networks Crossword Puzzles
The Mafia 2024-01-29
Across
- and sell protection to businesses and resolve disputes among both criminal and legitimate actors.
- a system or organization in which people or groups are ranked one above the other according to status or authority
- the state, which he defined as the monopoly of legitimate force over a given territory
- a structured group of three or more persons, existing for a period of time and acting in concert with the aim of committing one or more serious crimes or offences.in order to obtain directly or indirectly, a financial or material benefit.
- a pattern of relationships between and among individuals and social groups
- hierarchies consisting of a limited number of mafiosi drawn from networks of socially close people
Down
- monopolize the provision of some illicit service or product utilizing Violence
- also known as team leaders
- a real, active, and operating commercial or entrepreneurial undertaking which produces services or goods for profit
9 Clues: also known as team leaders • a pattern of relationships between and among individuals and social groups • monopolize the provision of some illicit service or product utilizing Violence • the state, which he defined as the monopoly of legitimate force over a given territory • ...
Tencho Definitions 2022-02-25
Across
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- denoting or relating to a period of a thousand years.
- Solar Systems permits electricity to be harnessed by solar panels and stored inside a battery without direct connection to the utility grid.
- take (something) illicitly; steal.
- content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page.
- the state, fact, quality, or condition of being singular.
- a mobile device used while watching television especially to access supplementary content or applications
- someone who would like to start a business and thinks and talks about doing so, but never gets started.
- Audio high-resolution audio files are superior sound quality over compressed audio formats such as MP3 and AAC.
- Data data that contains greater variety, arriving in increasing volumes and with more velocity
- fusion the process of combining sensor data or data derived from disparate sources such that the resulting information has less uncertainty than.
- Optimization the process of ensuring that visitors who access your site from mobile devices have an experience optimized for the device.
- business model in which a company offers basic or limited features to users at no cost and then charges a premium for supplemental or advanced features.
- Leader one whose views on a subject are taken to be authoritative and influential.
- Networks a computer system modeled on the human brain and nervous system.
- a course of study made available over the internet without charge to a very large number of people.
- the formation of ideas or concepts.
- a person, company, or technology that changes the way an industry operates.
Down
- a form of entertainment
- or Radio detection and ranging: a detection system that uses radio waves to determine the distance (ranging), angle, or velocity of objects.
- the application of typical elements of game playing (e.g. point scoring, competition with others, rules of play) to other areas of activity, typically as an online marketing technique to encourage engagement with a product or service.
- is King you should focus on putting out good content frequently and consistently.
- short for key performance indicator.
- a standards-based wireless technology developed to enable low-cost, low-power wireless machines a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
- reuse (discarded objects or material) in such a way as to create a product of higher quality or value than the original.
- an image, video, advertisement, etc., that is circulated rapidly on the internet.
- 360 video recordings where a view in every direction is recorded at the same time, shot using an omnidirectional camera or a collection of cameras.
- Computing a rapidly-emerging technology that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.
- the correct or acceptable way of communicating on the internet
- posting a single message or piece of content to multiple destinations.
- the state or quality of being efficient.
- Fatigue the feeling experienced by many people who are required to remember an excessive number of passwords as part of their daily routine.
- a person who introduces new methods, ideas, or products.
33 Clues: a form of entertainment • take (something) illicitly; steal. • the formation of ideas or concepts. • short for key performance indicator. • the state or quality of being efficient. • denoting or relating to a period of a thousand years. • a person who introduces new methods, ideas, or products. • the state, fact, quality, or condition of being singular. • ...
Chapter3_Internet Crime 2017-08-03
Across
- ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
- ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
- A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of prpgramming code is attached to a file, so that when the infected file is opened, the code executes
- ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
Down
- Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
- ______is a program in which malicious code is hidden inside a seemingly harmless program.
- Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- Type of attacker that Promote political ideology.
- ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
- Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
23 Clues: Type of attacker that Promote political ideology. • ______is a program in which malicious code is hidden inside a seemingly harmless program. • ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data. • ______is a harmful program that resides in the active memory of the computer and duplicates itself. • ...
PC PRO Chap 9 Key Terms 2020-03-06
Across
- The plastic casing around an electronic device's screen.
- A mobile communications standard used by 5G.
- A feature that measures the vertical and horizontal orientation of the device.
- A port on a mobile device that enables devices to exchange data without using cables.
- A troubleshooting tool that identifies issues in installed apps.
- A system power state where they system appears to be off, but volatile memory is refreshed and some components remain powered so the computer can wake up quickly if it receives input from a keyboard, LAN, or USB device.
- A troubleshooting tool for Wi-Fi connectivity issues that identifies the number of broadcasting APs, displays the signal strength and channel of each wireless network, and obtains wireless network information such as the network type, data activity, and service provider.
- A semiconductor device that emits light when an electric current passes through it.
- A physical location where you can obtain wireless Internet access using a wireless local area network (WLAN) with a router connected to an internet service provider.
- Connecting one device to another.
- A power supply that converts DC power from a computer to AC power for a screen.
- The package file format used by the Android operating system for the distribution and installation of mobile apps and middleware.
- A unique number given to every single mobile phone. The number is typically found behind the battery.
Down
- A proprietary computer bus and power connector created by Apple Inc. to replace its previous proprietary 30-pin dock connector.
- A mobile virtual private network (mobile VPN) provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.
- A wireless technology standard for exchanging data over short distances from fixed and mobile devices and for building personal area networks (PANs).
- A troubleshooting tool for cellular network connectivity issues that reports signal strength, interference number of cell towers in the area, the location of each cell tower, and mobile network information such as the network type, data activity, and service provider.
- A set of software development tools that allows the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar development platform.
- Detects the physical movements of the tablet by measuring its linear acceleration in one dimension.
- The light that illuminates an LCD screen so that images on the screen are visible.
- A telecommunications interface standard used on an Integrated Services Digital Network (ISDN) to carry multiple DS0 voice and data transmissions between the network and a user.
- A database residing in a wireless device that contains information used during the system selection and acquisition process.
- An electronic display system that switches pixels on and off using liquid crystals that rotate polarized light.
- A space-based navigation system that provides location and time information in all weather conditions anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites.
- A system power state where the system appears to be off and power consumption is reduced to a lower level.
- A unique identifier that defines a subscriber in the wireless world, including the country and mobile network to which the subscriber belongs. The IMSI is one of the pieces of information stored on a SIM card.
26 Clues: Connecting one device to another. • A mobile communications standard used by 5G. • The plastic casing around an electronic device's screen. • A troubleshooting tool that identifies issues in installed apps. • A feature that measures the vertical and horizontal orientation of the device. • ...
EY Technology Review 2023-05-12
Across
- Sometimes called a web or internet browser, a browser is a software program used to navigate the world wide web.
- Talk To You Later
- A company that connect people/homes/networks to the internet. Our ISP is Comcast.
- apples version of a word processor
- Laugh out loud
- Not right now
- apples version of presentation software
- The connection of the billions of devices, computers, websites, and networks connected together (with wires, signals, satellites etc) sharing information and communicating.
- most common spreadsheet software there is. Owned by Microsoft.
- Microsoft cloud service
- Often called a PDF.A versital file type readable by almost all hardware/software/operating systems. A very useful way to lock and share files.
- Googles Cloud service
- googles version of presentation software
- Your wireless connection to a network that hopefully is connected to the internet.
- one of the big 3 companies known for androids, search engines, gmail
- googles version of spreadsheet software
- An awesome technology teach
- A popular company with a variety of useful software that tend to specialize in multimedia and other creativity packages
- Hit Me Up
- collection of pages (more then 1) grouped together and published together. Often they have a theme to them. We spoke of the Boulder Boulder site having a registration page, map page, photo page, parking page etc...
- when you verify somebody or something is who/what they say they are
- Rolling on the floor laughing
- A devices that converts your data/requests into transferable packets the be sent/received across the internet. Your connection to the ISP whom connects you to the internet
Down
- A bookmark, sometimes called a “favorite,” saves a web page’s address. Allows you to access your favorites without typing…
- If you are connected to the internet.
- big 3 company known for iphones, ipads, graphics, macs, music
- big 3 companies known for productivity software Office, PCs, etc
- a single page/document containing information posted on the internet for people to see/use
- Thank goodness it's Friday
- googles version of a word processor
- IOT… what the internet has become now that everything we have is pretty much monitoring, connected, and communicating on a network… fridgerator, car, phone, printer, AC, … The dryer telling date the laundry was done.
- Microsofts version of presentation software
- Let Me Know
- When you use more then on form of information to verify/authenticate. Commonly something you 'know' (like password, phrase, dob) and something you 'have" that is physical like an ID badge, finger print, eye scan etc.
- apples version of spreadsheet software
- When you shut off your wireless signal to the internet. You can still use your device it just only has access to information stored on it.
- microsofts version of a word processor software
- The interconnection of information on webpages (and now websites) linked together through the internet. The WWW or "web" is often incorrectly used by people when they mean internet. The Web is not the internet but rather a part of the internet.
- Be Right back
- 2 or more computers/devices connected together (wired or wireless) sharing information. Think of all the devices in our house connected together.
- Plan Do Check Act
- If you are not connected to the internet
42 Clues: Hit Me Up • Let Me Know • Not right now • Be Right back • Laugh out loud • Talk To You Later • Plan Do Check Act • Googles Cloud service • Microsoft cloud service • Thank goodness it's Friday • An awesome technology teach • Rolling on the floor laughing • apples version of a word processor • googles version of a word processor • If you are connected to the internet. • ...
stem careers 2023-06-01
Across
- take what the network architect has done and ensure the day-to-day operation of these networks runs smoothly.
- studies microorganisms
- is a scientist who works with designing scientific equipment
- spend their time making sure databases run efficiently by securing data and storing it appropriately.
- spends their time designing equipment and creating a process for manufacturing chemicals and products.
- fix things in house with water
- help with money
- works with computer
- fix peoples eyes
- fix peoples insides
- cut hair
- help students learn
- helps doctors
- fix engines
- fix things with electricity
- build things like houses
- work with space
- fix people's mouths with braces and stuff that hurts
- put their engineering skills to use by working on circuit boards, processors, memory devices, networks, and routers by researching, designing, and developing systems.
- studies the Earth
- do stuff with math like solving hard problems
- make food
- extract metals or minerals from sites they established may have mineral deposits
- use telescopes to study planets
- They can take materials and create products from medical devices all the way down to golf clubs
- help pets
- work with stuff in water
- try to improve the quality of products and ensure they are safe
- help people with their fitness
- work with chemicals
- will work closely with a mathematician to design surveys or experiments to collect the data to support or disprove a hypothesis.
- design things on the web
- work with animals
- also known as java developers, spend their time in the nuts and bolts of tech as they build, program, design, and maintain software.
- does exactly that; they develop and implement tests to find software issues
Down
- make stuff for industrial use
- conduct research into fundamental computer and information science to develop solutions to problems.
- work with stats
- engineer stuff all around
- estimate how much things are
- is in the name, because these individuals actually design and build large databases
- job is to ensure products meet safety standards by monitoring chemical processes
- These engineers solve problems surrounding agricultural problems like pollution, power supplies, and the efficiency of agricultural machinery.
- design buildings
- only focus is to improve human health
- takes engineering to the next level by designing ways to extract natural gas and oil from the earth.
- strives to improve the environment at all costs.
- are similar to archeologists in the sense that they study culture
- solves problems
- may also get the joy of designing entire electrical systems!
- monitors security measures to protect information
- work with a variety of structures and chemical properties to manipulate them in order to enhance products or create new ones
- spend their time improving business decision making and policy formulation by interpreting applicable mathematical information.
- plan transportation
- fly planes
- make things with computer
- help people with their mouth
- job is to improve overall human health by investigating diseases and establishing methods to prevent or treat them.
- takes their knowledge of mathematics and statistics to solve problems that may occur in the real world.
- develop and maintain websites
60 Clues: cut hair • make food • help pets • fly planes • fix engines • helps doctors • work with stats • solves problems • help with money • work with space • design buildings • fix peoples eyes • studies the Earth • work with animals • works with computer • fix peoples insides • plan transportation • help students learn • work with chemicals • studies microorganisms • build things like houses • ...
Unit 2 Vocabulary Quiz 2025-10-02
Across
- Lotus Society: a secret society that began organizing to overthrow the Yuan Dynasty
- Horde: Batu's army that pushed westward through Russia and then into Europe
- an arrangement to receive cash, goods, or services now and pay for them in the future
- Economy: using money rather than bartering with commodities like cowrie shells or salt
- Ocean Slave Trade: slaves from eastern Africa were sold in northern Africa, the Middle east, and India. This led to African customs spreading throughout these areas
- the four regional Mongol kingdoms that arose after the death of Genghis Khan
- Compass: navigation tool for determining direction that allowed ships to travel without following the coast
- Bow: a versatile weapon that provided the Mongol cavalry with superior range, accuracy, and mobility, contributing to their military dominance and conquests
- a central component of Mongol society, characterized by their mobile lifestyle, reliance on animal husbandry, and skilled horsemanship, which enabled the Mongols to establish a vast empire through their expertise in mounted warfare and strategic mobility
- of Exchange: documents stating the holder was legally promised payment of a set amount on a set date
- continual eating of grasses or their roots without allowing them to regrow which led to abandonment of cities outside of Great Zimbabwe in the late 1400s
- Mongolica: the period of Mongolian peace between the 13th and 14th centuries
- settlements of people away from their homeland arising from trade
- Rudders: invented by the Chinese and made steering ships easier and more stable
- invented in China in the 9th century; used in siege warfare like cannons in the Song Dynasty
- Trade: route across the Sahara Desert; traded for gold and salt, created caravan routes, economic benefit for controlling dessert, camels and camel saddles were crucial in the development of these trade networks; facilitated the spread of Islam
- Weapons: portable towers and catapults
- Money: a system of credit developed in China that allowed a person to deposit money at one location and withdraw it at another
- Diffusion: the spread of ideas, religions and products often resulting from trade
Down
- a military unit consisting of approximately 10,000 soldiers, led by a commander known as a noyan, and formed the backbone of the Mongol military organization during their conquests
- groups of people traveling together for mutual protection, often with pack animals such as camels
- Ships: Arab ships with lateen sails; strongly influenced European ship design; facilitated trade in the Indian Ocean networks
- Bubonic Plague: Mongol conquests brought fleas that carried the bubonic plague to Asia and Europe
- Houses: issued bills of exchange; model for modern banks
- heavy winds that affected trade routes in the Indian Ocean
- Hanseatic League: a commercial alliance that formed between northern German cities and Scandinavia in the 13th century
- Sail: triangular shaped sail that could catch wind from many different directions
- Saddle: saddles developed by South Arabians as the use of the camel spread
- a fine blue and white ware from China
- Chinese sailing ship that developed during the Song Dynasty
- (or caravansary): inns that popped up about 100 miles apart (the distance camels could go before they needed water) along the routes of the Silk Roads
- an instrument used to determine latitude by measuring the position of the stars
- meeting of Mongol chieftains in 1206 where Temujin "Genghis Khan” was elected khan of the Mongolian Kingdom
- Script: system of writing that Genghis Khan adopted for the Mongol Empire
- Erosion: overuse of farmland and deforestation reduced agricultural production in feudal Europe
35 Clues: a fine blue and white ware from China • Weapons: portable towers and catapults • Houses: issued bills of exchange; model for modern banks • heavy winds that affected trade routes in the Indian Ocean • Chinese sailing ship that developed during the Song Dynasty • settlements of people away from their homeland arising from trade • ...
Unit 3&4 Social Media, Apps, and Video Games 2026-03-30
Across
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, it can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
- A specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective customers.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
Down
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- A user on social media who has established credibility in a specific industry.
