an IP address
  10. Websites for uploading and viewing media
  11. A special browser for smartphones
  12. An online journal where users post content
  13. A server that delivers web pages
  14. Symbols that define the content of web pages

30 Clues: A program to view web pagesA global network of networksA call made over the internetA server that delivers web pagesA collection of related web pagesA special browser for smartphonesAn electronic document on the webThe first page displayed by a websiteA unique address of a page on the webSaving a web link for future reference...

Digital Wonders: The NFT Universe Unveiled 2024-03-22

Digital Wonders: The NFT Universe Unveiled crossword puzzle
Across
  1. A common file format for images, often used for digital art NFTs.
  2. Cryptocurrency of the Ethereum network, commonly used to buy NFTs.
  3. The potential impact of NFTs on traditional art sales and copyright norms.
  4. Duplicate or copy of a popular NFT or collection, often with slight variations.
  5. The process of creating or issuing a new NFT on the blockchain.
  6. A popular marketplace for buying, selling, and discovering NFTs.
  7. Online platforms or spaces where NFTs are displayed and sold.
  8. Describes an NFT that is uncommon or has unique traits within a collection.
  9. An offer made by a buyer to purchase an NFT at a specified price.
Down
  1. Verification method for the authenticity and ownership of an NFT.
  2. A type of NFT that represents ownership or a claim over physical or digital assets.
  3. The action of buying, selling, or exchanging NFTs between parties.
  4. Buying NFTs and selling them quickly for profit.
  5. A symbol or graphic representation on a screen of a file, option, or command related to NFTs.
  6. Computers that maintain and secure blockchain networks, vital for NFT transactions.
  7. A three-dimensional NFT that uses light patterns to display images.
  8. The act of locking up a cryptocurrency to receive rewards, sometimes related to NFT platforms.
  9. The category of NFTs that includes digital paintings, sculptures, and multimedia.
  10. A predefined maximum amount of NFTs that can be minted in a particular collection.
  11. Searching for specific NFTs or collections in marketplaces.

20 Clues: Buying NFTs and selling them quickly for profit.Searching for specific NFTs or collections in marketplaces.Online platforms or spaces where NFTs are displayed and sold.The process of creating or issuing a new NFT on the blockchain.A popular marketplace for buying, selling, and discovering NFTs....

Compters 2024-07-10

Compters crossword puzzle
Across
  1. lower and upper limits of data
  2. related commands that are divided into tabs
  3. founded Facebook
  4. name of person who first introduced email in 1972
  5. a precise sequence of instructions for successfully carrying out a task
  6. when the computer performs more than one task at a time
  7. expands the window to full screen
  8. city in California that is headquarter for Yahoo
  9. a program that is loaded onto your computer without you knowing and hinders the normal function of the computer
  10. displays a menu of commands for opening, saving, and printing
  11. digit number
  12. the person that tells the computer what to do
  13. coping for one computer system to another
  14. name of browser Marc Anderson and Jim Clark founded in 1994
Down
  1. a particular order
  2. physical objects of the system
  3. to produce data in legible alphanumeric or graphic form
  4. a system which information can be be expressed by combinations of the digits of 1 and 0
  5. a set of codes designed to allow certain task to happen
  6. a small visual display of the app
  7. search for something or someone on the internet
  8. random access memory
  9. internal storage location
  10. allows more than one application
  11. an error
  12. follows a program, designed to compute
  13. an electronic device for for storing and processing data
  14. a system or set of principles underlying the arrangements of elements in a computer
  15. software/hardware protection between network and outside world
  16. to operate interactively
  17. software/ hardware that allows connections to other networks

31 Clues: an errordigit numberfounded Facebooka particular orderrandom access memoryto operate interactivelyinternal storage locationphysical objects of the systemlower and upper limits of dataallows more than one applicationa small visual display of the appexpands the window to full screenfollows a program, designed to compute...

Y9 ICT IGCSE Review Term 1 2025-01-06

Y9 ICT IGCSE Review Term 1 crossword puzzle
Across
  1. Short-range wireless communication technology for data exchange
  2. Hardware that allows a device to connect to a network
  3. Injury caused by repetitive motions, often affecting wrists or hands
  4. Technology for identifying individuals based on physical traits
  5. Data storage based on magnetic fields
  6. Programs used to perform specific tasks
  7. AI designed to simulate human expertise in solving problems
  8. Text-based interface for interacting with computers
  9. Learning using computer software or tools
  10. Network device that forwards data to specific devices
Down
  1. Printer type that sprays ink onto paper to create images
  2. Allows users to interact visually with a system
  3. Device that connects two separate networks, enabling communication
  4. Technology using light for data reading and writing
  5. Security system that controls incoming and outgoing network traffic
  6. Unique address assigned to each network interface card
  7. Temporary storage for data that is lost when powered off
  8. Software designed to detect and remove malicious programs
  9. Popular wireless internet communication standard
  10. Technology for identifying and tracking objects using radio waves
  11. Address used to identify devices on a network
  12. Storage with no moving parts, faster and more durable
  13. Type of barcode that can be scanned quickly
  14. Permanent storage that retains data even when powered off
  15. Remote data storage and computing over the internet
  16. Small-scale network used for personal devices
  17. Latest version of the internet protocol addressing system
  18. Device that connects multiple devices on a network, sending data to all

28 Clues: Data storage based on magnetic fieldsPrograms used to perform specific tasksLearning using computer software or toolsType of barcode that can be scanned quicklyAddress used to identify devices on a networkSmall-scale network used for personal devicesAllows users to interact visually with a systemPopular wireless internet communication standard...

Vocabulario 5a (EC) 2025-01-02

Vocabulario 5a (EC) crossword puzzle
Across
  1. ______ comida = to nibble or eat small bites
  2. a ____ = often
  3. Lo _____ = I am sorry
  4. to climb
  5. to dive
  6. the theater
  7. to get together
  8. I would like to
  9. a ____ = sometimes
  10. por ______ = of course
  11. hasta _____ = until then
  12. una ______ de arte = an art gallery
  13. ver una _____ de teatro = to see a theater play
  14. to ski
  15. to communicate
  16. to have fun
  17. mirar/ir a un ______ = to watch; attend a match/game of
  18. unfortunately
  19. las _____ sociales = social networks/social media
  20. Me _____ = I would love to
  21. hacer = to hike
  22. hacer _____ = to be cold
  23. to get a tan
  24. un ____ = a little
  25. hacer ____ = to be hot
  26. tener _____ de = to feel like doing something
Down
  1. hacer ____ = to make plans
  2. De _____ = agreed
  3. frequently
  4. _____ tiempo con = to spend time with
  5. _____ a = to connect with
  6. cool
  7. stadium
  8. to rain
  9. to surf
  10. Nos _____ en = We can meet at (place)
  11. estar = to be cloudy
  12. to meet up; to find each other
  13. hacer = to snowboard
  14. hacer = to go kayaking
  15. _____ en bicicleta de montaña = to go mountain biking
  16. estar = to be sunny
  17. to meet up
  18. Estaba ____ en = I was thinking about...
  19. Nos ____ a la(s) = We can meet at (time)
  20. to snow
  21. qué ____ = what a shame
  22. una _____ de arte = art exhibition
  23. to get bored
  24. _____ el tiempo = all the time
  25. bowling alley
  26. Me ______ = I would like to

52 Clues: coolto skito divestadiumto rainto surfto snowto climbfrequentlyto meet upthe theaterto have funto get boredto get a tanunfortunatelybowling alleya ____ = oftento communicateto get togetherI would like tohacer = to hikeDe _____ = agreeda ____ = sometimesun ____ = a littleestar = to be sunnyestar = to be cloudyhacer = to snowboard...

