networks Crossword Puzzles

Security homes and Security 2024-05-06

Security homes and Security crossword puzzle
Across
  1. Weak points in a system's security that may be exploited by cybercriminals in smart home devices.
  2. Popular voice-controlled smart assistant which raises privacy concerns regarding the data it collects.
  3. Security technique used to encode data sent between smart devices to prevent unauthorized access.
  4. A deceptive method often used to steal user credentials by mimicking legitimate requests or notifications, increasingly targeted at smart device users.
  5. A line of smart home products known for integrating security features but still poses risks if not properly managed.
Down
  1. A device often connected to smart home networks that can be manipulated remotely, highlighting the need for secure configurations.
  2. Unauthorized gathering of private information through electronic means in a connected home.
  3. Residences equipped with interconnected devices that can be managed remotely but may expose owners to cyber threats
  4. A type of malware that converts networked devices into controlled 'bots', often used in large-scale network attacks, including those on IoT devices.
  5. Measures and protocols implemented to protect smart home devices from cyber threats.
  6. Individuals who seek unauthorized access to networked devices, often targeting poorly secured smart home systems.

11 Clues: Measures and protocols implemented to protect smart home devices from cyber threats.Unauthorized gathering of private information through electronic means in a connected home.Weak points in a system's security that may be exploited by cybercriminals in smart home devices....

1. Security 2023-06-22

1. Security crossword puzzle
Across
  1. Protecting networks, computers, and information from digital attacks, like viruses or hacking.
  2. Protecting your money and personal information from theft or fraud when using banks or making purchases.
  3. Actions you take to stay safe, like not sharing personal information with strangers or walking home with a buddy.
  4. Ensuring the foods we eat are clean, safe, and free from harmful things like bacteria or chemicals.
  5. Event Precautions taken to keep people safe at large gatherings like concerts or festivals, including crowd control and first aid.
Down
  1. Measures to protect cars, bikes, or other vehicles from theft or damage, like alarms, locks, or tracking devices.
  2. Measures employers take to keep employees safe while they work, including training, rules, and safety equipment.
  3. Protecting your computer and online accounts from people who want to steal your information or cause harm.
  4. Measures to keep students and teachers safe at school, like monitoring visitors and having rules for behavior.
  5. Systems at airports that check people and their belongings to prevent dangerous items or actions on airplanes.
  6. Measures to protect your living space from intruders, like locks on doors and windows, or alarms.

11 Clues: Protecting networks, computers, and information from digital attacks, like viruses or hacking.Measures to protect your living space from intruders, like locks on doors and windows, or alarms.Ensuring the foods we eat are clean, safe, and free from harmful things like bacteria or chemicals....

James HW 1/25 2024-01-25

James HW 1/25 crossword puzzle
Across
  1. he development of computer systems capable of performing tasks that normally require human intelligence.
  2. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  3. The simulated cyberattack on a computer system to evaluate its security.
  4. a method or algorithm for transforming plaintext (readable data) into ciphertext (encoded or encrypted data) to secure communication or protect information.
  5. The process of verifying the identity of a user, system, or application before granting access.
Down
  1. Large and complex datasets that are difficult to manage and analyze using traditional data processing applications.
  2. The practice of protecting computer systems, networks, and data from security breaches and unauthorized access.
  3. The study and practice of techniques for securing communication and data through the use of codes and ciphers.
  4. Malicious software that attaches itself to a host program and can replicate itself to spread to other programs.
  5. A form of social engineering where attackers trick individuals into divulging sensitive information by pretending to be a trustworthy entity.
  6. A collection of computers and other devices connected for the purpose of sharing resources and information

11 Clues: The simulated cyberattack on a computer system to evaluate its security.The process of verifying the identity of a user, system, or application before granting access.he development of computer systems capable of performing tasks that normally require human intelligence....

The Malayan Emergency, Part II 2024-11-18

The Malayan Emergency, Part II crossword puzzle
Across
  1. The British strategy involved use of military force and the promise of this kind of change.
  2. These new habitations allowed the British to control the villagers, making it much more difficult for the MCP to receive support
  3. The assassination of this Mr. led to widespread panic among British elites in Malaya.
  4. After a years-long military campaign, the British government finally promised this to Malayans, which led to a negotiated peace.
  5. These elite units were deployed by the government to engage MCP fighters in difficult jungle conditions.
  6. This campaign aimed to win Malayans over with media encouraging civilians to reject communist ideology.
Down
  1. Many restrictions on civil liberties were most felt by members of this ethnic minority group.
  2. This plan aimed to isolate MCP guerrillas from their support networks among the rural population
  3. This program offered immunity from prosecution to young Malayans who had fought for the MCP.
  4. In response, the government declared this state on June 16, 1948.
  5. The government imposed strict controls on daily life, including censorship, curfews, and ________ without trial

11 Clues: In response, the government declared this state on June 16, 1948.The assassination of this Mr. led to widespread panic among British elites in Malaya.The British strategy involved use of military force and the promise of this kind of change.This program offered immunity from prosecution to young Malayans who had fought for the MCP....

ICT - Revision (May) 2024-04-17

ICT - Revision (May) crossword puzzle
Across
  1. is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
  2. to checks incoming and outgoing network traffic.
  3. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  4. unwanted software that monitors and gathers information on a person and how they use their computer.
  5. an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
Down
  1. an attack designed to steal a victim's password or other sensitive data.
  2. a hostname that refers to the current computer used to access it.
  3. software that is designed to gain access to your computer with malicious intent.
  4. a piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions.
  5. ______________is the practice of protecting systems, networks, and programs from digital attacks
  6. malicious form of self-replicating software.

11 Clues: malicious form of self-replicating software.to checks incoming and outgoing network traffic.a hostname that refers to the current computer used to access it.an attack designed to steal a victim's password or other sensitive data.software that is designed to gain access to your computer with malicious intent....

Network requirements concepts 2022-08-19

Network requirements concepts crossword puzzle
Across
  1. It connects LANs to each other, usually across multiple locations as well as individual devices that connect from a remote distance
  2. Consists a set of rules required to exchange information between computing systems
  3. It is the local network, network devices connected together within the same geographic location
  4. It is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area
  5. It is a global database system that relates IP addresses with an easy-to-remember name
  6. It is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information
Down
  1. It is the medium through which information usually moves from one network device to another
  2. This term can also refer to the underlying network architecture
  3. This theoretical model explains how networks behave within an orderly, seven-layered model for networked communication
  4. It works at the network layer and is responsible to find the shortest path for a packet
  5. It connects various devices in a network

11 Clues: It connects various devices in a networkThis term can also refer to the underlying network architectureConsists a set of rules required to exchange information between computing systemsIt is a global database system that relates IP addresses with an easy-to-remember name...

Cybersecurity 2 2022-09-08

Cybersecurity 2 crossword puzzle
Across
  1. This is popular network protocol analyzer, or an application that captures packets from a network connection
  2. 95% of all firewalls fail due to this
  3. ______ management is a continuous, proactive, and often automated process that keeps your computer systems, networks, and enterprise applications safe from cyberattacks and data breaches
  4. _____ scanning is a common technique hackers use to discover open doors or weak points in a network.
Down
  1. This type of testing simulates an attack against an organization in which ethical hackers use many of the same tools, techniques, and procedures as a real attacker would use.
  2. ______ detection is the process of identifying cyberattacks trying to enter a machine or network
  3. The process of converting information or data into a code, especially to prevent unauthorized access
  4. A cybersecurity _____ is a set of rules and guidelines that direct everyday IT activity in your organization

8 Clues: 95% of all firewalls fail due to this______ detection is the process of identifying cyberattacks trying to enter a machine or networkThe process of converting information or data into a code, especially to prevent unauthorized access_____ scanning is a common technique hackers use to discover open doors or weak points in a network....

AI Crossword 2023-06-19

AI Crossword crossword puzzle
Across
  1. The process of organizing data into groups based on similarities or patterns to enable prediction or decision-making.
  2. ____________ Networks is a type of artificial intelligence that mimics the structure and functionality of the human brain.
  3. a type of artificial intelligence technology that can produce various types of content, including text, imagery, audio and synthetic data (Two Words).
  4. (Acronym)_______is a branch of artificial intelligence (AI) that enables computers to comprehend, generate, and manipulate human language.
Down
  1. A field of study that enables computers to learn and improve from experience (two words).
  2. ___________ Learning is an analysis technique that aims to find patterns and insights in data without prior knowledge of the outcomes .
  3. ___________ Analysis is a process of analyzing and categorizing emotions in text or speech.
  4. __________ Learning is subset of machine learning that involves training models with multiple layers of artificial neurons

8 Clues: A field of study that enables computers to learn and improve from experience (two words).___________ Analysis is a process of analyzing and categorizing emotions in text or speech.The process of organizing data into groups based on similarities or patterns to enable prediction or decision-making....

Cyber Security 2022-12-18

Cyber Security crossword puzzle
Across
  1. A type of cyber attack that involves stealing sensitive information, such as credit card numbers or personal identification.
  2. A threat that originates from outside an organization's network.
  3. A type of cyber attack that involves tricking a user into revealing sensitive information, such as passwords or credit card numbers.
  4. A barrier that controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. Computer programs and related data that provide the instructions for telling a computer what to do and how to do it.
  2. A type of cyber attack that involves using social engineering techniques to manipulate individuals into divulging sensitive information or performing actions that may compromise their own or an organization's security.
  3. The process of protecting computers, networks, and data from unauthorized access or attacks.
  4. Intending or likely to cause harm or mischief.

8 Clues: Intending or likely to cause harm or mischief.A threat that originates from outside an organization's network.The process of protecting computers, networks, and data from unauthorized access or attacks.A barrier that controls incoming and outgoing network traffic based on predetermined security rules....

03G Objective Three - Emergency Communications Technology 2023-11-30

03G Objective Three - Emergency Communications Technology crossword puzzle
Across
  1. The method of responding to a telephone request for emergency service by which a public safety answering point transfers the call
  2. Technology that permits delivery of voice calls and other real-time multimedia sessions over IP networks
  3. The automatic display at the PSAP of the caller’s telephone number, the address/location of the telephone and supplementary emergency services information
  4. IP-based system that allows digital information to flow seamlessly thru the 911 network,
Down
  1. Telephone number associated with the access line from which a call originates
  2. The 911 call is selectively routed to the proper PSAP for the caller’s location
  3. An entity responsible for receiving 9-1-1 calls and processing those calls according to a specific operational policy
  4. This type of 911 call, the three-digit number is dialed and the caller must communicate the emergency and the location.

8 Clues: Telephone number associated with the access line from which a call originatesThe 911 call is selectively routed to the proper PSAP for the caller’s locationIP-based system that allows digital information to flow seamlessly thru the 911 network,Technology that permits delivery of voice calls and other real-time multimedia sessions over IP networks...

Information Security Terms 2024-01-31

Information Security Terms crossword puzzle
Across
  1. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. Software designed to detect and remove malicious software from a computer.
  3. The process of verifying the identity of a user, system, or device.
  4. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. A network security device that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. A software update designed to fix vulnerabilities or improve security.

16 Clues: The process of verifying the identity of a user, system, or device.A software update designed to fix vulnerabilities or improve security.Software designed to detect and remove malicious software from a computer.The process of converting data into a code to prevent unauthorized access....

Fellowship 2024-10-27

Fellowship crossword puzzle
Across
  1. With Harvard Med Professor James Rosenquist, started a 21-day guided program to treat technology addiction.
  2. Was Co-Managing Director of Cardinal Ventures.
  3. Recently started a Substack named "RobotFM: A DeepWalk".
  4. Summer staffer to Johannes Vogel, now Chief Whip of the FDP in the Bundestag.
  5. In high school, was lead student coordinator of a charity 24hr football marathon.
  6. Worked as a maitre d' at Tribeca Grill.
  7. Alumnus of the Young Leaders for Tomorrow's Europe (YLTE) program.
  8. Was 3rd in the state of California for Lincoln Douglas Debate.
  9. Won a 1st Place award at the Hilton Hospitality Hackathon by developing an intelligent algorithm to increase the efficiency of housekeepers.
Down
  1. Built Class Reveal, a safe and private way for students to compare high school schedules. Used by 3,000 students in West Windsor-Plainsboro.
  2. While in law school, wrote an article for Huffington Post on "Syria: Why The World Took a Second Glance".
  3. Won a Gold Medal for Painting from the Scholastic Art and Writing Awards.
  4. Named an STS Finalist for "Decoding Neural Networks: Discovery of Anti-Tumor B Cell Receptor Motifs Using a Novel Sequence-Based Computational Framework".
  5. Co-founder of her college Data Analytics Group, which partnered with government and NGOs to tackle elements of the COVID-19 crisis.
  6. In college, developed a haptic Bluetooth enabled smart helmet for cyclist to navigate eyes/hands-free.
  7. Conversational in Vietnamese.

16 Clues: Conversational in Vietnamese.Worked as a maitre d' at Tribeca Grill.Was Co-Managing Director of Cardinal Ventures.Recently started a Substack named "RobotFM: A DeepWalk".Was 3rd in the state of California for Lincoln Douglas Debate.Alumnus of the Young Leaders for Tomorrow's Europe (YLTE) program....

Malware 2023-06-21

Malware crossword puzzle
Across
  1. someone who enters a communication channel, such as a comment thread, solely to cause trouble
  2. a infection on your device that is non stop sending fake notifications or in text messages and emails
  3. perform attacks, gather information, propagate itself, scan networks, leak files, and remove itself from an infected system
  4. a type of malicious software, or malware, that spreads between computers and causes damage to data and software
  5. an online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data
  6. a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems
Down
  1. an email message meant to trick users into divulging private information
  2. a type of malware that downloads onto a computer disguised as a legitimate program
  3. get someone to send nudes or sexual images or videos
  4. when someone sets up a fake online profile to trick people who are looking for love, usually to get money out of them
  5. someone who enters a communication channel, such as a comment thread, solely to cause trouble
  6. a malicious software that enters a user's computer, gathers data from the device and user

12 Clues: get someone to send nudes or sexual images or videosan email message meant to trick users into divulging private informationa type of malware that downloads onto a computer disguised as a legitimate programa malicious software that enters a user's computer, gathers data from the device and user...

Computer Science 2019-03-07

Computer Science crossword puzzle
Across
  1. a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves
  2. the amount of data that can be sent from one point to another in a certain period of time
  3. a set of rules or procedures for transmitting data between electronic devices, such as computers
  4. a group of two or more computer systems linked together
  5. a collection of data that can be used by computers which need to communicate with each other,
  6. is the standard way to connect computers on a network over a wired connection
  7. a computer program or device that provides a service to another computer program and its user, also known as the client
Down
  1. a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
  2. the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.
  3. an Internet service that translates domain names into IP addresses.
  4. the number of bit errors per unit time
  5. one or more wires covered in a plastic covering that allows for the transmission of power or data between devices
  6. the amount of time a message takes to traverse a system
  7. a device that forwards data packets along networks

14 Clues: the number of bit errors per unit timea device that forwards data packets along networksa group of two or more computer systems linked togetherthe amount of time a message takes to traverse a systeman Internet service that translates domain names into IP addresses.is the standard way to connect computers on a network over a wired connection...

ICT at home Crossword 2020-07-01

ICT at home Crossword crossword puzzle
Across
  1. An attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from their bank asking them for their bank details.
  2. Electronic mail. A method for sending messages and files to other people.
  3. Data that is sent in pieces. Each piece is viewed as it arrives, eg a streaming video is watched as it downloads.
  4. packet A piece of data sent over a network. Messages have to be broken down into binary data packets before they are transferred.
  5. The computer on a network that request data from a server.
  6. A link in a document or webpage that connects to another location.
Down
  1. A web page or group of web pages hosted on one web server and viewed in a web browser, usually maintained by a person, group or organisation.
  2. An application used to view web pages, eg Internet Explorer or Google Chrome.
  3. To copy a file from the internet onto your computer or device.
  4. A global network connecting millions of computers.
  5. measures the amount of data that can transfer through a communications channel over a given period of time.
  6. A set of rules for how messages are turned into data packets and sent across networks.
  7. Unsolicited (junk) email.
  8. Computer code designed to damage a computer system.

14 Clues: Unsolicited (junk) email.A global network connecting millions of computers.Computer code designed to damage a computer system.The computer on a network that request data from a server.To copy a file from the internet onto your computer or device.A link in a document or webpage that connects to another location....