- The process of luring someone into a relationship by means of a fictional online persona.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
CHAPTER 18 TERMS 2020-09-10
Across
- Processor, memory, hard-disk or other storage subsystem, and wired/wireless utilization.
- contain events triggered by applications or programs determined by their programmers
- Supports plaintext authentication with MD5 or SHA with no encryption but provides GET BULK.
- the facility to which the message refers.
- a device that test the speed of data transfer in the network.
- are used to determine whether your network meets specific International Organization for Standardization or Telecommunication Industry Association standards.
- detects unwanted attempts to manipulate network systems and/or environments
- a single digit code from 0 to 7 that indicates the severity of the message.
- most popular form of TCP scanning
- displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
- is a device that transmits signals through each wire copper twisted pair to determine if it is connected to the correct pin at the other end.
- used for sniffing wireless networks
- protocol analyzers such as load testing, connectivity testing, and throughput testing.
- contain events generated by Windows system component, including drivers and services that started or failed to start.
- the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
- analyzes protocols
- looks inside every packet on a network segment.
Down
- text string containing detailed information about the even being reported.
- the standard level of performance of a certain device or to the normal operating capacity for your whole network.
- date and time of a message.
- a text string that uniquely describes the message.
- a diagnostic procedure in which a signal is transmitted and returned to the sending device after passing through all or a portion of a network circuit.
- a powerful enterprise (large corporate environment) network intrusion and prevention system.
- a device that test the speed of data transfer in the network.
- contain security events like valid logon attempts and potential security problems
- a term for software products and services combining security information management and security event management.
- is a line tester designed to check a copper cable connection for basic installation problems like opens, shorts, and crossed pairs.
- stores messages from you and can even time stamp and sequence them for you. Allows you to display, sort, and even search messages.
- sends messages to the NMS station, which then either reads or writes information in the database, stored on the NMS.
- a software tool designed to search a host for open ports.
- a combination cable tester and network analyzer, only better because it comes with more options.
- is a computer security device that monitors network and/or system activities for any strange or malicious behavior
- scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
- a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
- Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers.
- supports plaintext authentication with community strings and uses only UDP.
- an Application layer protocol that provides a message format for agents on a variety of devices to communicate with network management stations.
37 Clues: analyzes protocols • date and time of a message. • most popular form of TCP scanning • used for sniffing wireless networks • the facility to which the message refers. • looks inside every packet on a network segment. • a text string that uniquely describes the message. • a software tool designed to search a host for open ports. • ...
AWS Quiz III 2022-06-10
Across
- is an edge computing, data migration, and edge storage device that comes in two Options.
- is a cloud-based hardware security module that enables you to easily generate and use your own encryption keys on the AWS Cloud.
- is a highly available and scalable cloud Domain Name System (DNS) web service.
- provides a single location to track the progress of application migrations across multiple AWS and partner solutions
- is a service that enables customers to connect their Amazon Virtual Private Clouds (VPCs) and their on-premises networks to a single gateway
- is a data transfer service that makes it easy for you to automate moving data between on-premises storage and Amazon S3 or EFS.
- is an object storage service that offers industry-leading scalability, data availability, security, and performance.
- is a fully managed service that makes it easy for developers to create, publish,maintain, monitor, and secure APIs at any scale.
- lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily
- provides alerts and remediation guidance when AWS is experiencing events that might affect you.
- is a security service that uses machine learning to automatically discover, classify, and protect PII in S3 buckets.
- provides on-demand access to AWS’ security and compliance reports and select online agreements.
Down
- makes it easy to establish a dedicated network connection from your premises to AWS.
- running on AWS
- is a threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.
- gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.
- can migrate your data to and from most widely used commercial and open-source databases.
- is a managed Distributed Denial of Service (DDoS) protection service that safeguards web
- is a networking service that improves the availability and performance of the applications that you offer to your global users.
- enables you to build flexible, cloud-native directories for organizing hierarchies of data along multiple dimensions
- provides a unified user interface so you can view operational data from multiple AWS services and allows you to automate operational tasks across your AWS resources.
- is a service that makes it easy to develop, test, and deploy intelligent robotics applications at scale
- provides a simple, scalable, elastic file system for Linux-based workloads for use with AWS Cloud services and on-premises resources.
- is a networking service that helps establish secure connections between your on-premises networks,remote offices, client devices, and the AWS global network.
- is a hybrid storage service that allows your on-premises applications to seamlessly use AWS cloud storage.
- makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities.
- is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.
- helps you create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
28 Clues: running on AWS • is a highly available and scalable cloud Domain Name System (DNS) web service. • makes it easy to establish a dedicated network connection from your premises to AWS. • is an edge computing, data migration, and edge storage device that comes in two Options. • ...
The Media 2024-03-26
Across
- print and digital forms of communication—including television, newspapers, radio, the internet, and social media sites—that convey information to large audiences
- news organizations that mix opinion-driven journalism with factual reporting in order to appeal to consumers who are ideologically liberal or conservative; often characterized by ideological agenda setting, priming, and framing
- news reporting and political commentary by ordinary citizens and bystanders, advocacy groups, and eyewitnesses to crises, often using cell phone images or video and distributed via social media
- the tendency to favor information that confirms a person's existing beliefs; it involves discounting evidence that could disprove or challenge those beliefs
- the requirement that broadcasters provide candidates for the same political office with equal opportunities to communicate their messages to the public
- false, inaccurate, or misleading information in the media, especially social media; often targeting political candidates and leaders, mis_information can include mani_pulated or fabricated content, satire, and parody content to the public via airwaves on electromagnetic frequencies
- the putting forth of opinion and information that is consistent with the consumer's preexisting beliefs
- websites that pull together news from a wide range of online sources and make them available on one platform or page; news aggregators can be a way to avoid partisan or filtered news, providing a broad overview of the news of the day from many sources
- digital sites that are owned and managed by newspapers, follow the principles of journalism, and deliver content like that of print newspapers, with similar story layout for all users regardless of location, demographic characteristics, partisanship, or friend networks
- communication methods such as television and radio; they tend to take the form of one publisher (e.g., a television station) to many (viewers)
Down
- partisan media environments in which users are exposed primarily to opinions and information that conform to their existing beliefs; constructed by algorithms that analyze and then personalize each user's online experience
- a Federal Communications Commission regulation giving individuals the right to respond to personal attacks made on a radio or television broadcast
- closed communication systems in which individual beliefs are amplified or reinforced by repetition; they may increase social and political polarization because users do not encounter opposing views
- the process of calling attention to some issues, and not others, when reporting on political events and officials
- a form of reporting in which the media adopt a skeptical or hostile posture toward the government and public officials
- reporting that involves being as accurate, fair, and balanced as possible, relying on original sources, being transparent about citing sources, and presenting multiple viewpoints
- giant, often global, corporations that control a wide array of media, including television networks, movie studios, record companies, cable channels, book and newspaper publishers, and digital media outlets
- the process of presenting information from a certain perspective in order to shape the audience's understanding of that information
- software programs that analyze the viewing, liking, and commenting data of all of a platform's users, as well as individual users' prior data, to present users with additional content tailored to their individual interests instead of ordering posts based on the most recently published (as broadcast media do)
- the publishing or broadcasting of information or opinion as quickly as possible, with minimal fact-checking
- the media's designation of some issues, events, or people as important and others not
21 Clues: the media's designation of some issues, events, or people as important and others not • the putting forth of opinion and information that is consistent with the consumer's preexisting beliefs • the publishing or broadcasting of information or opinion as quickly as possible, with minimal fact-checking • ...
Unit 2 Terms 2024-10-28
Across
- An economic system in which private actors own and control property in accord with their interests,
- Informal settlements within cities that have inadequate housing and squalid, miserable living conditions.
- a series of protests that resulted in violence and millions of dollars in damages.
- Newly landed immigrants seeking opportunities and looking for work needed affordable housing.
- American inventor and business magnate and the founder of Ford Motor Co, famous for inventing the Model T automobile
- An American inventor who, singly or jointly, held a world-record 1,093 patents. In addition, he created the world's first industrial research laboratory.
- A spanish-speaking quarter in a town or city
- The act of giving privilege or financial encouragement to a person or organization.
- collective refusal by employees to work under the conditions required by employers.
- The negotiations between union and management representatives over salaries, benefits, and working conditions
- processes that involve different activities that lead to the extraction of raw materials from the earth
- Scottish-born American inventor, scientist, and teacher of the deaf whose foremost accomplishments were the invention of the telephone
Down
- A violent strike at the Homestead Works in Pittsburgh over a lock out following a decision to cut wages by nearly 20%.
- The concentration of human populations into discrete areas
- an agreement between an employer and an employee in which the employee agrees not to join or remain a member of a labor union as a condition of employment.
- State and local laws passed from the end of Reconstruction in 1877 through the mid-1950s by which white southerners reasserted their dominance by denying African Americans basic social, economic, and civil rights, such as the right to vote.
- Successfully used a steam engine to drill for oil near Titusville, Pennsylvania and started the oil boom.
- A collection of articles which Steffens had written for McClure's Magazine, it reports on the workings of corrupt political machines in several major cities in the US
- Accomplished inventor and a painter, he developed an electric telegraph and then co-developed morse Code
- American aviation pioneers generally credited with inventing, building, and flying the world's first successful airplane.
- May 4, 1886, a labor protest rally near Chicago's Haymarket Square turned into a riot after someone threw a bomb at police.
- Fought for better wages, reasonable hours and safer working conditions.
- Land, labor, and capital resources, and entrepreneurship
- The use of a blast of hot air to purify molten iron and convert it into steel.
- The federal legislation that created a system in which federal employees were chosen based upon competitive exams.
- An organization linked to a political party that often controlled local government.
- An economic and political system that demands state ownership and control of the fundamental means of production and the distribution of wealth.
- Rail networks, bridges, energy systems, wastewater services, aviation networks, roadways, drinking water systems
- American mechanical engineer who sought to improve industrial efficiency
- Highlighted the dangerous working and living conditions for families working in the meatpacking industry in early 20th century Chicago and focuses on an immigrant family from Lithuania
30 Clues: A spanish-speaking quarter in a town or city • Land, labor, and capital resources, and entrepreneurship • The concentration of human populations into discrete areas • Fought for better wages, reasonable hours and safer working conditions. • American mechanical engineer who sought to improve industrial efficiency • ...
Social Media, Apps, and Video Games Vocabulary 2026-03-30
Across
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, it can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- A user on social media who has established credibility in a specific industry.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
Down
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective customers.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
- The process of luring someone into a relationship by means of a fictional online persona.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Social Media, Apps and Video Games Unit 2026-03-30
Across
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, it can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- A user on social media who has established credibility in a specific industry.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
Down
- The process of luring someone into a relationship by means of a fictional online persona.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective customers.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
SET 4 2023-01-22
Across
- A technology that deals with the manipulation and control of matter at the atomic and molecular level
- Activity of pinpointing and resolving issues with softwares/technology
- protective barrier for computer networks and systems, like a security guard for your online information
Down
- A software that takes the source code of a program and turns it into machine code that the computer can understand
- A digital code or symbol that represents an asset or a right, like a digital coupon or a gift card
5 Clues: Activity of pinpointing and resolving issues with softwares/technology • A digital code or symbol that represents an asset or a right, like a digital coupon or a gift card • A technology that deals with the manipulation and control of matter at the atomic and molecular level • ...
Cyber Security Awareness (3) 2024-10-15
Across
- Probability of a cyberattack or data breach causing loss or exposure to an organization
- Software or code that cybercriminals use to damage or disrupt devices, steal data, or gain unauthorized access
- practice of protecting systems, networks, and programs from digital attacks
Down
- Text files that contain small amounts of data about a user that can be used for both good and bad purposes
- malicious program that can spread to a computer or network router without the user's knowledge or permission
5 Clues: practice of protecting systems, networks, and programs from digital attacks • Probability of a cyberattack or data breach causing loss or exposure to an organization • Text files that contain small amounts of data about a user that can be used for both good and bad purposes • ...
Week 13 Quiz 2014-04-03
Across
- how rapidly a system and the units within it change
- a term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
Down
- a term economists use to refer to situations where a product becomes more valuable once many people use it
- What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
- a state of the world involving networks of interdependence at multicontinental distances
- Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
6 Clues: how rapidly a system and the units within it change • a state of the world involving networks of interdependence at multicontinental distances • a term economists use to refer to situations where a product becomes more valuable once many people use it • ...
Week 13 Quiz 2014-04-03
Across
- A state of the world involving networks of interdependence at multicontinental distances
- What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
- A term economists use to refer to situations where a product becomes more valuable once many people use it
- Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
- A term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
Down
- How rapidly a system and the units within it change
6 Clues: How rapidly a system and the units within it change • A state of the world involving networks of interdependence at multicontinental distances • A term economists use to refer to situations where a product becomes more valuable once many people use it • ...
IPPS G3 - Week 13 Quiz 2017-03-22
Across
- a state of the world involving networks of interdependence at multicontinental distances
- how rapidly a system and the units within it change
- a term economists use to refer to situations where a product becomes more valuable once many people use it
Down
- a term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
- What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
- Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
6 Clues: how rapidly a system and the units within it change • a state of the world involving networks of interdependence at multicontinental distances • a term economists use to refer to situations where a product becomes more valuable once many people use it • ...
Activity 1 2024-08-25
Across
- The use and development of computer systems that are able to learn and adapt without following explicit instructions, by using algorithms and statistical models to analyze and draw inferences from patterns in data.
- A system of interconnected public web pages accessible through the Internet.
- The application of technologies and controls to protect systems, networks, programs, devices and data from cyber attacks.
Down
- The simulation of human intelligence processes by machines, especially computer systems.
- The process of exchanging information and ideas.
- A multidisciplinary field comprising aspects of computer science, physics, and mathematics that utilizes quantum mechanics to solve complex problems faster than on classical computers.
6 Clues: The process of exchanging information and ideas. • A system of interconnected public web pages accessible through the Internet. • The simulation of human intelligence processes by machines, especially computer systems. • The application of technologies and controls to protect systems, networks, programs, devices and data from cyber attacks. • ...
if 2024-03-16
Across
- Before joining Apple, Tim Cook worked at this company, where he ultimately became the Chief Operating Officer.
- A type of nanotechnology that involves the creation of structures and devices by manipulating individual atoms and molecules.
- Solana aims to address scalability issues faced by other blockchain networks, such as __________, by utilizing innovative technologies.
- Prior to becoming CEO, Tim Cook served as Apple's Chief __________ Officer.
Down
- Nanotechnology involves the study and manipulation of materials at the __________ level, leading to unique properties and behaviors.
- Solana was founded by Anatoly __________ in 2017, with the goal of providing a scalable blockchain solution for decentralized applications.
6 Clues: Prior to becoming CEO, Tim Cook served as Apple's Chief __________ Officer. • Before joining Apple, Tim Cook worked at this company, where he ultimately became the Chief Operating Officer. • A type of nanotechnology that involves the creation of structures and devices by manipulating individual atoms and molecules. • ...
Tutorial 9 2023-10-11
Across
- theory that argues that a firm's sustained competitive advantage is based on its valuable and rare resources
- excess resources a company has that can be leveraged to successfully adjust to situations
- theory that argues that information on a company's financial health is not available to all parties in a market at the same time.
