networks Crossword Puzzles

Crossword 2022-02-07

Crossword crossword puzzle
Across
  1. a sphere of knowledge identified by a name
  2. set up in every program to hold data coming in and going out
  3. a data storage device that uses flash memory
  4. a wireless technology that allows the exchange of data between different devices
  5. a combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line
  6. two or more computers that are connected
  7. a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted
  8. Universal Serial Bus
Down
  1. an organizational element of a computer operating system used to group files or other folders together
  2. an additional file sent with an email message
  3. n area or window on a computer screen in which icons are arranged in a manner analogous to objects on top of a desk
  4. a networking device that forwards data packets between computer networks
  5. a computer program with a graphical user interface for displaying and navigating between web pages
  6. a small handheld device that is dragged across a flat surface to move the cursor on a computer screen, typically having buttons that are pressed to control functions
  7. A central processing unit

15 Clues: Universal Serial BusA central processing unittwo or more computers that are connecteda sphere of knowledge identified by a namea data storage device that uses flash memoryan additional file sent with an email messageset up in every program to hold data coming in and going outa networking device that forwards data packets between computer networks...

Unit 6 TestOut 2022-04-07

Unit 6 TestOut crossword puzzle
Across
  1. a method of confirming identity by using two or more pieces of evidence (or factors) to an BLANK mechanism
  2. does each person have the physical attribute being measured?
  3. the act of claiming an identity, such as telling someone your name.
  4. The command BLANK creates a new group in a Linux terminal
  5. a secure shell (BLANK) key is an access credential.
  6. is the physical attribute distinctive enough that it can be used to distinguish between individuals?
  7. data, applications, systems, networks, and physical space.
Down
  1. the process of validating identity. it includes the identification process, a user providing input to prove identity, and the system accepting that input as valid.
  2. how well does the specified attribute hold up to aging
  3. a device or a file used to authenticate.
  4. issued by. certificate authority and verify identity by using public keys, details on the owner of the certificate, details on the issuer of the certificate.
  5. granting or denying access to an object based on the level of permissions or the actions allowed with the subject.
  6. sometimes referred to as accounting, is maintaining a record of the activity within the information system.
  7. users, applications, or processes that need access to objects.
  8. an online service that manages identity information for other organizations.

15 Clues: a device or a file used to authenticate.a secure shell (BLANK) key is an access credential.how well does the specified attribute hold up to agingThe command BLANK creates a new group in a Linux terminaldata, applications, systems, networks, and physical space.does each person have the physical attribute being measured?...

Communication Systems Crossword 2017-06-04

Communication Systems Crossword crossword puzzle
Across
  1. Separates a network into different segments at the data link layer.
  2. A communication system for short range transmission.
  3. A device that determines the path to send a data packet between at least two networks.
  4. has many resources and does not rely on the network for essential functions.
  5. meeting that allows people in different locations to see video and audio of each other.
  6. The sending of signals to receive an agreement about which protocol to use to accomplish an exchange of information.
  7. This network topology uses a combination of connected bus, star and ring topologies.
Down
  1. The capacity of the channel/transmission medium, determining speed.
  2. Determines the MAC address of the sender and intended receiver that precedes each message.
  3. Allows communication by sending and receiving message using a device connected to the Internet.
  4. Has few resources and relies on the network for storage and computations.
  5. A set of rules which governs the transfer of data between computer devices in data transmission.
  6. Cable that is composed of pairs of copper wire twisted together
  7. A system allowing customers to purchase goods using funds in their bank accounts.
  8. A digit representing the sum of the correct digits in a piece of stored or transmitted digital data.

15 Clues: A communication system for short range transmission.Cable that is composed of pairs of copper wire twisted togetherSeparates a network into different segments at the data link layer.The capacity of the channel/transmission medium, determining speed.Has few resources and relies on the network for storage and computations....

Crossword Vocabulary 2019-05-20

Crossword Vocabulary crossword puzzle
Across
  1. An organization that provides access to the Internet.
  2. The term internet, spelled with a lower case "i," has always meant a large network made up of smaller networks.
  3. USB is a hardware interface for up to 127 peripherals that is governed by the USB Implementers Forum (see USB-IF). USB is used to attach keyboards, mice, printers, external storage and mobile devices to the computer.
  4. Cookies provide a way for the website to recognize you and keep track of your preferences.
  5. An inhouse website that serves employees only, and most medium-sized and large companies have one.
  6. The primary method for keeping a computer secure from intruders.
  7. To store data locally in order to speed up subsequent retrievals. Pronounced "cash." See Web cache and browser cache.
  8. Machinery and equipment (CPUs, drives, keyboards, printers, scanners, cables, etc.).
  9. central Processing Unit
  10. To write and post an entry in a Weblog.
Down
  1. The fundamental display element of an electronic screen or bitmapped image.
  2. A series of instructions that performs a particular task is called a "program."
  3. The transmission capacity of an electronic the way such as a communications line, computer bus or computer channel.
  4. phishing is a scam to steal valuable information such as credit card and social security numbers, user IDs and passwords.
  5. uniform Resource Locator

15 Clues: central Processing Unituniform Resource LocatorTo write and post an entry in a Weblog.An organization that provides access to the Internet.The primary method for keeping a computer secure from intruders.The fundamental display element of an electronic screen or bitmapped image....

CAREER BAATEIN - Sales Careers 2016-09-15

CAREER BAATEIN - Sales Careers crossword puzzle
Across
  1. MMD is responsible for district wise network ................ and N+2 years capacity plan
  2. If I am in Govt Sales, I need to liaison with ...................
  3. In my role of Rural Sales, Mahindra ......... is a major project.
  4. As Manager Rural Sales, I need to create additional .......... streams from the rural network.
  5. MMD is responsible for proactive channel and marketing readiness prior to product ..................
  6. As MMD (Sales & Service), I need to generate a comprehensive report of market share every month to develop Market ..................
  7. As MMD, I need to partner with special networks partners such as .........
Down
  1. As RSM, I should have a balance of task & ........ orientation.
  2. MMD is responsible for the strategic development of key .......................
  3. As Manager Rural Sales, I need to have experience in Rural........
  4. As Manager - Rural Sales, I am responsible for the volume share from focus ..........
  5. I am responsible for the Volume Growth and Market Dominance of entire state or 2. I finalize business plans and create monthly/ quarterly sales forecast. I am directly responsible for topline
  6. This skill is the most important if I am in Govt. Sales
  7. As Manager Rural Sales, I need to be good at Sales .........
  8. If I am in Govt. Sales, I need to work with 4 major Govt Departments - Nationalized Banks, Health, Indian Post & Indian ......................

15 Clues: This skill is the most important if I am in Govt. SalesAs Manager Rural Sales, I need to be good at Sales .........As RSM, I should have a balance of task & ........ orientation.If I am in Govt Sales, I need to liaison with ...................In my role of Rural Sales, Mahindra ......... is a major project....

MEDIA CROSSWORD PUZZLE 2023-03-09

MEDIA CROSSWORD PUZZLE crossword puzzle
Across
  1. a person whose job is to discover information about news events and describe them for a newspaper or magazine or for radio or television
  2. extending or spread throughout the world
  3. websites and programs that allow people to communicate and share information on the internet using a computer or mobile phone
  4. An electronic device used to make calls, take pictures and access the internet.
  5. showing an unreasonable like or dislike for a person based on personal opinions
  6. the photographers who follow famous people everywhere they go in order to take photographs of them
  7. a vast computer network linking smaller computer networks worldwide
Down
  1. a person who corrects or changes pieces of text
  2. the presentation of stories in a way that is intended to provoke public interest or excitement, at the expense of accuracy
  3. a piece of equipment that you speak into to make your voice louder
  4. a regularly printed document with daily information for the population
  5. to remove parts of something, such as a book, movie, or letter, that you do not want someone to see or hear
  6. Newspaper with smaller pages that print short articles with lots of photos, often about famous people
  7. an electronic machine that is used for storing and processing data
  8. hired to work for different companies on particular assignments

15 Clues: extending or spread throughout the worlda person who corrects or changes pieces of texthired to work for different companies on particular assignmentsa piece of equipment that you speak into to make your voice louderan electronic machine that is used for storing and processing dataa vast computer network linking smaller computer networks worldwide...

Tech Challenge Crossword 2024-04-10

Tech Challenge Crossword crossword puzzle
Across
  1. A computer program designed to cause damage to a computer system
  2. A type of attack where a hacker floods a network or server with excessive requests, causing it to crash
  3. Measurement of the maximum data transfer capacity of a network, often expressed in bits per second
  4. A type of software that enables users to access and view web pages on the internet
  5. A popular programming language used for web development
  6. A programming language known for its simplicity and readability, often used for beginner programming courses
  7. A method of protecting sensitive information by encoding it into an unreadable format
  8. A popular operating system developed by Apple Inc.
Down
  1. A technology used to transmit data over short distances using radio waves, commonly used for wireless communication between devices
  2. A high-speed data storage and retrieval medium that functions like electronic memory
  3. A type of malware that self-replicates and spreads to other computers
  4. A basic unit of digital information storage
  5. A type of computer network that covers a large geographical area, often connecting multiple smaller networks
  6. Co-founder of Tesla and SpaceX, known for his work in electric vehicles, renewable energy, and space exploration
  7. A hardware device used to connect a computer to a network, enabling communication with other devices and access to the internet

15 Clues: A basic unit of digital information storageA popular operating system developed by Apple Inc.A popular programming language used for web developmentA computer program designed to cause damage to a computer systemA type of malware that self-replicates and spreads to other computers...

AP Computer science 2023-04-24

AP Computer science crossword puzzle
Across
  1. the smallest unit of data that a computer can process and store used to simplify strings of code into different functions
  2. an efficient algorithm for finding an item from a sorted list of items
  3. an algorithm that is designed to test for errors working back from output nodes to input nodes
  4. leverages computers and machines to mimic the problem-solving and decision-making capabilities of the human mind.
  5. a computer network that connects smaller networks
  6. type of low-level programming language that is intended to communicate directly with a computer's hardware
  7. the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device
  8. the capacity at which a network can transmit data.
Down
  1. the extraction of relevant information from a larger data set
  2. creates a separation between two things
  3. the available numbers in a numbering system
  4. the smallest unit of data that a computer can process and store
  5. a list set of instructions, used to solve problems or perform tasks, based on the understanding of available alternatives.
  6. type of computer that uses the continuous variation aspect of physical phenomena
  7. computer systems that systematically and unfairly discriminate against certain individuals or groups of individuals in favor of others

15 Clues: creates a separation between two thingsthe available numbers in a numbering systema computer network that connects smaller networksthe capacity at which a network can transmit data.the extraction of relevant information from a larger data setthe smallest unit of data that a computer can process and store...

Castrofloresandtj 2024-10-24

Castrofloresandtj crossword puzzle
Across
  1. process- gain the information used to gain estimates of the situation
  2. marsupial
  3. weapons- traditional weapons such as rifles and explosives
  4. warfare- operations carried on by small independent forces, generally in the rear of the enemy, with the objective of harassing, delaying, and disrupting military operations of the enemy.
Down
  1. operations- a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information
  2. warfare the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
  3. lauching- is used when a building dry dock can be flooded. the vessel is simply floated out and towed to the fitting out dock.
  4. control- measures taken to prevent a fire or collision.
  5. ceremony- when the vessel is formally named and launched is customarily
  6. a series of short cruises to check out the ship and its equipment.
  7. warfare- warfare- Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air.
  8. warfare- the use of military aircraft and other flying machines in warfare.
  9. launching- vessel is either completed on perpendicular building ways near the water.
  10. warfare of security experts will discuss the growing threats to corporations.
  11. warfare are self replicating programs that can hide in systems
  12. conflict between two populations of drastically different levels of military capability or size. Biological warfare, or germ warfare ...

16 Clues: marsupialcontrol- measures taken to prevent a fire or collision.weapons- traditional weapons such as rifles and explosiveswarfare are self replicating programs that can hide in systemsa series of short cruises to check out the ship and its equipment.process- gain the information used to gain estimates of the situation...