20 words crossword puzzle ICT 2025-01-08

20 words crossword puzzle ICT crossword puzzle
Across
  1. A request for information about a certain topic.
  2. A collection of pages or files linked together and available on the world wide web.
  3. Usually defines as a personal or noncommercial web site that uses a dated log format.\
  4. Another way to describe having access to the internet or actively using the internet.
  5. small pictures that represent the program on your computer.
  6. This is the printed/paper copy of a file from the computer.
  7. It is an unwanted email from someone we don't know.
  8. The web page that your browser is set to use when it starts up, or the main page of any website.
  9. This is a file that has been added to an e-mail.
  10. To search for information on the web in a random non-linear way.
Down
  1. A special software package that connects to a network and provides data.
  2. Refers to all computer networks on the internet.
  3. Animated faces that express different emotions.
  4. To leave a message on a newsgroup or bulletin board.
  5. A way to quickly access a favorite website by saving it in your browser.
  6. Illegally copying copyrighted software, music or movies.
  7. The act of moving from page to page and website to website online.
  8. This is where all of the messages that you send are kept.
  9. It is a series of letters and numbers that identifies a location.
  10. A real-time communication over the internet.

20 Clues: A real-time communication over the internet.Animated faces that express different emotions.Refers to all computer networks on the internet.A request for information about a certain topic.This is a file that has been added to an e-mail.It is an unwanted email from someone we don't know.To leave a message on a newsgroup or bulletin board....

ML Cross Word 2025-03-16

ML Cross Word crossword puzzle
Across
  1. Process of teaching a model using data
  2. Adjusting model settings to optimize performance
  3. Collection of data used for training or testing models
  4. Mathematical function used in clustering and classification
  5. Ratio of true positives to predicted positives
  6. Model that splits data based on feature values
  7. Open-source deep learning framework by Google
  8. Ratio of true positives to actual positives
  9. Algorithm that finds the best boundary between classes
  10. Python library for classical machine learning algorithms
  11. Line that best represents data
  12. Popular deep learning library developed by Facebook
  13. Computational model inspired by the human brain
  14. Subset of ML using neural networks with multiple layers
  15. Table that describes model performance in classification
Down
  1. Ensemble learning technique using multiple decision trees
  2. Process of deriving useful information from raw data
  3. Output generated by a machine learning model
  4. Classification with two possible output categories
  5. ML technique where agents learn by interacting with an environment
  6. ML technique where the model learns from labeled data
  7. Function that transforms data into a higher-dimensional space
  8. ML technique for predicting continuous values
  9. Probabilistic graphical model using Bayes' theorem
  10. Grouping similar data points without labeled categories
  11. Choosing the most relevant attributes for a model
  12. Data point that differs significantly from others
  13. True negative rate in classification problems
  14. Process of removing errors and inconsistencies from data
  15. Automated workflow for ML model development
  16. Measure of how many predictions are correct

31 Clues: Line that best represents dataProcess of teaching a model using dataRatio of true positives to actual positivesAutomated workflow for ML model developmentMeasure of how many predictions are correctOutput generated by a machine learning modelML technique for predicting continuous valuesOpen-source deep learning framework by Google...

extra credit GROWTH 2025-04-30

extra credit GROWTH crossword puzzle
Across
  1. the world had 2,043 in 2017
  2. everywhere
  3. trade and with the accumulation of private possessions that enrich our brief lives, and it creates intangible values of accomplishment and satisfaction
  4. 3 letter _ (increased body heights, higher life expectancies), greater material security and comfort (be it mea­sured by disposable incomes or owner­ship of labor-­easing devices), and unpre­ce­ dented degrees of communication and mobility
  5. the ability to change
  6. _6th and 13th 1500 and 1800
  7. holy people
  8. Had monks belonging to sects that espouse austere simplicity.
  9. ­were created by the collision of Indian and Eurasian
  10. Plant with rare resources
Down
  1. _10th letter compulsive collectors (however refined their tastes may be) and mentally sick hoarders who turn their abodes into garbage dumps
  2. 3 letter _ railway networks, expansion of steamship travel, rising production of steel, invention and deployment of internal combustion engines and electricity, rapid urbanization, improved sanitation, rising life expectancy—­began to take place at unpre­ce­dented rates during the
  3. proposing to control the Earth’s climate through ...
  4. the state of not being definitively determined or known, often involving uncertainty or ambiguity
  5. (length, mass, time, electric current, temperature, amount of substance, luminous intensity)9th letter a _
  6. Talked about as being primitive
  7. the name of the author 7th is _
  8. 7th letter is _A quin­tes­sen­tial marker of modern growth
  9. it took more than three centuries for the population of ----- to double to 400,000
  10. a metric unit of square measure, equal to 100 ares (2.471 acres or 10,000 square meters).

20 Clues: everywhereholy peoplethe ability to changePlant with rare resourcesthe world had 2,043 in 2017_6th and 13th 1500 and 1800Talked about as being primitivethe name of the author 7th is _proposing to control the Earth’s climate through ...­were created by the collision of Indian and Eurasian7th letter is _A quin­tes­sen­tial marker of modern growth...

Computer 2025-06-16

Computer crossword puzzle
Across
  1. - Each device is connected to a central computer using a point‑to‑point connection (Star Topology)
  2. Bombing - Spam attackers repeatedly sending bulk mail until the mail server gets full
  3. Hacking - Hacking done for good causes, such as national security
  4. - Installing a single licensed copy of software onto multiple computers against license terms
  5. - A single communication line or one main cable to which all the nodes are directly connected (Bus Topology)
  6. - Enables you to connect your computer to the internet over a telephone line
  7. - The process of transforming data into unreadable code
  8. - A network device used to connect all computers in a network with each other
  9. - Each node is connected to every other node in the network (Mesh Topology)
  10. - A group of computers and other peripheral devices linked together for the purpose of sharing data and hardware resources
  11. - Unwanted bulk email from unknown sources
Down
  1. Piracy - Copying and distributing software illegally
  2. - Using or imitating another person's work as one's own
  3. - The process of converting encrypted information back into readable form
  4. - Illegal intrusion into a computer system or network
  5. - All the nodes in the network are connected in a circular manner (Ring Topology)
  6. - A wireless technology used to interconnect mobile phones, computers, and printers using short‑range wireless connection
  7. - A device that connects two different types of networks with each other
  8. - Criminal activities using computer, network, or internet to cause harm to individuals or devices
  9. - Each computer in a network

20 Clues: - Each computer in a network- Unwanted bulk email from unknown sourcesPiracy - Copying and distributing software illegally- Illegal intrusion into a computer system or network- Using or imitating another person's work as one's own- The process of transforming data into unreadable codeHacking - Hacking done for good causes, such as national security...