SVCSRP - Data Science/CT/CS 2020-07-05

SVCSRP - Data Science/CT/CS crossword puzzle
Across
  1. a set of data that consists of values belonging to the set are distinct and separate unconnected values
  2. is the process of removing or reducing details from a complex object to facilitate focus on relevant concepts
  3. an area of information technology that involves the protection of computers, networks, programs, and data from unauthorized or unintentional access
  4. a set of data that consists of values belonging to the set can take on ANY value within a finite or infinite interval
  5. repeated execution of a sequence of statements
  6. a set of precise instructions to solve a problem or achieve a goal.
  7. a sequence of instructions that are repeated until a specific task achieved
  8. type of data that may be represented by a name, symbol, or a number code
Down
  1. categorical data that defines the values representing rank
  2. tackling larger problems by breaking them into smaller parts so that we can explain the process either to someone or to a computer.
  3. identifying and removing errors from scripts and programs
  4. type of data that is collected as values or counts and are expressed as numbers
  5. science, the study of computers and algorithmic processes, including their principles, their hardware and software designs, their applications, and their impact on society
  6. a value, which can change

14 Clues: a value, which can changerepeated execution of a sequence of statementsidentifying and removing errors from scripts and programscategorical data that defines the values representing ranka set of precise instructions to solve a problem or achieve a goal.type of data that may be represented by a name, symbol, or a number code...

Sports and Entertainment 2021-10-25

Sports and Entertainment crossword puzzle
Across
  1. Registered businesses that legally buy and sell tickets to a variety of entertainment events and guarantee ticket authenticity
  2. a digital audio encoding and compression format
  3. Way of distributing multimedia files over the Internet for playback on computers, iPods, cell phones, and other mobile devices
  4. Controls the sale of tickets for most venues in the country and many international countries
  5. Getting caught up in the heat of the moment and rationalizing that what may be a once-in-a-lifetime event is worth the big price tag.
  6. Distributing a movie nationally to a thousand or more theaters at the same time
  7. Making a comeback as a popular retro item
  8. Sell tickets to major sporting events, often outside the venue on the day of the event, at inflated prices.
Down
  1. Groups/affiliations of TV networks, production studios, and related entertainment businesses that produce shows or provide services for other members in the group
  2. Provides what subscribers want to hear, when and wherever they want to hear it
  3. Way of delivering sound without requiring you to download files from the internet
  4. Release of a movie to a limited number of theaters prior to its official release
  5. Movie outside the mainstream of popular subjects (independent film makers)
  6. Pre-movie advertisement for future movies

14 Clues: Pre-movie advertisement for future moviesMaking a comeback as a popular retro itema digital audio encoding and compression formatMovie outside the mainstream of popular subjects (independent film makers)Provides what subscribers want to hear, when and wherever they want to hear it...

Government: Media 2023-04-20

Government: Media crossword puzzle
Across
  1. Also called “equal opportunities”, it’s a rule requiring broadcaster to treat political candidates of different departments/parties equally
  2. Journalists who focus on exposing big businesses/influential figures for controversy and corruption.
  3. Independent US agency that regulates communi cations such as television, wire, satellite, and cable
  4. news Information that is primarily entertaining or personally useful.
  5. Journalism that is based upon sensationalism and crude exaggeration.
  6. A news agency that supplies syndicated news by wire to newspapers, radio, and television stations.
  7. When news media suggests to audiences ways and specific issues that should be used to evaluate the performance of leaders and governments.
  8. Biased, usually by emphasizing certain information while omitting others.
Down
  1. A rule preventing political biases in broadcasted media, forcing networks to devote time to both their views and opposing arguments
  2. The main means of mass communication, such as broadcasting, publishing, and the internet, considered collectively.
  3. The study of how rhetorical devices can be used to convince people of the value of any given position.
  4. The Penny Press was the term used to describe the revolutionary business tactic of producing newspapers which sold for one cent.
  5. A law that protects journalists from having to reveal confidential sources.
  6. The information-processing task where we continually make decisions about ignoring or paying attention to new information.

14 Clues: Journalism that is based upon sensationalism and crude exaggeration.Biased, usually by emphasizing certain information while omitting others.A law that protects journalists from having to reveal confidential sources.news Information that is primarily entertaining or personally useful....

Technology 2023-05-10

Technology crossword puzzle
Across
  1. the programs and other operating information used by a computer.
  2. a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
  3. a local or restricted communications network, especially a private network created using World Wide Web software.
  4. the technique of making an apparatus, a process, or a system operate automatically
  5. a structured set of data held in a computer, especially one that is accessible in various ways
  6. the branch of technology that deals with the design, construction, operation, and application of robots
  7. network interconnected computing devices that can exchange data and share resources with each other
Down
  1. tools, machinery, and other durable equipment
  2. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  3. a panel of keys that operate a computer or typewriter.
  4. broadcasting, computer networking, or other communication using radio signals, microwaves, etc
  5. The component of a computer system that controls the interpretation and execution of instructions.
  6. a small handheld device that is dragged across a flat surface to move the cursor on a computer screen, typically having buttons that are pressed to control functions
  7. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
  8. a computer that is portable and suitable for use while traveling.

15 Clues: tools, machinery, and other durable equipmenta panel of keys that operate a computer or typewriter.the programs and other operating information used by a computer.a computer that is portable and suitable for use while traveling.the technique of making an apparatus, a process, or a system operate automatically...

Telecommunication Systems 2017-08-25

Telecommunication Systems crossword puzzle
Across
  1. A _______ is a device that converts digital signals to analog signals and vice versa.
  2. A _______ is a set of rules and procedures for the control of communications in a network.
  3. An ______ is an adapter that interfaces a computer/ device to a network.
  4. In this type of network a group of computers and peripherals share information within a relatively small geographical area.
  5. In a _________ topology all computers in the network are attached to a "bus" cable.
  6. A _____________ transmits data to a host computer for processing and displays the result.
  7. The _____________ distributes programs and data to client computers on the network as they request them.
  8. In a ________ topology each computer on the network connects to the other, creating a point-to-point between every network device.
Down
  1. A ________ converts data between incompatible systems.
  2. A___________ is a communication processor that allows a single communication channel to carry data transmissions from many terminals simultaneously.
  3. A _________ connects two or more networks that use the same communication protocol.
  4. In a __________ topology each device has its own channel to a central point on the network.
  5. The ______ model shows on which level of a network model a protocol operates.
  6. In a ________ topology more than one device shares a single communications channel but the ends are connected.

14 Clues: A ________ converts data between incompatible systems.An ______ is an adapter that interfaces a computer/ device to a network.The ______ model shows on which level of a network model a protocol operates.In a _________ topology all computers in the network are attached to a "bus" cable....

transmittion speed 2022-03-27

transmittion speed crossword puzzle
Across
  1. What is it called when packets are resent because it is either lost or damaged
  2. What connects two or more packet-switched networks or subnetworks
  3. What is it called when two or more devices are connected together usually by cables or wifi?
  4. What do you call a delay in transmitting or processing data?
  5. It is a set of rules or procedures for transmitting data between electronic devices
  6. what is the maximum rate of data transfer across a given path called?
  7. It is a wireless networking technology that allows devices to communicate over a wireless signal
Down
  1. It is a collection of data which can be used by computers which need to communicate with each other
  2. It is anything where errors can occur
  3. It is a computer-computer or computer-internet network
  4. What tells you which internet protocol addresses are connected to which uniform?
  5. address What is assigned to every device on the internet and is usually a 1 digit number?
  6. it is when one or more computers attempt to send data at the same time to different computers, servers and will send back a request to try sending the data again
  7. What connects computers together with a cable so computers can share information?

14 Clues: It is anything where errors can occurIt is a computer-computer or computer-internet networkWhat do you call a delay in transmitting or processing data?What connects two or more packet-switched networks or subnetworkswhat is the maximum rate of data transfer across a given path called?...

Ancient Civilizations 2023-07-07

Ancient Civilizations crossword puzzle
Across
  1. An ancient civilization located in East Asia known for its long history, inventions, and dynasties.
  2. An ancient civilization located in the fertile crescent between the Tigris and Euphrates rivers.
  3. Valley An ancient civilization located in the Indian subcontinent known for its well-planned cities and trade networks.
  4. An ancient civilization located in Mesoamerica known for its powerful empire and unique art and culture.
  5. An ancient civilization located in South America known for its impressive stone architecture and road system.
  6. An ancient civilization located in modern-day Iran known for its vast empire and cultural contributions.
  7. An ancient civilization located in southeastern Europe known for its philosophers, city-states, and democracy.
  8. An ancient civilization located in Mesoamerica known for its advanced writing system, calendar, and cities.
Down
  1. An ancient civilization located in the eastern Mediterranean known for its seafaring skills and trade network.
  2. An ancient civilization located in Mesoamerica known for its colossal stone heads and cultural influence.
  3. An ancient city in Mesopotamia known for its impressive architecture and the Hanging Gardens.
  4. An ancient civilization located in North Africa known for its powerful navy and conflict with Rome.
  5. An ancient civilization located in Italy known for its vast empire, architecture, and governance system.
  6. An ancient civilization located in northeastern Africa known for its pyramids, pharaohs, and hieroglyphs.

14 Clues: An ancient city in Mesopotamia known for its impressive architecture and the Hanging Gardens.An ancient civilization located in the fertile crescent between the Tigris and Euphrates rivers.An ancient civilization located in East Asia known for its long history, inventions, and dynasties....

Critical Crosswords 2024-11-26

Critical Crosswords crossword puzzle
Across
  1. The kind of fallacy that involves interpreting a literary work by reference to the author’s state of mind
  2. The continued dominance of the West over less developed countries through informal means
  3. Dominated and marginalized people
  4. The literary genre that contains an episodic structure and which centers on a low-born adventurer
  5. A critical perspective that devotes its attention to literature’s formal structures in an objective manner
  6. A mode of writing that resists the dominant masculinist form of communication, and which therefore is often illogical, non-linear & ungrammatical: ___________ féminine
  7. The ‘great books’, or ‘great tradition’ of texts that everyone should study or know in order to be considered educated in literature
  8. The ways in which all utterances necessarily refer to other utterances, since words pre-exist the individual
Down
  1. Western representations of non-Western cultures as the inferior Other
  2. Networks of male–male relationships in literature
  3. The kind of violence that environmental degradation has inflicted upon the global poor
  4. A system of cultural assumptions, beliefs or values which uphold social order
  5. The kind of criticism that maintains a text's meaning is inseparably associated with the conditions of its production, circulation and consumption
  6. All that is said, imagined or conceived, including politics, laws, morality, religion, metaphysics, etc.

14 Clues: Dominated and marginalized peopleNetworks of male–male relationships in literatureWestern representations of non-Western cultures as the inferior OtherA system of cultural assumptions, beliefs or values which uphold social orderThe kind of violence that environmental degradation has inflicted upon the global poor...

Digital disruption 2024-08-09

Digital disruption crossword puzzle
Across
  1. - The practice of protecting systems, networks, and programs from digital attacks, essential as digital disruption increases vulnerabilities.
  2. - Large volumes of data analyzed to reveal patterns and trends, disrupting traditional decision-making processes.
  3. -The buying and selling of goods or services over the internet, disrupting traditional retail.
  4. - The act of introducing something new, often a product or process, that can disrupt an industry.
  5. - Significant change caused by new technology or business models, impacting industries and markets.
Down
  1. - The process of converting information into digital formats, disrupting traditional methods of operation.
  2. - Platforms that allow users to create and share content, disrupting traditional communication and marketing methods.
  3. - The use of technology to perform tasks without human intervention, often disrupting traditional labor markets.
  4. - The industry that uses technology to improve and automate financial services, leading to disruption in traditional banking.
  5. - A digital ledger technology that can disrupt financial services and other industries by enabling secure, transparent transactions.
  6. - New companies, often technology-driven, that can rapidly grow and disrupt established industries.
  7. - A technology that allows data and applications to be stored and accessed over the internet, disrupting traditional data storage methods.
  8. -Artificial Intelligence, the simulation of human intelligence by machines, disrupting multiple industries.
  9. - Internet of Things, a network of connected devices that collect and exchange data, disrupting various sectors.

14 Clues: -The buying and selling of goods or services over the internet, disrupting traditional retail.- The act of introducing something new, often a product or process, that can disrupt an industry.- New companies, often technology-driven, that can rapidly grow and disrupt established industries....

Slave Trading at the African Coast 2023-06-15

Slave Trading at the African Coast crossword puzzle
Across
  1. A type of shell that was used as currency in the slave trade, particularly in West Africa
  2. Trading posts established by European powers along the African coast for the purpose of buying and selling goods, including slaves
  3. European traders who operated outside of the established trading networks and often engaged in illegal or unauthorized trading activities2
  4. A European agent who was responsible for purchasing slaves and other goods from African traders on behalf of European merchants
Down
  1. African traders who acted as intermediaries between European merchants and African communities, tribes, and kingdoms
  2. Temporary holding pens where enslaved Africans were kept before being transported to the Americas
  3. A fortified structure built by European powers along the African coast to protect their trading interests

7 Clues: A type of shell that was used as currency in the slave trade, particularly in West AfricaTemporary holding pens where enslaved Africans were kept before being transported to the AmericasA fortified structure built by European powers along the African coast to protect their trading interests...

Managed Care 2023-04-17

Managed Care crossword puzzle
Across
  1. A model of service delivery and reimbursement that builds in integrated behavioral health
  2. A model of service delivery and reimbursement that utilizes a team-based approach to health care delivery
  3. When the mental health practitioner gives a reimbursement diagnosis to a client who does not dully meet DSM-V criteria
Down
  1. Networks of providers that collectively provide comprehensive health care coverages or an array of specialty care
  2. Payment or fee to a professional providing services to a number of people, such that the amount paid is determined by the number of patients
  3. Most common form of managed care systems and are less comprehensive than other types of managed care systems
  4. Allows for consumers to choose a provider while a professional controls utilization of services

7 Clues: A model of service delivery and reimbursement that builds in integrated behavioral healthAllows for consumers to choose a provider while a professional controls utilization of servicesA model of service delivery and reimbursement that utilizes a team-based approach to health care delivery...

Social media (2) 2022-03-22

Social media (2) crossword puzzle
Across
  1. Is a person who is following another person on a social networking platform, soch as Twitter or Instagram.
  2. A system for disseminating information over the Internet to a selected group of followers.
  3. type of social and collaborative innovation in which innovators, users and communities collaborate using digital.
  4. Means something that provides updates whenever new content is available.
Down
  1. Means any and all profiles, pages, feeds, registrations and other presences on or in connection with any social media or social networking website or online service.
  2. A person you know exclusively through the Internet or e-mail and will rarely, if ever, meet is considered an online friend.
  3. Has become a new form of written communication as it allows people to avoid being interrupted and express their ideas.
  4. means sharing and updating photos or videos on social networks.
  5. can express that they like or support certain content.
  6. is a person who exhibits strong interest or admiration for something or somebody, such as a celebrity, a sport, a sports team ecc…
  7. .Allow social media when they mention them in a post or comment

11 Clues: can express that they like or support certain content.means sharing and updating photos or videos on social networks..Allow social media when they mention them in a post or commentMeans something that provides updates whenever new content is available.A system for disseminating information over the Internet to a selected group of followers....

Computer Crossword Puzzle 2018-10-09

Computer Crossword Puzzle crossword puzzle
Across
  1. a software application used to locate, retrieve and display content on the World Wide Web, including web pages, images, video and other files.
  2. a compiler and made ready to run in the computer
  3. a computer-aided manufacturing (CAM) device that creates three-dimensional objects
  4. no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
  5. a programming language that developers use to create applications on your computer.
Down
  1. a person who uses computers to gain unauthorized access to data.
  2. a standard way to measure data transfer rates, such as network connection and Internet download speeds.
  3. a traditional technology for connecting wired local area networks (LANs), enabling devices to communicate with each other via a protocol a set of rules or common network language.
  4. a device that captures images from photographic prints, posters, magazine pages, and similar sources for computer editing and display.
  5. a computer-aided design software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
  6. 1,000 megabits or 1,000,000 kilo bits.

11 Clues: 1,000 megabits or 1,000,000 kilo bits.a compiler and made ready to run in the computera person who uses computers to gain unauthorized access to data.a computer-aided manufacturing (CAM) device that creates three-dimensional objectsa programming language that developers use to create applications on your computer....