- the tendency for positive impressions of an organisation in one area to positively influence one's opinion or feelings in other areas
Down
- the practices of commerce applied to the public sector in order to deliver greater financial value
- economic decisions are affected by the social networks in which economic actors operate
6 Clues: economic decisions are affected by the social networks in which economic actors operate • excess resources a company has that can be leveraged to successfully adjust to situations • the practices of commerce applied to the public sector in order to deliver greater financial value • ...
science 2023-10-27
Across
- definition: Organisms that live on or in another organism (the host) and feeds on it
- definition: Models That show how food energy passes from organism to organisms
- Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
- Definition: Networks of interconnected Food chains In an ecosystem
- Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
- definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything
6 Clues: Definition: Networks of interconnected Food chains In an ecosystem • definition: Models That show how food energy passes from organism to organisms • definition: Organisms that live on or in another organism (the host) and feeds on it • ...
Sam computer vocabulary 2014-02-10
Across
- A collection of information, usually including a username and the current date and time, stored on the local computer of a person using the World Wide Web, used chiefly by websites to identify users who have previously registered or visited the site.
- A memory device in which information can be accessed in any order.
- uniform resource locator; a standardized address of a location on the internet, esp on the World Wide Web
- A sequence of adjacent bits, usually eight, operated on as a unit by a computer
- computing the representation of each one of a set of numbers, letters, etc, as a unique sequence of bits, as in ASCII
- Is the brain of the computer
- the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
- A computer that processes requests for HTML and other documents that are components of web pages.
- internet service provider, a business providing its customers with connection to the internet and other related services
- a personal computer small enough to fit conveniently in an individual workspace
- An interconnected system of networks that connects computers around the world via the TCP/IP protocol.
- the programs and other operating information used by a computer.
- Is physical components that make up a computer system.
- Universal Serial Bus is an industry standard developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices.
- The set of routines stored in read-only memory that enable a computer to start the operating system and to communicate with the various devices in the system, such as disk drives, keyboard, monitor, printer, and communications ports.
Down
- a model of computer use in which services stored on the internet are provided to users on a temporary basis
- a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit. Also called hard disk drive.
- The numerical sequence that serves as an identifier for an Internet server.
- This term is used to describe a preset value for some option in a computer program.
- A program that accesses and displays files and other data available on the Internet and other networks.
- connect as or operate with a network.
- intellectual property, esp computer source code, that is made freely available to the general public by its creators
- A fast storage buffer in the central processing unit of a computer. Also called cache memory.
- Memory hardware that allows fast access to permanently stored data but prevents addition to or modification of the data.
- of, relating to, or situated on the edge or periphery of something.
- A computer or program that can download files for manipulation, run applications, or request application-based services from a file server.
- computing domain name system
- In computing, booting is the initial set of operations that a computer system performs after electrical power to the CPU is switched on or when the computer is reset. ...
29 Clues: Is the brain of the computer • computing domain name system • connect as or operate with a network. • Is physical components that make up a computer system. • the programs and other operating information used by a computer. • A memory device in which information can be accessed in any order. • of, relating to, or situated on the edge or periphery of something. • ...
CS101 Vocab Review 2021-08-08
Across
- Governs what an authenticated user is allowed to do
- Memory that stores values that are being used during processing
- The number of bits used to store each sample or value
- A signal that changes continuously overtime
- A smarter device that has knowledge about the nodes on each bus or LAN
- The number of images shown per second of video
- A collection of logic gates that transforms a set of binary inputs into a set of binary outputs
- The probability that a data request will be in the cache
- Used to store data for transactional purposes
- A type of node that amplifies and forwards a signal
- Users who have more privileges than others
- The process of measuring an analog signal at set intervals in order to digitize it
- Training model to correspond too closely or exactly to a particular set of data
- A variable or statement that evaluates to true or false
- A single element of a picture
- The type of node needed as the center of a star topography
- A type of node that can translate signals between different types of networks
- Malware that pretends to only do a legitimate task while also breaching security
- An unreliable transmission protocol
- A type of memory where information disappears without power
- A fixed size unit of memory, typically 1 byte
- This occurs when a computer tries to represent a number larger than the maximum value it is capable of storing
- Applying a mathematical one-way function to create a "signature" of the input
- A type of supervised learning with discrete targets
- Occurs when two messages are sent at the same time on a shared communication line
Down
- A method used to hide unneeded or complex details of a problem or idea
- The fastest networking technology for data communication today
- There are _____ bits in one byte
- Step-by-step instructions for solving a problem
- A program for reading and interpreting websites
- The base 8 positional numbering system
- A type of machine learning based on rewards and punishments
- An aspect of a computer that can be used to breach security
- The process of verifying that you really are the person who has the right to access a given computer
- The program that translates assembly language to machine language
- The practice of hiding the very existence of a message
- The base 2 numbering system that does not allow for negative numbers
- A reliable transmission protocol
- The von Nuemann architecture component that includes the ALU and the Control Unit
- An example of non-volatile memory
- A Boolean expression that is never false
- The rate at which information can be sent and received across a network
- A malicious security breach
- A network of networks
- A flexible notation that lies between the two extremes of natural language and real code
- The internet protocol layer whose goal is to deliver packages from source port to destination port
- One of the 3-V's, the rate at which data changes
- A herd of computers controlled to perform a task without the user's knowledge
48 Clues: A network of networks • A malicious security breach • A single element of a picture • There are _____ bits in one byte • A reliable transmission protocol • An example of non-volatile memory • An unreliable transmission protocol • The base 8 positional numbering system • A Boolean expression that is never false • Users who have more privileges than others • ...
PC PRO Chapter 6 2020-01-03
Across
- Network in which all hosts share all resources.
- A network with geographically disperse connections that connect multiple LANs.
- Maintains the signal in the center of the core.
- A specialized device that performs a specific network role.
- A device optimized for the single purpose of providing file sharing.
- A hardware device that converts digital data into digital signals sent on the medium.
- Carries the signal.
- Functions as a second physical channel and as a ground.
- A gigabit Ethernet cable with 10 Gbps speeds limited to cable length less than 100 meteres.
- Small geographic area network.
- A gigabit Ethernet cable with 10 Gbps speeds limited to cable length less than 55 meteres.
- Central connecting point for multiple media segments on the same subnet.
- Prevents the cladding and central core from breaking.
- A coaxial cable specification used for CCTV video systems.
- A cable that provides more EMI protection, but is more expensive than UTP cable..
- A coaxial cable specification used for cable TV, satellite TV, and broadband cable internet.
- Uses the same wire configuration on each connector end.
- Connects two segments within the same subnet.
- Similar to WLAN but uses different technology to connect to the internet. Also known as 3G or 4G networks.
- Hardware or software that provides a path for signals to pass between devices.
- A hardware device that connects two network segments with different subnet addresses.
- Carries broadband internet signals.
- Group of LANs that are geographically isolated but are connected to form a large internetwork.
- Private network that uses internet technologies.
Down
- A host that provides a service. VoIP Software that provides voice communication over an IP network.
- Transfers data using a single light ray.
- Private network that uses internet technologies but its resources are made available to trusted external users.
- Central connection for multiple media segments on the same subnet.
- A connector with 4 connectors, 2 pairs of wires, and a locking tab; used primarily for telephone wiring.
- A cable generally used for Ethernet cables and telephone wires.
- A cable that supports gigabit Ethernet.
- A connector with 8 connectors, 4 pairs of wires, and a locking tab; used for Ethernet networks.
- Encases everything and protects the cable.
- Carries data signals in cables.
- Encases a cable to protect it from external elements.
- Rules or standards that describe how hosts communicates and exchange data.
- A portion of a network with a common network address.
- or hosts Computers.
- Network the size of a few blocks to a metropolitan area.
- Network in which hosts have specific roles.
- Has the strictest specifications for crosstalk and noise of the Cat cables.
- Arrange wires in the first connector using T568A standard and the second connector the T568B standard.
- Computer system controlled by a single organization.
- Interfaces Devices that send and receive electrical signals.
- Large, world-wide, public network.
- Carries broadband internet signals.
- Surrounds inner cable conductor and keeps signal separated from the mesh conductor.
- A hardware device that converts binary data to analog waves and vice versa.
- Mesh network that uses wireless connection only.
- Used with both single and multi-mode cabling.
- media Path for electrical signals between devices.
- A hardware device that creates and receives transmission signals sent along the networking medium.
- Same as LAN but uses wireless connection.
- Small network for communication between devices.
54 Clues: Carries the signal. • or hosts Computers. • Small geographic area network. • Carries data signals in cables. • Large, world-wide, public network. • Carries broadband internet signals. • Carries broadband internet signals. • A cable that supports gigabit Ethernet. • Transfers data using a single light ray. • Same as LAN but uses wireless connection. • ...
Module I Vocab 2020-02-25
Across
- is a document commonly written in HTML (Hypertext Markup Language) that is accessible through the Internet or other networks using an Internet browser.
- a piece of electronic equipment for playing games on
- is an online platform which people use to build social networks or social relationship with other people who share similar personal or career interests, activities, backgrounds or real-life connections
- a wearable device is a technology that is worn on the human body
- a series of coded software instructions to control the operation of a computer or other machine
- is basically a system of Internet servers that support specially formatted documents
- is any piece of computer hardware equipment which converts information into human-readable form
- a hardware device capable of transmitting an analog or digital signal over the telephone, other communication wire, or over wireless
- a model of computer data storage in which the digital data is stored in logical pools
- the working area of a computer screen regarded as a representation of a notional desktop and containing icons representing items such as files and a wastebasket
- a computer or computer program which manages access to a centralized resource or service in a network
- is any physical device capable of storing information temporarily, like RAM (random access memory), or permanently, like ROM (read-only memory)
- designed to carry out web search, which means to search the World Wide Web
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit
Down
- a program or piece of software made to fulfill a purpose
- a piece of computer hardware equipment used to provide data and control signals to an information processing system such as a computer or information appliance
- a handheld electronic device for playing digital media such as audio and video files
- means the ability to view the same multimedia content from different types devices
- a machine for printing text or pictures onto paper, especially one linked to a computer
- an extra copy of data on a computer
- a computer program that distributes web pages as they are requisitioned
- a location connected to the Internet that maintains one or more pages on the World Wide Web
- is the environmentally responsible and eco-friendly use of computers and their resources
- combining 2 or more functions in a unit
- an application, downloaded usually by a mobile user
- a group or system of interconnected people or things
- short-range wireless interconnection of devices
- a mobile electronic device that is designed primarily for the purpose of reading digital e-books
- type of notebook computer that has an LCD screen on which the user can write using finger and swipe actions
- synchronization, in-sync = a state in which two or more people or things move or happen together at the same time and speed
- the programs and other operating information used by a computer.
- a program with graphic interface on a world wide web.
- cause to occur or operate at the same time or rate
- a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
34 Clues: an extra copy of data on a computer • combining 2 or more functions in a unit • short-range wireless interconnection of devices • cause to occur or operate at the same time or rate • an application, downloaded usually by a mobile user • a piece of electronic equipment for playing games on • a group or system of interconnected people or things • ...
Cyber and Digital Literacy 2024-04-30
Across
- an electronic device that manipulates information or data
- knowledge obtained from investigation, study, or instruction.
- use learning technologies in a variety of different contexts.
- is to digital media.
- a reference (an address) to a resource on the internet.
- to connect with friends, work, colleagues or people they don't know online.
- exchange information and ideas in virtual communities and networks.
- is a wireless, portable personal computer with a touchscreen interface
- an online tool for teachers to give quizzes and on the fly assessments to students.
- individual is he/she who possesses a range of digital skills.
- the use of technology to harass, threaten, embarrass, or target another person.
- is a tool that delivers and presents questions to students.
- the communication outlets or tools used to store and deliver information or data.
- refers to a collection of webpages you can view using internet and a browser.
- a free sharing tool perfect for clipping, curating, and sharing content.
- is a small portable personal computer.
- a vast network that connects computers all over the world.
- TED's youth and education initiative.
- is the sending and receiving of information.
- also known as “Facebook for school.”
Down
- embedding media content in images and videos.
- is complex and multifaceted.
- a free video sharing website that makes it easy to watch online videos.
- to develop an understanding of online security, identity and data management in our own literacy practices
- is a type of digital literacy and it refers both to the individuals capacity of synthesis and critical thinking.
- the ability to read, interpret, and understand information presented in pictorial or graphic images.
- is a free, cloud-based 3D CAD Software package for students.
- is a handheld electronic device that provides a connection to a cellular network and the internet.
- provider of a presentation design tool for the creative community.
- also known as digital literacy.
- is an easy to use learning portfolio application.
- is a powerful community based social tool for learning.
- handy management and messaging tool helps recognize. reward students.
- the capacity to use computer technology successfully while also understanding the consequences of those actions.
- enable students to produce short animated narrated explainer videos.
- engaging and interactive game.
- you can literally learn anything.
- presentations are nothing like your traditional presentations.
- the use of scientific knowledge for practical purposes or applications, whether in industry or in our everyday lives.
- increasing access to high quality educational materials for K-12 students all over the world.
- entails taking responsibility for ones role in cyberspace.
- is a digital tool for designing visual stories.
- is a sneaky or dishonest plan that's meant to con someone.
- a free photo and video sharing app.
- possesses critical thinking skills in understanding all sociatal issues raised by digital technologies.
- qualities that a person is expected to have as a responsible member of digital community.
- to connect people and allow people to share their thoughts with a big audience.
- only teach programming concepts.
- create and share videos with your class, with parents, and beyond.
- encompassesa wide range of criminal activities that are carried out using digital devices and/or networks.
50 Clues: is to digital media. • is complex and multifaceted. • engaging and interactive game. • also known as digital literacy. • only teach programming concepts. • you can literally learn anything. • a free photo and video sharing app. • also known as “Facebook for school.” • TED's youth and education initiative. • is a small portable personal computer. • ...
Cyber and Digital Literacy 2024-04-30
Across
- handy management and messaging tool helps recognize. reward students.
- to connect with friends, work, colleagues or people they don't know online.
- engaging and interactive game.
- individual is he/she who possesses a range of digital skills.
- create and share videos with your class, with parents, and beyond.
- is a handheld electronic device that provides a connection to a cellular network and the internet.
- is the sending and receiving of information.
- is to digital media.
- is a sneaky or dishonest plan that's meant to con someone.
- the communication outlets or tools used to store and deliver information or data.
- is a wireless, portable personal computer with a touchscreen interface.
- refers to a collection of webpages you can view using internet and a browser.
- provider of a presentation design tool for the creative community.
- is a powerful community based social tool for learning.
- a complex and multifaceted.
- presentations are nothing like your traditional presentations.
- enables students to produce short, animated narrated explainer videos.
- to connect people and allow people to share their thoughts with a big audience.
- the capacity to use computer technology successfully while also understanding the consequences of those actions.
- a free video sharing website that makes it easy to watch online videos.
- increasing access to high quality educational materials for K-12 students all over the world.
- to develop an understanding of online security, identity and data management in our own literacy practices
Down
- is a type of digital literacy and it refers both to the individuals capacity of synthesis and critical thinking.
- an online tool for teachers to give quizzes and on the fly assessments to students.
- a free photo and video sharing app.
- the use of scientific knowledge for practical purposes or applications, whether in industry or in our everyday lives.
- encompasses a wide range of criminal activities that are carried out using digital devices and/or networks.
- a vast network that connects computers all over the world.
- only teach programming concepts.
- embedding media content in images and videos.
- is a tool that delivers and presents questions to students.
- a free sharing tool perfect for clipping, curating, and sharing content.
- qualities that a person is expected to have as a responsible member of digital community.
- is an easy to use learning portfolio application.
- you can literally learn anything.
- is a small portable personal computer.
- the use of technology to harass, threaten, embarrass, or target another person.
- also known as digital literacy.
- the ability to read, interpret, and understand information presented in pictorial or graphic images.
- an electronic device that manipulates information or data.
- exchange information and ideas in virtual communities and networks.
- a reference (an address) to a resource on the internet.
- knowledge obtained from investigation, study, or instruction.