Ch2- Network Hardware Essentials 2025-02-25

Ch2- Network Hardware Essentials crossword puzzle
Across
  1. virtual local area network
  2. What IP address class is used for large networks and starts with "10.x.x.x"?
  3. A layer 3 device that doesn’t forward broadcasts
  4. What type of cable is used to connect two similar devices, such as two computers or two switches, directly without the need for a hub or router?
  5. What symbol in Packet Tracer automatically selects the correct cable type when connecting devices?
  6. Which device in Packet Tracer is used to assign IP addresses automatically to devices on a network?
  7. A multiport repeater that broadcasts data to all connected devices
  8. A network message addressed to only one computer on the LAN
  9. What type of cable is used for high-speed, long-distance communication
  10. The name assigned to a wireless network
  11. A tool used in Packet Tracer to check connectivity between devices
Down
  1. What table does a switch use to forward frames?
  2. What is the term for a port on a hub or switch that is used to connect to another hub or switch without requiring a crossover cable?
  3. A network device that uses MAC addresses to forward frames
  4. The type of cable used to connect a PC to a switch
  5. The Packet Tracer device that simulates internet connectivity
  6. A device that regenerates signals to extend transmission
  7. A device that connects a wired network to a wireless network
  8. What type of IP address is manually configured and does not change over time?
  9. network interface card

20 Clues: network interface cardvirtual local area networkThe name assigned to a wireless networkWhat table does a switch use to forward frames?A layer 3 device that doesn’t forward broadcastsThe type of cable used to connect a PC to a switchA device that regenerates signals to extend transmissionA network device that uses MAC addresses to forward frames...

Exemplary Travels. Hayool. Pd. 1. 2024-10-18

Exemplary Travels. Hayool. Pd. 1. crossword puzzle
Across
  1. The "ship of the desert" that revolutionized trade across the Sahara.
  2. The bacterium responsible for the Black Death, which traveled along trade routes.
  3. Major center of learning and trade in Mali during the 14th century.
  4. Dynasty established by Kublai Khan, marking Mongol control over China.
  5. Native American urban centers in the Southwest known for massive trade networks and cultural development.
  6. West African storytellers who preserved history through oral traditions.
  7. Roadside inns that supported merchants and travelers on ancient trade routes.
  8. Chinese ships that dominated trade in the South China Sea.
  9. Moroccan explorer who traveled over 75,000 miles across the Islamic world.
Down
  1. Settlements of people outside their homeland, fostering cross-cultural interactions.
  2. Nickname for European naval powers who dominated global trade routes during the Age of Exploration.
  3. Ming dynasty ruler who sponsored Zheng He's maritime expeditions and oversaw the construction of the Forbidden City.
  4. Tower in Delhi built by Muslim rulers, symbolizing the spread of Islam in India.
  5. Early form of currency that facilitated trade along the Silk Road.
  6. Massive temple complex built in Cambodia during the Khmer Empire.
  7. Wealthy ruler of Mali, famous for his pilgrimage to Mecca.
  8. Mongol ruler who led the destruction of Baghdad, marking the end of the Abbasid Caliphate.
  9. A method of fast communication and transportation used by the Mongols across their empire.
  10. Ming dynasty admiral who led massive maritime expeditions across the Indian Ocean.
  11. Native American city near present-day St. Louis.

20 Clues: Native American city near present-day St. Louis.Wealthy ruler of Mali, famous for his pilgrimage to Mecca.Chinese ships that dominated trade in the South China Sea.Massive temple complex built in Cambodia during the Khmer Empire.Early form of currency that facilitated trade along the Silk Road....

Slande Cheridor 2024-12-07

Slande Cheridor crossword puzzle
Across
  1. testers who are paid to probe networks and report vulnerabilities
  2. what the user has (smart card or key)
  3. a server role that makes it possible for administrators to take control of Microsoft product updates
  4. The most widely used method for encrypting data
  5. security features that enable administrators to control who has access to the network
  6. an industry-standard client/server protocol that offers centralized control
  7. security features that enable administrators to control what users can do after they are logged on to the network
  8. used in a Windows domain environment and provides mutual authentication
  9. backs up the disk sector by sector to create an exact image of the disk’s contents
  10. framework for other protocols that provide encryption and authentication
  11. A common tool used by many Linux administrators
  12. a good security enhancement for servers that aren’t physically secure
Down
  1. can be set in the Local Security Policy console found in Administrative Tools
  2. allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
  3. tool used to delete unneeded files in Windows
  4. disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  5. a unique biometric identifying trait. What the user is
  6. document that describes the rules governing access to an organization’s information resources
  7. creates a barrier between two entities
  8. prevents people from using eavesdropping technology

20 Clues: what the user has (smart card or key)creates a barrier between two entitiestool used to delete unneeded files in WindowsThe most widely used method for encrypting dataA common tool used by many Linux administratorsprevents people from using eavesdropping technologya unique biometric identifying trait. What the user is...

Russia Comp Gov 2025-11-17

Russia Comp Gov crossword puzzle
Across
  1. Russian court with judicial review (on Putin's request)
  2. Russia and Nigeria are both one (thanks to oil)
  3. describes electoral methods of both Federal Assembly and Mexican Congress
  4. Gorbachev restructuring reforms introducing limited market and political change
  5. System combining directly elected president with a prime minister and cabinet
  6. Formerly the Russian Communist party but now the Liberal Democratic Party of Russia
  7. founder of Smart Voting, now dead
  8. Soviet-era party appointment system whose networks still shape Russian elites
  9. can change internal boundaries and ratify treaties
  10. run by "super-governors"
  11. term of office for both Putin and Sheinbaum
  12. Eg. Republic of Altai vs Altai Krai
  13. Restive North Caucasus region with separatist conflict against Moscow
Down
  1. Putin's role during Medvedev's presidency
  2. Business magnates in Russia, created during shock therapy
  3. Gorbachev policy of openness that loosened censorship and controls
  4. Term for Russia’s controlled elections, media, and opposition
  5. Russian state-controlled natural gas giant often used as a foreign policy tool
  6. Rough functional equivalent of the UK House of Commons, but with far less independence
  7. Russian equivalent of Mexico’s old PRI-style dominant party
  8. Long-serving Russian president associated with managed democracy
  9. Fortress-like seat of Russian executive power in Moscow
  10. Using legal rules to serve those in power rather than to limit the state
  11. Putin ally who served one term as president before returning to prime minister
  12. The new KGB/FSB

25 Clues: The new KGB/FSBrun by "super-governors"founder of Smart Voting, now deadEg. Republic of Altai vs Altai KraiPutin's role during Medvedev's presidencyterm of office for both Putin and SheinbaumRussia and Nigeria are both one (thanks to oil)can change internal boundaries and ratify treatiesRussian court with judicial review (on Putin's request)...