Structures 2025-11-07

Structures crossword puzzle
Across
  1. Rely on their large mass and weight to ensure stability
  2. Use walls to support the weight of the floors and roof, transferring the load to the foundation
  3. Structural systems for tall buildings where the exterior columns and beams form a rigid, hollow tube-like structure to resist lateral loads.
  4. Utilize a "skeleton" of interconnected columns (vertical) and beams (horizontal) to support loads, enclosed by an outer "skin"
  5. Vertical structural elements primarily designed to resist axial compression.
  6. Curved structures that transfer loads to their supports by developing horizontal thrust
Down
  1. Use flexible fabric or cable networks under tension, often for lightweight, large-span roofs
  2. Combinations of two or more basic structural forms to maximize efficiency
  3. Moment frames with diagonal members to resist lateral forces
  4. architectural forms that use tension to support loads,
  5. Two-dimensional, flat, horizontal elements that carry loads primarily by flexure
  6. Horizontal structural elements that primarily resist loads by bending
  7. Use a framework of beams and joints, usually in triangular units, to distribute loads efficiently, often for long spans
  8. Vertical walls designed to resist lateral loads in high-rise buildings, often found around elevator shafts and stairwells.
  9. Thin, curved surfaces that derive their strength from their geometric form to handle loads

15 Clues: architectural forms that use tension to support loads,Rely on their large mass and weight to ensure stabilityMoment frames with diagonal members to resist lateral forcesHorizontal structural elements that primarily resist loads by bendingCombinations of two or more basic structural forms to maximize efficiency...

Landon cybersecurity puzzle 2026-04-07

Landon cybersecurity puzzle crossword puzzle
Across
  1. A security system that blocks or allows network traffic based on safety rules.
  2. A secret set of characters used to access accounts or devices.
  3. Security — Protecting a computer network from unauthorized access or attacks.
  4. Security — Protecting data from being accessed, altered, or destroyed by unauthorized users.
  5. A scam where attackers trick you into giving personal information through fake emails or websites.
  6. Malware that spreads on its own across networks without needing a file or user action.
  7. A type of malware that spreads by attaching itself to files and activates when the file is opened.
  8. The process of converting data into a coded form so only authorized users can read it.
  9. Any harmful software designed to damage, disrupt, or gain unauthorized access to a device or system.
Down
  1. Authentication (2FA) — A security method that requires two forms of verification, like a password and a code sent to your phone.
  2. A hidden program that gives hackers control over a system while staying undetected.
  3. Backup — Saving copies of your files in case the original data is lost or damaged.
  4. Malware that locks or threatens your data and demands payment to restore access.
  5. Citizenship — Using technology responsibly, safely, and respectfully online.
  6. Software that secretly monitors your activity and collects personal information.

15 Clues: A secret set of characters used to access accounts or devices.Citizenship — Using technology responsibly, safely, and respectfully online.Security — Protecting a computer network from unauthorized access or attacks.A security system that blocks or allows network traffic based on safety rules....

Computer and Technical Terms 2016-02-22

Computer and Technical Terms crossword puzzle
Across
  1. A compnent that stores data so future requests for that data can be served faster
  2. adress Each computer connected to the Internet is given a unique address called.
  3. The amount of copies that can be made of a project.
  4. Communication that both the sender and the receiver are active at the same time
  5. Is a suffix to the name of a computer file applied to indicate the encoding of its contents or usage.
  6. A website that is considerably greater in sized is referred to being?
  7. Using neutral rather than subjective, boastful, or exaggerated language.
  8. The idea of using about half the word count as the controlled condition.
  9. The codes or tags that browsers use to create web pages.
  10. Performing, participating, encouraging, or concealing any unauthorized use or attempts of unauthorized use of UT IT resources
  11. The html file you are creating and the picture you are using for your website must be in the same?
Down
  1. Communication where the sending and receiving occur at different times.
  2. Company that helps build large websites.
  3. May result in termination of access, disciplinary review, expulsion, termination or other appropriate disciplinary action.
  4. The main technology for local area networks
  5. Can be used to create web pages online
  6. The amount of images from one artist or photographer allowed on a web page

17 Clues: Can be used to create web pages onlineCompany that helps build large websites.The main technology for local area networksThe amount of copies that can be made of a project.The codes or tags that browsers use to create web pages.A website that is considerably greater in sized is referred to being?...

Computer and Technical Terms 2016-02-22

Computer and Technical Terms crossword puzzle
Across
  1. A website that is considerably greater in sized is referred to being?
  2. A compnent that stores data so future requests for that data can be served faster
  3. The amount of images from one artist or photographer allowed on a web page
  4. Communication that both the sender and the receiver are active at the same time
  5. The main technology for local area networks
  6. The amount of copies that can be made of a project.
  7. Using neutral rather than subjective, boastful, or exaggerated language.
  8. May result in termination of access, disciplinary review, expulsion, termination or other appropriate disciplinary action.
  9. The codes or tags that browsers use to create web pages.
  10. adress Each computer connected to the Internet is given a unique address called.
  11. Performing, participating, encouraging, or concealing any unauthorized use or attempts of unauthorized use of UT IT resources
Down
  1. The html file you are creating and the picture you are using for your website must be in the same?
  2. Company that helps build large websites.
  3. The idea of using about half the word count as the controlled condition.
  4. Is a suffix to the name of a computer file applied to indicate the encoding of its contents or usage.
  5. Communication where the sending and receiving occur at different times.
  6. Can be used to create web pages online

17 Clues: Can be used to create web pages onlineCompany that helps build large websites.The main technology for local area networksThe amount of copies that can be made of a project.The codes or tags that browsers use to create web pages.A website that is considerably greater in sized is referred to being?...

Computer Basics Part 3 2019-03-14

Computer Basics Part 3 crossword puzzle
Across
  1. removable and rewritable, uses USB port
  2. small,recordable, used mostly for cameras
  3. a vast computer network linking smaller computer networks worldwide
  4. transfer of data from one computer system to another
  5. largely obsolete--floppy disks, hard floppies and zip disks
  6. record the address of a website or other data to enable quick access in the future
  7. what is the most common browser in United States
  8. mounted inside system unit, main storage unit, reads data but only writes once
  9. a program with a graphical user interface (GUI) for displaying HTML files, used to navigate the World Wide Web
Down
  1. optional software additions that enhance and/or add functionality to a web browser
  2. the introductory page of a website, typically serving as a table of contents for the site
  3. a link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen
  4. DVD’s and CD’s
  5. an information system on the internet that allows documents to be connected to other documents by hypertext links, enabling users to search for information by moving from one document to another
  6. a record of web pages that you have visited in the past
  7. used to keep data when the power to the computer is turned off
  8. allows multiple documents to be contained within a single window

17 Clues: DVD’s and CD’sremovable and rewritable, uses USB portsmall,recordable, used mostly for cameraswhat is the most common browser in United Statestransfer of data from one computer system to anothera record of web pages that you have visited in the pastlargely obsolete--floppy disks, hard floppies and zip disks...

Propagandizing Words 2013-05-08

Propagandizing Words crossword puzzle
Across
  1. A belief or conclusion held with confidence but not substantiated by positive knowledge or proof
  2. To influence or manage shrewdly or deviously, in this case, propaganda
  3. The act of manifesting; usually the result of false propaganda in communist societies
  4. a short message or commercial, especially a commercial spoken on radio or television
  5. An object of criticism or attack
  6. A way of spreading information via technology
  7. Tending or having the power to persuade, very often, is used to describe propaganda
  8. A usually short communication transmitted by words, signals, or other means from one person, station, or group to another
  9. The way propaganda is used now days, a synonym of this word is practically
Down
  1. An interconnected system of networks that connects computers around the world via the TCP/IP protocol. The use of propaganda is new to this system
  2. / Something that has been organized or made into an ordered whole
  3. / The art and technique of using words effectively to impart information or ideas
  4. / The act or process of buying and selling in a market
  5. It is a way to promote some sort of company, political party, etc
  6. Serving to inform; providing or disclosing information; instructive, propaganda’s goal
  7. One who is actively involved in manipulating propaganda and media advertisements
  8. A piece of unverified information of uncertain origin usually spread by word of mouth

17 Clues: An object of criticism or attackA way of spreading information via technology/ The act or process of buying and selling in a market/ Something that has been organized or made into an ordered wholeIt is a way to promote some sort of company, political party, etcTo influence or manage shrewdly or deviously, in this case, propaganda...

CS 100-Crossword Puzzle 2016-02-17

CS 100-Crossword Puzzle crossword puzzle
Across
  1. a file recording style details, such as fonts, colors, etc.
  2. giving a lot of information in a few words
  3. a code that describes how a web page is formatted
  4. the codes or tags that browsers use to create web pages
  5. comprised of web servers and their files
  6. the main technology for local area networks
  7. the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.
  8. legal doctrine that permits limited use of copyrighted material without acquiring permission from the rights holders
  9. language that is neutral, boastful, or exaggerated
  10. a system of principles to guide decisions and achieve rational outcomes
Down
  1. when both a sender and the receiver are active at the same time
  2. editor a type of program used for editing plain text
  3. a piece of information that determines the properties of a field or tag in a database or a string of characters in a display
  4. when a group of computers and devices are connected to a single server and share a common wireless link
  5. a series of four numbers separated by dots that are given to each computer connected to the Internet
  6. a group of information on a computer that can be software programs or data
  7. to use a computer to gain unauthorized access to data in a system

17 Clues: comprised of web servers and their filesgiving a lot of information in a few wordsthe main technology for local area networksa code that describes how a web page is formattedlanguage that is neutral, boastful, or exaggeratededitor a type of program used for editing plain textthe codes or tags that browsers use to create web pages...

TECHFEST 2020 - Crossword Puzzle 2020-10-28

TECHFEST 2020 - Crossword Puzzle crossword puzzle
Across
  1. A secret word or phrase that must be used to gain admission to a place.
  2. A computer that is small enough to be carried around easily and is designed for use outside an office
  3. The wider network that allows computer networks around the world run by companies
Down
  1. A set of instructions and documentation that tells a computer what to do or how to perform a task
  2. A machine for printing text or pictures, especially one linked to a computer.

5 Clues: A secret word or phrase that must be used to gain admission to a place.A machine for printing text or pictures, especially one linked to a computer.The wider network that allows computer networks around the world run by companiesA set of instructions and documentation that tells a computer what to do or how to perform a task...

Working With Aboriginal and Torres Strait Islander People 2025-11-25

Working With Aboriginal and Torres Strait Islander People crossword puzzle
Across
  1. Advocacy or Allyship - involves using your position, privilege, and power to create systemic change.
  2. A ________ -based approach recognises that all individuals are resourceful and resilient experts in their lives, and can progress in a way that enhances their quality of life.
Down
  1. Advocacy or Allyship - is primarily about relationship and personal support.
  2. Economic participation means Aboriginal and/or Torres Strait Islander people and communities have _______ over economic decisions
  3. Collective __________ is when one community member suffers, the pain ripples through connected networks.

5 Clues: Advocacy or Allyship - is primarily about relationship and personal support.Advocacy or Allyship - involves using your position, privilege, and power to create systemic change.Collective __________ is when one community member suffers, the pain ripples through connected networks....

internet software crossword 2022-10-25

internet software crossword crossword puzzle
Across
  1. act of requesting another person to be your friend (and connecting with you) on a social media.
  2. online conversation where a person can continually read messages from others and then type and send a message reply.
  3. serves as a single platform to connect all of the parts of a computer together.
  4. Its a type of online fraud this type of fraud can send you to fake website
  5. is a unit of measurement for computer memory/data storage used by mathematicians and computer science professionals.
  6. A unit or measure of digital information, consisting of eight binary digits
  7. temporary memory bank where your computer stores data
  8. It's the most important part of the computer.
  9. it’s a unit of frequency equal to one billion hertz.
  10. Its equal to about one billion bytes
  11. PHONE A mobile phone that offers advanced capabilities and features like a web connection and a portable media player.
Down
  1. is a type of technology that stores operating systems, applications, and
  2. An online graphic representation of a user
  3. Software that displays advertisements on your computer.
  4. It's the smallest unit of data that a computer can hold and store.
  5. Messages sent through an electronic computer network to specific groups or individuals
  6. An industry standard for short-range wireless connections between devices like mobile phones, headsets, computers and PDAs.
  7. Several networks that are connected to one
  8. DISK A fixed magnetic disk drive used to store data on computes

19 Clues: Its equal to about one billion bytesAn online graphic representation of a userSeveral networks that are connected to oneIt's the most important part of the computer.it’s a unit of frequency equal to one billion hertz.temporary memory bank where your computer stores dataSoftware that displays advertisements on your computer....