Cartoon Network 2022-10-06

Cartoon Network crossword puzzle
Across
  1. This Series Is Based Around The J-Pop Duo That Performs Both Versions Of The Teen Titans Theme Song
  2. This Series Was Home To Some Legendary Crossovers, Such As With Captain Planet, Sonic, And The Majority Of Cartoon Networks Other Series, Forgotten Or Otherwise!
  3. This Iconic Series Was Rebooted In 2013, In A Way Most Fans Were Very Upset About
  4. This Series Got Picked Up For A Full Show In 2018 After The Success Of Its Online Pilot
  5. One Of The Networks Most Popular Series' Branched Out Into Many Different Iterations, With Their Own Distinct Art Styles
  6. Our Protagonist Has To Deal With His Meddling Sister Always Pushing His Buttons, Literally
  7. The Black And White Pilot Was Thought To Be Lost, Until The Creator Chose To Share It At A Film Festival
  8. A Place For Those Childhood Companions You Forgot You Created
  9. Three Boys With Similar Names Always Try To Swindle Their Friends For Jawbreakers
  10. The Less Succesful Series To Come From Grim And Evil
  11. Mark Hamill played Larry 3000 On This Short Lived Series - People Also Theorize That He May Be Gay
  12. Some Would Call It A Precursor To Gumball, With Its Use Of Mixed Media And 4th Wall Breaking
  13. The Precursor To Uncle Grandpa With The Same Creator, With UG Even Showing Up In This Series At Times
  14. These Two Barnyard Siblings Live With Their Human Parents, Who We Only "Fully" See In The Pilot
  15. Radicles From OK K.O. Joins Our Protagonists For An Episode
  16. Our protagonist Is An Optimistic Boy Whos Best Friend Is Played By Tom Kenny
  17. These Three Often Stack On Top Of Each Other To Traverse
  18. These Three Got Their Powers Thanks To The Mysterious Chemical X
  19. The Series Finale Introduces A Character Implied To Be Heffer From Nickelodeons Rocko's Modern Life
  20. This Mini Series Is Known For Its Creepy Nature And Use Of Horror To Enhance The Plot
  21. This Series Went By Books As Opposed To Seasons, And Was Supposed To Run For 8 Books, Until The Network Cut It Short
  22. Patton Oswalt Starred In This Very Short Lived Series
  23. Our Protagonist Shares The Same Voice Actor As Gideon Gleeful On Disneys Gravity Falls - He Also Created This Series
  24. This Anthology Series Led To The Creation Of Many CN Classics
  25. This Series Introduces A Whole New Generation To Many Classic Hanna Barbera Characters
  26. An Animated Talk Show Set In The Cosmos
  27. Known For Its Use Of Many Different Animation Styles - The Series Also Ended On A Cliffhanger
  28. This Popular Series Had A Movie That Had A Short Run In Select Theaters
  29. Its Creator Plays Our Protagonist, A Caped Feline With Daddy Issues
  30. Our Protagonist Was Originally Played By Text To Speech, Until Actor Bobby Block Took Over In The Second (And Final) Season - Bobby Also Re-Dubbed The First
Down
  1. Our Hunkalicious Protagonist Also Had A Short Lived Series Where He Answered Fan Questions, But Sadly The Majority Of It Is Lost Media
  2. Richard Steven Horvitz Stars In This Series
  3. Due To A Mix-Up With His Last Name, Our Protagonist Is Sent To A School For Animals, Despite Being A Human
  4. Originally Segments On Cow And Chicken, It Eventually Got A Full Series Of Its Own
  5. This Polarizing Series Showed The First Gay Marriage On The Network
  6. A Magical Old Man With Rainbow Suspenders Helps Kids Around The World
  7. This Series Was Originally Pitched To Nickelodeon, Who Passed On It In Favor Of Fanboy And Chum Chum - It Also Helped CN Out Of A Dry Spell
  8. This Squad Is Out To Face The Greatest Evil Of All Time - Adults!
  9. This little pooch Living In The Middle Of Nowhere Has To Protect His Owners From Many Terrifying Entities
  10. Had A Crossover With Ben 10 During The Omniverse Series
  11. Our Protagonist Flees From His Humble Farm Home To Escape The Military
  12. Hip Hop Icon André 3000 Created This Music Filled Series, As Well As Voicing The Legendary Sunny Bridges
  13. Simple Plan Perform This Iconic Theme Song
  14. Our Protagonist Is Tasked With Protecting Her Home Of Orchid Bay City From The Forces Of Evil, As She Is The Only One Who Can See Them
  15. This Series Is Known For Its Overuse Of Bright Colors And Random Plots, Leading Many To Believe Adult Swim Would Have Been A Better Home For This Band Of Misfits
  16. A Spoof On Series' Like Survivor
  17. This Was Cartoon Networks First Original Series, And Sadly The Majority Of It Is Lost Media
  18. Adult Swim Picked This Series Up For A Fifth (And Final) Season In 2017
  19. Based On A Childrens Book Series And Animated By The Same Studio As HHPAY
  20. Another Anthology Series, Although This One Had A Very Short Run - Not Even Lasting A Month
  21. People Have Compared This Island-Based Series' Crude Animation To That Of Klasky Csupo, Who Produced Rugrats, Aaahh!!! Real Monsters, And More

51 Clues: A Spoof On Series' Like SurvivorAn Animated Talk Show Set In The CosmosSimple Plan Perform This Iconic Theme SongRichard Steven Horvitz Stars In This SeriesThe Less Succesful Series To Come From Grim And EvilPatton Oswalt Starred In This Very Short Lived SeriesHad A Crossover With Ben 10 During The Omniverse Series...

tses 2023-10-06

tses crossword puzzle
Across
  1. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  2. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  3. A program that prevents, detects, and removes viruses or other malware from a computer system.
  4. It should be changed immediately if suspected of being compromised .
  5. _______ your data regularly and periodically check that you are able to restore them.
  6. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  7. Do not provide your _______ email account to social networks.
  8. displays annoying pop-ups to generate revenue for its authors.
  9. Always use _______ factor authentication where available.
  10. Erases user data beyond recoverability.
  11. Use a _______ password different from the passwords you use to access other sites.
Down
  1. This can slow down your computer and watch everywhere you go on the Internet.
  2. Online traces revealing user activities.
  3. A type of security incident where unauthorized access is gained to a system or data
  4. _______ your computer when left unattended.
  5. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.

16 Clues: Erases user data beyond recoverability.Online traces revealing user activities._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks.displays annoying pop-ups to generate revenue for its authors....

Networking Concept 2025-06-06

Networking Concept crossword puzzle
Across
  1. a card that is used to physically attach a computer to a network so that it can participate in network communication.
  2. a device that connects two different types of networks with each other.
  3. a topology in which a group of star-figured workstations connected to a linear bus backbone cable.
  4. it enables to connect the computer to the available network connection over the existing telephone lines.
  5. a topology in which each device is connected to a central computer using a point-to-point connection.
  6. it provides a direct connection between a source and destination.
  7. it has a larger network than LAN.
  8. this topology uses a single communication line or one main cable to which all the nodes are directly connected.
Down
  1. used for short range wireless connection.
  2. it cover a range of less than 10 metres.
  3. the computers that communicate with each other.
  4. it refers to a computer network that allows controlled access to an information source available on the internet.
  5. a topology in which all the nodes in the network are connected in a circular manner.
  6. it requires a public telecommunication media to transfer data.
  7. a network device that is used to connect all the computers in a network with each other.
  8. a topology in which each node is connected to every other node in the network.

16 Clues: it has a larger network than LAN.it cover a range of less than 10 metres.used for short range wireless connection.the computers that communicate with each other.it requires a public telecommunication media to transfer data.it provides a direct connection between a source and destination....

Chapter 01 part 03 2017-10-11

Chapter 01 part 03 crossword puzzle
Across
  1. What is an electronic version of a printed book, readable on computers and other digital devices?
  2. What is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals?
  3. Which mouse operations do you press and release the secondary mouse button?
  4. Who is Apple's cofounder?
  5. What involves reducing the electricity consumed and environmental waste generated when using a computer?
  6. What is not one of the widely used browsers?
  7. Who is Microsoft's founder?
Down
  1. What is a type personal computer designed so all of its components fit entirely on or under a desk or table?
  2. this is NOT an operating system used by today's computers and mobile devices?
  3. Which gesture displays a shortcut menu?
  4. What is a popular social networking site?
  5. What is the term for known specific patterns of viruses?
  6. What consist(s) of a series of related instructions that tells the computer what tasks to perform and how to perform them?
  7. What type of disc is a type of storage media that consists of a lat, round, portable metal disc made of metal, plastic, and lacquer that is written and read by a laser?
  8. What consists of electronic components that store instructions waiting to be executed and data needed by those instructions?
  9. Which kind of desktop uses the same case to house the screen and processing circuitry?

16 Clues: Who is Apple's cofounder?Who is Microsoft's founder?Which gesture displays a shortcut menu?What is a popular social networking site?What is not one of the widely used browsers?What is the term for known specific patterns of viruses?Which mouse operations do you press and release the secondary mouse button?...

24.01.2020. 2020-01-23

24.01.2020. crossword puzzle
Across
  1. to pass harmful programs from one computer to another, or within files in the same computer
  2. someone who has committed a crime or a violent or harmful act
  3. to prove that someone is a particular person
  4. a set of websites on the internet that end with the same letters, for example .com
  5. computer tool designed to limit access to your computer to help prevent virus and hacking.
  6. using the internet to harm or frighten another person, especially by sending them unpleasant messages.
  7. something or someone used to trick or confuse other people or animals into doing something, especially something dangerous.
  8. software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money
  9. a process in which individuals (or small groups) penetrate an area (especially the military penetration of enemy positions without detection)
  10. programs designed to damage or do other unwanted actions on a computer system (viruses, worms, trojan horses, and spyware, all in all)
  11. a hidden set of instructions in a computer program in order to introduce faults into a computer system
Down
  1. information superhighway
  2. practice of obtaining information without the permission of the holder using methods on the Internet, networks or individual computers.
  3. traditional and ordinary.
  4. able to be easily hurt, influenced, or attacked
  5. a thing that is the most important part of a system’s operation

16 Clues: information superhighwaytraditional and ordinary.to prove that someone is a particular personable to be easily hurt, influenced, or attackedsomeone who has committed a crime or a violent or harmful acta thing that is the most important part of a system’s operation...

Test 2024-04-16

Test crossword puzzle
Across
  1. The linux command to configure or display the current network interface configuration information
  2. A logical subdivision of an IP network.
  3. This protocol resolves IP address to MAC address
  4. Device that forwards data packets between computer networks.
  5. The maximum rate of data transfer across a given path.
  6. In an IP address that has 24 bits reserved for the network portion what kind of address is this? 130.127.55.255
  7. The way we describe data units in the network layer.
Down
  1. A networking device that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
  2. This type of switching fabric has the ability to overcome bus bandwidth limitations
  3. This channel partitioning protocol divides channels based on frequency.
  4. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  5. A node that serves as an entrance to another network.
  6. A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
  7. This protocol is unreliable and is often used by streaming apps
  8. The corporation that allocates and assigns IP addresses
  9. This type of threat can be caused by a nuclear detonation in the atmosphere or coronal mass ejection

16 Clues: A logical subdivision of an IP network.This protocol resolves IP address to MAC addressThe way we describe data units in the network layer.A node that serves as an entrance to another network.The maximum rate of data transfer across a given path.The corporation that allocates and assigns IP addresses...

Wi-Fi Networks 2018-01-24

Wi-Fi Networks crossword puzzle
Across
  1. Wireless ……………. connects users to other users within the network and also can serve as the point of interconnection between the WLAN and a fixed wire network.
Down
  1. It is a wireless computer network that links two or more devices using wireless communication within a limited area such as a home, school, computer laboratory, or office building.
  2. It is the primary name associated with an 802.11 wireless local area network(WLAN) including home networks and public hotspots

3 Clues: It is the primary name associated with an 802.11 wireless local area network(WLAN) including home networks and public hotspotsWireless ……………. connects users to other users within the network and also can serve as the point of interconnection between the WLAN and a fixed wire network....

APGov 5.8 2025-03-13

APGov 5.8 crossword puzzle
Across
  1. The advantage that incumbents have solely due to being recognized
  2. An electoral process where the winner of the most votes in a state receives all of the state's electoral votes
  3. The election held to actually vote for president
  4. A system used for selecting political party candidates during a primary
  5. A primary where everyone can vote regardless of which party they are registered to
  6. An election in which people vote for candidates to represent their parties in general elections
  7. An electoral system in which subgroups are reflected proportionately to each other
  8. Someone who has already been president or already recognized as a popular candidate
Down
  1. States that do not typically vote for a specific party
  2. To unevenly distribute to the beginning of the voting process
  3. Allowed residents of Washington DC to vote for president
  4. The period between the primaries and general election where political networks show interest in candidates based on support in primaries
  5. A body of people who formally cast votes for president based on the majority vote
  6. The number of votes cast for a candidate who receives the most votes, but does not receive the absolute majority
  7. Voting for candidates of more than one party
  8. The day during primaries when the greatest number of states hold primaries and caucuses
  9. A Primary election in which only registered members of the primary's party can vote
  10. A conference of members of legislation who select a candidate to run for office

18 Clues: Voting for candidates of more than one partyThe election held to actually vote for presidentStates that do not typically vote for a specific partyAllowed residents of Washington DC to vote for presidentTo unevenly distribute to the beginning of the voting processThe advantage that incumbents have solely due to being recognized...

Technology Crossword 2017-05-09

Technology Crossword crossword puzzle
Across
  1. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
  2. A program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
  3. A unit of information equal to 220 bytes or, loosely, one million bytes.
  4. A standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
  5. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Down
  1. To copy (data) from one computer system to another, typically over the Internet.
  2. A facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
  3. A program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
  4. A machine that processes something.
  5. A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  6. Messages distributed by electronic means from one computer user to one or more recipients via a network.
  7. page A web page set as the default or start-up page on a browser.

12 Clues: A machine that processes something.page A web page set as the default or start-up page on a browser.A unit of information equal to 220 bytes or, loosely, one million bytes.To copy (data) from one computer system to another, typically over the Internet....

match2 2013-03-07

match2 crossword puzzle
Across
  1. / data structure that contains a group of elements. Typically these elements are all of the same data...
  2. / the device that connects internet to wireless devices.
  3. / The brains of an information processing system; the processing component
  4. address / hardware identification number that uniquely identifies each device on a network. The MAC address is manufactured into every network card, such as an Ethernet card or Wi-Fi card, and therefore cannot be changed
  5. / list of jobs that are awaiting to be processed. When a job is sent to it, it is simply added to the list of jobs.
  6. / internal communication networks that are much easier and less expensive than other types. they use a TCP/IP connection and support Web browsing
Down
  1. / A measurement of the storage capacity of a device. One represents 1024
  2. / A step-by-step procedure designed to solve a problem or achieve an objective.
  3. / the case when data is contained in the cache
  4. / the condition that occurs when a calculation produces a result that is greater in magnitude than that which a given register or storage location can store or represent.
  5. controls the interpretation and execution of instructions.

11 Clues: / the case when data is contained in the cache/ the device that connects internet to wireless devices.controls the interpretation and execution of instructions./ A measurement of the storage capacity of a device. One represents 1024/ The brains of an information processing system; the processing component...

Leonard Pearlin's Theory of Psychological Distress 2014-10-28

Leonard Pearlin's Theory of Psychological Distress crossword puzzle
Across
  1. Societies show support for the individual by __________ them for scheduled events (stresses)(Holloway et al., 2003).
  2. Gender, race, intelligence, family and education are all examples of _________ characteristics.
  3. Development can occur in a common pattern but can also be _______ for each person.
  4. Adulthood is a __________ change rather than a series of transitions from one stage to another. (Holloway, Holloway, Witte,& Zuker, 2003).
  5. A term used to define the change in the individual's behaviour that results from "socialized responses to a common social clock rather than from age-linked inner changes" (Holloway et al., 2003).
Down
  1. Individuals might experience occasional periods of __________.
  2. Early ________ is the time for living out the dreams of teenage years.
  3. The path that the individual's life will take is determined by the range of ________ the individual possesses (Holloway et al., 2003).
  4. The availability of ___________ networks is one of the four elements that determine the individuals' life paths (Holloway et al., 2003).
  5. The timing and _______of stress that requires response is one of the four elements that determine the individual's life path (Holloway et al., 2003).
  6. Stresses are predictable because they are scheduled by the _______clock of society.

11 Clues: Individuals might experience occasional periods of __________.Early ________ is the time for living out the dreams of teenage years.Development can occur in a common pattern but can also be _______ for each person.Stresses are predictable because they are scheduled by the _______clock of society....

Cyber Crossword 2021-09-05

Cyber Crossword crossword puzzle
Across
  1. “the adoption or increase in use of digital or computer technology by an organization, industry, country.
  2. a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide.
  3. a paperless method of sending messages, notes or letters from one person to another or even many people at the same time via Internet.
  4. action or process of digitizing or conversion of analogue data in digital form.
  5. an integrated service of electronic applications needed for any kind of healthcare function.
Down
  1. validates contracts entered into electronically, and validates electronic signatures.
  2. virtual network of websites connected by hyperlinks.
  3. This in Cyber space is a focal point for two opposing schools of thought, the Cyberlibertarians and the Cyber-paternalists.
  4. an Internet utility software used touploaded and download files.
  5. a type of Network Bridge and modem that provides bi-directional data communication via radio frequency channels on a HFC and RFoG infrastructure.
  6. the first paying method from partner to partner,which does not have any mediator and obtains its power from the users.

11 Clues: virtual network of websites connected by hyperlinks.an Internet utility software used touploaded and download files.action or process of digitizing or conversion of analogue data in digital form.validates contracts entered into electronically, and validates electronic signatures....