- also known as “Facebook for school.”
- is a digital tool for designing visual stories.
- TED's youth and education initiative.
- is a free, cloud-based 3D CAD Software package for students.
- use learning technologies in a variety of different contexts.
- possesses critical thinking skills in understanding all societal issues raised by digital technologies.
49 Clues: is to digital media. • a complex and multifaceted. • engaging and interactive game. • also known as digital literacy. • only teach programming concepts. • you can literally learn anything. • a free photo and video sharing app. • also known as “Facebook for school.” • TED's youth and education initiative. • is a small portable personal computer. • ...
Module 3 Crossword 2026-02-12
Across
- Saving files to optical media requires special _____ or OS capabilities.
- A slot on a computer where you can attach a peripheral device.
- Memory that loses its content when power is removed.
- A router used to send and receive signals without cables.
- Acts as an electronic switch that opens or closes the circuit for electrical charges.
- Face-to- interaction often decreases with excessive tech use.
- The unit that manages the flow of instructions within the processor.
- Component you should generally not clean yourself if it requires opening the case.
- A device connected to a network.
- Cyberbullying is considered just as _____ as other types of bullying.
- Technology used by optical media like CDs and DVDs.
- A processor's _____ speed is distinct from its word size.
- Acronym for the card necessary to connect a computer to a network.
- Phase of the machine cycle writing the result to memory.
- Devices that begin functioning properly as soon as you connect them.
- One reason optical media is declining is that discs can get .
- Software to allow a computer to issue controls to a peripheral device.
- An input device, unlike a printer or speaker.
- When you _____ an OS, settings revert to default or a previous version.
- A very short duration of voltage increase.
- Storage drive with no moving parts, often used in mobile devices.
- Touchpads and trackballs are examples of _____ devices.
- Computer parts contain _____ metals like lead and mercury.
- Storage medium that is NOT the most common for the OS (unlike magnetic/SSD).
- Device used to direct the flow of information along networks.
Down
- A surge _____ prevents power fluctuations from damaging components.
- Small networks do NOT require _____ hardware.
- No _____ law specifically addresses doxxing.
- On a desktop, the case is usually a _____ or system unit, not under the keyboard.
- Cyberbullying where private information is shared digitally.
- Network device that transfers data only to the intended recipient.
- To avoid RSI, arms should NOT be _____ to the floor.
- Standard cable connection for external hard drives.
- Device used to convert a paper image into an electronic file.
- A computer's _____ factor is its size and shape.
- Processors that can execute more than one instruction per clock cycle.
- A benchmark test determines this factor of a computer.
- Device used to connect a home network to an ISP.
- Computer type where the monitor and system unit are housed together.
- Malicious software, such as viruses and spyware.
- You should fully _____ the battery before using a device for the first time.
- Small piece of semiconducting material on which integrated circuits are etched.
- A DSL modem uses standard _____ telephone wiring.
- An _____ circuit contains microscopic pathways for electrical current.
- Small, high-speed storage locations within a processor.
- Connectivity capable of transmitting large amounts of data at high speeds.
- Applied science specifying the design and arrangement of items for safety.
- The smallest unit of data, a single 0 or 1.
- The primary responsibility of a CPU is to _____ input into output.
- Storage type that reduces the need for local storage on your computer.
50 Clues: A device connected to a network. • A very short duration of voltage increase. • The smallest unit of data, a single 0 or 1. • No _____ law specifically addresses doxxing. • Small networks do NOT require _____ hardware. • An input device, unlike a printer or speaker. • A computer's _____ factor is its size and shape. • Device used to connect a home network to an ISP. • ...
Digital Citizenship Vocabulary 2026-03-19
Across
- a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- false or inaccurate information
- the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility
- user-controlled options in software, apps, and social networks that manage how personal data is shared, stored, and accessed
- a branch of computer science that develops systems capable of performing tasks requiring human-like intelligence, such as learning, reasoning, problem-solving, perception, and decision-making
- a U.S. legal doctrine permitting limited, unlicensed use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research
- the unique, often permanent, trail of data you leave behind while using the internet
- the moral principles that govern how individuals and organizations operate
- the ability to understand and share the feelings of another.
- the unauthorized use or reproduction of another's work.
- time spent using a device such as a computer, television, or games console.
- a technology that overlays digital information—such as 3D models, images, or data—onto the real world in real-time, typically using smartphone cameras, tablets, or smart glasses
- any data that can identify, contact, or locate an individual, either on its own or when combined with other data.
- a behavioral disorder characterized by compulsive, excessive use of digital devices (smartphones, social media, gaming) that interferes with daily life, relationships, and responsibilities.
- the practice of taking someone else's work or ideas and passing them off as one's own.
- false, inaccurate, or misleading information deliberately created and spread to deceive, manipulate, or harm, rather than to inform
Down
- the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, or damage
- the process of converting readable information (plaintext) into an unreadable, scrambled format (ciphertext) using an algorithm and a cryptographic key
- a form of social engineering cyberattack where criminals impersonate reputable organizations or individuals via email, text, or phone to steal sensitive information like passwords, credit card numbers, or login credentials
- a person who is present at an event or incident but does not take part.
- the sum of all information, behaviors, and attributes—such as usernames, profiles, search history, and financial data—that represent an individual or entity on the internet
- the established standards of respectful, polite, and responsible behavior in online environments
- a precise, step-by-step set of instructions or rules followed to solve a specific problem or accomplish a task
- the ethical, safe, and accountable use of technology, focusing on managing one's digital footprint, respecting others' privacy, and ensuring secure online interactions
- the responsible, ethical, and safe use of technology, the internet, and digital devices
- a non-profit organization providing free, standardized, legal licenses that allow creators to share their work while retaining copyright
- a form of intellectual property law that protects original works of authorship—such as books, music, art, and software—the moment they are fixed in a tangible medium
- the use of digital devices (phones, computers, social media, gaming) to intentionally and repeatedly harass, threaten, humiliate, or target someone
- maintaining a healthy, intentional, and responsible relationship with technology, ensuring screen time does not negatively impact physical, mental, or social well-being
- the practice of engaging with technology, resources, or daily activities with conscious intention, awareness, and purpose, rather than acting on autopilot
30 Clues: false or inaccurate information • the unauthorized use or reproduction of another's work. • the ability to understand and share the feelings of another. • a person who is present at an event or incident but does not take part. • the moral principles that govern how individuals and organizations operate • ...
Cyber Sys Ops Block IV - Unit 6 2019-01-24
Across
- This wired IDS sits on AF networks "listening" for suspicious activity. Generates reports for the AFNOSC (acronym).
- Vulnerability scanners compare details about a targeted system against a list of known security ____.
- ____ devices pretend to be legitimate access points in order to gather information from those devices connecting to them.
- Wireless ____ tools are intended for attacking wireless access points.
- An ____ Intrusion Detection System is also known as an Intrusion Prevention System.
- NIDS cannot analyze ____ packets.
- SNORT is an ____ source Network-based Intrusion Detection and Prevention System.
- ____ NIDS abilities include detection of rogue devices and wireless attack tools.
Down
- ____ records attributes of the host computer's memory and then monitors it to ensure it hasn't been modified (acronym).
- Host-based Intrusion Detections Systems primarily use ____ installed on a specific host.
- A ____ Scanner is a software application designed to probe a server or host for open ports.
- ____ scanning software detects and classifies system weaknesses in computers & network devices. Run from an attacker's POV.
- The function of an IDS is to ___ network traffic and computer settings to detect patterns indicating known intrusion attempts
- An Intrusion Detection System scans, audits and monitors network infrastructure for signs of attacks in ____.
- A major drawback of ____ is it cannot analyze encrypted packets (acronym).
15 Clues: NIDS cannot analyze ____ packets. • Wireless ____ tools are intended for attacking wireless access points. • A major drawback of ____ is it cannot analyze encrypted packets (acronym). • SNORT is an ____ source Network-based Intrusion Detection and Prevention System. • ____ NIDS abilities include detection of rogue devices and wireless attack tools. • ...
COMMUNICATION - ENTERPRISE 2020-09-02
Across
- an individual who contributes fund to a limited company in return for shares in that company
- a summary of what has taken place at a meeting
- the provision of information about the date, time and place of a forthcoming meeting
- messages between people in an enterprise that are spoken, such as in face-to-face conversation
- the official channels of communication used within an enterprise
- messages between people on the same organisational level of an enterprise
- messages between people on different organisational levels of an enterprise ie upwards and downwards
- a yearly meeting of shareholders that a limited company is usually legally required to hold
Down
- the process of communication in a non-verbal way through conscious or unconscious gestures, movements and mannerisms
- messages between people in an enterprise that are actually written down, as in a letter
- the unofficial channels of communication used within an enterprise
- global system of interconnected computer networks that provides an extensive range of information resources and services
- a computer system that shares information resources and services within a particular enterprise
- a document that is written to provide information, analyse an issue and make recommendation.
- a list of items that will be discussed at a forthcoming meeting
15 Clues: a summary of what has taken place at a meeting • a list of items that will be discussed at a forthcoming meeting • the official channels of communication used within an enterprise • the unofficial channels of communication used within an enterprise • messages between people on the same organisational level of an enterprise • ...
Technology 2020-10-23
Across
- A group or system of interconnected people or things
- A machine resembling a human being and able to replicate certain human movements and functions automatically
- Tools, machinery, and other durable equipment
- A recording of moving visual images made digitally or on videotape
- A spoken message left by a caller on a voicemail system
- A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- A set of related web pages located under a single domain name, typically produced by a single person or organization
- The working or use of telephones
- The branch of physics and technology concerned with the design of circuits using transistors and microchips, and with the behaviour and movement of electrons in a semiconductor, conductor, vacuum, or gas
Down
- The programs and other operating information used by a computer
- the action or process of transmitting something, or the state of being transmitted
- A thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment
- art of sending out music or pictures through radio waves
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- Device for making calls
15 Clues: Device for making calls • The working or use of telephones • Tools, machinery, and other durable equipment • A group or system of interconnected people or things • A spoken message left by a caller on a voicemail system • art of sending out music or pictures through radio waves • The programs and other operating information used by a computer • ...
PALOLO 2021-03-29
Across
- Set of information found in a specific internet address.
- A secret word or phrase that must be used to gain admission to a place.
- An identification used by a person with access to a computer, network, or online service.
- A link from a hypertext document to another location, activated by clicking on a highlighted word or image.
- An extra part or extension that is or may be attached to something to perform a particular function.
- Allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet.
- Set of programs and routines that allow the computer to perform certain tasks.
Down
- It Is a web where you can find information.
- A network service that allows users to send and receive messages using electronic communication networks.
- Includes the message content and any attachments.
- Unsolicited messages, usually of an advertising nature.
- Graphical control element used in computer programs, such as file managers or web browsers, and on web sites.
- Is the introduction that identifies the emails intent.
- A symbol representing a smiling face that is used in written communication to indicate that the writer is pleased or joking.
- Is the area in which you enter important information above the email content area.
15 Clues: It Is a web where you can find information. • Includes the message content and any attachments. • Is the introduction that identifies the emails intent. • Unsolicited messages, usually of an advertising nature. • Set of information found in a specific internet address. • A secret word or phrase that must be used to gain admission to a place. • ...
Tecnology Baez, Falcon, Macchia. 2021-03-17
Across
- Set of information found in a specific internet address.
- A secret word or phrase that must be used to gain admission to a place.
- An identification used by a person with access to a computer, network, or online service.
- A link from a hypertext document to another location, activated by clicking on a highlighted word or image.
- An extra part or extension that is or may be attached to something to perform a particular function.
- Allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet.
- Set of programs and routines that allow the computer to perform certain tasks.
Down
- It Is a web where you can find information.
- A network service that allows users to send and receive messages using electronic communication networks.
- Includes the message content and any attachments.
- Unsolicited messages, usually of an advertising nature.
- Graphical control element used in computer programs, such as file managers or web browsers, and on web sites.
- Is the introduction that identifies the emails intent.
- A symbol representing a smiling face that is used in written communication to indicate that the writer is pleased or joking.
- Is the area in which you enter important information above the email content area.
15 Clues: It Is a web where you can find information. • Includes the message content and any attachments. • Is the introduction that identifies the emails intent. • Unsolicited messages, usually of an advertising nature. • Set of information found in a specific internet address. • A secret word or phrase that must be used to gain admission to a place. • ...
Digital citizenship 2017-09-07
Across
- The correct way to communicate on the internet.
- warning that people are dangerous to children and adults. It is an example of a panic that people experience regarding anyone that they are unfamiliar with.
- The knowledge of Maxamizing the users profile.
- The information of a person that is on the internet.(online activity)
- is freedom extended to all digital technology users, and the behavioral expectations that come with them, but they social media has privllages.
- You can put anything you want out in the open.
- An appropiate, rebonsible behavior to technology use.
- responsibility for actions, which is either ethical or unethical.
- Any copying of copyrighted done for a limited and “transformative” purpose, such as to comment upon,or criticize. That can be done without permission from the copyright owner.
Down
- Difficult to get.Strong by using upper case/lower case letters, and numbers.
- Research is a process of collecting, analyzing, and interpreting information in order to increase our understanding.
- Anything you have done onto a search
- A way to talk without talking in person.
- A person who sends messages that immates, or threats another person.
- Websites and networks, you can have a profile that defines you and you can see other people’s profiles.
15 Clues: Anything you have done onto a search • A way to talk without talking in person. • The knowledge of Maxamizing the users profile. • You can put anything you want out in the open. • The correct way to communicate on the internet. • An appropiate, rebonsible behavior to technology use. • responsibility for actions, which is either ethical or unethical. • ...
Texas History 2022-04-20
Across
- an economic model which states that the price at which a good is sold is determined by the good’s supply, and its demand.
- the single worldwide computer network that interconnects other computer networks, enabling data and other information to be exchanged.
- Offered by companies to the customers to provide utility and satisfy their wants.
- a period of temporary economic decline during which trade and industrial activities are reduced.
- Land: natural resources used for production; 2) Labor: human effort that assists in production; 3) Capital: man made resources used in the production process (factories, machinery, tools, equipment, raw materials, wealth); 4) Entrepreneur: person who decides what, where, and how to produce.
- first European to map coast of Texas
- Mexican. Was not a good person at all
- statistical data relating to the population and particular groups within it.
- Act of competing
Down
- a long and severe recession in an economy or market
- the process of increasing the percentage and number of people living in urban settlements.
- A financial gain
- an economic system in which private businesses operate in competition and largely free of state control.
- the domestic marketplace for goods and services operating within the borders of and governed by the regulations of a particular country.
- space comprising the earth’s atmosphere and the space beyond.
15 Clues: A financial gain • Act of competing • first European to map coast of Texas • Mexican. Was not a good person at all • a long and severe recession in an economy or market • space comprising the earth’s atmosphere and the space beyond. • statistical data relating to the population and particular groups within it. • ...
Information system MK&Partiban 2023-08-16
Across
- What technology connects up to 8 devices in a 10-meter area through low-power, radio-based communication?
- One of the IT infrastructure components?
- What are the small pieces of software designed to repair vulnerabilities or flaws in a program or system called?
- What is the ability of the system to expand to serve a large number of users without breaking down?
- What term describes the process of collecting user interaction data from web servers?
- What is the combination of hardware and software used to prevent unauthorized access to private networks called?
- What data can be accessed but not altered?
- One of the open source software(OSS)?
Down
- What term encompasses password systems, tokens, smart cards, biometric authentication, and two-factor authentication?
- What device is responsible for converting digital signals into analog form and vice versa?
- What is often referred to as the world's largest and most extensive network?
- What system is designed to capture and integrate customer data from various parts of an organization?
- What term describes the integration of social networking technologies into customer relationship management?