CH. 7-Network Fundamentals 2021-10-24

CH. 7-Network Fundamentals crossword puzzle
Across
  1. This is a hardware device that routes data
  2. Port 53 and uses TCP and the protocol finds the IP address
  3. High bandwidth connection used in backbone networks
  4. always on technology that uses phone lines
  5. ______is used to network multiple computers together.
  6. Uses a cable modem to connect to a traditional cable TV network
  7. when a device is assigned a ____ IP the address does not change
  8. Connects multiple wireless devices and uses an access point
  9. port that refers to the destination point for data transfer
  10. is a protocol that automates the task of assigning an Internet Protocol (IP) address (dynamic addressing)
Down
  1. uses different frequencies to send multiple signals over media
  2. port that is an external or internal hardware component where wired connections are plugged into in order to establish communication and data transfer lines
  3. relies on cell towers to create a network used by cell phones and connectivity to the internet
  4. Not a good solution for time-sensitive applications like gaming, Voice over Internet Protocol (VoIP), and video conferencing
  5. a device that allows multiple computers to communicate with each other over a network.
  6. specifies how data is exchanged over the internet/network by providing end-to-end communications that identify how it should
  7. Two parts of an IP address are network and ____
  8. Commonly uses Bluetooth to connect mice, keyboards, phones and tablets
  9. uses an analog modem to call another modem

19 Clues: This is a hardware device that routes dataalways on technology that uses phone linesuses an analog modem to call another modemTwo parts of an IP address are network and ____High bandwidth connection used in backbone networks______is used to network multiple computers together.Port 53 and uses TCP and the protocol finds the IP address...

Computer Parts 2023-10-17

Computer Parts crossword puzzle
Across
  1. A computers storage containing non- volatile, permanent dad that can only be read, not written.
  2. Accepts text files or images from a computer.
  3. A small device that a computer user pushes across a desk in order to point to a play on a display.
  4. Electrical device that offers electric power such as a laptop computer.
  5. The backbone of a computer components that ties together in one spot.
  6. A high capacity, storage device containing a read-write mechanism plus one or more hard disk.
  7. The brain of the computer, containing all the circuitry needed to process storage data and output results.
  8. To pick up sounds such as vibrations in the air into electronic signals.
  9. The computer component for generating and recording audio.
  10. A computers short-term memory where data that is currently being used is stored.
Down
  1. A device used for observing or keeping continuous record of a process.
  2. A terminal device used to enable internet connection through wireless networks.
  3. A card that connects to a computer system to generate images to display
  4. An input device that consists of numbers and letters known as keys.
  5. A COMPUTER CASE USED FOR ACTIVE COOLING.
  6. Universal connection used to connect devices.
  7. Enables a computer to access the internet.
  8. An input device that captures still pictures or motion videos.
  9. A machine that scans documents and converts them into data.

19 Clues: A COMPUTER CASE USED FOR ACTIVE COOLING.Enables a computer to access the internet.Accepts text files or images from a computer.Universal connection used to connect devices.The computer component for generating and recording audio.A machine that scans documents and converts them into data....

Network Systems cross word 2023-08-29

Network Systems cross word crossword puzzle
Across
  1. Balancing The process of distributing network traffic across multiple servers to improve performance.
  2. A unique identifier for devices on a network.
  3. The process of breaking down data into smaller packets for transmission.
  4. A network topology where each device is connected to every other device.
  5. Name System The process of converting domain names into IP addresses.
  6. A protocol that ensures reliable and ordered delivery of data packets.
  7. A device that filters incoming and outgoing network traffic based on a set of rules.
  8. Address A unique address that identifies a device on a network.
  9. The time it takes for a data packet to travel from sender to receiver.
  10. The process of converting private IP addresses to a single public IP address.
  11. A network device that connects multiple networks together.
  12. loss Measurement of packets that are lost in transmission.
  13. The maximum amount of delay that can be tolerated in real-time applications.
Down
  1. The maximum amount of data that can be transmitted in a given time.
  2. Required Bandwidth The minimum amount of bandwidth required for a specific application to function properly.
  3. A device that connects multiple computers in a local area network.
  4. Host Configuration Protocol A protocol that assigns IP addresses dynamically to devices on a network.
  5. The practice of duplicating network components to ensure reliability and availability.
  6. A network topology where all devices are connected to a central hub.
  7. A measure of the amount of data that can be transmitted over a network connection in a certain time.

20 Clues: A unique identifier for devices on a network.A network device that connects multiple networks together.loss Measurement of packets that are lost in transmission.Address A unique address that identifies a device on a network.A device that connects multiple computers in a local area network....

Psychology Vocab Study Guide 2014-04-18

Psychology Vocab Study Guide crossword puzzle
Across
  1. Deviation/ a quantity calculated to indicate the extent of deviation for a group as a whole.
  2. Observation/ is a common research method in behavioral sciences such as psychology
  3. a region of the brain, between the thalamus and the midbrain
  4. its function is to coordinate and regulate muscular activity
  5. middle part of the diencephalon through which sensory impulses pass to reach the cerebral cortex
Down
  1. the central trunk of the mammalian brain
  2. cells/ a supportive cell in the central nervous system.
  3. a substance(as norepinephrine or acetylcholine) that transmits nerve impulses across a synapse.
  4. potential/ the change in electrical potential associated with the passage of an impulse along the membrane of a muscle cell or nerve cell.
  5. a specialized cell transmitting nerve impulses; a nerve cell
  6. system/a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood.
  7. arcs/ the nerve pathway involved in a reflex action including at its simplest a sensory nerve and a motor nerve with a synapse between.
  8. callosum/ a broad band of nerve fibers joining the two hemispheres of the brain

13 Clues: the central trunk of the mammalian braincells/ a supportive cell in the central nervous system.a specialized cell transmitting nerve impulses; a nerve cella region of the brain, between the thalamus and the midbrainits function is to coordinate and regulate muscular activity...

Chapter 10 2015-03-08

Chapter 10 crossword puzzle
Across
  1. vast collection of computer networks that connects millions of computers and tens of millions of people around the world.
  2. various Internet applications that allow individuals to share information and interests in an online community.
  3. second-generation Web technologies that allow for communication and collaboration of people in Web-based communities.
  4. a digital media file, most often audio,distributed via the Internet for playback on a portable media player, such as Apple’s iPod, or a computer.
  5. occurring at the same time
  6. a unique Internet address
Down
  1. an activity structured around a series of questions or searching tasks.
  2. allows two users on the Internet to synchronously communicate by typing messages back and forth to one another in real time.
  3. software that allows users to create and edit Web pages using a Web browser.
  4. not occurring at the same time
  5. inquiry-oriented activities in which some or all of the information used by learners is drawn from resources on the Web
  6. the computer that controls, sorts, and distributes incoming information on a particular topic)
  7. a form of synchronous communication in which users communicate mainly by typing messages to one person or many people at the same time

13 Clues: a unique Internet addressoccurring at the same timenot occurring at the same timean activity structured around a series of questions or searching tasks.software that allows users to create and edit Web pages using a Web browser.the computer that controls, sorts, and distributes incoming information on a particular topic)...

unit5 2015-03-20

unit5 crossword puzzle
Across
  1. 10. __________is unique time and date stamp identifying when the action took place
  2. 7._______ record is a fundamental tool for intrusion detection.
  3. 11. _________condition denotes which, if any, exception condition is raised on return.
  4. 2.____________user is an individual who seizes supervisory control of the system.
  5. 4.Other name of Intruder
  6. 12. _________is a receptor of action
Down
  1. 5.___________value is used to protect the password file in UNIX.
  2. 3._________referred as a hacker or cracker
  3. 1.__________is an individual who is not authorize to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account
  4. 6.________used to protect our network from other networks
  5. 8. ___________ based anomaly detection is profile the activity of each user is developed and used to detect changes in the behavior of individual accounts.
  6. 1._______is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges.
  7. based 9.____________involves an attempt to define a set of rules that can be used to decide changes in the behavior of individual accounts

13 Clues: 4.Other name of Intruder12. _________is a receptor of action3._________referred as a hacker or cracker6.________used to protect our network from other networks7._______ record is a fundamental tool for intrusion detection.5.___________value is used to protect the password file in UNIX....

IC3 Lesson 30 Vocabulary 2015-05-18

IC3 Lesson 30 Vocabulary crossword puzzle
Across
  1. Security feature used for larger networks that controls computers from one point
  2. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  4. Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
  5. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
  1. Encrypts the information in an SSL Certificate
  2. Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
  3. Hackers using spyware to control your browser
  4. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
  5. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
  6. A malicious program that records keystrokes
  7. Deciphers the information in an SSL Certificate
  8. A program that hackers use to capture IDs and passwords on a network

13 Clues: A malicious program that records keystrokesHackers using spyware to control your browserEncrypts the information in an SSL CertificateDeciphers the information in an SSL CertificateA program that hackers use to capture IDs and passwords on a networkSecurity feature used for larger networks that controls computers from one point...

IT Devices 2025-10-24

IT Devices crossword puzzle
Across
  1. A wearable computer in watch form that can track fitness, display notifications, and run simple apps
  2. Device for listening to music more generally with people, which can be wired or work with Bluetooth
  3. combines a cell phone with a handheld computer, having a touchscreen interface and internet access
  4. A portable computer with a built-in screen, keyboard, and trackpad that can be powered by battery or electricity
  5. Portable speaker that fits inside people’s ears and connects to any audio-producing device per Bluetooth
Down
  1. battery used to charge devices like a mobile phone
  2. A small portable device with a touchscreen which resembles a Smartphone but has a larger size
  3. flat surface on which a picture or document of a computer is projected
  4. A thin flat rubber device on which a computer mouse is moved
  5. An input device with keys that allows users to type text and commands into a computer
  6. creates physical copies of digital documents and images on paper or other materials
  7. that controls the cursor on a computer screen by moving and clicking
  8. A networking device that forwards data between computer networks and connects devices to the internet

13 Clues: battery used to charge devices like a mobile phoneA thin flat rubber device on which a computer mouse is movedthat controls the cursor on a computer screen by moving and clickingflat surface on which a picture or document of a computer is projectedcreates physical copies of digital documents and images on paper or other materials...

Chapter 05 Final Digital Security, Ethics, & Privacy Crossword 2018-11-08

Chapter 05 Final Digital Security, Ethics, & Privacy Crossword crossword puzzle
Across
  1. what is a technique intruders use to make their network of Internet transmission appear legitimate to a victim computer or network
  2. what is a program or set of instructions in a program that allows users to bypass security controls
  3. what is the term for a website that uses encryption techniques to protect its data
  4. to read encrypted data, the recipient must decipher it into a readable for. What is the term for this process
  5. what can transmit germs
  6. what occurs when someone steals personal or confidential information
  7. is someone who demands payment in order to stop an attack on an organization's technology infrastructure
Down
  1. a web server stores on a users computer
  2. has the same intent as a cracker, but does not have the technical skills and knowledge
  3. in which devastating type of DoS attach are multiple unsuspecting computers used to attack multiple computer networks
  4. computer viruses, worms, trojan horses, and rootkits are classified as what
  5. is any even or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
  6. what categories are the rights to which creators are entitled for their work
  7. what term refers to making a copy of a file
  8. what gives authors and artists the exclusive rights to duplicate, publish, and sell their materials

15 Clues: what can transmit germsa web server stores on a users computerwhat term refers to making a copy of a filewhat occurs when someone steals personal or confidential informationcomputer viruses, worms, trojan horses, and rootkits are classified as whatwhat categories are the rights to which creators are entitled for their work...

GHC_Crossword2 2012-12-11

GHC_Crossword2 crossword puzzle
Across
  1. The control block or blocks of data added prior to the actual message
  2. A reduction in a signals level as expressed in deciBels
  3. The disturbance or interference of open-air radio transmission to deliberately prevent communication
  4. The arrangement of stations and the links connecting the stations of a data communications network
  5. The undesirable noise or disturbance that occurs on a communications channel, caused by natural or man-made signals
  6. A network station designed to interconnect two otherwise incompatible devices or networks
  7. Any combination of two or more technologies
Down
  1. A grouping of 8 bits
  2. The waiting time, or delay between a stations request to a transmission channel,and completion
  3. A memory device type that loses its stored contents upon electrical power fluctuation or failure
  4. A modems characteristic when it is sending a carrier signal on a multipoint line when it has not been polled
  5. Using a constant time interval between bits or characters to insure that all data communications equipment is in step with each other
  6. A method of data communications using 75 bps as a transmission speed
  7. Interference from radio transmission signals or microwave communication causing a received signal to deflect from the target
  8. A character normally sent at the beginning/end of a synchronous transmission to provide timing and bit synchronization

15 Clues: A grouping of 8 bitsAny combination of two or more technologiesA reduction in a signals level as expressed in deciBelsA method of data communications using 75 bps as a transmission speedThe control block or blocks of data added prior to the actual messageA network station designed to interconnect two otherwise incompatible devices or networks...