FINISH DIGTIAL CITIZENSHIPS CROSSWARD FOR FREE CAR EXTENDED WARENTY 2025-12-01

FINISH DIGTIAL CITIZENSHIPS CROSSWARD FOR FREE CAR EXTENDED WARENTY crossword puzzle
Across
  1. legal protection for any piece of tangible forms
  2. using someone elses words or work for your own use without any credit
  3. bullying online, social media, text, any use of techonoly
  4. a type of crime scammers commit when pretending to be legit sources to hack or steal data
  5. Data that tracks your history online
  6. an instrument used to measure mass
  7. ability to access and analyze all forms of commucation
  8. principals that influence someone's behaviors or beliefs
  9. computer systems used for learning through human intelegence
  10. awareness of thoughts and feelings
  11. the use of graphics, sounds, ect to enhance real life in digital settings
  12. understanding or sharing feelings with an indivual
Down
  1. allows limited use of copyrighted items for criticsm, research, ect
  2. ethical use of technology
  3. Someone who uses the internet responsibly
  4. technology obsession
  5. information used to trick people
  6. incorrect information
  7. data like name, address, socail security number, ect
  8. someone who witnesses something happen
  9. a feature used to restrict or allow software, apps, ect
  10. rules for appropriate behavior online
  11. profiles, usernames, ect
  12. someone who witnesses something and tries to do something about it
  13. ability to control how information is used, shared, ect
  14. converting data to unreadable code
  15. protection for networks and data from scammers
  16. an organization that helps empower people for culture and knowledge
  17. time spent on devices
  18. process of following calculations for opperations

30 Clues: technology obsessionincorrect informationtime spent on devicesprofiles, usernames, ectethical use of technologyinformation used to trick peoplean instrument used to measure massconverting data to unreadable codeawareness of thoughts and feelingsData that tracks your history onlinerules for appropriate behavior online...

AI crossword 2023-09-17

AI crossword crossword puzzle
Across
  1. The highest form of AI which surpasses human intelligence and ability, potentially able to improve itself autonomously.
  2. These are the main building blocks of neural networks, similar to neurons in the human brain.
  3. The branch of AI that enables computers to understand and interpret visual information from the world.
  4. A subset of AI that allows computers to understand, interpret, and generate human language.
Down
  1. A broad branch of machine learning based on learning data representations, as opposed to task-specific algorithms.
  2. This type of AI specializes in performing a narrow task and its intelligence is confined to a narrow domain.
  3. Theprocess of machines learning from data to identify patterns and make decisions with little to no human intervention.

7 Clues: A subset of AI that allows computers to understand, interpret, and generate human language.These are the main building blocks of neural networks, similar to neurons in the human brain.The branch of AI that enables computers to understand and interpret visual information from the world....

Self-Directed Learner 2023-09-29

Self-Directed Learner crossword puzzle
Across
  1. A hybrid learning model that combines both traditional in-person instruction and online or digital learning components
  2. challenges or obstacles that adult learners may face, such as lack of access to education, work-life balance, or motivation issues.
  3. A theory that emphasizes learning in the digital age, where learners connect to resources and networks to acquire knowledge.
Down
  1. The practice of effectively allocating time for learning activities, work, and personal responsibilities.
  2. The concept of continuous learning and skill development throughout one's life’
  3. A learning theory that emphasizes observable behaviors and the use of rewards and punishments to shape behavior
  4. he theory and practice of teaching and educating adults, emphasizing self-directed learning and the unique needs of adult learners.

7 Clues: The concept of continuous learning and skill development throughout one's life’The practice of effectively allocating time for learning activities, work, and personal responsibilities.A learning theory that emphasizes observable behaviors and the use of rewards and punishments to shape behavior...

BM2501 2019-10-28

BM2501 crossword puzzle
Across
  1. _____ marketing describes any strategy that encourages individuals to pass on a marketing message to others, creating the potential for exponential growth in the message's exposure and influence.
  2. _____ marketing involves staging an event that generates excitement, curiosity and publicity to provide information to consumers.
  3. Word of mouth marketing is when a consumer’s interest in a company’s product or service is reflected in their daily _____.
Down
  1. Social currency is derived from social _____ theory.
  2. Social ______ refers to the actual and potential resources from presence in social networks and communities
  3. _____ messages are required to allow others to effortlessly transfer messages to one another.

6 Clues: Social currency is derived from social _____ theory._____ messages are required to allow others to effortlessly transfer messages to one another.Social ______ refers to the actual and potential resources from presence in social networks and communities...

science 2023-10-27

science crossword puzzle
Across
  1. definition: Organisms that live on or in another organism (the host) and feeds on it
  2. definition: Models That show how food energy passes from organism to organisms
  3. Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
  1. Definition: Networks of interconnected Food chains In an ecosystem
  2. Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
  3. definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything

6 Clues: Definition: Networks of interconnected Food chains In an ecosystemdefinition: Models That show how food energy passes from organism to organismsdefinition: Organisms that live on or in another organism (the host) and feeds on it...

Information Security 2024-05-07

Information Security crossword puzzle
Across
  1. Once money is paid, the attacker gives a passcode to disinfect the system and remove the lock.
  2. describes methods for ensuring that data stored on a computer system is protected against unauthorized access.
  3. is a very broad term that includes spyware, ransomware, and viruses.
Down
  1. is a computer user who enters/breaks into computer systems using hacking tools for their own personal gain without permission.
  2. is a type of malware that enters in system and hides as if it is a legitimate program.
  3. spread on their own through computer networks and don’t require the infected program to execute to activate.

6 Clues: is a very broad term that includes spyware, ransomware, and viruses.is a type of malware that enters in system and hides as if it is a legitimate program.Once money is paid, the attacker gives a passcode to disinfect the system and remove the lock....

Computer System Servicing 2- Software Applications and Vi 2025-01-23

Computer System Servicing 2- Software Applications and Vi crossword puzzle
Across
  1. infecting applications on a host computer
  2. they can completely cripple entire computer networks and can easily replicate and spread by using the internet to transfer to devices connected to the network.
  3. virus accesses a computer’s main memory and infects all programs, files, and folders located in the autoexec.bat path, before deleting itself.
Down
  1. virus disguised to look like something it is not
  2. This allows cyber criminals to attack major websites, such as social networking sites, email providers, and any site that enables user input or reviews.
  3. they can delete data and replace it with their own file content or code

6 Clues: infecting applications on a host computervirus disguised to look like something it is notthey can delete data and replace it with their own file content or codevirus accesses a computer’s main memory and infects all programs, files, and folders located in the autoexec.bat path, before deleting itself....