- What is the term for a CRM system that utilizes data warehouses fed by operational CRM systems and customer touch points?
- Specific characteristics of each quantity are called?
15 Clues: One of the open source software(OSS)? • One of the IT infrastructure components? • What data can be accessed but not altered? • Specific characteristics of each quantity are called? • What is often referred to as the world's largest and most extensive network? • What term describes the process of collecting user interaction data from web servers? • ...
Information Technology Career Cluster 2025-10-06
Across
- Part of a computer system that is designed to block unauthorized access
- A program used to view Web pages.
- unwanted e-mail (usually of a commercial nature sent out in bulk)
- a small amount of data generated by a website and saved by your web browse to remember information about you.
- helps increases or maintains the capabilities of a person with a disability
- the process of converting human instructions into a language that a computer can understand and follow
- a person who designs, writes and installs computer programs and applications
Down
- type of software that can process information on its own without human intervention.
- a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- Measures taken to protect a computer or computer system against unauthorized access or attack
- identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
- new technologies that aim to conserve the natural environment and resources.
- A global network connecting millions of computers, making it possible to exchange information.
- The amount of data that can be transmitted over a network in a given amount of time.
- the development, maintenance, and use of computer software, systems, and networks
15 Clues: A program used to view Web pages. • unwanted e-mail (usually of a commercial nature sent out in bulk) • Part of a computer system that is designed to block unauthorized access • helps increases or maintains the capabilities of a person with a disability • new technologies that aim to conserve the natural environment and resources. • ...
Cyber Ethics 2025-06-02
Across
- The act of harming or harrasing a person through informational technology in a deliberate manner
- a program or a set of programs wich disrupts the normal functioning of a device
- The practice of sending mails till the mail server gets full
- The legal right granted by the law to the creator for his orginal work
- Information about a person that exists on the internet because of his online activity
- The act of sending an email and misleading the user to belive it is from a trusted source
- An illegal intrusion into a computer or network without the user's notice
Down
- A criminal activity which involves the use of Compters,Networks and Intrnet connections with the intention to harm an individual or thier device
- The process of converting encrypted data into readable form
- A malicious technique of tricking a web user into clicking on somthing else from what the user precives he/she is clicking on
- The process of transforming data into unreadeable code
- Loading a single licenced copy of a software onto multiple computers contrary to licence's terms
- The act of copying or imitating another person's work as thier's
- A security system that prevents unauthourised people from accessing your system and network
- Unwanted bulk e-mails that come from unkown scources
15 Clues: Unwanted bulk e-mails that come from unkown scources • The process of transforming data into unreadeable code • The process of converting encrypted data into readable form • The practice of sending mails till the mail server gets full • The act of copying or imitating another person's work as thier's • ...
Vocabulary 2025-05-05
Across
- Obtaining input or information from a large number of people via the internet
- Scientific research conducted in whole or in part by amateur or nonprofessional scientists
- A set of rules governing the exchange or transmission of data between devices
- A problem-solving approach that finds a satisfactory solution where finding an optimal one is impractical
- The maximum amount of data that can be transmitted over a network in a given amount of time
- The time it takes for a data packet to travel from source to destination
- The system that translates human-readable website names into IP addresses
Down
- A system of interlinked hypertext documents and resources accessed through the internet
- The capacity for a system to handle growing amounts of work or accommodate growth
- The inclusion of extra components that can be used to maintain functionality if other components fail
- A method of reducing the size of data to save space or transmission time
- A global network that connects millions of private, public, academic, business, and government networks
- Data that provides information about other data, such as file size or date created
- A numeric system of base 2 that only uses combinations of the digits zero and one
- A unique string of numbers separated by periods used to identify devices on a network
15 Clues: A method of reducing the size of data to save space or transmission time • The time it takes for a data packet to travel from source to destination • The system that translates human-readable website names into IP addresses • Obtaining input or information from a large number of people via the internet • ...
POSC003 G1 Week 13 Quiz 2014-04-02
Across
- How rapidly a system and the units within it change
- What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
Down
- A term economists use to refer to situations where a product becomes more valuable once many people use it
- A state of the world involving networks of interdependence at multicontinental distances
- Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
- A term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
6 Clues: How rapidly a system and the units within it change • A state of the world involving networks of interdependence at multicontinental distances • A term economists use to refer to situations where a product becomes more valuable once many people use it • ...
Browsing Safely 2025-05-23
Across
- It is an act of harming and harassing using information technology in a deliberate manner
- It is used to conduct terrorism through the use of computers and internet in order to cause fear and panic
- It refers to an illegal entry into a computer system or network
Down
- It is a collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorised access
- It is a process of befriending children on social media to facilitate online or physical sexual abuse
- It is the short form of Vital Information Resources Under Seize
6 Clues: It is the short form of Vital Information Resources Under Seize • It refers to an illegal entry into a computer system or network • It is an act of harming and harassing using information technology in a deliberate manner • It is a process of befriending children on social media to facilitate online or physical sexual abuse • ...
Crossword about the World wide web 2021-07-15
Across
- It is a popularized file type due to its high standard of quality and easily downloadable size.
- defines the main content of the HTML document
- is a bitmap image format that was developed by a team at the online services provider CompuServe led by American computer scientist Steve Wilhite and released on 15 June 1987.
- allow web developers to arrange data into rows and columns.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- what is the <br> tag in html.
Down
- is a hypertext document provided by a website and displayed to a user in a web browser. A website typically consists of many web pages linked together in a coherent fashion.
- is a formal language comprising a set of strings that produce various kinds of machine code output.
- standard markup language for documents designed to
- defines the main content of the HTML document
10 Clues: what is the <br> tag in html. • defines the main content of the HTML document • defines the main content of the HTML document • standard markup language for documents designed to • allow web developers to arrange data into rows and columns. • It is a popularized file type due to its high standard of quality and easily downloadable size. • ...
Cyber security and EthicsCross Word 2023-08-25
Across
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- An area of data protection that concerns the proper handling of sensitive data
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
- Extortion software that can lock your computer and then demand a ransom for its release.
Down
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- Unsolicited messages sent in bulk by email
9 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
Hack Con Cyber Security 2022-04-01
Across
- authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence
- a network security device that monitors and filters incoming and outgoing network traffic
- a way of scrambling data so that only authorized parties can understand the information
- an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems
- wireless technology used to connect computers, tablets, smartphones and other devices to the internet
Down
- hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- malware that employs encryption to hold a victim's information for profit.
- a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
9 Clues: malware that employs encryption to hold a victim's information for profit. • a way of scrambling data so that only authorized parties can understand the information • a network security device that monitors and filters incoming and outgoing network traffic • ...
Unit 5.1 Describe the Possible Issues Arise from Organisation’s Social Media Platforms 2022-10-10
Across
- It refers to the response to current topics and trends while creating relevant and original content to interest their audience.
- When users post bad comments or reviews on the brand’s social media platforms. What is this issue known as?
- Leaks, harassment and hate speech belongs to which non-related topics?
- False context, imposter content, manipulated content and fabricated content belongs to which non-related topics?
- Resulted from brands which planned posts way ahead of time, and adopt a ‘set and forget’ style. What is this issue known as?
- When users were unable to access, load their newsfeed, send messages due to the website server is facing downtime. What is this issue known as?
Down
- Wrong information are conveyed to customers, this issue is known as?
- Contents such as posts, reviews, pictures and more; that is created and shared by any users via social media networks is known as___.
- False connection and Misleading information belongs to which non-related topics?
9 Clues: Wrong information are conveyed to customers, this issue is known as? • Leaks, harassment and hate speech belongs to which non-related topics? • False connection and Misleading information belongs to which non-related topics? • When users post bad comments or reviews on the brand’s social media platforms. What is this issue known as? • ...
Social media 2022-11-04
Across
- A person who deliberately starts arguments in the comments sections of sites
- Articles with headlines that make you want to click through and read. They usually don't live up to your expectations.
- A word, phrase or topic that is popular on Twitter at any given moment.
- A word or group of words that starts with the sign (#) and is used to group together similar ideas and topics
- Anything that is shared in social networks and gets passed along to many people very rapidly
Down
- User on social media who has subscribed to see your posts in their feed
- Ignoring someone and giving attention to your mobile phone instead
- A website or computer program that allows people to communicate and share information on the internet using a computer or mobile phone
- Someone who voices negative opinions about other people. It might be inspired by jealousy or boredom.
9 Clues: Ignoring someone and giving attention to your mobile phone instead • User on social media who has subscribed to see your posts in their feed • A word, phrase or topic that is popular on Twitter at any given moment. • A person who deliberately starts arguments in the comments sections of sites • ...
Propagandizing Words 2013-05-15
Across
- A usually short communication transmitted by words, signals, or other means from one person, station, or group to another
- The art and technique of using words effectively to impart information or ideas
- The act or process of buying and selling in a market
- It is a way to promote some sort of company, political party, etc
- A belief or conclusion held with confidence but not substantiated by positive knowledge or proof
- A way of spreading information via technology
- Serving to inform; providing or disclosing information; instructive, propaganda’s goal
- To influence or manage shrewdly or deviously, in this case, propaganda
Down
- An object of criticism or attack
- Tending or having the power to persuade, very often, is used to describe propaganda
- The way propaganda is used now days, a synonym of this word is practically
- Something that has been organized or made into an ordered whole
- An interconnected system of networks that connects computers around the world via the TCP/IP protocol. The use of propaganda is new to this system
- The act of manifesting; usually the result of false propaganda in communist societies
- A piece of unverified information of uncertain origin usually spread by word of mouth
- a short message or commercial, especially a commercial spoken on radio or television
- One who is actively involved in manipulating propaganda and media advertisements
17 Clues: An object of criticism or attack • A way of spreading information via technology • The act or process of buying and selling in a market • Something that has been organized or made into an ordered whole • It is a way to promote some sort of company, political party, etc • To influence or manage shrewdly or deviously, in this case, propaganda • ...
Computer and Technical Terms 2016-02-22
Across
- A compnent that stores data so future requests for that data can be served faster
- adress Each computer connected to the Internet is given a unique address called.
- The amount of copies that can be made of a project.
- Communication that both the sender and the receiver are active at the same time
- Is a suffix to the name of a computer file applied to indicate the encoding of its contents or usage.
- A website that is considerably greater in sized is referred to being?
- Using neutral rather than subjective, boastful, or exaggerated language.
- The idea of using about half the word count as the controlled condition.
- The codes or tags that browsers use to create web pages.
- Performing, participating, encouraging, or concealing any unauthorized use or attempts of unauthorized use of UT IT resources
- The html file you are creating and the picture you are using for your website must be in the same?
Down
- Communication where the sending and receiving occur at different times.
- Company that helps build large websites.
- May result in termination of access, disciplinary review, expulsion, termination or other appropriate disciplinary action.
- The main technology for local area networks
- Can be used to create web pages online
- The amount of images from one artist or photographer allowed on a web page
17 Clues: Can be used to create web pages online • Company that helps build large websites. • The main technology for local area networks • The amount of copies that can be made of a project. • The codes or tags that browsers use to create web pages. • A website that is considerably greater in sized is referred to being? • ...
Social media 2025-04-02
Across
- The continuously updated page you see on a social media website. Content is renewed automatically every time you refresh
- Short for Graphics Interchange Format.
- Social media platform created in 2007
- The group of people who can see the content you share online.This includes your followers who can like, comment, or share your content.
- Feedback after purchasing a product.
- Also called sharing.Sending content originally posted by another user.
- A photo you have taken of yourself.
- Social media platform where you can send messages and pictures that disappear after seeing them.
Down
- The images, photos and videos, or texts shared on the internet to spread a specific idea, style, or behavior.
- In social media content, creators can use specific words or pictures to attract the users’ attention and prompt them into clicking on their links
- A person who can see and react the content you share on your social media.
- The time you spend searching for particular information. You use your web browser.
- It holds the list of emails or messages you received from other users.
- The unpermitted access to and control over a computer system, often for the purpose of stealing or destroying it.
- The information, products, videos, and all the data you share on your social networks
- Social media platform created in 2010
- If a topic, video, or another type of content marketing is.....
17 Clues: A photo you have taken of yourself. • Feedback after purchasing a product. • Social media platform created in 2007 • Social media platform created in 2010 • Short for Graphics Interchange Format. • If a topic, video, or another type of content marketing is..... • It holds the list of emails or messages you received from other users. • ...
Organizations 2019-06-04
Across
- One of 27 institutes and centers that make up the National Institutes of Health
- A nonprofit academic medical center based in Rochester, Minnesota
Down
- Its mission is to develop national networks of volunteers capable of responding to both acute and chronic conditions that arise within our society
- Is also one of the 4 major style guides for academic papers
4 Clues: Is also one of the 4 major style guides for academic papers • A nonprofit academic medical center based in Rochester, Minnesota • One of 27 institutes and centers that make up the National Institutes of Health • Its mission is to develop national networks of volunteers capable of responding to both acute and chronic conditions that arise within our society
Spreadsheets 2024-10-17
Across
- Created without your direct input, like websites collecting your data.
- Refers to a state of being connected to or available through the internet. It involves the use of digital networks to access, share, or interact with information, services, and people in a virtual environment.
- The trail you leave by choice, like posts on social media.
Down
- a trail you leave behind in the digital world.
- to provoke someone to react angrily.
- The action of alerting the platform administrators or moderators about content or behavior that violates the platform’s rules or guidelines. This could include things like harassment, hate speech, false information, or inappropriate content.
- the right to keep personal information to ourselves.
- Groups of people who share common interests, goals, or characteristics and interact with each other to exchange information, support, or ideas.
- Digital platforms and tools that allow users to create, share, and interact with content and with other users.
9 Clues: to provoke someone to react angrily. • a trail you leave behind in the digital world. • the right to keep personal information to ourselves. • The trail you leave by choice, like posts on social media. • Created without your direct input, like websites collecting your data. • ...
watermelon🐢🍪🧋 2022-05-05
Across
- She learned at Cambridge that in Greek tragedy there was one protagonist, and one deuteragonist
- The same cast of mind also tended to seek simple, universal formulae to resolve any problem, no matter how complex.
- An oral, poorly absorbed opioid antagonist, such as naloxone, can be helpful when usual laxatives are not working.
Down
- i was in search of migrant birds and I discovered sand martins and my first common sandpiper of the year
- All this variability can leave you feeling part introvert, part extrovert, part ambivert.
- The English are very strict on their anti-rabies regulations and sometimes keep animals in quarantine for six months.
- Many ethnographers have noted the importance of food and drink for maintaining familiar forms and social networks among immigrant populations.
- He arrived in Scotland as a refugee and has lived in the Glasgow area ever since.
- We empathize with others and often respond with emotion to their condition.
9 Clues: We empathize with others and often respond with emotion to their condition. • He arrived in Scotland as a refugee and has lived in the Glasgow area ever since. • All this variability can leave you feeling part introvert, part extrovert, part ambivert. • She learned at Cambridge that in Greek tragedy there was one protagonist, and one deuteragonist • ...
Automation and IT 2024-12-04
Across
- ______ includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.
- _____ The application of scientific knowledge for practical purposes, especially in industry.
- ______ Technological adaptation wherein technologically less advance countries or places need To adapt and find solutions into their problems
- _____ Transforming the way data is being handled, processed, and delivered from millions of devices around the world
Down
- _____ preventing harmful attacks on computers, servers, mobile devices, electronic systems, networks, and data.
- _________ the process of creating software and systems to replace repeatable processes and reduce manual intervention.
- _____ a crime committed with or through the use of information and communication technologies such as radio, television, cellular phone, computer and network, and other communication device or application.
- _________is a specific type of automation where the machine that is being controlled has particular traits that make it resemble human beings.