Doughnut Economics DCB 2022-04-30

Doughnut Economics DCB crossword puzzle
Across
  1. Food security, health, education, income and work, peace and justice, political voice, social equity, gender equality, housing, networks, energy, water
  2. Instead of a linear self contained market, doughnut economists aim or a _ economy
  3. Climate change, ocean acidification, chemical pollution, nitrogen and phosphorus loading, freshwater withdrawals, land conversion, biodiversity loss, air pollution, ozone layer depletion
  4. the mainstream economists wrongly believe that humans are perfectly _
  5. between the outer 'ecological ceiling' circle (symbolising the environmental limits of the planet that we live on) and the inner 'social foundation' (setting out a baseline for human health and wellbeing)
Down
  1. Founder of doughnut economics
  2. Instead of being addicted to GDP growth, doughnut economists are _ about growth
  3. The monetary measure of the market value of all the final goods and services produced in a specific time period by countries.
  4. meeting the needs of the present without compromising the ability of future generations to meet their own needs
  5. Canada, France, Germany, Italy, Japan, the United Kingdom, and the United States
  6. An intergovernmental economic organisation with 38 member countries, founded in 1961 to stimulate economic progress and world trade.

11 Clues: Founder of doughnut economicsthe mainstream economists wrongly believe that humans are perfectly _Instead of being addicted to GDP growth, doughnut economists are _ about growthCanada, France, Germany, Italy, Japan, the United Kingdom, and the United StatesInstead of a linear self contained market, doughnut economists aim or a _ economy...

Puzzle - 12 2022-10-10

Puzzle - 12 crossword puzzle
Across
  1. State of being safe / free from danger or threat
  2. a form of malicious code that looks like a legit file, program or application, but actually is designed to control the user's computer and data
  3. A person or event that has the potential for impacting a valuable resource in a negative manner
  4. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
  5. The programs and other operating information used by a computer
  6. is an attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
Down
  1. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  2. Good guys in the world of cybercrime. Hackers who use their skills and talents for good
  3. extends a private network across a public network and enables users to send and receive data across shared or public networks
  4. a list of permitted items that are automatically let through whatever gate is being used.
  5. name commonly given to unsolicited email.

11 Clues: name commonly given to unsolicited email.State of being safe / free from danger or threatThe programs and other operating information used by a computerGood guys in the world of cybercrime. Hackers who use their skills and talents for gooda list of permitted items that are automatically let through whatever gate is being used....

5G Activity Sheet 2023-09-13

5G Activity Sheet crossword puzzle
Across
  1. The term synonymous with bandwidth
  2. ---------------relies on Radio Access Technology (RAT) and the configuration of radio resources to carry what it is intended to deliver
  3. -----------defined as a network configuration that allows multiple networks to be created on top of a common physical infrastructure
  4. --------------- is a distributed computing framework that brings enterprise applications closer to data sources such as IoT devices or local edge servers
  5. 5G is entirely safe and poses no health or safety concerns
  6. . Millimeter waves cannot travel well through buildings or obstacles.
  7. ----------------refers to traffic control mechanisms that seek to either differentiate performance based on application or network-operator requirements or provide predictable or guaranteed performance to applications, sessions, or traffic aggregates.
Down
  1. 5G will rely on compact, portable base stations that involve minimal power and can be placed in large quantities throughout geographical areas. What are these called?
  2. -------------convert electrical signals into radio waves
  3. 5G technology uses millimeter waves.
  4. A single 5G base station has the ability to send and receive signals from over 22 times the amount of users using_______-antennas.
  5. In 5G NR, the NR stands for?

12 Clues: In 5G NR, the NR stands for?The term synonymous with bandwidth5G technology uses millimeter waves.-------------convert electrical signals into radio waves5G is entirely safe and poses no health or safety concerns. Millimeter waves cannot travel well through buildings or obstacles....

History of Kyrgyzstan 2025-01-26

History of Kyrgyzstan crossword puzzle
Across
  1. Rock carvings or engravings created by ancient peoples, often depicting daily life or spiritual beliefs.
  2. A way of life where people move from place to place, often following seasonal migration patterns.
  3. An ancient nomadic tribe that lived near the Ili River and maintained alliances with the Han Dynasty.
  4. A valley in Central Asia that served as a hub for agriculture, trade, and cultural exchanges.
Down
  1. An essential animal for transportation, warfare, and cultural pride among nomads of Central Asia.
  2. A nomadic group that thrived in Central Asia, known for their warrior skills and trading networks.
  3. A group of families united by kinship ties, forming the foundation of nomadic social and political life.
  4. An economic system based on raising livestock, integral to the survival of nomadic societies.
  5. A term used to describe the famous horses of Davan, prized by the Chinese for their speed and strength.
  6. A state in the Ferghana Valley, known for its fertile land and legendary horses.
  7. A portable, round tent covered with skins or felt, used as a dwelling by nomads in Central Asia.

11 Clues: A state in the Ferghana Valley, known for its fertile land and legendary horses.An economic system based on raising livestock, integral to the survival of nomadic societies.A valley in Central Asia that served as a hub for agriculture, trade, and cultural exchanges....

MasterCard Fieldtrip Vocabulary 2025-10-21

MasterCard Fieldtrip Vocabulary crossword puzzle
Across
  1. Harmful digital activity detected by the Fusion Center. 54 68 72 65 61 74
  2. Key concept: ensuring business can recover from incidents. 52 65 73 69 6C 69 65 6E 63 65
  3. Analyzes network activity and alerts on threats. 53 4F 43
  4. Place where teams from across Mastercard collaborate to detect and respond to threats.46 75 73 69 6F 6E 43 65 6E 74 65 72
  5. Study of protecting systems and networks. 43 79 62 65 72 73 65 63 75 72 69 74 79
  6. The Fusion Center handles these to prevent data loss.49 6E 63 69 64 65 6E 74 73
  7. “Trust is a _______.”43 75 72 72 65 6E 63 79
Down
  1. An unwanted software program or attack. 4D 61 6C 77 61 72 65
  2. Cyber teams must work together in this way. 43 6F 6C 6C 61 62 6F 72 61 74 69 6F 6E
  3. The global company hosting our field trip. 4D 61 73 74 65 72 63 61 72 64
  4. Digital evidence is analyzed here.46 6F 72 65 6E 73 69 63 73

11 Clues: “Trust is a _______.”43 75 72 72 65 6E 63 79Analyzes network activity and alerts on threats. 53 4F 43An unwanted software program or attack. 4D 61 6C 77 61 72 65Digital evidence is analyzed here.46 6F 72 65 6E 73 69 63 73The global company hosting our field trip. 4D 61 73 74 65 72 63 61 72 64...

Network topologies 2016-10-27

Network topologies crossword puzzle
Across
  1. operating/A specialized operating system for a network device such as a router, switch or firewall.
  2. read an encrypted file, you must have access to a secret key or password that enables you to decrypt it.
  3. server/a device which controls access to separately stored files, as part of a multi-user system.
  4. node is a basic unit used in computer science. Nodes are devices or data points on a larger network
  5. was a proprietary suite of networking protocols developed by Apple Inc. for their Macintosh computers.
  6. area network (WAN)/a computer network in which the computers connected may be far apart, generally having a radius of more than 1 km.
  7. per second (bps)
  8. server/is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device
  9. transmission/Data transmission is the process of sending digital or analog data over a communication medium to one or more computing, network, communication or electronic devices.
  10. repeater is a network device that is used to regenerate or replicate signals that are weakened or distorted by transmission over long distances and through areas with high levels of electromagnetic interference (EMI).
  11. set of guidelines for implementing networking communications between computers
  12. a networking device that forwards data packets between computer networks.
  13. a new, extended version of NetBIOS, the program that lets computers communicate within a local area network.
  14. of sending or receiving information, such as telephone lines or computers.
  15. private Network (VPN)/A virtual private network (VPN) is a network that is constructed using public wires — usually the Internet — to connect to a private network, such as a company's internal network.
  16. server/a mail transport agent, a mail router or an Internet mailer) is an application that receives incoming e-mail from local users.
  17. device used to connect two different networks, especially a connection to the Internet.
  18. duplex/Refers to the transmission of data in two directions simultaneously. For example, a telephone is a full-duplex device because both parties can talk at once.
  19. desktop computer terminal, typically networked and more powerful than a personal computer.
Down
  1. network/A network of computers configured to allow certain files and folders to be shared with everyone or with selected users.
  2. topology/Star networks are one of the most common computer network topologies.
  3. a computer networking device that connects devices together on a computer network, by using packet switching to receive, process and forward data to the destination device.
  4. refers to the original frequency range of a transmission signal before it is converted, or modulated, to a different frequency range.
  5. topology/A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring
  6. pair cable/Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources
  7. range of frequencies within a given band, in particular that used for transmitting a signal.
  8. with others to exchange information and develop professional or social contacts.
  9. is the process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand.
  10. topology is the arrangement of the various elements (links, nodes, etc.) of a computer network.
  11. computer or device on a network that manages network resources. There are many different types of servers
  12. refers to one-way communications where one party is the transmitter and the other is the receiver.
  13. central airport or other transport facility from which many services operate.
  14. (a network or system) from unauthorized access with a firewall.
  15. duple/allowing the transmission of signals in both directions but not simultaneously.
  16. elevated, enclosed platform on a ship from which the captain and officers direct operations.
  17. backup/a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event.
  18. a device) able to be attached to and used with a computer, though not an integral part of it.
  19. cable/is a type of cable that has an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield.
  20. rate/is the unit for symbol rate or modulation rate in symbols per second or pulses per second.
  21. area network - a computer network that links devices within a building or group of adjacent buildings, especially one with a radius of less than 1 km.
  22. topology/Bus topology is a specific kind of network topology in which all of the various devices in the network are connected to a single cable or line
  23. server/is a device that connects printers to client computers over a network
  24. server/Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP address and possibly a domain name.

43 Clues: per second (bps)(a network or system) from unauthorized access with a firewall.a networking device that forwards data packets between computer networks.of sending or receiving information, such as telephone lines or computers.server/is a device that connects printers to client computers over a network...

Vulnerabilities in Wireless Networks 2024-10-16

Vulnerabilities in Wireless Networks crossword puzzle
Across
  1. Unauthorized WiFi access (CIA)
  2. Every message is a broadcast, unencrypted messages can be read by anyone who’s listening and within range (Confidentiality)
  3. WiFi creates new availability problems, such as session hijacking, forced disassociation, and jamming! (Availability)
Down
  1. When WiFi access points receive two streams of communication claiming to be the same computer, stronger signal is accepted! (Integrity)

4 Clues: Unauthorized WiFi access (CIA)WiFi creates new availability problems, such as session hijacking, forced disassociation, and jamming! (Availability)Every message is a broadcast, unencrypted messages can be read by anyone who’s listening and within range (Confidentiality)...

Wi-fi and networks 2025-10-10

Wi-fi and networks crossword puzzle
Across
  1. Set of rules that allow devices to communicate
  2. Unique numbers that specifies who you send a message to
  3. Allows 2 or more devices to communicate
Down
  1. Fake network used to steal your data

4 Clues: Fake network used to steal your dataAllows 2 or more devices to communicateSet of rules that allow devices to communicateUnique numbers that specifies who you send a message to

Crossword Puzzle For Fun (words from 专练2) 2022-04-24

Crossword Puzzle For Fun (words from 专练2) crossword puzzle
Across
  1. n. the means of communication among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
  2. n. the amount that is left after taking numbers or money away from a total
  3. n. an arrangement that sb has with a company that allows them to use the Internet, send and receive messages by email, etc; an arrangement that sb has with a bank, etc. to keep money there, take some out, etc.
Down
  1. n. a thing or things that are owned by sb.
  2. n. a document in which you declare what you want to happen to your money and property when you die.
  3. ahead of time

6 Clues: ahead of timen. a thing or things that are owned by sb.n. the amount that is left after taking numbers or money away from a totaln. a document in which you declare what you want to happen to your money and property when you die....

Icebreaker 2023-09-19

Icebreaker crossword puzzle
Across
  1. An approach that attempts to capture the financial contribution of each customer by determining the discounted value of sales and costs
  2. The aggregation of relational assets and liabilities, associated with the firm's boundary-spanning employees and social networks linked to the offering or experience
Down
  1. Changes in a person's motivation, ability, preferences, and consumption choices as they grow older
  2. A stage where customers first evaluate and begin to deal with a firm, at or before first contact, where they start to learn about the firm's offerings
  3. Communication by a customer about a seller to others, which can be positive or negative
  4. An enduring desire to maintain a valued relationship

6 Clues: An enduring desire to maintain a valued relationshipCommunication by a customer about a seller to others, which can be positive or negativeChanges in a person's motivation, ability, preferences, and consumption choices as they grow older...

lesson 25 2016-04-22

lesson 25 crossword puzzle
Across
  1. text or graphics added to the end of an outgoing e-mail message
  2. to save or transfer data to a storage device folder for the purpose of saving space or organizing the data
  3. mail email software provided with windows vista
  4. a document, image, figure, or other file that you can attach to an email message
  5. agent a software application installed on the local PC, network, or web, such as email, text messaging, and instant messaging problems
  6. messaging a form of electronic communication that allows you to send and receive text messages in “real time” from friends and colleagues who are currently online
Down
  1. address consist of three parts, the username of the individual, the @ symbol, and the users domain
  2. list a list of email address you can use the same message to send to a group
  3. units of data sent across a network
  4. mail transmission of the electronic messages over networks
  5. unsolicited commercial e-mail that is sent to many people at the same time to promote serices
  6. book part of most email programs; used to keep a list of contacts and their email addresses
  7. list a list of e-mail address you can use the same message to send to a group
  8. message using a cell phone or other mobile devices to send and receive written messaging

14 Clues: units of data sent across a networkmail email software provided with windows vistamail transmission of the electronic messages over networkstext or graphics added to the end of an outgoing e-mail messagelist a list of email address you can use the same message to send to a group...

Computer Science 2019-03-07

Computer Science crossword puzzle
Across
  1. the amount of time a message takes to traverse a system
  2. the number of bit errors per unit time
  3. a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
  4. a group of two or more computer systems linked together
  5. the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.
  6. a collection of data that can be used by computers which need to communicate with each other,
  7. one or more wires covered in a plastic covering that allows for the transmission of power or data between devices
  8. a computer program or device that provides a service to another computer program and its user, also known as the client
Down
  1. is the standard way to connect computers on a network over a wired connection
  2. a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves
  3. the amount of data that can be sent from one point to another in a certain period of time
  4. an Internet service that translates domain names into IP addresses.
  5. a set of rules or procedures for transmitting data between electronic devices, such as computers
  6. a device that forwards data packets along networks

14 Clues: the number of bit errors per unit timea device that forwards data packets along networksthe amount of time a message takes to traverse a systema group of two or more computer systems linked togetheran Internet service that translates domain names into IP addresses.is the standard way to connect computers on a network over a wired connection...

HRM CA 2023-09-15

HRM CA crossword puzzle
Across
  1. The process of using digital platforms, such as job boards and social media, to attract and hire candidates.
  2. The department responsible for managing HRIS and related technologies.
  3. The process of integrating a new employee into the company, often facilitated by HR software.
  4. A platform for creating, delivering, and tracking employee training and development programs.
  5. Software that integrates various HR processes into a single platform.
  6. A software application used to streamline the recruitment process by managing job postings, applicant resumes, and interview scheduling.
  7. AI-powered chatbots are utilized to assist with HR chores and provide answers to frequently asked inquiries.
  8. Strategic planning to guarantee that a company has the talent needed to accomplish its objectives.
Down
  1. Data and key performance indicators (KPIs) are used to assess HR-related outcomes like employee engagement or the length of time it takes to fill job opportunities.
  2. A software system that manages HR-related data, including employee information, payroll, benefits, and attendance.
  3. Technology that provides data analytics and reporting capabilities for HR.
  4. To boost engagement and motivation among employees, training and development programmes might incorporate game-like components and mechanics.
  5. Platforms that connect professionals for networking, job searching, and industry-specific discussions.
  6. HR storing HR information and applications in the cloud to provide scalability and remote access.

14 Clues: Software that integrates various HR processes into a single platform.The department responsible for managing HRIS and related technologies.Technology that provides data analytics and reporting capabilities for HR.The process of integrating a new employee into the company, often facilitated by HR software....

Chapter 19 2023-11-30

Chapter 19 crossword puzzle
Across
  1. Individuals go through life embedded in a personal network of individuals to whom they give and from whom they receive support
  2. The view that our aging society is being unfair to its younger members because older adults receive inequitably large allocations of resources
  3. Prejudice against others because of their age, especially prejudice against older adult
  4. This gender of child is more likely to be involved in the lives of aging parents.
  5. Erikson's eighth and final stage occurring late adulthood
  6. Theory that the more active and involved older adults are, the more likely they are to be satisfied with their lives
  7. With compensation theory) The theory that successful aging is related to three main factors
Down
  1. One factor in the Selective Optimization with compensation theory
  2. Theory that motivation changes as a function of time horizons; older adults become more selective about social networks (familiar individuals with established rewarding relationships)
  3. One factor in the Selective Optimization with compensation theory
  4. This increases in middle adulthood but declines in the 70s and 80s
  5. An event that alters a late adulthood coup's lifestyle and requires adaption
  6. These types of issues include health care, generational inequity, income, and technology in late adulthood
  7. Openness, neuroticism, pessimistic, positive: the forementioned words make up someone's _________
  8. Relevant theorist to Socioemotional development

15 Clues: Relevant theorist to Socioemotional developmentErikson's eighth and final stage occurring late adulthoodOne factor in the Selective Optimization with compensation theoryOne factor in the Selective Optimization with compensation theoryThis increases in middle adulthood but declines in the 70s and 80s...