NETWORKING QUIZ 2025-05-17

NETWORKING QUIZ crossword puzzle
Across
  1. Encryption is the process of converting data into a code to prevent unauthorized access. It ensures that sensitive information, like passwords or credit card details, remains private even if intercepted by malicious actors. Encryption is essential for securing data both at rest (stored data) and in transit (data being transmitted).
  2. A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet, and helps to prevent unauthorized access or attacks.
  3. terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats.
Down
  1. Private Network (VPN) A VPN is a technology that allows users to create a secure and encrypted connection over a less secure network, such as the internet. It enables remote users to access a private network securely, protecting data from being intercepted by unauthorized parties.
  2. Control Access control refers to the mechanisms used to regulate who or what can access a network or system, and under what conditions. This includes techniques like authentication (verifying the identity of users) and authorization (granting permission to access resources). Types of access control models include discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC).
  3. Detection System (IDS: An IDS is a device or software application that monitors a network or systems for malicious activity or policy violations. It alerts administrators to suspicious behavior, such as an unauthorized attempt to access the network, and can also provide real-time detection of potential security breaches.
  4. are five key terminologies used in performing network security:

7 Clues: are five key terminologies used in performing network security:terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats....

VID for the Enterprise 2024-01-24

VID for the Enterprise crossword puzzle
Across
  1. Provide users with on-demand access to software applications, allowing them to use the software without worrying about the complexities of installation, maintenance, or infrastructure management
  2. Enables users to run applications, process data, and perform various computational tasks without the need for owning physical hardware.
  3. Enables communication and connectivity between various resources and services within a cloud environment
  4. protecting data, systems, and networks from unauthorized access, attacks, and damage.
Down
  1. Refers to the physical components, such as servers, storage devices, and networking equipment, that form the foundation of cloud computing
  2. Provides users with scalable and flexible data storage solutions over the internet
  3. Offers development tools, middleware, automated deployment, scalability, and maintenance and updates
  4. provides a level of abstraction between the physical hardware resources and the virtualized resources that users interact with

8 Clues: Provides users with scalable and flexible data storage solutions over the internetprotecting data, systems, and networks from unauthorized access, attacks, and damage.Offers development tools, middleware, automated deployment, scalability, and maintenance and updates...

Happy ageing! 2019-04-17

Happy ageing! crossword puzzle
Across
  1. ______ Nation is a national initiative to harness infocomm technologies, networks and big data to create tech-enabled solutions.
  2. There are 6 different categories of NSA courses: 1) Health & Wellness, 2) IT & Science, 3) Media, Arts & Design, 4) Ageing & Life Skills, 5) Finance & Business and 6)________
  3. What kind of software should I install to prevent malware infection?
Down
  1. NSA has ad-hoc learning opportunities such as ________ Learning Programme that match youths and seniors in a group learning environment.
  2. A method in which cyber criminals use to fraudulently obtain your personal and financial information such as your login details, bank account numbers and credit card numbers.
  3. Singapore has recently introduced the sixth pillar of Total Defense: _______ Defense.
  4. _______ is also known as for malicious software.
  5. A "guitar" that has 4 strings instead of 6.

8 Clues: A "guitar" that has 4 strings instead of 6._______ is also known as for malicious software.What kind of software should I install to prevent malware infection?Singapore has recently introduced the sixth pillar of Total Defense: _______ Defense....

Living Online 2015-08-24

Living Online crossword puzzle
Across
  1. Malicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload comput¬ers and networks.
  2. Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network.
  3. Wireless technology used to network computers together and to other devices like printers or servers.
  4. Any machine attached to a network: client, server, printer, and so on.
  5. Malicious program installed with¬out the user’s knowledge while surfing the Internet that tracks the user’s activities and gathers other information.
  6. Copying something created by someone else not giving credit
  7. Bad hacker who creates malicious programs to break into computers and do harm
  8. Process where files, data or e-mail messages are intentionally made unreadable without a mechanism to decode it.
  9. Characters created using the colon or semicolon keys for eyes to express emotion in a text or e-mail message, such as :) or :(.
  10. A program or feature used to block spam or e-mail messages from specific senders
  11. Standards used to control how data is sent over a network
  12. Businesses that have a physical location.
  13. Pieces of text that are stored on the computer as you surf the Internet that help Web sites track your activities.
  14. Boolean operator that excludes specific words from search results.
  15. Password with at least eight characters containing a mixture of uppercase and lowercase letters, numbers and punctuation or symbol characters.
  16. Unique name given to each network and used to identify specific e-mail and Web servers.
  17. A delivered e-mail message has been ___________.
  18. Security devices that read finger¬prints, analyze a user’s voice, and so on to provide secure access.
  19. E-mail attack or scam designed to gather information from a user while appearing to be safe
Down
  1. Disposing of paper and other products so they can be processed for reuse
  2. Concept that says you don’t need permission to include limited excerpts from another author’s work when reviewing or analyzing it
  3. Program that combs the Internet, cataloging all the Web pages it finds and storing the results in a search¬able database.
  4. Saved URL
  5. Part of an IP address that defines the network from which a user is then accessing the Internet.
  6. Buying and selling products and ser¬vices by bidding over the Internet
  7. Boolean search operator that requires both search terms to be included in the search results
  8. Sending an existing e-mail message on to a new recipient
  9. Any field in a form on a Web page or other document where the user can enter text.
  10. Microsoft’s dedicated e-mail soft¬ware program.
  11. Most popular search engine.
  12. Area at the top of a Web browser that displays the URL of the current site or the site a user is about to access.
  13. Feature that enables a user quickly look through files or e-mail mes¬sages for a key word or phrase.
  14. Used by machines like an ATM to conduct secure transactions.
  15. Password that contains anything that could be easy to guess, such as birthdays, names, or strings of fewer than eight characters.
  16. Default Web page that opens when a browser is launched.
  17. Unsolicited e-mail message sent by someone you don’t know.

36 Clues: Saved URLMost popular search engine.Businesses that have a physical location.Microsoft’s dedicated e-mail soft¬ware program.A delivered e-mail message has been ___________.Default Web page that opens when a browser is launched.Sending an existing e-mail message on to a new recipientStandards used to control how data is sent over a network...