- _________ system for storing data that makes it difficult orimpossible to alter, corrupt, or deceive.
9 Clues: _____ The application of scientific knowledge for practical purposes, especially in industry. • _________ system for storing data that makes it difficult orimpossible to alter, corrupt, or deceive. • ______ includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. • ...
Crossword Puzzle 2022-09-30
Across
- system that delivers content or services to end users over the internet. A web server consists of a physical server
- software or hardware that can be configured to block data from certain locations, applications, or ports while still allowing
Down
- network device that both modulates and demodulates analog carrier signals (called sine waves) for encoding and decoding digital
- processes on external networks or those that are hosted or Internet
- high-speed device that receives incoming data packets and redirects them to their destination
5 Clues: processes on external networks or those that are hosted or Internet • high-speed device that receives incoming data packets and redirects them to their destination • system that delivers content or services to end users over the internet. A web server consists of a physical server • ...
Data Protection 2018 2018-10-15
Across
- Share and Control Information Appropriately. Watch what you share on [ ] networks and share company information based on "need to know".
- Protect Company [ ] and Devices. Label documents with AIP. Spot phisling scams. Report Lost or stolen Data.
- Protect Your [ ]. Never share your passwords and don't reuse work passwords for personal accounts.
Down
- Use Approved [ ] and Services. Classify and label your files. Use Box to share and collaborate on documents. Don't use unapproved apps.
- [ ] Security Questions or Concerns. Report phishing scams to phish@coca-cola.com
5 Clues: [ ] Security Questions or Concerns. Report phishing scams to phish@coca-cola.com • Protect Your [ ]. Never share your passwords and don't reuse work passwords for personal accounts. • Protect Company [ ] and Devices. Label documents with AIP. Spot phisling scams. Report Lost or stolen Data. • ...
Historic Figures 2026-02-23
Across
- One of ancient Egypt’s first female pharaohs who ruled successfully and expanded trade networks.
- Last ruler of ancient Egypt who used political strategy and alliances with Rome to maintain power.
Down
- Colombian independence spy who gathered intelligence against Spanish rule and became a national heroine.
- Teenager who claimed divine visions, led French troops in battle, and was later declared a saint.
- Egyptian queen known for religious reforms and for one of the most famous ancient sculptures ever discovered.
5 Clues: One of ancient Egypt’s first female pharaohs who ruled successfully and expanded trade networks. • Teenager who claimed divine visions, led French troops in battle, and was later declared a saint. • Last ruler of ancient Egypt who used political strategy and alliances with Rome to maintain power. • ...
IPPS-G4 Week 13 2017-03-23
Across
- A state of the world involving networks of interdependence at multicontinental distances
- How rapidly a system and the units within it change
- A term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
Down
- What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
- Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
- A term economists use to refer to situations where a product becomes more valuable once many people use it
6 Clues: How rapidly a system and the units within it change • A state of the world involving networks of interdependence at multicontinental distances • A term economists use to refer to situations where a product becomes more valuable once many people use it • ...
IPPS Quiz Week 13 2013-11-11
Across
- how rapidly a system and the units within it change
- a state of the world involving networks of interdependence at multicontinental distances
Down
- Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
- a term economists use to refer to situations where a product becomes more valuable once many people use it
- What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
- a term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
6 Clues: how rapidly a system and the units within it change • a state of the world involving networks of interdependence at multicontinental distances • a term economists use to refer to situations where a product becomes more valuable once many people use it • ...
science 2023-10-27
Across
- definition: Organisms that live on or in another organism (the host) and feeds on it
- definition: Models That show how food energy passes from organism to organisms
- Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
- Definition: Networks of interconnected Food chains In an ecosystem
- Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
- definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything
6 Clues: Definition: Networks of interconnected Food chains In an ecosystem • definition: Models That show how food energy passes from organism to organisms • definition: Organisms that live on or in another organism (the host) and feeds on it • ...
science 2023-10-27
Across
- definition: Organisms that live on or in another organism (the host) and feeds on it
- definition: Models That show how food energy passes from organism to organisms
- Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
- Definition: Networks of interconnected Food chains In an ecosystem
- Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
- definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything
6 Clues: Definition: Networks of interconnected Food chains In an ecosystem • definition: Models That show how food energy passes from organism to organisms • definition: Organisms that live on or in another organism (the host) and feeds on it • ...
science 2023-10-27
Across
- definition: Organisms that live on or in another organism (the host) and feeds on it
- definition: Models That show how food energy passes from organism to organisms
- Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
- Definition: Networks of interconnected Food chains In an ecosystem
- Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
- definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything
6 Clues: Definition: Networks of interconnected Food chains In an ecosystem • definition: Models That show how food energy passes from organism to organisms • definition: Organisms that live on or in another organism (the host) and feeds on it • ...
Developer Security Crossword 2022-04-21
Across
- an open-source system first developed by Google for for automating software deployment, scaling, and management.
- an approach to software development where software is composed of small independent services that communicate over well-defined APIs.
Down
- the grading score of an enterprise's networks, information, and systems based on information security resources.
- a process in which you assume the role of an attacker to uncover vulnerabilities within your own software.
- a computer-software vulnerability that is unknown to those responsible for the software.
5 Clues: a computer-software vulnerability that is unknown to those responsible for the software. • a process in which you assume the role of an attacker to uncover vulnerabilities within your own software. • the grading score of an enterprise's networks, information, and systems based on information security resources. • ...
IP Addressing 2016-03-10
Across
- A method of expressing a network prefix (/)
- Addresses between 224.0.0.0 – 239.255.255.255
- The first IP address within a network that has all 0’s in the host portion.
- A broadcast that is sent to a specific network or series of networks. Uses the address 255.255.255.255
- An IP address that does not have to be globally unique and is not routable on the Internet.
- A method of assigning IPv4 addresses which requires that addresses within the same class must use the same subnet mask.
- An IP address that is globally unique and routable on the Internet.
- A method used to determine the network portion of an IP address by comparing the binary values.
- Address between network and broadcast.
Down
- The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes
- Last IP address within a network that has all 1’s in the host portion
- A more efficient way of assigning addresses that allows the use of multiple subnet masks within the same IPv4 address class.
- The number of binary ones in the subnet mask
- Describes IPv4 packets sent to all hosts in a particular network. Uses the broadcast address of that network.
- A group of 8 binary bits
15 Clues: A group of 8 binary bits • Address between network and broadcast. • A method of expressing a network prefix (/) • The number of binary ones in the subnet mask • Addresses between 224.0.0.0 – 239.255.255.255 • An IP address that is globally unique and routable on the Internet. • Last IP address within a network that has all 1’s in the host portion • ...
Module 3 Crossword 2019-04-19
Across
- This word is short for binary digit and is the smallest unit of data represented in a computer.
- This acts as a bridge and takes data from one system and plugs that data into another.
- This system locates data that is stored in primary or secondary storage.
- System _________ is the combining of the various subsystems into one larger system and ensuring that the subsystems function together as a whole.
- When evaluating the training, this evaluates what the trainees thought about the training.
- This standard method for network management is used to manage small networks and is a simple network solution that does not require a server.
- This country represses what its citizens can read on the web.
Down
- How a network is organized or laid out is referred to as its _________.
- In a project plan, this phase prepares the facility for the conversion from the old system to the new.
- Whether new services or new clinics will be implemented is an example of _________ scanning.
- Evaluating the way the facility does business in order to improve efficiency is known as _________.
- CPU is considered the _________ of the computers.
- The Open Systems Interconnection (OSI) is composed of how many layers?
- This IP address is temporary and changes periodically.
- This was the first standard protocol for communication between EHR components.
15 Clues: CPU is considered the _________ of the computers. • This IP address is temporary and changes periodically. • This country represses what its citizens can read on the web. • The Open Systems Interconnection (OSI) is composed of how many layers? • How a network is organized or laid out is referred to as its _________. • ...
Caslin_Hiring vacab 2024-02-22
Across
- the process of establishing employees' roles and responsibilities.
- a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts.
- a permanent decrease in the total number of workers a company employs.
- the means of interactions among people in which they create share and or exchange information and ideas in virtual communities and networks.
- the process of identifying attracting interviewing selecting hiring and onboarding employees.
- the total amount of sales you make over a set period.
- a quick summary of a person's relevant education and experiences.
- to give up a job or position by telling your employer that you are leaving.
- someone who can answer questions about your work history skills abilities and work style.
- to encourage people to like buy use do or support something.
Down
- learning how to do the job or do the job better while in the role.
- coordinating managing and allocating human capital or employees in ways that move an organization's goals forward.
- a person or business that employs one or more people especially for wages or salary.
- your application must have made a good impression.
- the end of an employee's work with a company.
15 Clues: the end of an employee's work with a company. • your application must have made a good impression. • the total amount of sales you make over a set period. • to encourage people to like buy use do or support something. • a quick summary of a person's relevant education and experiences. • learning how to do the job or do the job better while in the role. • ...
Caslin_Hiring vacab 2024-02-22
Across
- the process of establishing employees' roles and responsibilities.
- a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts.
- a permanent decrease in the total number of workers a company employs.
- the means of interactions among people in which they create share and or exchange information and ideas in virtual communities and networks.
- the process of identifying attracting interviewing selecting hiring and onboarding employees.
- the total amount of sales you make over a set period.
- a quick summary of a person's relevant education and experiences.
- to give up a job or position by telling your employer that you are leaving.
- someone who can answer questions about your work history skills abilities and work style.
- to encourage people to like buy use do or support something.
Down
- learning how to do the job or do the job better while in the role.
- coordinating managing and allocating human capital or employees in ways that move an organization's goals forward.
- a person or business that employs one or more people especially for wages or salary.
- your application must have made a good impression.
- the end of an employee's work with a company.
15 Clues: the end of an employee's work with a company. • your application must have made a good impression. • the total amount of sales you make over a set period. • to encourage people to like buy use do or support something. • a quick summary of a person's relevant education and experiences. • learning how to do the job or do the job better while in the role. • ...
Technology 2023-06-18
Across
- Short for "application," it refers to a software program designed for a specific purpose or task.
- A software application used to access and view websites on the internet.
- Electronic mail sent and received through computer networks, allowing for quick communication.
- The physical components of a computer system, such as the processor, memory, and storage.
- A machine that can store, process, and retrieve information and perform tasks.
- A global network that connects computers and allows communication and information sharing.
- The process of creating instructions or programs that tell a computer what to do.
Down
- A mobile phone that can also perform various functions like internet browsing and app usage.
- A secret combination of characters used to gain access to a computer or online account.
- Programs and applications that run on a computer and perform specific tasks.
- A camera that captures video and sends it over the internet in real time.
- A collection of web pages accessed through the internet and organized under a domain name.
- A portable device with a touchscreen interface that allows for browsing and multimedia usage.
- A wireless networking technology that allows devices to connect to the internet without using cables.
- The branch of technology that deals with the design, construction, and operation of robots.
15 Clues: A software application used to access and view websites on the internet. • A camera that captures video and sends it over the internet in real time. • Programs and applications that run on a computer and perform specific tasks. • A machine that can store, process, and retrieve information and perform tasks. • ...
CSP Unit 1 Review 2024-01-09
Across
- Error from attempting to represent a number that is too large.
- a named reference to a value that can be used repeatedly throughout a program.
- A way of representing information using only two options.
- Error Error from attempting to represent a number that is too large.
- the practice of obtaining input or information from a large number of people via the Internet.
- an ordered sequence of characters.
Down
- An agreed-upon set of rules that specify the behavior of some system
- data about data
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
- Value a data type that is either true or false.
- associated with an action and supplies input data to a program. Can be generated when a key is pressed, a mouse is clicked, a program is started, or by any other defined action that affects the flow of execution.
- a collection of program statements. Programs run (or “execute”) one command at a time.
- a relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.
- Finding and fixing problems in an algorithm or program.
- a computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
15 Clues: data about data • an ordered sequence of characters. • Value a data type that is either true or false. • Finding and fixing problems in an algorithm or program. • A way of representing information using only two options. • Error from attempting to represent a number that is too large. • An agreed-upon set of rules that specify the behavior of some system • ...
U.S. and Canada 2022-10-19
Across
- farming A farming method used in dry regions in which crops are grown that rely only on the natural precipitation
- A large population concentration made up of several large and many smaller cities, such as the area between Boston and Washington D.C.
- A high point or ridge that determines the direction rivers flow
- A small river or stream that feeds into a larger river
- Public services or systems such as power, water, sewage, transportation, communication, networks, school, and healthcare
- The source of a stream or river
- Economy that emphasizes services and technology rather than industry and manufacturing
Down
- Movement towards cities
- line A boundary in the eastern United States where higher land of the Piedmont drops to the lower Atlantic Coastal Plain
- A mild climate region in the southern and southwestern portions of the United States
- A channel or pipeline for carrying a large quantity of flowing water
- A large, powerful windstorm that forms over warm ocean waters
- belt A farming method used in dry regions in which crops are grown that rely only on the natural precipitation
- fuel A resource formed in the Earth by plant and animal remains
- Sprawl The unplanned and uncontrollable spread of urban settlements into neighboring regions
15 Clues: Movement towards cities • The source of a stream or river • A small river or stream that feeds into a larger river • A large, powerful windstorm that forms over warm ocean waters • A high point or ridge that determines the direction rivers flow • fuel A resource formed in the Earth by plant and animal remains • ...
Safe Surfing and Computer Component Study Guide 2022-08-15
Across
- this is the second step done to the input information and is needed for a computer to give an output.
- the __________ System: master program that manages how software uses the hardware of a computer
- this is the first step needed for a computer to give an output
- an attack when a hacker sends a fake email to steal login credentials
- hacker a person who tries to find network vulnerabilities to help fix the problem and prevent actual cyberattacks
- attacks include Trojan, adware, and spyware
- physical devices like circuits, chips, wires, speakers, plugs, and more
Down
- all of the computer programs, or code. It includes things like apps, games, websites, maps, and more
- this is the last step after a computer receives input, stores information, and processes the information
- an attack when the hacker gains access to the information path between the user and website. This commonly happens with unsecured Wi-Fi networks and malware
- code that is the most basic form of software and controls all the hardware of a computer
- this occurs after the information is stored.
- the ______________ processing unit that calculates information
- an attack when someone tries to guess your password
- the person who carries out a cyberattack
15 Clues: the person who carries out a cyberattack • attacks include Trojan, adware, and spyware • this occurs after the information is stored. • an attack when someone tries to guess your password • this is the first step needed for a computer to give an output • the ______________ processing unit that calculates information • ...
Cyber Security 2025-12-02
Across
- Employees using unauthorized apps/services that create security gaps.
- Corrupting the training data of an AI system so it learns harmful or incorrect behaviour.
- Attacks exploiting vulnerabilities that the software creator doesn't know about yet.
- Networks of compromised devices used for spam, DDoS attacks, etc.
- Employees or contractors misusing access intentionally or accidentally.
- Slightly modified inputs (images, text, audio) designed to fool AI models into misclassifying things.
- Forcing an AI system to ignore instructions and output harmful or unintended content.
- Using leaked passwords from one website to log into another (because people reuse passwords).
- Using manipulated audio/video to impersonate someone and deceive victims.
- Hiding malicious data (scripts, payloads, commands) inside images, audio files, or other media so it passes undetected.
Down
- Intercepting communication between two parties to steal or modify data.
- Attacking a vendor or service that a company trusts, and spreading malware through legitimate updates.
- Attempts to bypass safety filters in AI systems using carefully designed prompts or exploits.
- Fake emails or messages designed to steal credentials or install malware.
- Trying to clone a machine learning model by repeatedly querying it and recreating it elsewhere.