Computer Terminology 2024-02-22

Computer Terminology crossword puzzle
Across
  1. Ram (Random Access Memory) is the hardware in a device. It is the place where the data is stored in my computer processor.
  2. Travis
  3. The process by which a computer or virtual machine reads and acts on the instructions of a computer program.
  4. Storage is where data is permanently kept on your computer.
  5. devices It is a piece of equipment used to provide data and control signals to an information processing system
  6. The visual, auditory, or tactile perceptions provided by the computer after processing the provided information.
  7. Binary describes a numbering scheme in which there are only two possible values for each digit ,0 and 1
Down
  1. It is a very small processing unit inside a CPU which is a single integrated circuit on a computer chip that performs arithmetic and logic functions.
  2. It is the process by which data transmitted over computer networks is converted from binary code into its original.
  3. It is the main printed circuit board in computers.
  4. It is the physical parts of a computer.
  5. The Central Processing Unit is the primary component of a computer which acts as a control center.
  6. It is a set of instructions, data or programs used to operate computers and execute specific tasks.
  7. It is the smallest unit of data that a computer can process and store.

14 Clues: TravisIt is the physical parts of a computer.It is the main printed circuit board in computers.Storage is where data is permanently kept on your computer.It is the smallest unit of data that a computer can process and store.The Central Processing Unit is the primary component of a computer which acts as a control center....

transmittion speed 2022-03-27

transmittion speed crossword puzzle
Across
  1. address What is assigned to every device on the internet and is usually a 1 digit number?
  2. What is it called when packets are resent because it is either lost or damaged
  3. what is the maximum rate of data transfer across a given path called?
  4. It is anything where errors can occur
  5. It is a set of rules or procedures for transmitting data between electronic devices
  6. What tells you which internet protocol addresses are connected to which uniform?
  7. What connects computers together with a cable so computers can share information?
Down
  1. It is a wireless networking technology that allows devices to communicate over a wireless signal
  2. it is when one or more computers attempt to send data at the same time to different computers, servers and will send back a request to try sending the data again
  3. What is it called when two or more devices are connected together usually by cables or wifi?
  4. It is a collection of data which can be used by computers which need to communicate with each other
  5. It is a computer-computer or computer-internet network
  6. What do you call a delay in transmitting or processing data?
  7. What connects two or more packet-switched networks or subnetworks

14 Clues: It is anything where errors can occurIt is a computer-computer or computer-internet networkWhat do you call a delay in transmitting or processing data?What connects two or more packet-switched networks or subnetworkswhat is the maximum rate of data transfer across a given path called?...

Cyber Ethics 2025-05-31

Cyber Ethics crossword puzzle
Across
  1. The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  2. The practice of taking someone else's work or ideas and passing them off as one's own.
  3. The act of installing a legal copy of software in contravention of its license agreement
  4. The process of converting encrypted data back into its original, readable form
Down
  1. Any criminal activity that involves a computer, network or networked device
  2. ETHICS The moral principles and guidelines that should be followed when using computers, networks, and the internet
  3. A type of malicious software (malware) that replicates itself and can cause damage to computer systems
  4. A type of Denial of Service (DoS) attack that overwhelms an email address or server by flooding it with hundreds to thousands of messages
  5. An illegal intrusion into a computer system
  6. A type of cyberattack where attackers deceive individuals into revealing sensitive information
  7. The etiquette or rules of polite and respectful online communication
  8. A network security system that monitors and controls incoming and outgoing network traffic based on a set of security rules
  9. Unwanted bulk emails that come from unknown sources
  10. The process of converting readable data into an unreadable format, called ciphertext, to protect sensitive information from unauthorized access

14 Clues: An illegal intrusion into a computer systemUnwanted bulk emails that come from unknown sourcesThe etiquette or rules of polite and respectful online communicationAny criminal activity that involves a computer, network or networked deviceThe process of converting encrypted data back into its original, readable form...

AZ900 Module 2 2024-11-26

AZ900 Module 2 crossword puzzle
Across
  1. What are geographical areas on Azure that house multiple data centres?
  2. Which Azure service is used for serverless computing that runs code in response to triggers? Azure ......... (7)
  3. What Azure feature allows you to assign specific permissions to users based on their roles?
  4. What ties together billing and usage details for Azure resources under a single account?
  5. What is the logical container in Azure used to manage and organize related resources? (8,5)
  6. This abbreviation is a redundancy option that replicates data across regions to ensure durability in case of regional failures?
  7. What term do you use to validate who you are
Down
  1. What ensures fault tolerance in Azure by providing physically separate locations within a region? (12,5)
  2. What Azure compute service provides full control of the operating system? (7,8)
  3. What Azure service allows you to create private networks in the cloud?
  4. This abbreviation denotes a feature in Azure which is used to filter traffic to and from Azure resources within a virtual network?
  5. What is the identity and access management service used to authenticate and authorize users in Azure? (9, 5, 2)
  6. What Azure storage service is optimized for storing unstructured data? (4, 7)
  7. This abbreviation is a storage replication option keeps three copies of your data in a single data centre?

14 Clues: What term do you use to validate who you areWhat Azure service allows you to create private networks in the cloud?What are geographical areas on Azure that house multiple data centres?What Azure storage service is optimized for storing unstructured data? (4, 7)What Azure compute service provides full control of the operating system? (7,8)...

Networking Concepts 2025-06-13

Networking Concepts crossword puzzle
Across
  1. The maximum rate of data transfer across a network.
  2. Network Interface Card; a hardware component that allows computers to connect to a network.
  3. A technology for exchanging data over short distances using short-range radio frequency
  4. A network covering a small area, typically a single room or building
  5. A device that allows wireless devices to connect to a wired network using Wi-Fi.
  6. A basic networking device that connects multiple computers in a network, broadcasting data to all connected devices
  7. A device that forwards data packets between computer networks
Down
  1. A telecommunications network that extends over a large geographical area for the primary purpose of computer networking
  2. A device in a network that filters and forwards data packets between LAN segments.
  3. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
  4. A device that modulates and demodulates signals for data transmission over telephone lines.
  5. The arrangement of different elements (links, nodes, etc.) in a computer network.
  6. A network that connects computers within a limited area such as a residence, school, or office building
  7. A system for connecting computers within a local area network (LAN) using a protocol that defines how data packets are formatted and transmitted
  8. A system for connecting computers within a local area network (LAN) using a protocol that defines how data packets are formatted and transmitted

15 Clues: The maximum rate of data transfer across a network.A device that forwards data packets between computer networksA network covering a small area, typically a single room or buildingA device that allows wireless devices to connect to a wired network using Wi-Fi.The arrangement of different elements (links, nodes, etc.) in a computer network....

Tech gadgets 2022-06-14

Tech gadgets crossword puzzle
Across
  1. A small piece of equipment that you connect to a computer to copy and store information: memory ...
  2. The American word for mobile phone: ... phone
  3. The part of a radio, television, or computer through which the sound is played
  4. A computer that is small enough to be carried around easily and is flat when closed
  5. A piece of electronic equipment that connects computer networks to each other
  6. The set of keys on a computer or typewriter that you press in order to write
  7. A piece of electronic equipment for playing games on: game ...
  8. A piece of equipment that you hold in your hand and use to control a television, DVD player, etc: ... control.
Down
  1. A small electronic device that is used for maths
  2. A small, flat computer that is controlled by touching the screen
  3. A device with a part to cover each ear through which you can listen to for example music without other people hearing
  4. A flat surface in a cinema, on a television, or as part of a computer, on which pictures or words are shown
  5. A machine that is connected to a computer and prints onto paper using ink
  6. A small video camera that can be held easily in one hand

14 Clues: The American word for mobile phone: ... phoneA small electronic device that is used for mathsA small video camera that can be held easily in one handA piece of electronic equipment for playing games on: game ...A small, flat computer that is controlled by touching the screenA machine that is connected to a computer and prints onto paper using ink...

ELD 3 Unit 6 Review Crossword 2025-06-06

ELD 3 Unit 6 Review Crossword crossword puzzle
Across
  1. To give an advanced thought, discussion, or treatment.
  2. the degree or amount of strength or force that something has
  3. To find or employ measures to obtain or accomplish your dreams, goals, etc; To follow or search for someone or something, in order to catch or attack that person or thing
  4. To be involved or attracted to someone or something
  5. The study of the fundamental nature of knowledge, reality, and existence
  6. To follow (something) back to its cause, beginning, or origin : to find out where something came from
  7. a very small difference in color, tone, meaning, etc.
Down
  1. the basic physical systems needed for a society or organization to function, including roads, bridges, buildings, water and power systems, and communication networks
  2. to give more details about something : to discuss something more fully
  3. forming an idea, picture or plan in your mind
  4. To propose a tentative explanation or educated guess based on limited evidence as a starting point for further investigation
  5. having or showing impressive knowledge about a subject; having the confident quality of someone who is respected or obeyed by other people
  6. Complete lack of inhibition or restraint; Give up completely (a course of action, a practice, or a way of thinking)
  7. to study or examine something carefully

14 Clues: to study or examine something carefullyforming an idea, picture or plan in your mindTo be involved or attracted to someone or somethinga very small difference in color, tone, meaning, etc.To give an advanced thought, discussion, or treatment.the degree or amount of strength or force that something has...

Information Security Terms 2024-01-31

Information Security Terms crossword puzzle
Across
  1. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. Software designed to detect and remove malicious software from a computer.
  3. The process of verifying the identity of a user, system, or device.
  4. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. A network security device that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. A software update designed to fix vulnerabilities or improve security.

16 Clues: The process of verifying the identity of a user, system, or device.A software update designed to fix vulnerabilities or improve security.Software designed to detect and remove malicious software from a computer.The process of converting data into a code to prevent unauthorized access....

Internet Basics 2021-01-02

Internet Basics crossword puzzle
Across
  1. collection of web pages which have a common theme or focus
  2. software program retrieving and presenting data using the Internet
  3. descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
  4. websites used to share, post and exchange information in an informal format through several differing channels
  5. computer user who attempts to acquire unauthorized entry to servers and computer systems
  6. allows equipment such as fax machines, printers and files to be served to multiple computers
  7. single web document which opens in a browser
  8. last portion of a web name; includes examples such as “.com”, “.org” or “.net”
Down
  1. worldwide collection of networks which allow people to communicate and share information quickly and easily
  2. list of websites visited
  3. software program which searches the Internet for words or phrases and returns a list as to where each is located
  4. words, phrases or graphics in a web page which targets another location
  5. middle portion of a web name; unique to the web name
  6. computer program which replicates and spreads itself from one computer to another
  7. first portion of a web name; often “www.”
  8. web page which automatically opens when the web browser is opened
  9. hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
  10. two or more computers linked together which share and exchange information

18 Clues: list of websites visitedfirst portion of a web name; often “www.”single web document which opens in a browsermiddle portion of a web name; unique to the web namecollection of web pages which have a common theme or focusweb page which automatically opens when the web browser is openedsoftware program retrieving and presenting data using the Internet...

PASS Week 4 2021-10-02

PASS Week 4 crossword puzzle
Across
  1. neurotransmitter associated with joy and reward; increased levels when in love, decreased levels when suffering from Parkinson’s disease
  2. processes emotions, initiates the fear response
  3. major inhibitory neurotransmitter, helps us sleep
  4. ganglia, initiates motor movements, sends info to the cerebellum; when it deteriorates, Parkinson’s can develop
  5. a visual representation of the amount of our somatosensory and motor cortexes are devoted to different regions of the body due to the complexity of their sensations and movements
  6. neurotransmitter involved in arousal/wakefulness, eating and mood; when presynaptic neurons consistently reuptake it too quickly, one may experience depression symptoms
  7. neurotransmitter involved in voluntary movement, memory, attention and arousal; a lack of it has been tied to Alzheimer’s disease
  8. the memory consolidator, turns short term memories into long term, can also be involved in the retrieval of spatial memories
  9. the fundamental unit of the nervous system, organizes in communicative networks
  10. selective serotonin reuptake inhibitor
Down
  1. the relay station that sends info throughout the cortex
  2. Master regulatory region of the brain, controls our drives
  3. biological underpinnings of psychological processes
  4. cortex, involved in complex though, personality, planning, decision making, impulse control and more
  5. a component of the brain that includes the medulla pons and midbrain, and is largely involved in autonomic functions
  6. the major excitatory neurotransmitter, which is involved in learning
  7. the brain’s natural opiates, they relieve pain
  8. adds precision to complex motor movements, causes “muscle memory”, is easily disrupted by alcohol

18 Clues: selective serotonin reuptake inhibitorthe brain’s natural opiates, they relieve painprocesses emotions, initiates the fear responsemajor inhibitory neurotransmitter, helps us sleepbiological underpinnings of psychological processesthe relay station that sends info throughout the cortexMaster regulatory region of the brain, controls our drives...

Computer Vocabulary 2019-10-29

Computer Vocabulary crossword puzzle
Across
  1. drive the hard drive is what stores all your data
  2. a type of software application designed to run a mobile device
  3. stands or Uniform Resource Locator
  4. Completely Automated Public Turing to tell Computers and Humans Apart
  5. any one of the very small dots that together form a picture
  6. media content or devices that allow people to share information, communicate, and collaborate over the internet or computer networks
  7. a saved list that is stored as links in your browser
  8. Combine two or more lists, files, or cells
  9. Bin where you put files you want to delete from your computer
  10. bar a bar across the top of the computer screen which has the names of pull down menus such as file edit and or view
Down
  1. to set the alignment, spacing, boarders, and other things that determine how the document will look
  2. a document in which data is arranged in rows and columns and can be used in calculations such as excel and google sheets
  3. in word processing, to align a text along the center, left and right margins
  4. to engage in activities that don't involve devises,apps, or the internet
  5. bar the bar beside the start button that shows what programs are open
  6. based coding coding within a coding language where instructions are represented as blocks
  7. Balance Using media in a way that feels healthy and in balance with other life activities
  8. writing the step by step instructions that tell the computer what to do

18 Clues: stands or Uniform Resource LocatorCombine two or more lists, files, or cellsdrive the hard drive is what stores all your dataa saved list that is stored as links in your browserany one of the very small dots that together form a pictureBin where you put files you want to delete from your computer...

Chapter 3 and 10 - By: Zhara, Riza and Od 2023-10-11

Chapter 3 and 10 - By: Zhara, Riza and Od crossword puzzle
Across
  1. Time you have left after finishing up all your work, and that you can spend on activities you like is called…
  2. All the marketing activities designed to satisfy the needs and wants of sports consumers.
  3. Marketing to a specific group of people who share similar interests.
  4. Developing, promoting, and distributing products, or goods and services, to satisfy customers through entertainment.
  5. The methods used for communicating or transmitting messages.
  6. Non-governmental organization that focuses on providing a service rather than a profit.
  7. A retail business with a physical location or store site.
  8. A national organization that created divisions of schools on a competitive level, such as Division 1, Division 11, Division 111, acronym is…
  9. Business situation in which a few firms affect but do not control an industry.
  10. It was accepted on June 23, 1972.
Down
  1. A person who plays soccer as a hobby, and sometimes participates in sporting events without getting paid is called…
  2. Selling an additional product that is tied to one name.
  3. Non-traditional sports ie, skateboarding, rollerblading, skiing.
  4. An independent broadcaster that contracts with larger national networks for programming.
  5. Costs and expenses equal to income revenues.
  6. An example of this would be Lebron James, Serena Williams, or Kylian Mbappe.
  7. Another word for trend.
  8. The ranking of the TV-show or radio-show popularity in a certain time period.

18 Clues: Another word for trend.It was accepted on June 23, 1972.Costs and expenses equal to income revenues.Selling an additional product that is tied to one name.A retail business with a physical location or store site.The methods used for communicating or transmitting messages.Non-traditional sports ie, skateboarding, rollerblading, skiing....