Crossword 2023-09-01

Crossword crossword puzzle
Across
  1. The total amount of money earned by a company before expenses.
  2. One of the two global payment card networks along with Visa, founded in 1966.
  3. A code, typically consisting of three or four digits, found on the back of a debit card used for added security in online transactions
  4. Ownership of this type of company is typically not publicly traded.
  5. The measure of how rapidly a company can turn its assets into cash to meet short-term obligations.
  6. A company's financial statement that shows its revenues, expenses, and profits or losses over a specific period.
  7. A financial institution where you can deposit and withdraw money.
Down
  1. The amount of money left over after subtracting expenses from revenue.
  2. The process of systematically allocating the cost of an asset over its useful life.
  3. The financial statement that shows a company's financial position at a specific point in time.
  4. A convenient piece of plastic that grants you the power to make purchases on borrowed funds.
  5. A record of all financial transactions within a business, often categorized into accounts.
  6. The total amount of money owed to creditors by a business or individual.
  7. A unique identification number required to complete online transactions with a debit card.
  8. A financial product that represents ownership in a company.

15 Clues: A financial product that represents ownership in a company.The total amount of money earned by a company before expenses.A financial institution where you can deposit and withdraw money.Ownership of this type of company is typically not publicly traded.The amount of money left over after subtracting expenses from revenue....

MAKAYLA 2024-01-09

MAKAYLA crossword puzzle
Across
  1. Error Error from attempting to represent a number that is too large.
  2. Wide Web a system of linked pages, programs, and files.
  3. Operators <, >, <=, >=, ==, != indicate a Boolean expression
  4. form of program documentation written into the program to be read by people and which do not affect how a program runs.
  5. 8 bits
  6. A computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
  7. A relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.
  8. Associated with an action and supplies input data to a program. Can be generated when a key is pressed, a mouse is clicked, a program is started, or by any other defined action that affects the flow of execution.
Down
  1. A named group of programming instructions. Also referred to as a “procedure”.
  2. Device a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
  3. the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
  4. A type of computer that forwards data across a network
  5. A way of representing information using only two options.
  6. Finding and fixing problems in an algorithm or program.
  7. bias Data that does not accurately reflect the full population or phenomenon being studied

15 Clues: 8 bitsA type of computer that forwards data across a networkWide Web a system of linked pages, programs, and files.Finding and fixing problems in an algorithm or program.A way of representing information using only two options.Operators <, >, <=, >=, ==, != indicate a Boolean expression...

Cash Vocab 2024-02-22

Cash Vocab crossword puzzle
Across
  1. the permanent reduction of a company's labor force by removing unproductive workers or divisions
  2. someone that another person or company hires to perform a service
  3. the process of actively seeking out, finding and hiring candidates for a specific position or job
  4. a form employers use to collection information about you to see if you are a good fit for the position
  5. a venture that involves persuading customers to buy products to increase sales
  6. a formal, in-depth conversation between two or more persons, wherein exchange of information takes place, with a view of checking candidate's acceptability for the job.
  7. a short written description of your education, qualifications, previous jobs, and sometimes also your personal interests
  8. to give up a job or position by telling your employer that you are leaving
Down
  1. the platforms on which users build social networks and share information—to build a company's brand, increase sales, and drive website traffic
  2. a recommendation from a business contact
  3. the total amount of sales you make over a set period
  4. the end of an employee's work with a company
  5. an individual or organization that has employees.
  6. an essential tool for banks, lenders, suppliers and credit grantors in assessing the creditworthiness of small businesses.
  7. a permanent decrease in the total number of workers a company employs

15 Clues: a recommendation from a business contactthe end of an employee's work with a companyan individual or organization that has employees.the total amount of sales you make over a set periodsomeone that another person or company hires to perform a servicea permanent decrease in the total number of workers a company employs...

Module 3 Crossword 2019-04-19

Module 3 Crossword crossword puzzle
Across
  1. This word is short for binary digit and is the smallest unit of data represented in a computer.
  2. CPU is considered the _________ of the computers.
  3. This IP address is temporary and changes periodically.
  4. Evaluating the way the facility does business in order to improve efficiency is known as _________.
  5. This country represses what its citizens can read on the web.
  6. How a network is organized or laid out is referred to as its _________.
  7. Whether new services or new clinics will be implemented is an example of _________ scanning.
Down
  1. In a project plan, this phase prepares the facility for the conversion from the old system to the new.
  2. System _________ is the combining of the various subsystems into one larger system and ensuring that the subsystems function together as a whole.
  3. This standard method for network management is used to manage small networks and is a simple network solution that does not require a server.
  4. The Open Systems Interconnection (OSI) is composed of how many layers?
  5. This acts as a bridge and takes data from one system and plugs that data into another.
  6. When evaluating the training, this evaluates what the trainees thought about the training.
  7. This system locates data that is stored in primary or secondary storage.
  8. This was the first standard protocol for communication between EHR components.

15 Clues: CPU is considered the _________ of the computers.This IP address is temporary and changes periodically.This country represses what its citizens can read on the web.The Open Systems Interconnection (OSI) is composed of how many layers?How a network is organized or laid out is referred to as its _________....

Intro to Psych Exam 4 Review 2024-04-10

Intro to Psych Exam 4 Review crossword puzzle
Across
  1. an emotional reaction that leads to resistance against pressure to conform.
  2. the idea that the experience of emotion is accompanied by physical arousal.
  3. the HPA axis is the system of connections between the hypothalamus, the adrenal glands, and the ____ that plays an important role in our experience of stress.
  4. ___ sleep happens 25% of the time.
  5. the common tendency to overestimate the role of personal factors and overlook the impact of social situations in judging others is called the ___ attribution error.
  6. ___ motivation comes from the pleasure of the activity itself.
Down
  1. a state of consciousness involving focused attention and reduced peripheral awareness.
  2. the theory that the experience of emotion is the result of experienced arousal.
  3. another name for sleepwalking.
  4. the behavioral reaction to stress that involves activities designed to create social networks that provide protection from threats.
  5. the natural inclination to sleep at a certain time.
  6. when group members prioritize group harmony and do not voice concerns about a decision being made.
  7. self-monitoring is the tendency to ___ behavior to meet the demands of social situations.
  8. the tendency to perform cognitively easy tasks ___ in the presence of others is called social facilitation.
  9. an optimal experience during which the mind and body work harmoniously while homed in on a specific task.

15 Clues: another name for sleepwalking.___ sleep happens 25% of the time.the natural inclination to sleep at a certain time.___ motivation comes from the pleasure of the activity itself.an emotional reaction that leads to resistance against pressure to conform.the idea that the experience of emotion is accompanied by physical arousal....

Browsing Safely 2025-06-05

Browsing Safely crossword puzzle
Across
  1. IT IS A COLLECTION OF TECHNOLOGIES,PROCESSES AND PRACTICES DESIGNED TO PROTECT NETWORKS,COMPUTERS,PROGRAMS, AND DATA FROM ATTACK OR DAMAGE
  2. IT IS AN IMPRESSION WHEN ENGAGE IN VARIOUS ONLINE ACTIVITIES LIKE BROWSING,COMMUNICATING ETC.
  3. IT IS USED TO CONDUCT TERRORISM THROUGH THE USE OF COMPUTER AND INTERNET TO CAUSE FEAR AND PANIC
  4. IT IS A CRIME IN WHICH VICTIM IS ATTACKED FIRST AND THEN FORCED TO PAY MONEY TO STOP FURTHER ATTACKS
  5. IT IS A CRIMINAL ACTIVITY INTENDED TO HARM ANYONE USING INTERNET AND COMPUTER
  6. IN THIS PROCESS TO FOOL ANYONE TO BE FROM A BANK AND TRICK PEOPLE INTO GIVING THEM MONEY
  7. IT MEANS HOAXING OR MISLEADING
  8. SET OF PROGRAMS THAT HAMPER THE NORMAL FUNCTIONING OF COMPUTER
  9. IT IS A SOFTWARE THE HELPS IN PREVENTING UNAUTHORIZED ACCESS TO YOUR COMPUTER
Down
  1. THEY ARE CALLED 'UNETHICAL HACKERS'
  2. IT IS THE PROCESS OF 'BEFRIENDING' CHILDREN ON SOCIAL MEDIA TO FACILITATE ONLINE OR PHYSICAL SEXUAL ABUSE
  3. IT REFERS TO THE ACT OF STEALING AND MISUSING SOMEONE'S PERSONAL INFORMATION.
  4. IT REFERS TO ILLEGAL ENTRY OF SOMEONE'S COMPUTER SYSTEM OR NETWORK
  5. IT IS AN ACT OF HARMING OR HARASSING ANYONE USING INFORMATION TECHNOLOGY
  6. IT IS A COMPUTER PROGRAM THAT IS DESIGNED TO IDENTIFY,PREVENT,AND REMOVE VIRUSES FROM COMPUTER

15 Clues: IT MEANS HOAXING OR MISLEADINGTHEY ARE CALLED 'UNETHICAL HACKERS'SET OF PROGRAMS THAT HAMPER THE NORMAL FUNCTIONING OF COMPUTERIT REFERS TO ILLEGAL ENTRY OF SOMEONE'S COMPUTER SYSTEM OR NETWORKIT IS AN ACT OF HARMING OR HARASSING ANYONE USING INFORMATION TECHNOLOGYIT REFERS TO THE ACT OF STEALING AND MISUSING SOMEONE'S PERSONAL INFORMATION....

Technology 2023-05-08

Technology crossword puzzle
Across
  1. a set of computer programs and associated documentation and data
  2. the most important processor in a given computer
  3. an organized collection of structured information, or data, typically stored electronically in a computer system
  4. intelligence demonstrated by machines, as opposed to intelligence displayed by humans or by other animals
  5. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
  6. network a set of computers sharing resources located on or provided by network nodes
  7. every aspect of protecting an organization and its employees and assets against cyber threats
  8. an electronic link providing direct access from one distinctively marked place in a hypertext or hypermedia document to another in the same or a different document.
  9. a worldwide system of computer networks
Down
  1. the physical parts of a computer
  2. to transfer
  3. the transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems
  4. a type of malicious software, or malware, that spreads between computers and causes damage to data and software
  5. design, construction, and use of machines (robots) to perform tasks done traditionally by human beings
  6. a specific unit of data that's equal to about 1 billion bytes of data

15 Clues: to transferthe physical parts of a computera worldwide system of computer networksthe most important processor in a given computera set of computer programs and associated documentation and dataa specific unit of data that's equal to about 1 billion bytes of datanetwork a set of computers sharing resources located on or provided by network nodes...

The Gift of the magi 2025-02-11

The Gift of the magi crossword puzzle
Across
  1. When you ransack, you rifle through things, steal some of them, and leave a huge mess behind
  2. Of all the social networks, one predominates.
  3. If you are ardent, you are passionate about something. A pop star's ardent admirers might go so crazy at his concert that they faint from excitement.
  4. To chronicle an event is to record it as it happens, and a chronicle is a record of those events.
  5. Use the noun prudence to describe sensible decisions about everyday life, like the prudence of people who spend their money wisely, saving as much as they can.
  6. The adjective ecstatic turns the noun "ecstasy" into a descriptive word.
  7. A vestibule is a little area just inside the main door of a building, but before a second door
  8. based on pretensedeceptively pleasing
Down
  1. Parsimony is a noun to use when you are watching your money very carefully
  2. lower the value of something
  3. Wanting what someone else has and resenting them for having it is envy.
  4. solicitation for money or food (especially in the street by an apparently penniless person
  5. An adornment is some ornament or accent that makes a person or thing look more attractive.
  6. cause extensive destruction or ruin utterly
  7. Sterling is British money, but it also describes anything of very high quality

15 Clues: lower the value of somethingbased on pretensedeceptively pleasingcause extensive destruction or ruin utterlyOf all the social networks, one predominates.Wanting what someone else has and resenting them for having it is envy.The adjective ecstatic turns the noun "ecstasy" into a descriptive word....