15 Clues: Networks of compromised devices used for spam, DDoS attacks, etc. • Employees using unauthorized apps/services that create security gaps. • Intercepting communication between two parties to steal or modify data. • Employees or contractors misusing access intentionally or accidentally. • Fake emails or messages designed to steal credentials or install malware. • ...
Workplace Readiness Crossword Puzzle (CS) 2025-09-10
Across
- something that furnishes proof
- a website that allows people of similar interests to interact and exchange information that is typically personal
- The ability to think clearly and rationally, understanding the logical connection between ideas.
- data converted into a meaningful and useful context
- The process of finding solutions to difficult or complex issues.
- unbiased; neutral
- Shares responsibility for collaborative work and respects the thoughts, opinions, and contributions of other team members.
- the unethical distribution of mass digital messages.
- malware that spreads by users from an infected device to the rest of the devices on a network/system.
Down
- the protection of information systems against unauthorized access (e.g., hacking, identity theft).
- pretending to be someone you trust or a system you work with, to get you to visit a fictitious site and enter your login or other private info
- Understands basic Internet and email safety and follows workplace protocols to maintain the security of information, computers, networks, and facilities.
- The process of assessing or judging the value or quality of something.
- a type of virus that does not rely on users to copy and spread but can replicate itself, once inside a network/system.
- connected with or related to the matter at hand
15 Clues: unbiased; neutral • something that furnishes proof • connected with or related to the matter at hand • data converted into a meaningful and useful context • the unethical distribution of mass digital messages. • The process of finding solutions to difficult or complex issues. • The process of assessing or judging the value or quality of something. • ...
the internetttttt 2022-05-03
Across
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- short for internet service provider.
- a networking device that forwards data packets between computer networks
- the chief support of a system or organization.
Down
- a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.
- copy (data) from one computer system to another, typically over the internet.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.
9 Clues: short for internet service provider. • the chief support of a system or organization. • a networking device that forwards data packets between computer networks • copy (data) from one computer system to another, typically over the internet. • a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment. • ...
nervous system 2017-03-22
Across
- bundles of fibers that transmit impulses of sensation to the brain
- the main trunk of the brain continuing downward to form the spinalcord
- a feeling of being worried
- the network of nerve cells and fibers that transmits nerve impulses between parts of the body.
- a short branched extension of a nerve cell
- a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
Down
- the long threadlike part of a nerve cell along which impulses are conducted from the cell body to other cells.
- the principal and most anterior part of the brain
- an action that is performed as a response to a stimulus and without conscious thought.
- the part of the nervous system responsible for control of the bodily functions
- a specialized cell transmitting nerve impulses; a nerve cell.
- the part of the brain at the back of the skull in vertebrates. Its function is to coordinate and regulate muscular activity.
- the other half next to the spinal cord
- a junction between two nerve cells
- the cylindrical bundle of nerve fibers and associated tissue that is enclosed in the spine and connects nearly all parts of the body to the brain
15 Clues: a feeling of being worried • a junction between two nerve cells • the other half next to the spinal cord • a short branched extension of a nerve cell • the principal and most anterior part of the brain • a specialized cell transmitting nerve impulses; a nerve cell. • bundles of fibers that transmit impulses of sensation to the brain • ...
Computer 2021-12-10
Across
- unit The part of the computer that holds all the electronic parts which includes the CPU or brains of the computer.
- An output device that displays what you are doing on the computer.
- A contraction of "Binary Digit". A bit is the single unit of information in a computer, typically represented as a 0 or 1.
- An electronic machine that processes, stores data, and does calculations.
- A program that accesses and displays files and other data available on the Internet and other networks.
- a peripheral input device modeled after the typewriter keyboard
- Carries out the instructions given to the computer.
Down
- A procedure for solving a mathematical problem in a finite number of steps that frequently involves repetition of an operation; broadly: a step-by-step method for accomplishing some task.
- a group of 8 bits
- An output device that can print what is on the monitor on paper.
- A circuit board that contains all of the computer system's main components
- an electro-mechanical data storage device that stores and retrieves digital data
- the part of a computer (a microprocessor chip) that does most of the data processing
- hand-held pointing device
- Computer location where instructions and data are stored on a temporary basis. This memory is volatile.
15 Clues: a group of 8 bits • hand-held pointing device • Carries out the instructions given to the computer. • a peripheral input device modeled after the typewriter keyboard • An output device that can print what is on the monitor on paper. • An output device that displays what you are doing on the computer. • ...
Communication Lesson 1 2023-01-15
Across
- a company that provides access to the internet.
- It is a computer system that hosts Websites and send you the web page you requested to see.
- The protocol allows you to upload and download files.
- Top level domain for a medium sized insurance business.
- The build-in connections that give you more information, and when your pointer changes from an arrow to a hand when you hover over a link.
- Domains that are at the highest level in the Domain Name System, such as .com, .edu, .org, .gov, .net
- The type of cable uses light pulses to send data.
- The signals Wireless Fidelity (Wi-Fi) uses to connect to the network.
Down
- A worldwide network of interconnected networks
- It is a computer software application that accesses and displays web pages, and you should use it to research information for your class project.
- A text-based address that points to a specific page on the internet.
- A number that uniquely identifies a website or a computer device.
- Top level domain of a large university.
- Topo level domain of your local National Guard.
- The technology translates the Website name you type into your browser into its associated IP address.
15 Clues: Top level domain of a large university. • A worldwide network of interconnected networks • a company that provides access to the internet. • Topo level domain of your local National Guard. • The type of cable uses light pulses to send data. • The protocol allows you to upload and download files. • Top level domain for a medium sized insurance business. • ...
Media Key Terms Crossword 2023-04-20
Across
- A rule that requires broadcasters to treat a candidate for the same political office identically to every other candidate for that office.
- Mandates broadcasting networks to devote time to contrasting views on issues of public importance.
- news that focuses on human interest stories and more culture / pop culture topics
- The revolutionary business tactic of producing newspaper
- Laws protecting witnesses from revealing certain pieces of information in court.
- news that focuses on bigger issues, such as economics, politics, humane topics, international affairs, etc,.
Down
- When media is written in a way to give an intended effect to the recipient.
- One who searches for verification of harmful claims.
- A news agency that supplies news by wire, to newspapers, radio, and television
- Method of using aggressive tactics and ruthless tones to one being interviewed / taking down information
- When media influences recipients without them knowing it.
- Journalism in elections that focuses on polling data and public perception. Represented commonly in a type of competition
- When media favors a certain side/opinion, by usually omitting information for the other side/opinion and treating what they say like facts.
- Journalism that is based upon on sensationalism and crude exaggeration.
- Technology that is intended to reach a mass audience.
15 Clues: One who searches for verification of harmful claims. • Technology that is intended to reach a mass audience. • The revolutionary business tactic of producing newspaper • When media influences recipients without them knowing it. • Journalism that is based upon on sensationalism and crude exaggeration. • ...
18CSC305J / ARTIFICIAL INTELLIGENCE / Unit IV 2023-04-12
Across
- Identify the type of learning in which labeled training data is used.
- _______algorithms enable the computers to learn from data, and even improve themselves, without being explicitly programmed.
- Real-Time decisions, Game AI, Learning Tasks, Skill acquisition, and Robot Navigation are applications of________
- In linear regression, we try to ______ the least square errors of the model to identify the line of best fit.
- The prior goal of unsupervised learning model is to determine the ________ .
- In Model based learning methods, an iterative process takes place on the ML models that are built based on various model parameters, called ?
- Machine Learning has various search/ optimization algorithms, which of the following is not evolutionary computation?
- Which of the following is a widely used and effective machine learning algorithm based on the idea of bagging?
Down
- Machine learning is a subset of_________
- A model of language consists of the categories which does not include ________.
- What is the application of machine learning methods to a large database called?
- Identify the kind of learning algorithm for "facial identities for facial expressions".
- Which supervised learning technique can process both numeric and categorical input attributes?
- A subset of machine learning that involves systems that think and learn like humans using artificial neural networks.
- The most significant phase in genetic algorithm is _________
15 Clues: Machine learning is a subset of_________ • The most significant phase in genetic algorithm is _________ • Identify the type of learning in which labeled training data is used. • The prior goal of unsupervised learning model is to determine the ________ . • A model of language consists of the categories which does not include ________. • ...
Nathan 2020-11-16
Across
- A malware that allows a hacker to remote control a computer.
- A virus that attaches itself to a message on the internet to infect a computer
- A Cyber attack that's propose is to make network unavailable.
- A Malware that infects a computer and takes over its control to a central server that commands and controls.
- A protocol that provides the framework for a web browsing to work.
- A group of computer connected to a common communication
- A software that protects your computer from anything that may compromise your computer's information
- A computer worm that poses as a love letter that infected over ten million window computers.
Down
- Someone looking to the breach defenses of a computer or exploit a weak computer system.
- A illegal practice that has emails pose as emails from companies to have you open to reveal personal information
- A very damaging computer virus that targeted microsoft computers.
- A program that is used to operate a computer to do a specific task.
- A virus program that can self replicate without human assistances which in turn helps it spread faster into other networks.
- A Malware or virus that disguises itself as a legit software.
- A computer program that hijacks computer to then make copies of itself.
15 Clues: A group of computer connected to a common communication • A malware that allows a hacker to remote control a computer. • A Cyber attack that's propose is to make network unavailable. • A Malware or virus that disguises itself as a legit software. • A very damaging computer virus that targeted microsoft computers. • ...
Recovery Model Crossword Puzzle 2020-12-10
Across
- _______-Oriented services create a vision of recovery that includes the voices of people served.
- People with mental illness encounter __________ embedded within social structures.
- Elements of the recovery process include ______. (Hint two words).
- Nothing about us __________ us.
- How many tasks do people engage in throughout the recovery process?
- What is #3 of the six stage model of the recovery process?
- Evidence-based interdisciplinary intervention approaches that attempt to operationalize key elements of the recovery process include:
Down
- Which one of the fundamental components of recovery is considered the catalyst for the recovery process?
- Recovery is a(n) _______ experienced by people with mental illness.
- Recovery-oriented approaches require continual reflection related to evolving ______ with clients.
- The core values, assumptions and philosophy of occupational therapy are remarkably consistent with those of ______. (Hint two words).
- Social and financial strains will ___________ impact the recovery process.
- Overarching expectation is that the journey of recovery will provide opportunities for greater __________, positive growth, and community participation.
- Having relationships and social networks that provide support, friendship, love and hope provides us with a ______________.
- This is a client-centered tool and engages clients to collaborate with service providers in identifying priority occupations and evaluating performance of and satisfaction with these occupations over time.(Hint abbreviation)
15 Clues: Nothing about us __________ us. • What is #3 of the six stage model of the recovery process? • Elements of the recovery process include ______. (Hint two words). • Recovery is a(n) _______ experienced by people with mental illness. • How many tasks do people engage in throughout the recovery process? • ...
Crossword 2021-02-23
Across
- It is used for online classes, for communication, for entertainment, and for almost all of our other daily routine.
- It is invented by Alexander Graham Bell.
- It is first invented in Persia in the year 950.
- It is the global interconnection of networks, routers and protocols flinging data around the planet.
- With the use of technology, these were invented to ensure widespread destruction.
- It was invented in China by alchemists in an attempt to produce life-extending elixirs.
- It is a system that provides navigation and location of places.
- It is the global computer virus created by a Filipino student in the year 2000 which made an estimated $10 billion damage to business and government agencies.
- It is one of the discoveries of Nicéphore Niépce.
Down
- It is one of the disadvantages of technology that is the introduction of harmful substances to the environment.
- Example of mental illness that can be caused by social media.
- It is a type of experimental antibiotics, created using enzymes to fight off pathogenic bacterial infections.
- The discovery of this opened up a lot of possibilities for the early humans.
- It is invented to substitute humans for procedures that are dangerous for people.
- Technology has accelerated this aspect which led to the development of modern transportation and communication technology.
15 Clues: It is invented by Alexander Graham Bell. • It is first invented in Persia in the year 950. • It is one of the discoveries of Nicéphore Niépce. • Example of mental illness that can be caused by social media. • It is a system that provides navigation and location of places. • The discovery of this opened up a lot of possibilities for the early humans. • ...
PALOLO 2021-03-29
Across
- Set of information found in a specific internet address.
- A secret word or phrase that must be used to gain admission to a place.
- An identification used by a person with access to a computer, network, or online service.
- A link from a hypertext document to another location, activated by clicking on a highlighted word or image.
- An extra part or extension that is or may be attached to something to perform a particular function.
- Allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet.
- Set of programs and routines that allow the computer to perform certain tasks.
Down
- It Is a web where you can find information.
- A network service that allows users to send and receive messages using electronic communication networks.
- Includes the message content and any attachments.
- Unsolicited messages, usually of an advertising nature.
- Graphical control element used in computer programs, such as file managers or web browsers, and on web sites.
- Is the introduction that identifies the emails intent.
- A symbol representing a smiling face that is used in written communication to indicate that the writer is pleased or joking.
- Is the area in which you enter important information above the email content area.
15 Clues: It Is a web where you can find information. • Includes the message content and any attachments. • Is the introduction that identifies the emails intent. • Unsolicited messages, usually of an advertising nature. • Set of information found in a specific internet address. • A secret word or phrase that must be used to gain admission to a place. • ...
Technology(Benjamin Falcon, Ramiro Baez and Santiago Macchia) 2021-03-17
Across
- Set of programs and routines that allow the computer to perform certain tasks.
- A network service that allows users to send and receive messages using electronic communication networks.
- A secret word or phrase that must be used to gain admission to a place.
- Includes the message content and any attachments.
- Graphical control element used in computer programs, such as file managers or web browsers, and on web sites.
- Is the area in which you enter important information above the email content area.
- An identification used by a person with access to a computer, network, or online service.
- Is the introduction that identifies the emails intent.
Down
- A link from a hypertext document to another location, activated by clicking on a highlighted word or image.
- Unsolicited messages, usually of an advertising nature.
- A symbol representing a smiling face that is used in written communication to indicate that the writer is pleased or joking.
- Allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet.
- An extra part or extension that is or may be attached to something to perform a particular function.
- Set of information found in a specific internet address.
- It Is a web where you can find information.
15 Clues: It Is a web where you can find information. • Includes the message content and any attachments. • Is the introduction that identifies the emails intent. • Unsolicited messages, usually of an advertising nature. • Set of information found in a specific internet address. • A secret word or phrase that must be used to gain admission to a place. • ...
ADVANCED NETWORKING 2021-04-08
Across
- This is a method of sending messages from one computer to another via a communication link.
- This has some special information which helps to detect any missing packets at the destination for reassembling.
- Software programs designed to damage or do other unwanted actions on a computer system.
- This is considered as a small segment of a large message.
- This is a unique name used to specify a particular computer on a network.
- This prevents outsiders from accessing the private data of the network(This can be either hardware or this can be software based)
- This is referred as the largest wide area network in the world.
Down
- This is the act of listening in on someone’s private conversations without their knowledge.
- Computers that are used to host websites are usually known by this.
- This is a computer-based system that allows users and subscribers to exchange personal voice messages.
- This means that the network should be available whenever it is needed.
- A word or series of alphanumeric characters used as a security measure to prevent unauthorized access to data.
- This directs traffic between networks.
- This is a software manage access to websites and helps to keep away from malicious sites.
- This involves a third party interrupting a two-way communication(Write the Abbreviation)
15 Clues: This directs traffic between networks. • This is considered as a small segment of a large message. • This is referred as the largest wide area network in the world. • Computers that are used to host websites are usually known by this. • This means that the network should be available whenever it is needed. • ...