MTA Key Words 2020-09-14

MTA Key Words crossword puzzle
Across
  1. a new Microsoft lightweight web browser with a layout engine built around web standards
  2. You canput on your browser that Internet Explorer allows you to do
  3. Utility provided by Microsoft or a third party that's accessible thorough a common interface
  4. in Internet Explorer prevents sites from installing and using applications ( ActiveX )
  5. Allows you to sync any folder in your computer with a folder on an external drive ( Sync )
  6. are natives commands available in Windows Powershell
  7. is the traditional Microsoft browser with a layout engine that offers a number of features that protect
  8. text stored by a user's web browser
  9. to help manage Internet Explorer security when visiting websites
  10. a server that acts as an intermediary for clients seeking resources outside their networks
Down
  1. small applications that allow websites to provide contents such as videos and games ( ActiveX )
  2. is a set of tools and technology that protects your computer
  3. an accessory program that comes with Windows 10 that allow you to take a screenshot annotate and save them
  4. occurs when you have two copies of a file stored in different locations
  5. also referred to as a snip or screen grab, a picture of whatever is displayed on the screen
  6. allows you to keep tract of websites that you visit frequently so you can visit them in the future
  7. blocks content from websites that appear on the list
  8. helps prevent anyone who might be using your computer from seeing where you visited

18 Clues: text stored by a user's web browserblocks content from websites that appear on the listare natives commands available in Windows Powershellis a set of tools and technology that protects your computerto help manage Internet Explorer security when visiting websitesYou canput on your browser that Internet Explorer allows you to do...

Emerging Technologies 2020-10-04

Emerging Technologies crossword puzzle
Across
  1. A unit of measurement for the width of the smallest wire on a chip
  2. Programming language designed to optimize graphics and text
  3. A binary digit, which is the smallest piece of data on a computer; it can contain one of two values: one or zero
  4. A software that controls the major functions of a computer such as allocating memory to different programs, and protecting the computer and information on it from unauthorized access
  5. A coding system used to structure text files in a document translating it into a web document
  6. A computer program that secures computers and networks from access by unauthorized users
  7. A memory storage device for a computer that uses flash memory
  8. Computer operating on electric motors and electromechanical switches
  9. How many instructions a computer can translate into functions at one time
Down
  1. The "brain" of the computer
  2. A device designed to act as a transmitter and as a resistor
  3. Gives instructions to the computing machine in zeros or ones
  4. The amount of data calculations a microchip can perform at one time
  5. Data that describes or further explains data
  6. The ability to carry out two programs or processes at the same time
  7. The memory space on a computer where programs which are running or open are stored, so they can be easily accessed
  8. The Internet commerce channel to sell and distribute items purchased online
  9. Computer operating on tubes and transistors

18 Clues: The "brain" of the computerComputer operating on tubes and transistorsData that describes or further explains dataA device designed to act as a transmitter and as a resistorProgramming language designed to optimize graphics and textGives instructions to the computing machine in zeros or ones...

CS Principles Review - 2022 2022-04-22

CS Principles Review - 2022 crossword puzzle
Across
  1. Crowdsourcing is when multiple online users ____ to fund a project or come up with new ideas.
  2. This is data about data.
  3. The heuristic approach does not ensure that the ____ is optimal but is used when finding the best ____ is not practical.
  4. This is when a user is tricked into giving away private information.
  5. Information that can be used to uniquely ____ an individual is called personally identifiable information.
  6. Distributed computing uses multiple ____ to run different parts of a program.
  7. Creative commons is a public copyright license that allows copyrighted work to be _____ distributed.
  8. Scientific research is done by individuals, many who are not scientists.
  9. Multifactor _____ requires the user to show various proofs in multiple categories to determine their ____.
  10. Scalablity is a program's ability to adjust its scale in order to meet new ____.
Down
  1. Lossy compression technique takes away the subtle ____ variations that the human eye cannot capture. The ____ that is lost can never be recovered.
  2. A rogue access point gives unauthorized access to secure networks through a ____ connection.
  3. To prevent _____ access, an encryption is coded in the data.
  4. A ____ is used to track information about a user visiting a website.
  5. User datagram protocol is a minimal error checking protocol that transports _____ data.
  6. Fault-tolerant is when a system is still able to function while supporting ____.
  7. Open access allows people to view _____ for analysis purposes.
  8. Application programing interface is a ____ of procedures with a description of how each procedure is called.

18 Clues: This is data about data.To prevent _____ access, an encryption is coded in the data.Open access allows people to view _____ for analysis purposes.A ____ is used to track information about a user visiting a website.This is when a user is tricked into giving away private information....

Lesson 135.13 2025-10-10

Lesson 135.13 crossword puzzle
Across
  1. The invisible intercessor that lets hardware and kernel exchange instructions seamlessly.
  2. Command-line modifier, typically preceded by a slash, that alters how the command executes.
  3. Logical division of physical storage that defines boundaries for file system deployment.
  4. Advanced Windows utility designed for high-volume, resilient file transfers and directory synchronization.
  5. Digitally signed document used to verify the authenticity and identity of an entity online.
  6. Network mode enabling discovery and sharing features within secure, trusted environments like home or work.
  7. Add-on module integrated into MMC to extend its functionality for specific administrative tasks.
  8. A controlled reversal restoring a prior configuration after instability or fault detection.
Down
  1. Rearranges scattered data on HDDs to restore contiguous storage order and boost read efficiency.
  2. Operation that structures a partition with a specific file system, enabling data organization.
  3. Network profile that conceals a device and restricts sharing to protect against untrusted connections.
  4. Centralized database in Windows that records hardware settings, user configurations, and system preferences.
  5. A temporary deactivation employed for diagnostic isolation or conflict testing.
  6. The actual input value provided to fulfill a parameter within a command.
  7. Command used for duplicating files or directories, including subdirectories, from one location to another.
  8. Process that prepares raw storage media for system recognition before partition tables exist.
  9. Technology that establishes an encrypted tunnel over public networks to connect users securely to private systems.
  10. Command that reveals the installed Windows edition, version, and build through a system dialog.

18 Clues: The actual input value provided to fulfill a parameter within a command.A temporary deactivation employed for diagnostic isolation or conflict testing.Logical division of physical storage that defines boundaries for file system deployment.The invisible intercessor that lets hardware and kernel exchange instructions seamlessly....

unit 3 networks 2025-01-06

unit 3 networks crossword puzzle
Across
  1. is the first part of the URL
Down
  1. is the last part of the URL
  2. name is the middle part of the URL

3 Clues: is the last part of the URLis the first part of the URLname is the middle part of the URL

ICT at home Crossword 2020-07-01

ICT at home Crossword crossword puzzle
Across
  1. An attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from their bank asking them for their bank details.
  2. Electronic mail. A method for sending messages and files to other people.
  3. Data that is sent in pieces. Each piece is viewed as it arrives, eg a streaming video is watched as it downloads.
  4. packet A piece of data sent over a network. Messages have to be broken down into binary data packets before they are transferred.
  5. The computer on a network that request data from a server.
  6. A link in a document or webpage that connects to another location.
Down
  1. A web page or group of web pages hosted on one web server and viewed in a web browser, usually maintained by a person, group or organisation.
  2. An application used to view web pages, eg Internet Explorer or Google Chrome.
  3. To copy a file from the internet onto your computer or device.
  4. A global network connecting millions of computers.
  5. measures the amount of data that can transfer through a communications channel over a given period of time.
  6. A set of rules for how messages are turned into data packets and sent across networks.
  7. Unsolicited (junk) email.
  8. Computer code designed to damage a computer system.

14 Clues: Unsolicited (junk) email.A global network connecting millions of computers.Computer code designed to damage a computer system.The computer on a network that request data from a server.To copy a file from the internet onto your computer or device.A link in a document or webpage that connects to another location....

NAMANH 2025-05-16

NAMANH crossword puzzle
Across
  1. the brain of the computer.
  2. It's like a powerful assistant to your computer's main processor (CPU) , handling the heavy lifting of graphics rendering, image processing, and video editing.
  3. the main circuit board in a computer system. It connects all of the internal components
  4. best teacher
  5. a common condition caused by intense use of your eyes, such as by reading, using digital devices or driving long distances.
  6. an injury to the tendons or muscles in the wrist, often caused by overuse, force, or sudden movements
  7. is one of the most important parts of your computer. It provides high-speed, short-term memory for your computer's CPU
Down
  1. A common cause of back pain is an injury like a pulled muscle.
  2. It's a type of data storage device that uses spinning magnetic disks to store and retrieve information.
  3. is any software intentionally designed to harm, exploit, or otherwise compromise devices, networks, or data
  4. a sum of money demanded or paid for the release of a captive.
  5. a type of malicious software, or malware, that spreads between computers and causes damage to data and software
  6. is a type of non-volatile computer memory that stores instructions and data that cannot be easily modified or erased.
  7. It's a type of computer storage device that uses integrated circuit assemblies to store data persistently.

14 Clues: best teacherthe brain of the computer.a sum of money demanded or paid for the release of a captive.A common cause of back pain is an injury like a pulled muscle.the main circuit board in a computer system. It connects all of the internal componentsan injury to the tendons or muscles in the wrist, often caused by overuse, force, or sudden movements...

HelpDesk Unit1 Vocab 2024-10-24

HelpDesk Unit1 Vocab crossword puzzle
Across
  1. process of involving a higher level of expertise when a support issue cannot be resolved at the initial level
  2. a formal contract that outlines the expected level of service performance between a service provider and a customer
  3. a service that provides support and assistance to users experiencing technical issues or needing information about products and services
  4. process of diagnosing and fixing problems, particularly in technology or equipment
  5. an event or unplanned interruption that disrupts normal operations or quality of [IT] services
  6. the solution to a problem, particularly in the context of tech support
  7. amount of time it takes for a help desk or tech support to reply to a user's request for assistance
Down
  1. an indication or sign of a problem, often used to help diagnose issues in technology
  2. computer or system that provides data, resources, or services to other computers (clients) over a network
  3. written materials that provide instructions and information about a product or service
  4. assistance provided to users for troubleshooting and resolving issues with computer hardware, software, networks
  5. the point of interaction between a user and a computer or software
  6. computer or application that accesses services provided by a server in a network
  7. group of interconnected computers and devices that can communicate and share resources with each other

14 Clues: the point of interaction between a user and a computer or softwarethe solution to a problem, particularly in the context of tech supportcomputer or application that accesses services provided by a server in a networkprocess of diagnosing and fixing problems, particularly in technology or equipment...

Unit 2 Vocabulary 2022-08-29

Unit 2 Vocabulary crossword puzzle
Across
  1. taming an animal and keeping it as a pet or on a farm
  2. the creation of written laws
  3. a worker in a skilled trade, especially one that involves making things by hand
  4. an important man-made object
  5. the time period when people learned to farm
  6. a large region controlled by one leader
  7. Belief in only one god
  8. Systems of organization such as government, religion, social structure, and economic systems and trade networks
  9. machinery and equipment developed from the application of scientific
  10. a belief system, usually in a supreme power or deity
  11. a government run by one person
  12. when a small group runs the government the governing body of a nation, state, or community
  13. a country ruled by religious leaders
Down
  1. a way of recording or gesturing language using various instruments
  2. a system of social hierarchy specific to India
  3. a complex society
  4. a very small country, made up of one city the creation of written laws
  5. any system where groups of people are ranked one above another
  6. the transmission of elements or features of one culture to another
  7. elite members of society running
  8. Belief in more than one god
  9. A period of time during which a country is ruled by members of the same family
  10. network of Eurasian trade routes active from the second century BCE until the mid-15th century.
  11. concentrating on and becoming an expert in a particular subject or skill
  12. when people make decisions through voting
  13. when the people elect representatives to make decisions

26 Clues: a complex societyBelief in only one godBelief in more than one godthe creation of written lawsan important man-made objecta government run by one personelite members of society runninga country ruled by religious leadersa large region controlled by one leaderwhen people make decisions through votingthe time period when people learned to farm...

Advertising MAJ 2022-05-25

Advertising MAJ crossword puzzle
Across
  1. A device, such as a walkie-talkie, that transmits or receives such signals
  2. A publication, usually issued daily or weekly, containing current news, editorials, feature articles, and usually advertising
  3. Distinctive name identifying a product, service or organizations
  4. company The act or process of buying and seeling in a market
  5. A piece of cloth bearing a motto or legend as of a club
  6. Of or relating to commerce
  7. A phrase used repeatedly as in advertising or promotion
  8. One that consumes, especially one that acquires goods or services for direct use or ownership rather than for resale or use in production and manufacturing
  9. A notice, such as a poster on a paid announcement in tho print, broadcast, on eletronic media, designed to attract public attention on or potrage
Down
  1. Appear suddently or unexpectedly
  2. Advertising or marketing announcements sent by mail without being requested to residences and workplaces
  3. agency Creates advertising material contrasts for punlication space, and sometimes undertakes market research on behalf of it clients
  4. A small leaf or leaflike part
  5. The advertisement or message posted on such a panel
  6. To make a tinckling or ringing metallic sound
  7. A small booklet or pamphlet, often containing promotional material or product information
  8. A publicly accessible system of networks that connects computers around the world via the TCP/IP protocol
  9. Symbol or design that identifies a brand
  10. media A way of public comumnication reaching a large audience
  11. A periodical containing a collection of articles, stories, pictures, or other features

20 Clues: Of or relating to commerceA small leaf or leaflike partAppear suddently or unexpectedlySymbol or design that identifies a brandTo make a tinckling or ringing metallic soundThe advertisement or message posted on such a panelA piece of cloth bearing a motto or legend as of a clubA phrase used repeatedly as in advertising or promotion...

Geography crossword puzzle 2022-07-04

Geography crossword puzzle crossword puzzle
Across
  1. What is the pollution related to and primarily caused by unnecessary honking called?
  2. What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
  3. What is the environment that has not been affected by people?
  4. What is a physical area on the earth’s surface called?
  5. area What is an area with dense transport networks and densely packed buildings called
  6. Refers to our surroundings and can either be physical or human.
  7. What is the pollution caused by leakage fuel storage tanks into rivers?
  8. What job opportunities are called?
  9. What is the pollution caused by an increase in LED usage?
  10. What is the environment where people live on farms and villages called?
  11. Consist of living and non-living things that are found naturally.
Down
  1. What is the number of people living in a unit area of land called?
  2. What is a built up area called?
  3. What are the disadvantages of going to a city called?
  4. What is the movement of people from rural to urban areas called?
  5. What is a physical area on the Earth’ surface called?
  6. What is the increase in the proportion of people living in urban areas called?
  7. Refers to surface runoff that results from melting snow.
  8. What is the area of the earth’s surface that holds special meaning for people?
  9. What is a multicultural society with many people from diverse cultural backgrounds called?
  10. What are the advantages of going to a city called?
  11. What is poor air quality affecting half the world’s urban population called?

22 Clues: What is a built up area called?What job opportunities are called?What are the advantages of going to a city called?What are the disadvantages of going to a city called?What is a physical area on the Earth’ surface called?What is a physical area on the earth’s surface called?Refers to surface runoff that results from melting snow....

1st Semester Review 2022-12-06

1st Semester Review crossword puzzle
Across
  1. uses an analog modem to transmit data over phone lines
  2. kind of like a VPN, but less secure. typically free.
  3. the act of discarding redundant info
  4. provides info at bottom of document
  5. shortcut to CUT text
  6. systems that are formed by link
  7. a VPN is best remembered as...
  8. shortcut selects all text
  9. raw bits and pieces of information
  10. goes right and left
  11. function that counts specific results
  12. any physical device you can touch
  13. outer edges of a document
  14. brain of the computer
  15. Structured Query Language
  16. function that adds all numbers in a range
  17. computing power will double every two years
  18. amount of time it takes data to travel from source to destination
  19. amount of data that can be transmitted within a fixed time period
  20. bad for the environment
  21. protect data and devices from unauthorized access
Down
  1. one million
  2. translates domain names such as google.com into a working IP address
  3. tells the hardware what to do
  4. goes up and down
  5. process of placing one message format into another
  6. provides info at top of document
  7. extracts from one or more organization's data
  8. allows us to accomplish tasks/goals
  9. involves a "three-way-handshake"
  10. cell that references another cell, performs operations on it
  11. also known as extenders, regenerate signal so it can be sent further
  12. common input device
  13. little helpers that pitch in when needed
  14. organized collection of related information
  15. has little overhead, less reliable, "best effort"

36 Clues: one milliongoes up and downgoes right and leftcommon input deviceshortcut to CUT textbrain of the computerbad for the environmentshortcut selects all textouter edges of a documentStructured Query Languagetells the hardware what to doa VPN is best remembered as...systems that are formed by linkprovides info at top of document...

Semester One Vocabulary Set 1 (A) 2019-12-18

Semester One Vocabulary Set 1 (A) crossword puzzle
Across
  1. Eight bits.
  2. The tiny colored dots that form the text and pictures on your screen.
  3. The "brains" of a personal computer or smartphone.
  4. Name used for the many servers located on the Internet that provide data and digital services to users.
  5. The English-language binary code for letters and numbers.
  6. A search ______ is a website that helps you find the links for and get connected to resources on the web.
  7. The address you key into a browser to fetch audio, video, and/or pages of text. Short for "Uniform Resource Locator"
  8. Someone who creates new things.
  9. Given edit __________ you have permission to view and make changes to a document.
Down
  1. The World Wide ____ is the human-friendly, hyperlink-connected collection of text, graphics, and audio on the internet.
  2. A networked computer that stores, retrieves, and may process information for users.
  3. The global network of computer networks on which email, instant messaging, banking services, telnet, and browsers all operate.
  4. New binary code for the characters in most modern & ancient languages.
  5. The legal protection given to "original works of authorship".
  6. Base 16, a way of representing bits compactly that uses the digits 0-9 and letters A through F.
  7. To work together with someone else on a shared project.
  8. The typefaces or lettering styles available on a computer.
  9. A single unit of digital information, corresponding to one/zero, on/off, or set/clear.
  10. The flashing symbol on your screen that shows where typed information will appear.
  11. A group of people or computers connected so they can send and receive information among themselves.