Authentication and Authorization 2024-11-26

Authentication and Authorization crossword puzzle
Across
  1. _______ is an authorization model that grants access to an organization’s specific resources based on the relationship between the user and the resource.
  2. __________ Layer a security protocol that encrypts data transmitted between systems
  3. Organizations need to pick an authorization model that is easy for users to understand but also provides the required level of security.
  4. A authorization step where the user enters _______.
  5. A authorization step where the _____ sends request to server.
  6. _______ access control that restricts access based on the level of sensitivity of the resources.
  7. The process of verifying a user's identity by checking their credentials.
Down
  1. ________ grants users access to an organization’s specific data and systems based on particular attributes associated with the user.
  2. ________ authentication uses unique physical characteristics.
  3. ______ Directory Access Protocol refers to a standard protocol used to access and manage directory information.
  4. ________ access control defines roles and privileges to restrict systems access to only authorized users.
  5. ________ is the process after authentication that determines the level of access a user has to system resources such as data, applications and networks.
  6. _____ is the opposite of MAC as it assigns privileges based on the user and the access group.
  7. __________ authentication provides a temporary token
  8. Allows users to log in to multiple applications using the same set of credentials.

15 Clues: A authorization step where the user enters _______.__________ authentication provides a temporary token________ authentication uses unique physical characteristics.A authorization step where the _____ sends request to server.The process of verifying a user's identity by checking their credentials....

Information Technology Career Cluster 2025-10-06

Information Technology Career Cluster crossword puzzle
Across
  1. The amount of data that can be transmitted over a network in a given amount of time.
  2. the development, maintenance, and use of computer software, systems, and networks
  3. Part of a computer system that is designed to block unauthorized access
  4. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  5. unwanted e-mail (usually of a commercial nature sent out in bulk)
  6. a small amount of data generated by a website and saved by your web browse to remember information about you.
  7. A program used to view Web pages.
  8. new technologies that aim to conserve the natural environment and resources.
  9. identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
  10. a person who designs, writes and installs computer programs and applications
Down
  1. helps increases or maintains the capabilities of a person with a disability
  2. type of software that can process information on its own without human intervention.
  3. the process of converting human instructions into a language that a computer can understand and follow
  4. Measures taken to protect a computer or computer system against unauthorized access or attack
  5. A global network connecting millions of computers, making it possible to exchange information.

15 Clues: A program used to view Web pages.unwanted e-mail (usually of a commercial nature sent out in bulk)Part of a computer system that is designed to block unauthorized accesshelps increases or maintains the capabilities of a person with a disabilitynew technologies that aim to conserve the natural environment and resources....

Patrick Cybersecurity Crossword 2026-04-01

Patrick Cybersecurity Crossword crossword puzzle
Across
  1. malicious software that secretly installs on your device to steal personal data like passwords, browsing habits, and financial details, often without your knowledge, causing identity theft, fraud, or system slowdowns
  2. Unsolicited messages sent to a large group of people
  3. backup of all changes made since last full backup
  4. malware disguised as legitimate software, tricking users into installing it to gain unauthorized access to their systems for stealing data, creating backdoors, or causing damage like deleting files
  5. the process of securing a system from attacks by discovering/reducing system vulnerabilities
  6. a type of malicious software (malware) that attaches to legitimate files, replicates itself, and spreads to other programs and devices, often without the user's knowledge
Down
  1. Consists of security controls designed to protect individual computers
  2. type of self-replicating malware that spreads across networks, exploiting security flaws to infect other devices independently
  3. unwanted software that secretly installs on your device to bombard you with ads, slowing performance and posing security risks
  4. has digital technology similar to a flash drive, no moving parts
  5. backup of any daily changes or new data files
  6. stores data using laser technology
  7. complete copy of all data files
  8. Emails that “fish” for users’ private information
  9. uses electronic technology; needs USB port to connect/save files

15 Clues: complete copy of all data filesstores data using laser technologybackup of any daily changes or new data filesbackup of all changes made since last full backupEmails that “fish” for users’ private informationUnsolicited messages sent to a large group of peoplehas digital technology similar to a flash drive, no moving parts...

Greek Trade Routes 2025-05-01

Greek Trade Routes crossword puzzle
Across
  1. networks Systems of exchange connecting different regions for the purpose of buying, selling, or bartering goods.
  2. Independent sovereign cities that function as political and economic centers, such as Athens or Corinth in ancient Greece.
  3. Prominent natural or manmade features used for navigation, such as mountains or lighthouses.
  4. winds Seasonal northerly winds in the Mediterranean used by sailors for predictable travel.
  5. A fast ancient Greek warship with three rows of oars, used to protect trade routes.
  6. A sturdy Greek merchant ship designed for transporting goods.
  7. (North Star) A fixed star used by navigators to find true north.
  8. A sundial component used to measure the sun’s altitude and estimate latitude.
Down
  1. People who travel or work on the sea, especially sailors or navigators.
  2. (Pilot Books) Written guides describing coastal routes, distances, and harbors.
  3. A simple navigational tool for measuring star angles, possibly used by later Greek sailors.
  4. Sea The ancient Greek name for the Black Sea.
  5. Sea The body of water between Greece and Asia Minor, central to Greek trade and culture.
  6. navigation The practice of using stars, the sun, and the moon to determine direction and position at sea.
  7. Heavy devices dropped to the seabed to keep ships stationary in harbors or during storms.
  8. of Alexandria An ancient lighthouse in Egypt, one of the Seven Wonders, aiding sailors in navigation.
  9. Graecia Greek colonies in southern Italy and Sicily.

17 Clues: Sea The ancient Greek name for the Black Sea.Graecia Greek colonies in southern Italy and Sicily.A sturdy Greek merchant ship designed for transporting goods.(North Star) A fixed star used by navigators to find true north.People who travel or work on the sea, especially sailors or navigators....

Networking 2025-10-20

Networking crossword puzzle
Across
  1. the most basic networking device that connects multiple computers or other network devices together.
  2. A very large Wide Area Network.
  3. Wide Web An information system on the Internet which allows documents to be connected to other documents by hypertext links.
  4. The computer on a network that request data from a server.
  5. A group of interconnected computers and devices.
  6. A router is a device that routes data packets transmitted within a network, or between networks, to their intended destination.
  7. "billions"
  8. a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.
  9. using wires or cables rather than wireless technology to transmit signals
  10. "millions", so 1Mbit = 1,000,000 bits
Down
  1. In computing, bandwidth is the maximum rate of data transfer across a given path,(measured in "bits")
  2. printers, etc...) and connections in a network.
  3. Topology The description of the arrangement of devices (e.g. switches, routers, computers,
  4. Delay in the time from when the information is requested, until it is received.
  5. A computer that holds data to be shared with other computers. Example: A Web Server stores and serves websites. An eMail Server stores and serves eMails.
  6. A network component that filters network packets, so that a device attached to the network only receives packets intended for that device.
  7. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  8. using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
  9. smallest unit of data

19 Clues: "billions"smallest unit of dataA very large Wide Area Network."millions", so 1Mbit = 1,000,000 bitsprinters, etc...) and connections in a network.A group of interconnected computers and devices.The computer on a network that request data from a server.using wires or cables rather than wireless technology to transmit signals...

Networking 2023-01-09

Networking crossword puzzle
Across
  1. a computer network restricted to an organization
  2. certain sets of rules that determine how data should be transferred over networks, compressed, presented on the screen and so on.
Down
  1. a computer network that allows controlled access to an information source available on internet.
  2. the layout in which various components of a network are connected and communicate with each other.

4 Clues: a computer network restricted to an organizationa computer network that allows controlled access to an information source available on internet.the layout in which various components of a network are connected and communicate with each other....

PC 2022-09-20

PC crossword puzzle
Across
  1. a term in translation meaning "prescription", that is, a given sequence of actions. This concept is directly related to the concept of an algorithm.
  2. compact portable computer
  3. a type of malicious programs that can infiltrate the code of other programs, system memory areas, boot sectors and distribute their copies over various communication channels
  4. a type of transmission line, a device for transmitting electromagnetic energy or signals from one object to another.
  5. this is any information received and transmitted, stored by various sources.
Down
  1. data, or content, that is combined with each other in various forms: sound, animated computer graphics, video.
  2. a program or set of programs used to control a computer
  3. a document or set of documents intended to represent something
  4. a device that performs logical operations and data processing may use display input and output devices, and typically includes a central processing unit (CPU) for performing operations.
  5. information and communication network and a worldwide system of interconnected computer networks for storing and transmitting information.

10 Clues: compact portable computera program or set of programs used to control a computera document or set of documents intended to represent somethingthis is any information received and transmitted, stored by various sources.data, or content, that is combined with each other in various forms: sound, animated computer graphics, video....

PC 2022-09-20

PC crossword puzzle
Across
  1. data, or content, that is combined with each other in various forms: sound, animated computer graphics, video.
  2. a document or set of documents intended to represent something
  3. compact portable computer
  4. a device that performs logical operations and data processing may use display input and output devices, and typically includes a central processing unit (CPU) for performing operations.
  5. this is any information received and transmitted, stored by various sources.
Down
  1. a type of malicious programs that can infiltrate the code of other programs, system memory areas, boot sectors and distribute their copies over various communication channels
  2. information and communication network and a worldwide system of interconnected computer networks for storing and transmitting information.
  3. a type of transmission line, a device for transmitting electromagnetic energy or signals from one object to another.
  4. a program or set of programs used to control a computer
  5. a term in translation meaning "prescription", that is, a given sequence of actions. This concept is directly related to the concept of an algorithm.

10 Clues: compact portable computera program or set of programs used to control a computera document or set of documents intended to represent somethingthis is any information received and transmitted, stored by various sources.data, or content, that is combined with each other in various forms: sound, animated computer graphics, video....

Network Essentials 2022-11-09

Network Essentials crossword puzzle
Across
  1. a way to map multiple local private addresses to a public one before transferring the information
  2. directing traffic from the outside world to the appropriate server inside a local TCP/IP network
  3. network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment
  4. interface card, hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network
  5. a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
Down
  1. perimeter network that protects an organization's internal local area network (LAN) from untrusted traffic
  2. networking device that forwards data packets between computer networks
  3. hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device
  4. device that converts data from a digital format into a format suitable for an analog transmission
  5. device or computer that allows wireless devices to connect to and communicate with a network

10 Clues: networking device that forwards data packets between computer networksdevice or computer that allows wireless devices to connect to and communicate with a networkdirecting traffic from the outside world to the appropriate server inside a local TCP/IP network...

DIGITAL CROSSWORD 2022-05-27

DIGITAL CROSSWORD crossword puzzle
Across
  1. a device or program enabling a user to communicate with a computer.
  2. a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
  3. a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.
  4. the transmission capacity of a computer network or other telecommunication system.
Down
  1. the process or action of verifying the identity of a user or process.
  2. the machines, wiring, and other physical components of a computer or other electronic system.
  3. convert (information or an instruction) into a particular form.
  4. a program or piece of software designed and written to fulfill a particular purpose of the user.
  5. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  6. a method of transmitting or receiving data (especially video and audio material) over a computer network as a steady, continuous flow, allowing playback to start while the rest of the data is still being received.

10 Clues: convert (information or an instruction) into a particular form.a device or program enabling a user to communicate with a computer.the process or action of verifying the identity of a user or process.the transmission capacity of a computer network or other telecommunication system....

IOT Crossword 2022-07-05

IOT Crossword crossword puzzle
Across
  1. Reduces the cost of backhauling all IoT data to the cloud.
  2. A device used by utility companies to collect information about energy consumption (e.g., electricity, natural gas, water), and transmit the data back to the company or even to the consumer.
  3. An umbrella term for M2M technology when it focuses exclusively on industrial machines.
  4. A collection of scattered, independent devices that measure environmental or physical conditions, all without significant power consumption.
  5. This is any device that gathers information from various network points and sends that information on to another network.
  6. ________ in IoT is one of the key characteristics, devices have different hardware platforms and networks.
Down
  1. Mobile Cloud applications moves the __________ Power and __________ away from the mobile phone, and into the cloud.
  2. This network is commonly used to pair health-tracking wearables with users’ cell phones and install location trackers on household devices.
  3. World’s largest technical professional society that aims to promote standardization through international electronics development.
  4. The language two or more machines use to communicate with each other.

10 Clues: Reduces the cost of backhauling all IoT data to the cloud.The language two or more machines use to communicate with each other.An umbrella term for M2M technology when it focuses exclusively on industrial machines.________ in IoT is one of the key characteristics, devices have different hardware platforms and networks....