HOI 2020-02-25

HOI crossword puzzle
Across
  1. / a series of coded software instructions to control the operation of a computer or other machine
  2. social network / is an online platform which people use to build social networks or social relationship with other people who share similar personal or career interests, activities, backgrounds or real-life connections
  3. / a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
  4. reader / s a mobile electronic device that is designed primarily for the purpose of reading digital e-books
  5. / combining 2 or more functions in a unit.
  6. / an extra copy of data on a computer.
  7. engine / is designed to carry out web search, which means to search the World Wide Web
  8. device / A communication device is a hardware device capable of transmitting an analog or digital signal over the telephone, other communication wire, or wirelessly.
  9. console / a piece of electronic equipment for playing games on
  10. / cause to occur or operate at the same time or rate
  11. computing / is an application of environmental science which offers economically possible solutions that conserve natural environment and its resources
  12. device / is a piece of computer hardware equipment used to provide data and control signals to an information processing system such as a computer or information appliance.
  13. / an application, downloaded usually by a mobile user.
  14. / is a document commonly written in HTML (Hypertext Markup Language) that is accessible through the Internet or other networks using an Internet browser.
  15. / a program with graphic interface on a world wide web.
  16. / a location connected to the Internet that maintains one or more pages on the World Wide Web
  17. / a group or system of interconnected people or things
  18. device / is any piece of computer hardware equipment which converts information into human-readable form.
  19. server / a computer program that distributes web pages as they are requisitioned
Down
  1. / type of notebook computer that has an LCD screen on which the user can write using finger and swipe actions
  2. drive / a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit.
  3. media player / a handheld electronic device for playing digital media such as audio and video files
  4. device convergence / means the ability to view the same multimedia content from different types devices and thanks to the digitization of content
  5. / short-range wireless interconnection of devices.
  6. / a program or piece of software made to fulfill a purpose.
  7. storage / a model of computer data storage in which the digital data is stored in logical pools.
  8. / a machine for printing text or pictures onto paper, especially one linked to a computer.
  9. / the working area of a computer screen regarded as a representation of a notional desktop and containing icons representing items such as files and a wastebasket.
  10. / synchronization, in-sync = a state in which two or more people or things move or happen together at the same time and speed
  11. / the programs and other operating information used by a computer.
  12. device / a wearable device is a technology that is worn on the human body
  13. / a computer or computer program which manages access to a centralized resource or service in a network
  14. / the faculty by which the mind stores and remembers information
  15. / is basically a system of Internet servers that support specially formatted documents.

34 Clues: / an extra copy of data on a computer./ combining 2 or more functions in a unit./ short-range wireless interconnection of devices./ cause to occur or operate at the same time or rate/ an application, downloaded usually by a mobile user./ a group or system of interconnected people or things/ a program with graphic interface on a world wide web....

Chapter3_Internet Crime 2017-08-03

Chapter3_Internet Crime crossword puzzle
Across
  1. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
  2. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
  3. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
  4. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
  5. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
  6. Type of attacker that Promote political ideology.
  7. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
  8. They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
  9. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
  10. Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
Down
  1. Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
  2. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
  3. In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
  4. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
  5. Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
  6. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
  7. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
  8. ______is a program in which malicious code is hidden inside a seemingly harmless program.
  9. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of programming code is attached to a file, so that when the infected file is opened, the code executes
  10. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
  11. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
  12. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
  13. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.

23 Clues: Type of attacker that Promote political ideology.______is a program in which malicious code is hidden inside a seemingly harmless program.______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.______is a harmful program that resides in the active memory of the computer and duplicates itself....

Chapter3_Internet Crime 2017-08-03

Chapter3_Internet Crime crossword puzzle
Across
  1. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
  2. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
  3. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
  4. Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
  5. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
  6. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
  7. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
  8. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
  9. Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
  10. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
  11. Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
  12. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
  13. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
Down
  1. They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
  2. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
  3. In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
  4. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes
  5. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
  6. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
  7. Type of attacker that Promote political ideology.
  8. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
  9. ______is a program in which malicious code is hidden inside a seemingly harmless program.
  10. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.

23 Clues: Type of attacker that Promote political ideology.______is a program in which malicious code is hidden inside a seemingly harmless program.______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people....

Chapter3_Internet Crime 2017-08-03

Chapter3_Internet Crime crossword puzzle
Across
  1. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
  2. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
  3. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
  4. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
  5. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
  6. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
  7. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
  8. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
  9. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
  10. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
  11. Type of attacker that Promote political ideology.
  12. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
Down
  1. ______is a program in which malicious code is hidden inside a seemingly harmless program.
  2. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
  3. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
  4. Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
  5. Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
  6. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
  7. Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
  8. In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
  9. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
  10. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes

22 Clues: Type of attacker that Promote political ideology.______is a program in which malicious code is hidden inside a seemingly harmless program.______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.______is a harmful program that resides in the active memory of the computer and duplicates itself....

Chapter3_Internet Crime 2017-08-03

Chapter3_Internet Crime crossword puzzle
Across
  1. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
  2. Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
  3. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
  4. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
  5. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
  6. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
  7. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
  8. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
  9. Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
  10. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
  11. In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
  12. Type of attacker that Promote political ideology.
Down
  1. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
  2. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
  3. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
  4. Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
  5. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes
  6. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
  7. ______is a program in which malicious code is hidden inside a seemingly harmless program.
  8. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
  9. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
  10. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.

22 Clues: Type of attacker that Promote political ideology.______is a program in which malicious code is hidden inside a seemingly harmless program.______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.______is a harmful program that resides in the active memory of the computer and duplicates itself....

Final Review 2023-11-27

Final Review crossword puzzle
Across
  1. Contains users and computer settings and policies.
  2. This configuration change allows admins to improve VoIP.
  3. The amount of time that the data can be stored in the DNS cache.
  4. This technology is also referred to as a PAN.
  5. A group of networks that are geographically isolated but are connected by ISPs.
  6. This email protocol is used to send emails.
  7. Changing this value in Task Manager provides adequate attention from the system CPU to a process.
  8. A secure remote access protocol.
  9. Is used to encrypt the entire volume.
  10. IP address on the 169.254.0.0 network assigned by hosts to themselves.
  11. Public key encryption happens in this OSI model layer.
  12. File Access Protocol which can be protected.
  13. Windows admin utility that allows admins to aggregate different admin tools.
  14. A list that contains information on allowed and denied access to folders and files.
  15. Tis virtualization component provides the hardware needed.
  16. The DNS servers hold the original and official DNS records for a specific domain.
  17. This kernel component moves the data of an app not currently being accessed from RAM to a paging file.
  18. This email Protocol is used to retrieve emails.
  19. In a TCP connection hosts send this packet to establish a connection.
  20. The rights granted to a user or group to access files and folders.
  21. A thin layer of software that resides between the virtual machine and hardware.
  22. This Linux command is used to change permissions.
  23. This attribute is unique for all objects in a domain.
  24. Is responsible for converting logical data into an acceptable form for transmission.
  25. Hubs physical topology.
  26. This OSI model layer is responsible for end-to-end communication.
  27. This command allows you to resolve a hostname to its associated IP address.
  28. A type of system software on SOHO routers.
  29. This type of Windows installation is used when a compatible OS needs to be upgraded.
Down
  1. .com, .net, and .ca are registered under this DNS server.
  2. This topology describes how the network's computers are connected.
  3. TCP protocol sends this to start the handshake negotiation.
  4. A reliable Transport layer protocol.
  5. Is a lightweight Active Directory Protocol.
  6. In this network type, organization resources are shared with suppliers.
  7. A file created by the hypervisor to store data.
  8. The process of proving someone's identity.
  9. This application layer protocol uses TCP port 3389.
  10. Simple Multi-tenancy is associated with this cloud type.
  11. This wireless feature allows a printer connection with the least effort.
  12. Type of network is available privately to employees.
  13. Disabling this option creates unique permissions for a folder.
  14. These types of groups are created mainly for permissions.
  15. This application layer protocol uses TCP port 389.
  16. This cloud solution delivers everything a developer needs.
  17. This backup solution backs up every file that has changed since the last full backup.
  18. This VPN provides both authentication and encryption.
  19. The network name on a wireless network.
  20. The frequency at which your router sends and receives signals.
  21. This reference model is created to interpret network communication.
  22. This command in the Linux system is used to search for text.
  23. Uses TCP port 22 for remote access.
  24. This transport layer protocol is used when speed is the main concern.
  25. This device interconnects multiple networks to each other.