20 Clues: Eight bits.Someone who creates new things.The "brains" of a personal computer or smartphone.To work together with someone else on a shared project.The English-language binary code for letters and numbers.The typefaces or lettering styles available on a computer.The legal protection given to "original works of authorship"....

Semester One Vocabulary Set 1 (G) 2019-12-18

Semester One Vocabulary Set 1 (G) crossword puzzle
Across
  1. Eight bits.
  2. The tiny colored dots that form the text and pictures on your screen.
  3. The "brains" of a personal computer or smartphone.
  4. Name used for the many servers located on the Internet that provide data and digital services to users.
  5. The English-language binary code for letters and numbers.
  6. A search ______ is a website that helps you find the links for and get connected to resources on the web.
  7. The address you key into a browser to fetch audio, video, and/or pages of text. Short for "Uniform Resource Locator"
  8. Someone who creates new things.
  9. Given edit __________ you have permission to view and make changes to a document.
Down
  1. The World Wide ____ is the human-friendly, hyperlink-connected collection of text, graphics, and audio on the internet.
  2. A networked computer that stores, retrieves, and may process information for users.
  3. The global network of computer networks on which email, instant messaging, banking services, telnet, and browsers all operate.
  4. New binary code for the characters in most modern & ancient languages.
  5. The legal protection given to "original works of authorship".
  6. Base 16, a way of representing bits compactly that uses the digits 0-9 and letters A through F.
  7. To work together with someone else on a shared project.
  8. The typefaces or lettering styles available on a computer.
  9. A single unit of digital information, corresponding to one/zero, on/off, or set/clear.
  10. The flashing symbol on your screen that shows where typed information will appear.
  11. A group of people or computers connected so they can send and receive information among themselves.

20 Clues: Eight bits.Someone who creates new things.The "brains" of a personal computer or smartphone.To work together with someone else on a shared project.The English-language binary code for letters and numbers.The typefaces or lettering styles available on a computer.The legal protection given to "original works of authorship"....

Semester One Vocabulary Set 1 (M) 2019-12-18

Semester One Vocabulary Set 1 (M) crossword puzzle
Across
  1. The typefaces or lettering styles available on a computer.
  2. A group of people or computers connected so they can send and receive information among themselves.
  3. The global network of computer networks on which email, instant messaging, banking services, telnet, and browsers all operate.
  4. Name used for the many servers located on the Internet that provide data and digital services to users.
  5. Given edit __________ you have permission to view and make changes to a document.
  6. The World Wide ____ is the human-friendly, hyperlink-connected collection of text, graphics, and audio on the internet.
  7. Eight bits.
  8. The "brains" of a personal computer or smartphone.
  9. The address you key into a browser to fetch audio, video, and/or pages of text. Short for "Uniform Resource Locator"
  10. The legal protection given to "original works of authorship".
  11. A search ______ is a website that helps you find the links for and get connected to resources on the web.
Down
  1. A networked computer that stores, retrieves, and may process information for users.
  2. A single unit of digital information, corresponding to one/zero, on/off, or set/clear.
  3. The English-language binary code for letters and numbers.
  4. New binary code for the characters in most modern & ancient languages.
  5. Base 16, a way of representing bits compactly that uses the digits 0-9 and letters A through F.
  6. To work together with someone else on a shared project.
  7. The tiny colored dots that form the text and pictures on your screen.
  8. Someone who creates new things.
  9. The flashing symbol on your screen that shows where typed information will appear.

20 Clues: Eight bits.Someone who creates new things.The "brains" of a personal computer or smartphone.To work together with someone else on a shared project.The English-language binary code for letters and numbers.The typefaces or lettering styles available on a computer.The legal protection given to "original works of authorship"....

Vocabulary 2020-10-23

Vocabulary crossword puzzle
Across
  1. Cause to cover a larger area; make longer or wider.
  2. Taking something by force that does not belong to you.
  3. media: Is computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks.
  4. Have the power to enter a certain place.
  5. An identification used by a person with access to a computer, network, or online service.
  6. An insistent and peremptory request, made as if by right.
  7. Possession of the means or skill to do something.
  8. The application of scientific knowledge for practical purposes, especially in industry.
  9. Depend on with full trust or confidence.
  10. Use a computer to gain unauthorized access to data in a system.
  11. The center of interest or activity.
Down
  1. Make a thing started but not finished not continue permanently or for a limited time.
  2. An apparatus using or applying mechanical power and having several parts, each with a definite function.
  3. Belonging to or for the use of one particular person or group of people only.
  4. Line that limits the outer part or furthest from the center of a thing.
  5. A secret word or phrase that must be used to gain admission to something.
  6. Share or exchange information, news, or ideas.
  7. It refers to the absence of risk or trust in something or someone.
  8. Happening or coming immediately.
  9. Develop or increase in mental capacity by education or experience.
  10. Take part or intervene in an activity without invitation or necessity.
  11. Facts provided or learned about something or someone.
  12. A particular place or position.

23 Clues: A particular place or position.Happening or coming immediately.The center of interest or activity.Have the power to enter a certain place.Depend on with full trust or confidence.Share or exchange information, news, or ideas.Possession of the means or skill to do something.Cause to cover a larger area; make longer or wider....

Vocabulary 2020-10-26

Vocabulary crossword puzzle
Across
  1. Cause to cover a larger area; make longer or wider.
  2. Taking something by force that does not belong to you.
  3. media: Is computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks.
  4. Have the power to enter a certain place.
  5. An identification used by a person with access to a computer, network, or online service.
  6. An insistent and peremptory request, made as if by right.
  7. Possession of the means or skill to do something.
  8. The application of scientific knowledge for practical purposes, especially in industry.
  9. Depend on with full trust or confidence.
  10. Use a computer to gain unauthorized access to data in a system.
  11. The center of interest or activity.
Down
  1. Make a thing started but not finished not continue permanently or for a limited time.
  2. An apparatus using or applying mechanical power and having several parts, each with a definite function.
  3. Belonging to or for the use of one particular person or group of people only.
  4. Line that limits the outer part or furthest from the center of a thing.
  5. A secret word or phrase that must be used to gain admission to something.
  6. Share or exchange information, news, or ideas.
  7. It refers to the absence of risk or trust in something or someone.
  8. Happening or coming immediately.
  9. Develop or increase in mental capacity by education or experience.
  10. Take part or intervene in an activity without invitation or necessity.
  11. Facts provided or learned about something or someone.
  12. A particular place or position.

23 Clues: A particular place or position.Happening or coming immediately.The center of interest or activity.Have the power to enter a certain place.Depend on with full trust or confidence.Share or exchange information, news, or ideas.Possession of the means or skill to do something.Cause to cover a larger area; make longer or wider....

Vocabulary 2020-10-26

Vocabulary crossword puzzle
Across
  1. The center of interest or activity.
  2. Take part or intervene in an activity without invitation or necessity.
  3. Make a thing started but not finished not continue permanently or for a limited time.
  4. A secret word or phrase that must be used to gain admission to something.
  5. Taking something by force that does not belong to you.
  6. Share or exchange information, news, or ideas.
  7. Line that limits the outer part or furthest from the center of a thing.
  8. It refers to the absence of risk or trust in something or someone.
  9. The application of scientific knowledge for practical purposes, especially in industry.
  10. An insistent and peremptory request, made as if by right.
Down
  1. Facts provided or learned about something or someone.
  2. media Is computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks.
  3. Happening or coming immediately.
  4. Belonging to or for the use of one particular person or group of people only.
  5. Develop or increase in mental capacity by education or experience.
  6. Use a computer to gain unauthorized access to data in a system.
  7. Have the power to enter a certain place.
  8. An apparatus using or applying mechanical power and having several parts, each with a definite function.
  9. An identification used by a person with access to a computer, network, or online service.
  10. Depend on with full trust or confidence.
  11. Possession of the means or skill to do something.
  12. A particular place or position.
  13. Cause to cover a larger area; make longer or wider.

23 Clues: A particular place or position.Happening or coming immediately.The center of interest or activity.Have the power to enter a certain place.Depend on with full trust or confidence.Share or exchange information, news, or ideas.Possession of the means or skill to do something.Cause to cover a larger area; make longer or wider....

Fashion History 2021-02-02

Fashion History crossword puzzle
Across
  1. inexpensive clothing produced rapidly by mass-market retailers in response to the latest trends.
  2. a machine with a mechanically driven needle for sewing or stitching cloth.
  3. a French fashion designer, best known as the founder of one of the world's top fashion houses
  4. a fashion designer- the father of haute couture
  5. A pattern cut out of paper; specifically a dressmaking pattern printed on paper
  6. an electronic communications network that connects computer networks and organizational computer facilities around the world.
  7. a machine used to spin cotton and other fibers in mills
  8. an object that is regarded as the usual or most common size or form of its kind
  9. Machine that represented an important step toward automatic weaving
  10. took place from the 18th to 19th centuries, was a period of transition to new manufacturing processes
  11. an American inventor and sewing machine pioneer
Down
  1. a machine that automated the separation of cottonseed from the short-staple cotton fiber
  2. a famous french fashion designer popularized the little black dress
  3. allow each person to have only a fixed amount of (a particular commodity).
  4. the inventor of the quintessential American garment, the blue jean
  5. made for the general market and sold through stores rather than made to order for an individual customer; off the rack.
  6. a machine for spinning with more than one spindle at a time
  7. a type of cloth or woven fabric.
  8. the inventor of the cotton gin and a pioneer in the mass production of cotton
  9. the craft or action of forming fabric by interlacing threads.

20 Clues: a type of cloth or woven fabric.a fashion designer- the father of haute couturean American inventor and sewing machine pioneera machine used to spin cotton and other fibers in millsa machine for spinning with more than one spindle at a timethe craft or action of forming fabric by interlacing threads....

Proteins 2020-12-16

Proteins crossword puzzle
Across
  1. a permanent denaturation that results when liquid or semi-liquid proteins form solid or semisoft clots
  2. the reversible process of adding oxygen
  3. Large marsupial
  4. side chains that are less soluble in water and are attached to another compound of the same type, such as lipids or cholesterol
  5. the 3D structure of an entire amino acid chain
  6. the reversible process of removing oxygen
  7. organic subunits of proteins
  8. term used for the 11 nonessential amino acids made by the body
  9. the order the amino acids occur in a chain
  10. the shape of sections of an amino acid
Down
  1. formed by bubbling gas through a mixture, beating or whipping, and depressurization
  2. proteins made from strong, elastic, helix-shaped strands that form networks
  3. Has a trunk
  4. a chain of amino acids bound together by peptide bonds
  5. Flying mammal
  6. nutrient with a structure composed of carbon, hydrogen, oxygen, nitrogen, and usually sulfur
  7. term used for the 9 essential amino acids that are not made by the body and must be supplied by the diet
  8. the iron-building protein pigment in muscle that provides color
  9. a mixture of fluids locked in a tangled 3D mesh of denatured and coagulated protein
  10. covalent bonds between 2 protein molecules at side chains containing sulfur
  11. any change in shape of a protein molecule without breaking the peptide bonds
  12. Man's best friend
  13. the result of oxidation or dehydrogenation of an alcohol
  14. type of bond formed when 2 amino acids combine and water is released
  15. Likes to chase mice
  16. water-repelling

26 Clues: Has a trunkFlying mammalLarge marsupialwater-repellingMan's best friendLikes to chase miceorganic subunits of proteinsthe shape of sections of an amino acidthe reversible process of adding oxygenthe reversible process of removing oxygenthe order the amino acids occur in a chainthe 3D structure of an entire amino acid chain...

Euphoria's Respiratory Crossword Puzzle 2021-03-20

Euphoria's Respiratory Crossword Puzzle crossword puzzle
Across
  1. Prefix meaning before/from or in front of
  2. Suffix meaning pain
  3. The medical term for a heart attack
  4. abbreviation for a portable, life saving device designed to treat people experiencing sudden cardiac arrest
  5. abbreviation for the medical name for a heart attack
  6. A test where the patient is asked to walk on a treadmill or ride a bicycle to increase how hard the heart rate
  7. Vessels that deliver blood to tissues
  8. A test where leads are attached to the chest
  9. Vessels that return blood to the heart
  10. High blood pressure
  11. A portable ECG machine that patients wear over a period of few days
Down
  1. Combining word for plug or blockage
  2. Networks of small vessels the perfuse tissues
  3. A procedure using x-ray dye and a catheter
  4. Pumps blood through the system
  5. A test that is used to measure certain items in the blood may indicate heart muscle damage
  6. suffix Surgical puncture to remove fluid
  7. A disorder in which there is a narrowing in the arteries surrounding the heart
  8. abbreviation for atherosclerotic cardiovascular disease
  9. abbreviation for a disease that develops when the major blood vessels that supply the heart become damaged or diseased
  10. The complete stopping of the heart
  11. A condition in which the pericardial sac around the heart is inflamed
  12. A condition in which an artery has a weakened wall that causes it to swell
  13. abbreviation for a condition that occurs when the heart muscle doesn't pump blood as well as it should
  14. prefix meaning under or insufficient

25 Clues: Suffix meaning painHigh blood pressurePumps blood through the systemThe complete stopping of the heartCombining word for plug or blockageThe medical term for a heart attackprefix meaning under or insufficientVessels that deliver blood to tissuesVessels that return blood to the heartsuffix Surgical puncture to remove fluid...

IRIS scavanger hunt level 2 2021-11-12

IRIS scavanger hunt level 2 crossword puzzle
Across
  1. Working with numerics was made possible using this Travis' project
  2. This library can make use of your camera but only if you have opencv
  3. work your brains like a jet with this python editor
  4. This library acts as a Python interface for artificial neural networks
  5. it joins point to point to create a 2D hexagonal diagram
  6. This library's name was derived from the word panel data
  7. this function from NumPy library is used to calculated scalar products of vectors and matrices
  8. function returns True if the specified object is of the specified type
  9. Microsoft made this blue beast but not for windows, even Mac and Linux users prefer this when coding
  10. this is python's anonymous function, but wait it wont hack your PC
  11. datasets can be big and small, some might even look like a pig or a mole, attributes they all have, and this one's pandas' fav
Down
  1. It was initially developed by Facebook artificial-intelligence research group, and Uber’s Pyro software
  2. there are many creators of python as its opensource but there is only one benevolent dictator
  3. this brainchild of a hunter taught python programmers to plot
  4. pythons own little family containing its members and what all they do
  5. module to manage user-editable configuration files for an application
  6. A library for C++ works in python too
  7. This came out in 2008 and made the whole python world change
  8. an oops concept to wrap up your data
  9. Python doesn't speak english but this library helps in understanding it

20 Clues: an oops concept to wrap up your dataA library for C++ works in python toowork your brains like a jet with this python editorit joins point to point to create a 2D hexagonal diagramThis library's name was derived from the word panel dataThis came out in 2008 and made the whole python world change...

Wellness 2023-02-15

Wellness crossword puzzle
Across
  1. / The ability to adapt and bounce back from adversity and challenges.
  2. / The act of reducing tension and anxiety in the body and mind.
  3. management / The practice of using one's time effectively and efficiently to achieve goals and balance competing demands.
  4. / The act of inhaling and exhaling air, which is essential for life and can be used to manage stress and anxiety.
  5. / The act of consuming enough fluids to maintain good health.
  6. / A physical, mental, and spiritual practice that combines breath control, stretching, and meditation.
  7. / The practice of being present and fully engaged in the current moment.
  8. support / The emotional and practical assistance provided by friends, family, and other social networks.
  9. / Actions taken to improve one's physical, mental, and emotional health and well-being.
  10. / A physical or psychological response to a perceived threat or challenge.
  11. / The study of how food affects the body and how to make healthy food choices.
Down
  1. / The ability to think outside the box and generate new and original ideas.
  2. / The state of being in good health and having a balanced and fulfilling life.
  3. / The practice of looking inward and examining one's thoughts, feelings, and behaviors.
  4. / Activities done for pleasure and relaxation outside of work or other obligations.
  5. / Physical activity that improves strength, endurance, and overall fitness.
  6. / The quality of being thankful and appreciative of one's blessings and circumstances.
  7. / Practice that involves quieting the mind and focusing on the present moment.
  8. / The natural world around us, including plants, animals, and the environment.
  9. / A natural state of rest during which the body repairs and rejuvenates itself.

20 Clues: / The act of consuming enough fluids to maintain good health./ The act of reducing tension and anxiety in the body and mind./ The ability to adapt and bounce back from adversity and challenges./ The practice of being present and fully engaged in the current moment./ A physical or psychological response to a perceived threat or challenge....