June 2020 Newsletter Crossword Puzzle 2020-06-04

June 2020 Newsletter Crossword Puzzle crossword puzzle
Across
  1. Occurs when an employee shares personally identifiable information about a single or relatively small number of people to an unauthorized recipient.
  2. An alternate way of accessing a system. Malware might add a backdoor to a system after infecting it.
  3. Inactive data that is physically stored on media such as a hard drive, laptop, flash drive, or archived/stored another way.
  4. Data that is actively moving from one location to another via the Internet or over a network.
  5. Practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks by cyber criminals.
  6. Process that occurs when a user proves identity, such as using a personal identity verification card and/or password.
Down
  1. The result of taking plaintext and encrypting it.
  2. Grants authorized users the right to use a service while preventing access to non-authorized users.
  3. A list of applications that users are allowed to install and run on their computers.
  4. A password attack that attempts to guess a password.

10 Clues: The result of taking plaintext and encrypting it.A password attack that attempts to guess a password.A list of applications that users are allowed to install and run on their computers.Data that is actively moving from one location to another via the Internet or over a network....

Fake news 2019-11-16

Fake news crossword puzzle
Across
  1. The use of humour, irony, exaggeration, or ridicule to expose and criticize people's stupidity or vices, particularly in the context of contemporary politics and other topical issues.
  2. A person who writes for newspapers, magazines, or news websites or prepares news to be broadcast.
  3. The activity or industry of broadcasting sound programmes to the public.
  4. A printed publication (usually issued daily or weekly) consisting of folded unstapled sheets and containing news, articles, advertisements, and correspondence.
  5. Make sure or demonstrate that (something) is true, accurate, or justified.
Down
  1. Information, especially of a biased or misleading nature, used to promote a political cause or point of view.
  2. A person who is professionally involved in politics, especially as a holder of an elected office.
  3. A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  4. Of undisputed origin and not a copy; genuine.
  5. A set of related web pages located under a single domain name.

10 Clues: Of undisputed origin and not a copy; genuine.A set of related web pages located under a single domain name.The activity or industry of broadcasting sound programmes to the public.Make sure or demonstrate that (something) is true, accurate, or justified.A person who is professionally involved in politics, especially as a holder of an elected office....

Puzzle 2021-01-20

Puzzle crossword puzzle
Across
  1. Sometimes abbreviated as DL, D/L, or DLing, download is a term used to describe copying data from one computer to another, either over a network or modem
  2. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
  3. Alternatively referred to as a link and web link, a hyperlink is an icon, graphic, or text that links to another file or object
Down
  1. bar Browser that can identify the user’s location on the web and allows them access to different websites
  2. A web address or internet address
  3. The physical components of my computer or device
  4. browser links to support websites for further information and help.
  5. the programs and other operating information used by computer
  6. engine A search engine is a software system that is designed to carry out web searches, which means to search the World Wide Web in a systematic way for particular information specified in a textual web search query.
  7. the process of assigning a code to something for classification or identification.

10 Clues: A web address or internet addressThe physical components of my computer or devicethe programs and other operating information used by computerbrowser links to support websites for further information and help.the process of assigning a code to something for classification or identification....

crossHR 2021-09-19

crossHR crossword puzzle
Across
  1. Evaluation of employees’ current and potential levels of performance for managers to make objective human resources decisions
  2. Sexual Harassment (Prevention, Prohibition and Redressal) Act, 2013 requires the formation of an Internal ______ Committee
  3. Amount subtracted from gross pay
  4. Acknowledgement of employees performance or achievements
  5. _______ is an incentive that motivates employees to recruit candidates from within their networks
  6. Employee _____ Form is a formal document that department managers use to request the hiring of the new employees
Down
  1. Job _____ is a detailed description of the role, including all responsibilities, objectives and requirements
  2. The ______ contract refers to the unwritten, intangible agreement between an employee and their employer that describes the informal commitments, expectations and understandings that make up their relationship
  3. The _____ act prescribes the basic rights and interests of the workers, and the guarantee to provide them with basic amenities like proper sanitation, ventilated work space, safety for using machinery etc.
  4. _______ framework is a means by which organizations communicate which behaviours are required, valued, recognized and rewarded with respect to specific occupational roles

10 Clues: Amount subtracted from gross payAcknowledgement of employees performance or achievementsJob _____ is a detailed description of the role, including all responsibilities, objectives and requirements_______ is an incentive that motivates employees to recruit candidates from within their networks...

Module 2 Post-test 2021-04-26

Module 2 Post-test crossword puzzle
Across
  1. This community perspective uses self-organization and encourages the local citizens to contribute to the community by taking responsibilities and actions.
  2. It is described from social science perspective as a group of people interacting together.
  3. One highlight of civil society perspective wherein the members of the community may involve themselves in various community activities.
  4. The ultimate of this discipline is to improve the lives of others such that their needs are satisfied.
  5. Civil society perspective is considered as _______model since because of collaboration a sense of belonging is achieved.
  6. It is most often associated with the study, diagnosis of mental illnesses.
Down
  1. It explains the connection between the individual and the community.
  2. This field is focused in the study of society, social orders, socialization and culture.
  3. One of the perspectives in community wherein it understands that community is composed of the ways people interact with each other, react, and expect each other to act and interact.
  4. Institutional community is a_______model as it is defined by its networks and institutions.

10 Clues: It explains the connection between the individual and the community.It is most often associated with the study, diagnosis of mental illnesses.This field is focused in the study of society, social orders, socialization and culture.It is described from social science perspective as a group of people interacting together....

money puzzle 2021-11-03

money puzzle crossword puzzle
Across
  1. where you record all of the check and cash transactions your business has during an accounting period
  2. a card issued by a bank allowing the holder to transfer money electronically to another bank account when making a purchase
  3. uses a website or app to transfer funds from one person to another over the internet or mobile networks
  4. a small card that can be exchanged for a specified cash value of goods or services from a particular business, given as a gift
  5. a small plastic card issued by a bank, business, etc., allowing the holder to purchase goods or services on credit
Down
  1. the loss of potential gain from other alternatives when one alternative is chosen
  2. a card you can use to pay things
  3. an account at a bank against which checks can be drawn by the account depositor
  4. a price for a service for commodity that includes all extra costs incidental to the item
  5. a balance achieved between two desirable but incompatible features; a compromise

10 Clues: a card you can use to pay thingsan account at a bank against which checks can be drawn by the account depositora balance achieved between two desirable but incompatible features; a compromisethe loss of potential gain from other alternatives when one alternative is chosen...

Empowerment Technology: 6 types of Social Media 2023-03-15

Empowerment Technology: 6 types of Social Media crossword puzzle
Across
  1. the sixth type of social media.
  2. people can upload photos or videos to our service and share them with their followers or with a select group of friends.
  3. example of bookmarking sites. It is an image sharing app and social media service designed to enable saving and discovery of information on the internet
  4. sites that allow users to pont their own sew items or links to news sources. This users can also comment on the post and sents say ale i rank.
  5. websites and apps that allow users and organizations to connect, communicate, share information and form relationships.
Down
  1. sites that allow you to upload and share medis content like images, music and video
  2. interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
  3. regularly updated websites that provide insight into a certain topic.
  4. sites that allow you to store and manage links to various website and resources.
  5. form of blogging using short posts without titles.It allow users to exchange small elements of content

10 Clues: the sixth type of social media.regularly updated websites that provide insight into a certain topic.sites that allow you to store and manage links to various website and resources.sites that allow you to upload and share medis content like images, music and video...

CW Crypto #4 2023-04-01

CW Crypto #4 crossword puzzle
Across
  1. Acronym for "decentralized autonomous organization," an organization that runs on a blockchain network and is governed by its members
  2. The process of holding and locking up cryptocurrency to help validate transactions on a proof-of-stake blockchain network
  3. The maximum amount of gas that can be used for a transaction on the Ethereum network
  4. A scaling solution that creates a network of sidechains to improve transaction throughput on the Ethereum network
  5. A practice in DeFi where users earn rewards for providing liquidity to a liquidity pool
Down
  1. The ability for different blockchain networks to communicate and exchange value with each other
  2. Acronym for "decentralized finance," a set of financial applications that run on a blockchain network
  3. A secondary protocol built on top of a blockchain network to improve scalability and reduce costs
  4. loan A type of uncollateralized loan in DeFi that is borrowed and repaid within the same transaction
  5. market maker (AMM) A type of decentralized exchange that uses an algorithm to determine the price of assets

10 Clues: The maximum amount of gas that can be used for a transaction on the Ethereum networkA practice in DeFi where users earn rewards for providing liquidity to a liquidity poolThe ability for different blockchain networks to communicate and exchange value with each other...

c2 2023-04-01

c2 crossword puzzle
Across
  1. The process of exchanging one type of cryptocurrency token for another on a decentralized exchange or protocol
  2. A consensus mechanism used by some cryptocurrencies that uses a verifiable delay function to create a timeline of events
  3. The process of providing liquidity to a decentralized exchange or protocol to earn rewards
  4. A mechanism that connects liquidity across different blockchain networks to enable cross-chain trading
  5. A service that aggregates transactions from multiple users to create a single transaction on a rollup network
  6. A set of rules and guidelines for creating and managing a particular type of cryptocurrency token
Down
  1. The backbone of the Ethereum 2.0 network, which coordinates and finalizes shard chains
  2. The ability for a blockchain network to support multiple chains or shards to improve scalability
  3. A network of oracles that provides off-chain data to a blockchain network to execute smart contracts
  4. proof A cryptographic method that allows for the verification of a statement without revealing any information about it

10 Clues: The backbone of the Ethereum 2.0 network, which coordinates and finalizes shard chainsThe process of providing liquidity to a decentralized exchange or protocol to earn rewardsThe ability for a blockchain network to support multiple chains or shards to improve scalability...

Biology Crossword 2023-05-08

Biology Crossword crossword puzzle
Across
  1. large biomolecules and macromolecules that comprise one or more long chains of amino acid residues.
  2. whose molecules consist of a number of sugar molecules bonded together.
  3. ribonucleic acid, a nucleic acid present in all living cells
  4. acid organic acid that contains a carboxyl group (C(=O)OH) attached to an R-group.
  5. an organic compound derived from two amino acids
Down
  1. process of reacting monomer molecules together in a chemical reaction to form polymer chains or three-dimensional networks.
  2. any of the class of sugars
  3. a substance produced by a living organism which acts as a catalyst to bring about a specific biochemical reaction.
  4. acid a complex organic substance present in living cells, especially DNA or RNA, whose molecules consist of many nucleotides linked in a long chain.
  5. any of a class of organic compounds that are fatty acids or their derivatives and are insoluble in water but soluble in organic solvents. They include many natural oils, waxes, and steroids.

10 Clues: any of the class of sugarsan organic compound derived from two amino acidsribonucleic acid, a nucleic acid present in all living cellswhose molecules consist of a number of sugar molecules bonded together.acid organic acid that contains a carboxyl group (C(=O)OH) attached to an R-group....

Montsee CLasheer 2013-05-01

Montsee CLasheer crossword puzzle
Across
  1. is a program written with malicious intent and sent out by attackers
  2. Sends abnormally large amounts of requests to a system preventing access to the services
  3. is a person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
  4. or malware is a file or program other then a virus that is potentially harmful. Many grayware attacks are phishing attacks that try to persuade the reader to unknowingly provide attackers with access to personal information
  5. guidelines are an important component of a security policy.
  6. is a self-replicating program that is harmful to networks
Down
  1. Gains access to resources on devices by pretending to be a trusted computer\
  2. also known as secure erase, is a procedure performed to permanently delete data from a hard drive.
  3. is as important as data security. When a computer is taken, the data is also stolen.
  4. is technically a worm.does not need to be attached to other software.

10 Clues: is a self-replicating program that is harmful to networksguidelines are an important component of a security policy.is a program written with malicious intent and sent out by attackersis technically a worm.does not need to be attached to other software.Gains access to resources on devices by pretending to be a trusted computer\...

CS 102 Lecture 5 Crossword Puzzle 2017-04-18

CS 102 Lecture 5 Crossword Puzzle crossword puzzle
Across
  1. The application of investigation and technical analysis to preserve digital evidence that can be used in a court of law.
  2. This internet attack disrupts computer access to an internet service by sending an influx of confusing data messages or useless traffic to a computer network.
  3. This cyber-criminal has the malicious intention of destroying data, stealing information or committing another type of crime.
Down
  1. These attacks play on human error to bypass technical security controls.
  2. This cyber-criminal is an amateur that uses pre-written hacking and cracking programs to break into computers or networks.
  3. Programs that act without a user's knowledge and alter operations of computers and mobile devices.
  4. This cyber-criminal describes someone who enter a computer or network illegally.
  5. This cyber criminal uses the internet or network to destroy computers for political reasons.
  6. The ____ web is a portion of the internet that cannot be accessed through regular search engines.
  7. These controls help reduce the chances of theft and include surveillance cameras, the use of security guards, alarm systems and locking devices.