54 Clues: Hubs physical topology.A secure remote access protocol.Uses TCP port 22 for remote access.A reliable Transport layer protocol.Is used to encrypt the entire volume.The network name on a wireless network.The process of proving someone's identity.A type of system software on SOHO routers.Is a lightweight Active Directory Protocol....

CAT cross word 2024-10-09

CAT cross word crossword puzzle
Across
  1. Software that is available for use at no cost but may have restrictions on usage or distribution
  2. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
  3. Address A unique identifier assigned to each device connected to a network that uses the Internet Protocol for communication.
  4. Computing The delivery of computing services, such as storage, processing, and software, over the internet (the cloud) to offer flexible resources and economies of scale.
  5. The use of digital communication tools (like social media, messaging apps, or online forums) to harass, threaten, embarrass, or target another person. Cyberbullying can include spreading rumours, sending harmful messages, impersonation, or sharing private information without consent.
  6. A technology that allows electronic devices to connect to a wireless local area network (WLAN) using radio waves.
  7. A cyber attack that redirects users from legitimate websites to fraudulent ones to steal sensitive information
  8. A standard for connecting peripherals to a computer, allowing for data transfer and power supply, available in various versions (e.g., USB 2.0, USB 3.0) with different speeds and capabilities.
  9. Processing Unit, the primary component of a computer that performs most of the processing tasks.
  10. A cyber attack that uses disguised emails or messages to trick users into revealing confidential information, such as passwords or credit card numbers.
  11. (Fiber to the Home) A type of broadband network architecture where optical fibre is installed directly from the central provider's office to individual homes or buildings, providing high-speed internet access
  12. A data storage device that uses flash memory to store data, providing faster access than traditional hard drives.
  13. A network device that connects multiple devices within a local area network (LAN) and uses MAC addresses to forward data only to its intended destination, reducing network collisions
  14. Wide Area Network, a network that covers a broad geographical area, connecting multiple smaller networks (LANs).
Down
  1. Cable A cable made of thin strands of glass or plastic that transmits data as light signals, offering high-speed data transmission with minimal signal loss
  2. Random Access Memory, a type of fast but temporary storage that a computer uses to store data that is currently being used or processed
  3. Random Access Memory, a type of fast but temporary storage that a computer uses to store data that is currently being used or processed
  4. Central Processing Unit, the primary component of a computer that performs most of the processing tasks
  5. Malicious software designed to harm or exploit any programmable device or network.
  6. Local Area Network, a network that connects computers within a small geographical area, like a home, school, or office.
  7. Server A server that provides database services to other computers or applications, handling queries, storage, and data management.
  8. Computing Device A device built and optimized to perform a single task or a limited range of tasks, such as a GPS navigator, a digital camera, or a gaming console.
  9. A type of twisted pair cable used in Ethernet networks, without additional shielding, typically less expensive and more flexible than STP.
  10. A wireless network that connects devices within a limited area, like a home or office, using Wi-Fi technology.
  11. Graphics Processing Unit, a specialized processor designed to accelerate graphics rendering and image processing
  12. Engineering The use of psychological manipulation to trick individuals into divulging confidential information or performing actions that compromise security.

26 Clues: Malicious software designed to harm or exploit any programmable device or network.Software that is available for use at no cost but may have restrictions on usage or distributionProcessing Unit, the primary component of a computer that performs most of the processing tasks....

Cyber Security Review 2021-09-08

Cyber Security Review crossword puzzle
Across
  1. Use IP Address to pass the data between networks
  2. Reduce collisions because split the
  3. is software/hardware based network security system that controls the in and out network traffic
  4. _____________ Control Protocol
  5. Downloads onto a computer disguised as a legitimate program
  6. software intentionally designed to harm a network, server, or computer
  7. Data arriving to a _____ port is repeated on all the other ports
  8. Misrepresenting oneself by using fake e- mail addresses or masquerading as someone else
  9. Intentionally disrupting, defacing or destroying a Web site
  10. Destroy data when certain conditions are met
  11. is an object, person, or other entity that represents a constant danger to an asset
  12. is a flexible filament of very clear glass capable of carrying information in the form of light
  13. This address is a 48 bits long binary number unique for every network card
  14. A type of software security
  15. These IPs do not change. Whether you
  16. translates the locally significant source address into a globally unique address
  17. Is a device that plugs into a motherboard and provides ports for the network cable connections
  18. Doesn’t needs user intervention to replicates
  19. These losses refer to the loss of trust and lowered opinion of people to a business as a result of them being affected by a threat
  20. Cable that consists of a cylindrical conductor that surrounds a single inner wire made of two conducting elements
  21. is a series of LANs linked together to form a network in an extended area
  22. Type of network that consists of a series of computers linked together to form a network in a circumscribed location
  23. person who intends to gain unauthorized access to a computer systems
  24. It forward the information based on MAC address list and ports
  25. your machine or reboot your router it remains the
Down
  1. Topology in which all nodes indirectly connect to each other through one or more switches
  2. A group of computers and associated devices that are connected by communications facilities
  3. These losses refer to damages of the operating capability of an organisation
  4. Its purpose is to regenerate signals distorted by transmission loss due to attenuation
  5. is a network that is spread over a very small area
  6. domains
  7. These losses refer to damages to the wealth of an organisation
  8. Activated when infected program is loaded in memory and executed by its own or a user action
  9. between computers on a network plural)
  10. In this topology data travels in one direction using a control signal called a ‘token’
  11. Fraudulent email leading to a fraudulent website
  12. Network topology where all the nodes are joined to one cable
  13. The practice and study of techniques for secure communication
  14. A type of physical security
  15. cable type that is commonly used on Ethernet networks
  16. is a malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
  17. to a computing device or node when it’s connected to a network
  18. is a temporary IP address that is
  19. Is a set of rules that governs the
  20. occurs when someone steals your personal information to commit crimes in your name
  21. the process of converting plaintext to ciphertext

46 Clues: domainsA type of physical securityA type of software security_____________ Control Protocolis a temporary IP address that isIs a set of rules that governs theReduce collisions because split theThese IPs do not change. Whether youbetween computers on a network plural)Destroy data when certain conditions are met...