Final Chapter 1-3 2018-11-05
Across
- what gesture do you press and hold one finger and then move the finger horizontally or vertically on the screen
- what mouse operations do you quickly press and release the left mouse button twice without moving the mouse
- what gesture do you move two fingers together
- a style of table does not contain a physical keyboard
- what gesture do you move two fingers apart
- is a personal computer that users can carry from place to place
- which kind of desktop uses the same case to house the screen and processing circuitry
Down
- in which gesture do you quickly touch and release one finger one time
- what gesture displays a shortcut menu
- what gesture do you press and hold one finger on an object and then move the finger to the new location
- what gesture do you press and hold one finger on an object and then move the finger to the new location
- what is an electronic version of a printed book, readable on computers and other digital devices
- what conveys meaning and is useful to users
- what consists of electronic components that store instructions waiting to be executed and data needed by those instructions
- is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals
- what mouse operations do you move the mouse until the pointer is positioned on the item of choice
16 Clues: what gesture displays a shortcut menu • what gesture do you move two fingers apart • what conveys meaning and is useful to users • what gesture do you move two fingers together • a style of table does not contain a physical keyboard • is a personal computer that users can carry from place to place • ...
Computer! 2023-05-10
Across
- the application of scientific knowledge for practical purposes, especially in industry.
- working or produced by machines or machinery.
- mobile-phone-based software programme that allows users to send and receive information using their phone's internet connection
- a telecommunications industry specification that describes how mobile devices, computers and other devices can easily communicate with each other using a short-range wireless connection.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- an application, especially as downloaded by a user to a mobile device.
- docs an online word processor that lets you create and format documents and work with other people.
- a system for transmitting visual images and sound that are reproduced on screens, chiefly used to broadcast programs for entertainment, information, and education.
- the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
Down
- the programs and other operating information used by a computer.
- is a technology company
- depictions of human emotions, living beings, objects and even certain symbols.
- operating by or producing electricity.
- a panel of keys that operate a computer or typewriter.'=
- upload a video of (someone or something) to the video-sharing website
15 Clues: is a technology company • operating by or producing electricity. • working or produced by machines or machinery. • a panel of keys that operate a computer or typewriter.'= • the programs and other operating information used by a computer. • upload a video of (someone or something) to the video-sharing website • ...
HAPPY HOUR CROSSWORD 2024-02-22
Across
- an intangible asset that represents the value of a business's reputation.
- The most dressed person in deepArica
- Most consumed element in deepAfrica.
- powerful class of neural networks that are used for unsupervised learning
- Open-Source Tool Used To Protect Linux Servers From Brute-Force Attacks, Password Guessing, And Other Malicious Activity
- a type of personal computer made by the Apple Computer company.
- standard network protocol used for the transfer of computer files between a client and server on a computer network.
Down
- software that creates and runs virtual machines
- a way of financing your business idea through donations of money from the public
- a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource
- An Open-Source Virtualization Technology That Allows You To Run Multiple Virtual Machines On A Linux Host
- the value of ownership interest in the business, calculated by deducting liabilities from assets
- fixed costs associated with operating a business such as rent, marketing, utilities and administrative costs
- an online cash register that keeps records of all biashara (business transactions) between a supplier and a buyer?
- amount of data that can be transferred between your website and its users over a certain period of time
15 Clues: The most dressed person in deepArica • Most consumed element in deepAfrica. • software that creates and runs virtual machines • a type of personal computer made by the Apple Computer company. • an intangible asset that represents the value of a business's reputation. • powerful class of neural networks that are used for unsupervised learning • ...
Castrofloresandtj 2024-10-24
Across
- process- gain the information used to gain estimates of the situation
- marsupial
- weapons- traditional weapons such as rifles and explosives
- warfare- operations carried on by small independent forces, generally in the rear of the enemy, with the objective of harassing, delaying, and disrupting military operations of the enemy.
Down
- operations- a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information
- warfare the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
- lauching- is used when a building dry dock can be flooded. the vessel is simply floated out and towed to the fitting out dock.
- control- measures taken to prevent a fire or collision.
- ceremony- when the vessel is formally named and launched is customarily
- a series of short cruises to check out the ship and its equipment.
- warfare- warfare- Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air.
- warfare- the use of military aircraft and other flying machines in warfare.
- launching- vessel is either completed on perpendicular building ways near the water.
- warfare of security experts will discuss the growing threats to corporations.
- warfare are self replicating programs that can hide in systems
- conflict between two populations of drastically different levels of military capability or size. Biological warfare, or germ warfare ...
16 Clues: marsupial • control- measures taken to prevent a fire or collision. • weapons- traditional weapons such as rifles and explosives • warfare are self replicating programs that can hide in systems • a series of short cruises to check out the ship and its equipment. • process- gain the information used to gain estimates of the situation • ...
CSP Review WG 2025-05-02
Across
- ______ computing - spliting up a program into multiple tasks, some of which can be completed simultaneously
- the maximum amount of data that can be transfered in a fixed period of time over a network
- chunks of data used to provide transport between the data's origin and destination
- a solution to a problem that isnt necesarily perfect but is good enough for a hard problem
- the act of funding digital projects throught the combined effort of many online users
- procedural _____ is the act of simplifying code by using a function
Down
- the process of scrambling data to prevent unauthorized access
- ______ provides an unreliable data transfer protocol that only detects for corrupt packets but not lost packets
- Rouge Access Point - A ______ point that gives unauthorized access to secure networks
- the protocol responsible for reliable and ordered delivery between two systems
- the process of finding a path from sender to reciever
- ______ computing - running multiple parts of a program on multiple comptuters
- _____ search - an algorithm that searches a list by cutting it in half repeatedly
- _____ error - When the code runs but does not do as expected due to an error in your own thinking
- compressing data in a way that preserves all data and allows for full recovery
15 Clues: the process of finding a path from sender to reciever • the process of scrambling data to prevent unauthorized access • procedural _____ is the act of simplifying code by using a function • ______ computing - running multiple parts of a program on multiple comptuters • the protocol responsible for reliable and ordered delivery between two systems • ...
Networking Concepts 2025-05-21
Across
- The computers that communicate with each other.
- A network created for a individual person.
- In this topology,all the nodes in the network are connected in a circular manner.
- The topology in which each device is connected to a central computer using a point to point connection.
- The device works similar to Hub.
Down
- Most commonly used network card.
- In this network,two or more computers and peripheral devices are connected within a small area such as a room,an office building or a campus.
- The security where a user is given a unique login name and password.
- In this topology, each node is connected to every other node in the network.
- This topology uses single communication line or one main cable to which all the nodes are directly connected.
- One of the most common topology network setups that consists of a group of star figured workstations connected to a linear bus backbone cable.
- Larger than LAN and is spread across a city.
- A device that connects two different networks with each other.
- This kind of network connects two or more computers located in a distant places.
- A network device that is used to connect all the computers in a network with each other.
15 Clues: Most commonly used network card. • The device works similar to Hub. • A network created for a individual person. • Larger than LAN and is spread across a city. • The computers that communicate with each other. • A device that connects two different networks with each other. • The security where a user is given a unique login name and password. • ...
Information Technology Career Cluster 2025-10-06
Across
- A program used to view Web pages.
- a person who designs, writes and installs computer programs and applications
- a small amount of data generated by a website and saved by your web browse to remember information about you.
- a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- type of software that can process information on its own without human intervention.
- A global network connecting millions of computers, making it possible to exchange information.
- the development, maintenance, and use of computer software, systems, and networks
Down
- helps increases or maintains the capabilities of a person with a disability
- unwanted e-mail (usually of a commercial nature sent out in bulk)
- identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
- the process of converting human instructions into a language that a computer can understand and follow
- Part of a computer system that is designed to block unauthorized access
- Measures taken to protect a computer or computer system against unauthorized access or attack
- new technologies that aim to conserve the natural environment and resources.
- The amount of data that can be transmitted over a network in a given amount of time.
15 Clues: A program used to view Web pages. • unwanted e-mail (usually of a commercial nature sent out in bulk) • Part of a computer system that is designed to block unauthorized access • helps increases or maintains the capabilities of a person with a disability • a person who designs, writes and installs computer programs and applications • ...
U01 E Protecting data and information 2 2023-12-21
Across
- (8,5,8) is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet. A primary use case is encrypting the communication between web applications and servers, such as web browsers loading a website. This can also be used to encrypt other communications such as email, messaging, and voice over IP (VoIP). Acronym TLS
- is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions: managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.
- (4,10,3) is the UK's implementation of the General Data Protection Regulation (GDPR). Everyone responsible for using personal data has to follow strict rules called 'data protection principles. They must make sure the information is: used fairly, lawfully and transparently
Down
- (7,2,11,3) provides public access to information held by public authorities. It does this in two ways: public authorities are obliged to publish certain information about their activities; and. members of the public are entitled to request information from public authorities.
- (6,7,5) is standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers). It prevents hackers from seeing or stealing any information transferred, including personal or financial data. Acronym SSL
- (6,4,7) is a security program used to decrypt and encrypt email and authenticate email messages through digital signatures and file encryption.acronym PGP
- is a computer network security system that restricts internet traffic in to, out of, or within a private network. This software or dedicated hardware-software unit functions by selectively blocking or allowing data packets.
- is a kind of software used to prevent, scan, detect and delete viruses from a computer. Once installed, most antivirus software runs automatically in the background to provide real-time protection against virus attacks
- (8,6,3) makes it an offense to make, adapt, supply or obtain articles for use in unlawfully gaining access to computer material or impairing the operation of a computer. Access is defined in the Act as: altering or erasing the computer programme or data. copying or moving the programme or data
9 Clues: (6,4,7) is a security program used to decrypt and encrypt email and authenticate email messages through digital signatures and file encryption.acronym PGP • ...
The New Power Balance 2015-04-08
Across
- Political ideology that emphasizes the civil rights of citizens, representative government, and the protection of private property.
- Revolutionaries who wanted to abolish all private property and governments, usually by means of violence.
- Political ideology that advocated for government protection of workers from exploitation by property owners and government ownership of industries.
- Chancellor of Prussia and later Germany who led Prussia to victory against Austria and France and created the German Empire.
- One of the leaders of the Meiji Restoration.
- Political program in which young leaders set Japan on the path of centralization, industrialization, and imperialism.
- Empress of China that resisted government reforms and opposed western influence.
- 19th century idea that men and women should have clearly differentiated roles in society.
- Term used to describe late 19th century society.
- Italian nationalist who conquered Sicily and Naples and added them to a unified Italy in 1860.
- Known for writing "The Communist Manifesto" and "Das Kapital."
- A form of energy used for telegraphy, lighting, industrial motors, and railroads.
Down
- Political ideology that stresses people's membership in a nation.
- Copper cables laid along the bottom of the ocean for telegraphic communication.
- American inventor best known for inventing the electric light bulb.
- Networks of iron or steel rails on which locomotives pulled trains.
- The most widely used metal in construction, machinery, and railroad equipment.
17 Clues: One of the leaders of the Meiji Restoration. • Term used to describe late 19th century society. • Known for writing "The Communist Manifesto" and "Das Kapital." • Political ideology that stresses people's membership in a nation. • American inventor best known for inventing the electric light bulb. • ...
Cybersecurity Unit 1 Lesson 1 2022-12-02
Across
- Changes your directory
- A set of steps to accomplish a task.
- A set of techniques used to protect networks and digital information from attack, damage, or unauthorized access.
- Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
- Guidelines that team members develop in order to be followed when working together.
- A system that can distinguish between a human and an automated program.
- Shows the contents of your directory
- A process that converts human-readable text or data into a coded form.
Down
- A team of individuals working together to investigate cyber events and anomalies.
- A collection of rules detailing appropriate student behavior.
- Software that is intended to do harm or damage.
- The trail that you leave behind when you engage in online experiences.
- To guess or discover, especially a password.
- Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network.
- To confirm your identity using knowledge know only to you or information interpreted by you.
- An attempt to discover information, especially passwords, through trial and error.
- Irrelevant or inappropriate messaging sent through email to a large number of recipients, also known as junk mail.
17 Clues: Changes your directory • A set of steps to accomplish a task. • Shows the contents of your directory • To guess or discover, especially a password. • Software that is intended to do harm or damage. • A collection of rules detailing appropriate student behavior. • The trail that you leave behind when you engage in online experiences. • ...
Computer and Technical Terms 2016-02-22
Across
- A compnent that stores data so future requests for that data can be served faster
- adress Each computer connected to the Internet is given a unique address called.
- The amount of copies that can be made of a project.
- Communication that both the sender and the receiver are active at the same time
- Is a suffix to the name of a computer file applied to indicate the encoding of its contents or usage.
- A website that is considerably greater in sized is referred to being?
- Using neutral rather than subjective, boastful, or exaggerated language.
- The idea of using about half the word count as the controlled condition.
- The codes or tags that browsers use to create web pages.
- Performing, participating, encouraging, or concealing any unauthorized use or attempts of unauthorized use of UT IT resources
- The html file you are creating and the picture you are using for your website must be in the same?
Down
- Communication where the sending and receiving occur at different times.
- Company that helps build large websites.
- May result in termination of access, disciplinary review, expulsion, termination or other appropriate disciplinary action.
- The main technology for local area networks
- Can be used to create web pages online
- The amount of images from one artist or photographer allowed on a web page
17 Clues: Can be used to create web pages online • Company that helps build large websites. • The main technology for local area networks • The amount of copies that can be made of a project. • The codes or tags that browsers use to create web pages. • A website that is considerably greater in sized is referred to being? • ...
Friday Game v1.2 2023-07-07
Across
- A powerful computer that provides resources or services to other computers
- The cloud storage service in Microsoft 365 for individual users to store and sync files
- A collaboration platform in Microsoft 365 for chat, meetings, file sharing, and teamwork
- Unsolicited and unwanted email messages, often sent in bulk
- A networking device that connects multiple devices within a local area network
- The period of time during which a system or service is available and operational
- A wireless networking technology that allows devices to connect to the internet
- Voice over Internet Protocol, a technology that allows voice communication over the internet
- A copy of important data stored in case the original data is lost or damaged
Down
- The process of diagnosing and resolving problems or issues in a system
- A record or request for help or support logged by a user
- Distributed Denial of Service, an attack that disrupts the normal functioning of a network
- Measures and practices to protect computer systems and networks from cyber threats
- Malicious software that encrypts files and demands a ransom for their release
- Redundant Array of Independent Disks, a data storage technology that combines multiple physical disks into a single logical unit for improved performance or data protection
- A system of interconnected devices
- Managed Service Provider, a company that offers IT services and support to other businesses
17 Clues: A system of interconnected devices • A record or request for help or support logged by a user • Unsolicited and unwanted email messages, often sent in bulk • The process of diagnosing and resolving problems or issues in a system • A powerful computer that provides resources or services to other computers • ...
Crossword 2022-02-07
Across
- a sphere of knowledge identified by a name
- set up in every program to hold data coming in and going out
- a data storage device that uses flash memory
- a wireless technology that allows the exchange of data between different devices
- a combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line
- two or more computers that are connected
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted
- Universal Serial Bus
Down
- an organizational element of a computer operating system used to group files or other folders together
- an additional file sent with an email message
- n area or window on a computer screen in which icons are arranged in a manner analogous to objects on top of a desk
- a networking device that forwards data packets between computer networks
- a computer program with a graphical user interface for displaying and navigating between web pages
- a small handheld device that is dragged across a flat surface to move the cursor on a computer screen, typically having buttons that are pressed to control functions
- A central processing unit
15 Clues: Universal Serial Bus • A central processing unit • two or more computers that are connected • a sphere of knowledge identified by a name • a data storage device that uses flash memory • an additional file sent with an email message • set up in every program to hold data coming in and going out • a networking device that forwards data packets between computer networks • ...