10 Clues: These attacks play on human error to bypass technical security controls.This cyber-criminal describes someone who enter a computer or network illegally.This cyber criminal uses the internet or network to destroy computers for political reasons.The ____ web is a portion of the internet that cannot be accessed through regular search engines....

Bitcoin 2018-05-06

Bitcoin crossword puzzle
Across
  1. The permanent divergence of an alternative operating version of the current blockchain.
  2. An application that stores, sends and receives bitcoins.
  3. A ____ ledger is the ledger in which all of the data, while being synchronized and replicable is controlled by a singular network or individual.
  4. The number of blocks preceding the genesis block on the chain.
  5. Measuring unit of the processing power of the Bitcoin network.
Down
  1. The act of using the same bitcoin twice.
  2. The infamous website which was like the Amazon of the black market in which all the prices for the illegal drugs and other illicit materials were quoted in bitcoin.
  3. A ___ is a record in the block chain that contains and confirms many waiting transactions.
  4. The ____ in a bitcoin block is a 32-bit field whose value is set so that the hash of the block will contain a run of leading zeros.
  5. A ____ ledger is an agreement of shared, replicable and synchronized data, spread across multiple networks, across many CPU’s.

10 Clues: The act of using the same bitcoin twice.An application that stores, sends and receives bitcoins.The number of blocks preceding the genesis block on the chain.Measuring unit of the processing power of the Bitcoin network.The permanent divergence of an alternative operating version of the current blockchain....

Crossword 2021-12-17

Crossword crossword puzzle
Across
  1. Example of software agents by computing environment
  2. Component of Artifical Intelligence
  3. A machine is described as _________ if it can perform its task or tasks without needing human intervention.
  4. Program that is designed to communicate with people through text or voice commands in a way that mimics human-to-human conversation.
Down
  1. A set of rules that a machine can follow to learn how to do a task
  2. This subset of AI is particularly focused on developing algorithms that will help machines to learn and change in response to new data, without the help of a human being.
  3. is an interdisciplinary branch of computer science and engineering
  4. This field of research is focused on developing AI that is equal to the human mind when it comes to ability.
  5. Series of algorithms that endeavours to recognize underlying relationships in a set of data through a process that mimics the way the human brain operates.
  6. information that has been translated into a form that is efficient for movement or processing

10 Clues: Component of Artifical IntelligenceExample of software agents by computing environmentA set of rules that a machine can follow to learn how to do a taskis an interdisciplinary branch of computer science and engineeringinformation that has been translated into a form that is efficient for movement or processing...

Storage of Electronic Data 2022-04-14

Storage of Electronic Data crossword puzzle
Across
  1. data,
  2. storage,
  3. incidents, Security incidents include but are not limited to the theft or loss of a computer device, the introduction of malicious software, or other misconfiguration that may lead to unauthorized access to confidential or sensitive information.
  4. commit data as retrievable records.
  5. may result in appropriate disciplinary action, up to and including termination, temporary or permanent restrictions on information access/networks, and criminal and/or civil action.
Down
  1. by the university and maintained by ITS for the purpose of electronically retaining university data.
  2. The university reserves the right to monitor network traffic, perform random audits and to take other steps to ensure the integrity of its information and compliance with this policy.
  3. security incident, Individuals granted access to university data or information systems must report any known security incident or any incident that is likely to cause a disclosure of sensitive information to unauthorized parties by contacting the university’s tech desk.
  4. and all data and records created, collected, stored and/or managed in connection with the operation and management of the university
  5. Office,

10 Clues: data,Office,storage,commit data as retrievable records.by the university and maintained by ITS for the purpose of electronically retaining university data.and all data and records created, collected, stored and/or managed in connection with the operation and management of the university...

Tech Terms Crossword Puzzle 2022-04-13

Tech Terms Crossword Puzzle crossword puzzle
Across
  1. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
  2. a place, person, or thing from which something comes or can be obtained
  3. the information about a particular person that exists on the internet as a result of their online activity
  4. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
  5. a set of data that describes and gives information about other data
Down
  1. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
  2. the practice of taking someone else's work or ideas and passing them off as one's own
  3. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  4. websites and applications that enable users to create and share content or to participate in social networking
  5. a method employing encryption to provide secure access to a remote computer over the internet

10 Clues: a set of data that describes and gives information about other dataa place, person, or thing from which something comes or can be obtainedthe practice of taking someone else's work or ideas and passing them off as one's owna method employing encryption to provide secure access to a remote computer over the internet...

cryptex3-4 2024-02-23

cryptex3-4 crossword puzzle
Across
  1. Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
  2. DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
  3. Allows users to interact with electronic devices through graphical icons and visual indicators.
  4. Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
  5. 𝗔𝗻 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗸𝗻𝗼𝘄𝗻 𝗳𝗼𝗿 𝗶𝘁𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗰𝘂𝘀𝘁𝗼𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝘀.
Down
  1. Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
  2. Collaborative online encyclopedia relies on user-generated content and is openly editable.
  3. Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
  4. Computer's essential firmware responsible for initializing hardware.
  5. Git command is used to create a copy of a repository on a local machine.

10 Clues: Computer's essential firmware responsible for initializing hardware.Git command is used to create a copy of a repository on a local machine.Collaborative online encyclopedia relies on user-generated content and is openly editable.Allows users to interact with electronic devices through graphical icons and visual indicators....

cryptex3-2 2024-02-23

cryptex3-2 crossword puzzle
Across
  1. Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
  2. Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
  3. Allows users to interact with electronic devices through graphical icons and visual indicators.
  4. Git command is used to create a copy of a repository on a local machine.
  5. DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
Down
  1. Computer's essential firmware responsible for initializing hardware.
  2. Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
  3. Collaborative online encyclopedia relies on user-generated content and is openly editable.
  4. 𝗔𝗻 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗸𝗻𝗼𝘄𝗻 𝗳𝗼𝗿 𝗶𝘁𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗰𝘂𝘀𝘁𝗼𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝘀.
  5. Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.

10 Clues: Computer's essential firmware responsible for initializing hardware.Git command is used to create a copy of a repository on a local machine.Collaborative online encyclopedia relies on user-generated content and is openly editable.Allows users to interact with electronic devices through graphical icons and visual indicators....

cryptex3-3 2024-02-23

cryptex3-3 crossword puzzle
Across
  1. Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
  2. Allows users to interact with electronic devices through graphical icons and visual indicators.
  3. Collaborative online encyclopedia relies on user-generated content and is openly editable.
  4. Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
  5. Git command is used to create a copy of a repository on a local machine.
Down
  1. Computer's essential firmware responsible for initializing hardware.
  2. DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
  3. Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
  4. Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
  5. 𝗔𝗻 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗸𝗻𝗼𝘄𝗻 𝗳𝗼𝗿 𝗶𝘁𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗰𝘂𝘀𝘁𝗼𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝘀.

10 Clues: Computer's essential firmware responsible for initializing hardware.Git command is used to create a copy of a repository on a local machine.Collaborative online encyclopedia relies on user-generated content and is openly editable.Allows users to interact with electronic devices through graphical icons and visual indicators....

cryptex3-5 2024-02-23

cryptex3-5 crossword puzzle
Across
  1. Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
  2. Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
  3. Git command is used to create a copy of a repository on a local machine.
  4. Allows users to interact with electronic devices through graphical icons and visual indicators.
  5. Computer's essential firmware responsible for initializing hardware.
Down
  1. DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
  2. Collaborative online encyclopedia relies on user-generated content and is openly editable.
  3. Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
  4. 𝗔𝗻 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗸𝗻𝗼𝘄𝗻 𝗳𝗼𝗿 𝗶𝘁𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗰𝘂𝘀𝘁𝗼𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝘀.
  5. Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.

10 Clues: Computer's essential firmware responsible for initializing hardware.Git command is used to create a copy of a repository on a local machine.Collaborative online encyclopedia relies on user-generated content and is openly editable.Allows users to interact with electronic devices through graphical icons and visual indicators....

cryptex3-9 2024-02-23

cryptex3-9 crossword puzzle
Across
  1. Collaborative online encyclopedia relies on user-generated content and is openly editable.
  2. Computer's essential firmware responsible for initializing hardware.
  3. DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
  4. Git command is used to create a copy of a repository on a local machine.
Down
  1. Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
  2. Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
  3. Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
  4. 𝗔𝗻 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗸𝗻𝗼𝘄𝗻 𝗳𝗼𝗿 𝗶𝘁𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗰𝘂𝘀𝘁𝗼𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝘀.
  5. Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
  6. Allows users to interact with electronic devices through graphical icons and visual indicators.

10 Clues: Computer's essential firmware responsible for initializing hardware.Git command is used to create a copy of a repository on a local machine.Collaborative online encyclopedia relies on user-generated content and is openly editable.Allows users to interact with electronic devices through graphical icons and visual indicators....

barham's crossword 2023-09-14

barham's crossword crossword puzzle
Across
  1. the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
  2. the process of hiring someone from within your existing business structure to fill a vacant position for your company
  3. the permanent reduction of a company's labor force through the elimination of unproductive workers or divisions
  4. a person who is hired to work for another or for a business, firm, etc, in return for payment
  5. a form employers use to collection information about you to see if you are a good fit for the position
Down
  1. a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts
  2. the action of finding new people to join an organization or support a cause
  3. filling a job vacancy with an employee from outside the company
  4. any communication that attempts to influence people to buy products or services
  5. a person or organization that employs people.

10 Clues: a person or organization that employs people.filling a job vacancy with an employee from outside the companythe action of finding new people to join an organization or support a causeany communication that attempts to influence people to buy products or services...

Artificial intelligence 2025-10-17

Artificial intelligence crossword puzzle
Across
  1. – Information collected and used by computers to learn, analyze, and make decisions.
  2. Learning – A type of machine learning that uses many layers of neural networks to analyze complex data.
  3. – The use of technology to perform tasks with little or no human help.
  4. Language Processing (NLP) – A part of AI that helps computers understand and respond to human language.
  5. – A computer program that can talk or chat with people, often used in customer service or apps.
  6. – The study of right and wrong; in AI, it deals with making sure technology is used fairly and responsibly.
Down
  1. – A step-by-step set of instructions that a computer follows to solve a problem or perform a task.
  2. Network – A computer system modeled after the human brain, used to recognize patterns and make decisions.
  3. Learning – A branch of AI where computers learn from data and improve their performance without being directly programmed.
  4. – The field that involves designing and building robots that can perform human-like tasks.

10 Clues: – The use of technology to perform tasks with little or no human help.– Information collected and used by computers to learn, analyze, and make decisions.– The field that involves designing and building robots that can perform human-like tasks.– A computer program that can talk or chat with people, often used in customer service or apps....

Word Hike 2023-10-08

Word Hike crossword puzzle
Across
  1. named storage location in memory that holds data or values, which can change during the execution of a program.
  2. A step-by-step procedure or formula used for solving a problem or performing a task in computer science.
  3. The set of rules that govern the structure and format of valid statements and expressions in a programming language.
  4. The process of identifying and fixing errors or bugs in a program to ensure it functions correctly.
  5. A common networking technology used for local area networks (LANs) that relies on wired connections.
Down
  1. A field of computer science focused on creating machines and software capable of intelligent behavior, such as learning, problem-solving, and decision-making.
  2. A small, high-speed memory used to store frequently accessed data for faster retrieval by the CPU.
  3. father of the computer.
  4. A control structure that allows a set of instructions to be repeated based on a specified condition.
  5. A markup language used to create web pages and define their structure and content.

10 Clues: father of the computer.A markup language used to create web pages and define their structure and content.A small, high-speed memory used to store frequently accessed data for faster retrieval by the CPU.The process of identifying and fixing errors or bugs in a program to ensure it functions correctly....