MingoAldrete 2023-03-23

MingoAldrete crossword puzzle
Across
  1. a television receiver used in a studio to select or verify the picture being broadcast from a particular camera.
  2. someone who conveys their message thoroughly and is receptive and responsive to others' input.
  3. a person that is nice to others
  4. a pair of earphones joined by a band placed over the head, for listening to audio signals such as music or speech.
  5. a panel of keys that operate a computer or typewriter
  6. a small handheld device that is dragged across a flat surface to move the cursor on a computer screen, typically having buttons that are pressed to control functions
  7. learners one who can take responsibility for their own learning.
  8. a person that likes to be and talk to other people
  9. thinker kind of thinking in which you question, analyse, interpret, evaluate
  10. a person that is cheerful
  11. a computer operating system with a graphical user interface.
Down
  1. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  2. a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
  3. a worldwide system of computer networks
  4. a person that has a religion close to God
  5. one actually practices what the faith is about, instead of others who just say they are
  6. an insulated wire or wires having a protective casing and used for transmitting electricity or telecommunication signals
  7. Random Access Memory
  8. a person that is big in heigth
  9. Citizens People that care about them and think

20 Clues: Random Access Memorya person that is cheerfula person that is big in heigtha person that is nice to othersa worldwide system of computer networksa person that has a religion close to GodCitizens People that care about them and thinka person that likes to be and talk to other peoplea panel of keys that operate a computer or typewriter...

Network Security 2023-03-28

Network Security crossword puzzle
Across
  1. varies in size and can sustain network operations for only a limited time in the event of an outage
  2. attacker poses as a trusted site
  3. analyzes data, identifies attacks, responds to intrusions
  4. after user is authenticated, he is granted access to resources or services n the network
  5. pretends to do one thing while doing something malicious
  6. a form of network equipment redundancy
  7. a rogue access point that looks like a legit access point
  8. manipulating people inside the network environment to gain access to the network from the outside
  9. uses your info to generate targeted ads
  10. used to check for weakness in a network
  11. consists of software safeguards
  12. programming a list of mac addresses that you accept and block all others
Down
  1. a program that has two jobs: to replicate and activate
  2. when a person goes through trash to find personal info
  3. a user identifies himself to the system and the identity is verified against authentication database
  4. duplication of digital components/devices
  5. hides itself from all but the most aggressive antimalware tools
  6. replicates exclusively through networks
  7. something on a system or network that you don't want to have to happen
  8. method used to prevent passage of any TCP or UDP segments or datagrams through any port other than ones assigned by system admin
  9. consists of hardware safeguards
  10. flooding the network w/so many requests that it stops functioning
  11. using another person's wireless network w/o permission
  12. software that helps prevent intrusions
  13. the tracking of a network and resource usage on the network

25 Clues: consists of hardware safeguardsconsists of software safeguardsattacker poses as a trusted sitea form of network equipment redundancysoftware that helps prevent intrusionsreplicates exclusively through networksuses your info to generate targeted adsused to check for weakness in a networkduplication of digital components/devices...

CSP AP TERMS 2023-04-26

CSP AP TERMS crossword puzzle
Across
  1. an estimation of the amount of computational resources used by an algorithm
  2. problem in the code, unexpected word/line typo or grammar
  3. the syntax is correct but the code is unintended due to weak code
  4. the inclusion of extra components that can be used to mitigate failure of a system if other components fail
  5. key encryption that involves one key for both encryption and decryption
  6. a public copyright license that enables the free distribution of an otherwise copyrighted work. This is used when the content creator wants to give others the right to share, use, and build upon the work they have created.
  7. A small network often in one building
  8. A solution for an unreasonable time problem that is good enough. Google map route recommendation.
  9. the capacity for the system to change in size and scale to meet new demands
  10. a wireless access point that gives unauthorized access to secure networks
  11. key encryption pairs a public key for encryption and a private key for decryption
Down
  1. maximum amount of data that can be sent in a fixed amount of time
  2. __ Authorities issue digital certificates
  3. data about data
  4. allows for scalability of the Internet
  5. what is bandwidth measured in?
  6. this data has a range of values that change smoothly, rather than in discrete intervals, over time
  7. Material created on a computer is the __ __ of the creator or an organization
  8. a type of compression that removes all the subtle color variations that the human eye can not pick up
  9. scientific research conducted in whole or part by distributed individuals

20 Clues: data about datawhat is bandwidth measured in?A small network often in one buildingallows for scalability of the Internet__ Authorities issue digital certificatesproblem in the code, unexpected word/line typo or grammarmaximum amount of data that can be sent in a fixed amount of timethe syntax is correct but the code is unintended due to weak code...

CSP AP TERMS 2023-04-26

CSP AP TERMS crossword puzzle
Across
  1. an estimation of the amount of computational resources used by an algorithm
  2. problem in the code, unexpected word/line typo or grammar
  3. the syntax is correct but the code is unintended due to weak code
  4. the inclusion of extra components that can be used to mitigate failure of a system if other components fail
  5. key encryption that involves one key for both encryption and decryption
  6. a public copyright license that enables the free distribution of an otherwise copyrighted work. This is used when the content creator wants to give others the right to share, use, and build upon the work they have created.
  7. A small network often in one building
  8. A solution for an unreasonable time problem that is good enough. Google map route recommendation.
  9. the capacity for the system to change in size and scale to meet new demands
  10. a wireless access point that gives unauthorized access to secure networks
  11. key encryption pairs a public key for encryption and a private key for decryption
Down
  1. maximum amount of data that can be sent in a fixed amount of time
  2. __ Authorities issue digital certificates
  3. data about data
  4. allows for scalability of the Internet
  5. what is bandwidth measured in?
  6. this data has a range of values that change smoothly, rather than in discrete intervals, over time
  7. Material created on a computer is the __ __ of the creator or an organization
  8. a type of compression that removes all the subtle color variations that the human eye can not pick up
  9. scientific research conducted in whole or part by distributed individuals

20 Clues: data about datawhat is bandwidth measured in?A small network often in one buildingallows for scalability of the Internet__ Authorities issue digital certificatesproblem in the code, unexpected word/line typo or grammarmaximum amount of data that can be sent in a fixed amount of timethe syntax is correct but the code is unintended due to weak code...

CSP AP TERMS 2023-04-26

CSP AP TERMS crossword puzzle
Across
  1. an estimation of the amount of computational resources used by an algorithm
  2. problem in the code, unexpected word/line typo or grammar
  3. the syntax is correct but the code is unintended due to weak code
  4. the inclusion of extra components that can be used to mitigate failure of a system if other components fail
  5. key encryption that involves one key for both encryption and decryption
  6. a public copyright license that enables the free distribution of an otherwise copyrighted work. This is used when the content creator wants to give others the right to share, use, and build upon the work they have created.
  7. A small network often in one building
  8. A solution for an unreasonable time problem that is good enough. Google map route recommendation.
  9. the capacity for the system to change in size and scale to meet new demands
  10. a wireless access point that gives unauthorized access to secure networks
  11. key encryption pairs a public key for encryption and a private key for decryption
Down
  1. maximum amount of data that can be sent in a fixed amount of time
  2. __ Authorities issue digital certificates
  3. data about data
  4. allows for scalability of the Internet
  5. what is bandwidth measured in?
  6. this data has a range of values that change smoothly, rather than in discrete intervals, over time
  7. Material created on a computer is the __ __ of the creator or an organization
  8. a type of compression that removes all the subtle color variations that the human eye can not pick up
  9. scientific research conducted in whole or part by distributed individuals

20 Clues: data about datawhat is bandwidth measured in?A small network often in one buildingallows for scalability of the Internet__ Authorities issue digital certificatesproblem in the code, unexpected word/line typo or grammarmaximum amount of data that can be sent in a fixed amount of timethe syntax is correct but the code is unintended due to weak code...

Cybersecurity Month 2023-05-19

Cybersecurity Month crossword puzzle
Across
  1. creating a fake identity on a social network account or dating website
  2. an error, flaw, failure, or fault in a computer or system
  3. programs that automatically execute tasks as ordered by the creator of the program that has infected them
  4. after these are downloaded, opened, or executed, your data becomes corrupt
  5. programs and other operating systems used by a computer
  6. a type of malicious software that disguises itself as a harmless program
  7. a cyber attacker
  8. private network VPN
  9. an attack when a person or program disguises themselves as another
  10. malware used to gain access to a user's system or data
  11. authentication attaching a phone number or email to an account for extra security
  12. short for malicious software
  13. breach when sensitive, protected, or confidential information is intentionally released to an untrusted environment
  14. engineering taking advantage of human trust to gain access to private information
Down
  1. customizable additions to software for extra functionality
  2. secret word or phrase used to gain access
  3. method of obtaining user info through fraudulent communications targeted directly at people
  4. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers
  5. the way in which the identity of a user is confirmed
  6. cryptocurrency
  7. software that automatically displays or downloads material when a user if offline
  8. a form of malware used to threaten victims by blocking, publishing, or corrupting their data unless a ransom is paid
  9. technology IT
  10. an internet traffic filter meant to stop unauthorized traffic
  11. the physical and tangible parts of a computer

25 Clues: technology ITcryptocurrencya cyber attackerprivate network VPNshort for malicious softwaresecret word or phrase used to gain accessthe physical and tangible parts of a computerthe way in which the identity of a user is confirmedmalware used to gain access to a user's system or dataprograms and other operating systems used by a computer...

Security 2014-02-23

Security crossword puzzle
Across
  1. Technology created by Microsoft to control interactivity on web pages
  2. also known as junk mail
  3. Computer and ________ security helps to ensure that only authorized personnel have access
  4. self-replicating program that is harmful to networks
  5. Type of security that uses human interface, like a thumb scanner
  6. Monitors users and sends reports back to the host
  7. Threat from a user outside of the network
  8. Code used to login to a locked account
  9. Data is transformed using a complicated algorithm to make it unreadable
  10. Windows feature that can encrypt data
  11. An attack on the actual hardware
  12. Threat from user inside the network.
  13. malicious software that is disguised as a legitimate program
Down
  1. The first generation security standard for wireless.
  2. Type of attack that focuses on the software
  3. Program that controls the traffic in and out of a computer
  4. A program written with malicious intent, sent by hackers
  5. Type of encryption that requires both sides of an encrypted conversation to use an encryption key to encode and decode the data
  6. Type of encryption that requires two keys, a private key and a public key.
  7. Minimum number of characters recommended in a password
  8. Displaying unwanted ads on your computer
  9. When the attacker pretends to be a legit organization
  10. ensures that messages are not corrupted or tampered with during transmission
  11. malicious program that gains full access to a computer system
  12. A data _________ stores a copy of the information on a computer to removable backup media that can be kept in a safe place.

25 Clues: also known as junk mailAn attack on the actual hardwareThreat from user inside the network.Windows feature that can encrypt dataCode used to login to a locked accountDisplaying unwanted ads on your computerThreat from a user outside of the networkType of attack that focuses on the softwareMonitors users and sends reports back to the host...

All about computers 2015-05-31

All about computers crossword puzzle
Across
  1. invented the transistor
  2. helped design ENIAC
  3. A device used for storing data
  4. Handles all received instructions from the computer
  5. A line of computers produced by Apple
  6. Invented the world wide web
  7. the father of electronic games
  8. Small electronic device used for performing functions
  9. Internet address for all resources online
  10. Optical disc containing audio/software data
  11. developed BASIC
  12. Used for connecting devices to your system
  13. invented idea that led to ARPANET
  14. invented first home computer
  15. Another name for the cpu
  16. Program that translates source into object code
  17. Thin plate used for holding electrical components
  18. co-invented the microprocessor
  19. Number system with two digits
  20. invented first digital computer
  21. The beginning of the internet today
  22. invented first printed circuit board
  23. Allows using icons to interact with devices
  24. Code that helps display things on computers
  25. co-developed BASIC
  26. A unit of storage
Down
  1. co-invented first electronic digital computer
  2. A simple programming language
  3. storage Term for services over networks by servers
  4. A two dimensional barcode
  5. Device that amplifies signals/opens/closes circuits
  6. created first graphical computer game
  7. group that launched personal computer revolution
  8. founder of computer science
  9. Connected devices that transmit data
  10. co-invented the USB
  11. developed first modern programmable computer
  12. the father of video games
  13. Allows computers to transmit data over telephones
  14. developed JavaScript
  15. A single point in a graphic image
  16. built first integrated circuit
  17. Devices used to manage network resources
  18. created first one-gigahertz computer ptocessor chip

44 Clues: developed BASICA unit of storageco-developed BASIChelped design ENIACco-invented the USBdeveloped JavaScriptinvented the transistorAnother name for the cpuA two dimensional barcodethe father of video gamesInvented the world wide webfounder of computer scienceinvented first home computerA simple programming languageNumber system with two digits...

ict 2017-06-25

ict crossword puzzle
Across
  1. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  2. a type of code
  3. video-sharing website
  4. Code SACN THING THAT TAKES YOU TO A WEBSITE
  5. Universal Serial Bus
  6. an object-oriented computer programming language commonly used to create interactive effects within web browsers.
  7. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  8. different types of hardware
  9. a hardware used with a keyboard and a mouse
  10. a group or system of interconnected people or things
  11. something that you click on that will take you to a website
  12. a software package designed to create electronic presentations consisting of a series of separate pages or slides.
Down
  1. a place where power or information leaves a system.
  2. an app
  3. an object that you type with
  4. the programs and other operating information used by a computer.
  5. a disk drive used to read from and write to a hard disk.
  6. random access memory
  7. a set of related web pages located under a single domain name
  8. the action of making codes
  9. a unit of information equal to one sextillion (1021) or, strictly, 270 bytes.
  10. an amount of storage ( 1 billion )
  11. the thing that controls the computer in the form of a board
  12. machinery and devices developed from scientific knowledge
  13. EXTESIBLE HYPERTEXT MARKUP LANGUAGE
  14. Format standard way that information is encoded

26 Clues: an appa type of coderandom access memoryUniversal Serial Busvideo-sharing websitethe action of making codesdifferent types of hardwarean object that you type withan amount of storage ( 1 billion )EXTESIBLE HYPERTEXT MARKUP LANGUAGECode SACN THING THAT TAKES YOU TO A WEBSITEa hardware used with a keyboard and a mouse...

Software Puzzel 2022-04-24

Software Puzzel crossword puzzle
Across
  1. network that is designed to block unauthorized access while permitting outward communication.
  2. code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  3. Stores programs and data and retains its information even when the power is turned off.
  4. The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials.
  5. a bridge between two networks so that data can be transferred between a number of computers
  6. The part of a computer that controls and performs all its operations.
  7. A small picture on a computer screen that represents a function that can be opened.
  8. Computer hardware disk was first introduced in 1956 by
  9. a Unix-like OS composed entirely of free software
Down
  1. when your program has good syntax but there is a mistake in the order of the statements
  2. When a program displays a message and pauses for the user to type some input to the program.
  3. Reads the source code of the program as written by programmers
  4. is not a core data type in Python programming
  5. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  6. Founder of bluetooth.
  7. A little application that gets downloaded to your computer along with a web page.
  8. Software program that manages one/more virtual machines
  9. data sent to your computer by a Web server that records your actions on a certain Web site
  10. The density of pixels described in pixels per inch.
  11. Bhatkar Father of Supercomputing

20 Clues: Founder of bluetooth.Bhatkar Father of Supercomputingis not a core data type in Python programminga Unix-like OS composed entirely of free softwareThe density of pixels described in pixels per inch.Computer hardware disk was first introduced in 1956 bySoftware program that manages one/more virtual machines...

Software Puzzle 2022-04-24

Software Puzzle crossword puzzle
Across
  1. when your program has good syntax but there is a mistake in the order of the statements
  2. Computer hardware disk was first introduced in 1956 by
  3. Founder of bluetooth.
  4. is not a core data type in Python programming
  5. Software program that manages one/more virtual machines
  6. The density of pixels described in pixels per inch.
  7. data sent to your computer by a Web server that records your actions on a certain Web site
  8. A little application that gets downloaded to your computer along with a web page.
  9. a Unix-like OS composed entirely of free software
  10. a bridge between two networks so that data can be transferred between a number of computers
Down
  1. A small picture on a computer screen that represents a function that can be opened.
  2. The part of a computer that controls and performs all its operations.
  3. Reads the source code of the program as written by programmers
  4. network that is designed to block unauthorized access while permitting outward communication.
  5. code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  6. When a program displays a message and pauses for the user to type some input to the program.
  7. Stores programs and data and retains its information even when the power is turned off.
  8. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  9. Bhatkar Father of Supercomputing
  10. The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials.

20 Clues: Founder of bluetooth.Bhatkar Father of Supercomputingis not a core data type in Python programminga Unix-like OS composed entirely of free softwareThe density of pixels described in pixels per inch.Computer hardware disk was first introduced in 1956 bySoftware program that manages one/more virtual machines...