Data transmission crossword 2026-04-01

Data transmission crossword crossword puzzle
Across
  1. A key known only to one user/computer
  2. Encryption that uses public and private keys to secure data
  3. A computer capable of very fast calculations using probability, allowing it to process much more data than traditional computers
  4. A type of serial data transmission which has become the industry standard for connecting computers to devices via a USB port
  5. Sending data down one channel/wire one bit at a time
  6. A method of transmission in which a message is broken into many data packets which can then be sent along pathways independently of each other
  7. The part of a data packet that indicates the end of the data packet and cyclic redundancy check error check
  8. A verification method used to check if data transferred has been altered or corrupted; calculated from the data block and sent after each block
  9. Data that arrives at the destination with the bits no longer synchronised
  10. Stages in a network that can receive and transmit data packets; routers are nodes in communication networks
  11. A bit (either 0 or 1) added to a byte of data in the most significant bit position; ensures correct parity protocol
  12. The actual data being carried in a data packet
  13. The process of making data meaningless using encryption keys
  14. Data that can be sent in both directions at the same time (simultaneously)
  15. Encrypted data produced from plaintext using an encryption algorithm
  16. A horizontal and vertical parity check on a block of data being transmitted
  17. A method used to check if data has been transferred correctly; it makes use of even parity or odd parity
  18. The original text/message before encryption
Down
  1. A key used in symmetric encryption that both parties have access to
  2. Encryption where the same key is used to encrypt and decrypt a message
  3. A message sent to the sender indicating that data has been received correctly
  4. Another name for a hacker who intercepts data being transmitted on a network
  5. A key known to all users
  6. An extra byte of data sent at the end of a parity block; composed of parity bits from a vertical parity check
  7. The time interval allowed to elapse before an acknowledgement is received
  8. Data that can be sent in one direction only
  9. A small part of a message/data that is transmitted over a network; after transmission all the data packets are reassembled to form the original message/data
  10. A device that enables data packets to be moved between different networks, for example to join a LAN to a WAN
  11. A method where data is sent to a receiver and immediately sent back to verify accuracy
  12. An additional digit appended to a number to check if the entered number is error-free
  13. A method of checking transmitted data for errors using acknowledgement and timeout to request re-sending
  14. Data that can be sent in both directions but not at the same time
  15. The part of the data packet that contains the IP addresses of the sender and receiver, and includes the packet number which allows reassembly of the data packets
  16. Software that converts plaintext into ciphertext
  17. Sending data down several channels/wires several bits at a time (usually 1 byte)

35 Clues: A key known to all usersA key known only to one user/computerData that can be sent in one direction onlyThe original text/message before encryptionThe actual data being carried in a data packetSoftware that converts plaintext into ciphertextSending data down one channel/wire one bit at a time...

paper 2 2022-12-13

paper 2 crossword puzzle
Across
  1. Attempting to gain access to a computer system that you do not have permission to access
  2. Ensuring that sensitive data is only disclosed to necessary personnel, such as employee records are only processed by staff within the HR department
  3. The right of all people to keep their personal data confidential
  4. The process of scrambling data so it can be securely stored, or sent securely over networks so that it can be understood only by its intended recipient
Down
  1. an assessment of the practicality of a project or system
  2. Collective term for unwanted and damaging software such as viruses, ransomware, worms and Trojan horses
  3. Security measure that controls incoming and outgoing network traffic using a set of rule
  4. Duplicated data to a separate storage media in case the original data is lost
  5. Anyone who has an interest in, or is affected by, the development of a product or the actions of an organisation

9 Clues: an assessment of the practicality of a project or systemThe right of all people to keep their personal data confidentialDuplicated data to a separate storage media in case the original data is lostSecurity measure that controls incoming and outgoing network traffic using a set of rule...

techno-addictions 2022-10-06

techno-addictions crossword puzzle
Across
  1. Disproportionate inclination towards the use of technologies, which limit human freedom and generate dependence.
  2. Feeling of not being able to live without the Internet, which is detrimental to your personal and professional relationships.
  3. Category of games based on impulsive play, which require payment to advance and access better features.
  4. Impulsive search for information at the first possible symptom of discomfort or disease.
Down
  1. Feeling of anxiety, when you cannot use your cell phone.
  2. Tendency to forget the information or where we can get it, by always using Google for any query on the Internet.
  3. Restlessness and discomfort, caused by the fear of missing out on what is happening in social networks.
  4. The action of undervaluing those who accompany you, when you pay attention to your cell phone instead of them.
  5. Phantom' vibration, feeling that the phone is vibrating when in fact it has not vibrated and no input has been registered.

9 Clues: Feeling of anxiety, when you cannot use your cell phone.Impulsive search for information at the first possible symptom of discomfort or disease.Restlessness and discomfort, caused by the fear of missing out on what is happening in social networks.Category of games based on impulsive play, which require payment to advance and access better features....

Chapter 13: Education 2019-05-08

Chapter 13: Education crossword puzzle
Across
  1. an overemphasis on credentials (e.g. college degrees) for signaling social status or qualifications for a job
  2. when members of a negatively stereotyped group are placed in a situation where they fear they may confirm those stereotypes
  3. a set of policies that grant preferential treatment to a number of particular subgroups within the population – typically women and historically disadvantaged racial minorities
  4. the symbolic and interactional resources that people use to their advantage in various situations
Down
  1. the information, knowledge of people, and connections that help individuals enter, gain power in, or otherwise leverage social networks
  2. hypothesis stating that parental resources are finite and that each additional child gets a smaller amount of them
  3. the nonacademic and less overt socialization functions of schooling
  4. a way of dividing students into different classes by ability or future plans
  5. the process through which academic, social, and cultural skills are developed

9 Clues: the nonacademic and less overt socialization functions of schoolinga way of dividing students into different classes by ability or future plansthe process through which academic, social, and cultural skills are developedthe symbolic and interactional resources that people use to their advantage in various situations...

The Mafia 2024-01-29

The Mafia crossword puzzle
Across
  1. and sell protection to businesses and resolve disputes among both criminal and legitimate actors.
  2. a system or organization in which people or groups are ranked one above the other according to status or authority
  3. the state, which he defined as the monopoly of legitimate force over a given territory
  4. a structured group of three or more persons, existing for a period of time and acting in concert with the aim of committing one or more serious crimes or offences.in order to obtain directly or indirectly, a financial or material benefit.
  5. a pattern of relationships between and among individuals and social groups
  6. hierarchies consisting of a limited number of mafiosi drawn from networks of socially close people
Down
  1. monopolize the provision of some illicit service or product utilizing Violence
  2. also known as team leaders
  3. a real, active, and operating commercial or entrepreneurial undertaking which produces services or goods for profit

9 Clues: also known as team leadersa pattern of relationships between and among individuals and social groupsmonopolize the provision of some illicit service or product utilizing Violencethe state, which he defined as the monopoly of legitimate force over a given territory...