COMPUTER. 2025-06-16

COMPUTER. crossword puzzle
Across
  1. topology One of the most common network setup that consists of a group of starfigure workstation connected to a liner bus backbone cable.
  2. A network device that is used to connect all the computers in a network with each other.
  3. Card Used to physically attached a computer to a network so that eat can participate in network communication.
  4. An act of sending an email to user miscellating him to believe that is form a trusted person or organisation.
  5. On what date bulk emails that come from unknown sources.
  6. topology A single communication line or one main cable to which all the nodes directly connected.
Down
  1. A device that connect to different types of networks with each other for example a LAN with WAN.
  2. Enables you to connect your computer to the available internet connection over the existing telephone lines.
  3. A program or set of programs that disrupts the normal functioning of a computer.
  4. The act of using or imitating the language and thoughts of a person as One original work.

10 Clues: On what date bulk emails that come from unknown sources.A program or set of programs that disrupts the normal functioning of a computer.A network device that is used to connect all the computers in a network with each other.The act of using or imitating the language and thoughts of a person as One original work....

Super Secret Security Crossword Puzzle 2024-05-31

Super Secret Security Crossword Puzzle crossword puzzle
Across
  1. itelligence exhibited by machines, particularly computer systems.
  2. one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
  3. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  4. "gift" or "present" in Arabic.
  5. a team of experts that proactively monitor and respond to cybersecurity incidents.
  6. a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
  1. the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.
  2. an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
  3. a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet.
  4. a technique through which a cybercriminal disguises themselves as a known or trusted source.

10 Clues: "gift" or "present" in Arabic.itelligence exhibited by machines, particularly computer systems.a team of experts that proactively monitor and respond to cybersecurity incidents.a technique through which a cybercriminal disguises themselves as a known or trusted source....

Crossword 2024-05-02

Crossword crossword puzzle
Across
  1. This term refers to the process of ensuring that software and hardware components can work together smoothly.
  2. What do you call the practice of optimizing the flow of goods and services in the IT supply chain?
  3. This term describes the physical layout of computer components within a system.
  4. What term describes the process of ensuring that data remains intact and unchanged during storage, transfer, or processing?
Down
  1. ____Computing. A method of distributing computing tasks across multiple computers or processors to improve efficiency and performance.
  2. This term describes the practice of organizing and controlling the flow of information between systems or components.
  3. What is the name for a network device that forwards data packets between computer networks?
  4. A protocol used for securely accessing remote computers or systems over an unsecured network.
  5. What is the term for the physical or virtual space where data is stored and managed by a computer system or network?
  6. What three-letter acronym represents the process of moving data between computer systems over a network?

10 Clues: This term describes the physical layout of computer components within a system.What is the name for a network device that forwards data packets between computer networks?A protocol used for securely accessing remote computers or systems over an unsecured network....

Poverty 2025-01-23

Poverty crossword puzzle
Across
  1. What refers to conditions or practices that help to maintain health and prevent the spread of disease?
  2. What is the social process of excluding a group or individual from full participation in society?
  3. What refers to the basic physical systems of a country or region, such as transportation and communication networks?
  4. What is the state of being extremely poor; lacking the basic necessities of life?
  5. What is the term for the failure of a child to grow to their full potential height due to chronic malnutrition?
  6. What refers to the public health and engineering measures for the safe disposal of human waste and sewage?
Down
  1. What is the term for the unjust and uneven distribution of resources and opportunities within a society?
  2. What is the condition of not having enough food to meet basic nutritional needs?
  3. What is the condition of not getting enough essential nutrients from the diet, even if calorie needs are met?
  4. What is the state of disagreement or hostility that can arise from various factors, including competition for resources?

10 Clues: What is the condition of not having enough food to meet basic nutritional needs?What is the state of being extremely poor; lacking the basic necessities of life?What is the social process of excluding a group or individual from full participation in society?...

Computer Term Crossword 2021-10-06

Computer Term Crossword crossword puzzle
Across
  1. to copy a copyrighted material for a limited purpose.
  2. A collection of LANs, it is a network of networks.
  3. A right given to the originator to stop people from copying he/she’s work.
  4. A basic element that is required for the computer to function.
  5. A website that allows any users to edit the content.
  6. It is a small portable hard drive that can be inserted into the computer through the USB port to see data inside the drive.
  7. A set of devices that is connected together in a limited area.
  8. Also called universal serial bus, it is a standard that is used for connecting peripheral devices to a computer.
Down
  1. A hardware in a computer that saves data that is currently in use so it can be reached easily.
  2. A set of rules that protects integrity.
  3. A device or unit that works separately from the CPU but is connected to the computer.
  4. The correct way to use the internet.
  5. Sending unwanted messages in a bulk.
  6. Brain of the computer and it lets the computer interact with the programs.
  7. Storage device for computers which uses magnetic storage.
  8. A network security that monitors network traffic and blocks data base on the security rules.
  9. To make digital devices give unauthorized access to a computer system.
  10. Taking someone else's work and stating that it is yours.
  11. A memory storage device that contains semiconductor chips.

19 Clues: The correct way to use the internet.Sending unwanted messages in a bulk.A set of rules that protects integrity.A collection of LANs, it is a network of networks.A website that allows any users to edit the content.to copy a copyrighted material for a limited purpose.Taking someone else's work and stating that it is yours....

Crossword Vocabulary 2021-10-06

Crossword Vocabulary crossword puzzle
Across
  1. local area networks. A series of computers linked together to form a network.
  2. The “brain” of your computer. It’s a hardware that enables your computer to process different information.
  3. A site that enables you to edit content from a web browser.
  4. A device that operates differently from a CPU but works with it.
  5. good behavior on the internet.
  6. A network information that is not tied to a single place.
  7. An act of compromising a digital network to access an account of a system.
  8. irrelevant and disturbing messages such as commercials and advertisements.
  9. A magnetic device that stores data.
Down
  1. drive a small memory drive that is used for storing and transferring data to or from a computer.
  2. a collection of security designed to prevent dangerous electronic access to a computer network system.
  3. Security A rule or policies that protect your data and information on the internet.
  4. use The right to reuse copy-righted material or information on the internet.
  5. An element of something.
  6. Stores data when the PC is on, but it erases the data when it’s shut down.
  7. An act of using someone’s thought and ideas without crediting the author.
  8. An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
  9. A right from the owner to make copies of what the owner did.
  10. A faster type of device made mostly of flash memory that stores data.

19 Clues: An element of something.good behavior on the internet.A magnetic device that stores data.A network information that is not tied to a single place.A site that enables you to edit content from a web browser.A right from the owner to make copies of what the owner did.A device that operates differently from a CPU but works with it....

Law and Order 2024-01-31

Law and Order crossword puzzle
Across
  1. A well-known criminal who steals, often by force.
  2. The idea that some individuals might have a biological predisposition to criminal behavior.
  3. Proven to be false or without merit.
  4. The fear or anxiety felt in anticipation of something that may happen.
  5. A now-discredited movement aimed at improving the genetic composition of the human population through selective breeding.
  6. The scientific study of the nervous system, including the brain.
  7. Academic or research-based attention.
  8. People or characteristics that resemble ancestors or earlier forms of life.
  9. The study of the relationship between brain function and criminal behavior.
Down
  1. Individuals characterized by persistent antisocial behavior, impaired empathy, and remorse, and bold, disinhibited, and egotistical traits.
  2. Conduct that shows a lack of consideration for others and that may cause damage to society, whether intentionally or through negligence.
  3. A lack of ability to feel or express emotions.
  4. The concept that people might commit crimes because of the conditions they live in, rather than being inherently bad.
  5. The part of the brain responsible for decision-making, impulse control, and social behavior.
  6. A complex system of nerves and networks in the brain, associated with basic emotions and drives.
  7. An examination of a body after death to determine the cause of death.
  8. The study of crime, criminal behavior, and the criminal justice system.
  9. The branch of biology that deals with the normal functions of living organisms and their parts.
  10. The skull, especially the part encasing the brain.

19 Clues: Proven to be false or without merit.Academic or research-based attention.A lack of ability to feel or express emotions.A well-known criminal who steals, often by force.The skull, especially the part encasing the brain.The scientific study of the nervous system, including the brain....

Computers 2024-09-16

Computers crossword puzzle
Across
  1. A computer that provides data to other computers.
  2. Flash Drive A small storage device that uses flash memory and connects via a USB port.
  3. A personal computer that is small enough to be carried around.
  4. (Central Processing Unit) A piece of hardware that processes data and performs arithmetic and logical operations.
  5. A program that damages or destroys computer data, and replicates itself.
  6. The physical parts of a computer.
  7. The display screen that provides visual output from a computer.
  8. The main circuit board that connects different parts of a computer.
  9. Storage Areas on Internet servers where data and applications can be stored and accessed.
  10. Computer A personal computer that resides on a desk or table.
Down
  1. (Universal Serial Bus) A standard that allows communication between devices, like a flash drive and computer.
  2. Programs that tell a computer what to do and how to do it.
  3. A very small piece of silicon inside a computer with circuits for storing information or performing operations.
  4. A flat control surface used to move the cursor on a laptop, similar to a mouse.
  5. A wireless technology standard that connects devices using radio waves.
  6. System A system that allows hardware devices to communicate and support software programs (e.g., Microsoft Windows).
  7. Card A type of memory card typically used in digital cameras.
  8. Drive The most commonly used type of secondary storage device, which stores data as aligned particles on a magnetic disk.
  9. (Random Access Memory)A type of short-term memory that stores data while the computer is working.
  10. A device that sends and receives data on computer networks.

20 Clues: The physical parts of a computer.A computer that provides data to other computers.Programs that tell a computer what to do and how to do it.A device that sends and receives data on computer networks.Card A type of memory card typically used in digital cameras.Computer A personal computer that resides on a desk or table....

RockX Persistence Crossword 2022-09-21

RockX Persistence Crossword crossword puzzle
Across
  1. One of the Cosmos wallets that supports Persistence($XPRT)
  2. People who volunteer a computer to maintain the blockchain's integrity by constantly computing the linkage from the first block to the last.
  3. Which is the platform pSTAKE integrated with for its BNB liquid staking implementation. This allows leveraged yield farming on Pancakeswap pools?
  4. What is the name of the popular smart contract library that persistence chain recently integrated, which allows developers to deploy rust contracts on the chain
  5. ________ is a decentralized peer-to-peer blockchain that people can use to create liquidity and trade IBC enabled tokens.
  6. Get an estimated yield of 5.87% when you stake ________ with RockX!
  7. The name of the consensus mechanism used by Persistence chain
  8. The leading staking service provider in Asia
  9. The platform where you can stake your XPRT to earn compounded yields
  10. RockX is a validator in what kind of network?
Down
  1. What is the name of the popular smart contract library that persistence chain recently integrated, which allows developers to deploy rust contracts on the chain
  2. A platform where you can track your assets on pSTAKE, Ethereum and BNB chains
  3. ________ is the native token of its the crypto.org chain
  4. ________ is a sharded protocol that enables blockchain networks to operate together seamlessly.
  5. The current CEO of RockX
  6. RockX is based in which country?
  7. What month is the Persistence Genesis Day?
  8. ________ is a decentralized, open-source blockchain with smart contract functionality founded by Vitalik Buterin
  9. The name of the Liquid Staking protocol by Persistence
  10. What platform did persistence partner with to implement cross-chain messaging?

20 Clues: The current CEO of RockXRockX is based in which country?What month is the Persistence Genesis Day?The leading staking service provider in AsiaRockX is a validator in what kind of network?The name of the Liquid Staking protocol by Persistence________ is the native token of its the crypto.org chain...

CrossWord Vocabulary 2021-10-06

CrossWord Vocabulary crossword puzzle
Across
  1. The “brain” of your computer. It’s a hardware that enables your computer to process different information.
  2. The right to reuse copy-righted material or information on the internet.
  3. A collection of security designed to prevent dangerous electronic access to a computer network system.
  4. A right from the owner to make copies of what the owner did.
  5. A magnetic device that stores data.
  6. A faster type of device made mostly of flash memory that stores data.
  7. A site that enables you to edit content from a web browser.
  8. Good behavior on the internet.
  9. Irrelevant and disturbing messages such as commercials and advertisements.
  10. An act of using someone’s thought and ideas without crediting the author.
  11. Local area networks. A series of computers linked together to form a network.
Down
  1. An element of something.
  2. An act of compromising a digital network to access an account of a system.
  3. A rule or policies that protect your data and information on the internet.
  4. A network information that is not tied to a single place.
  5. A small memory drive that is used for storing and transferring data to or from a computer.
  6. Stores data when the PC is on, but it erases the data when it’s shut down.
  7. A device that operates differently from a CPU but works with it.
  8. An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable.

19 Clues: An element of something.Good behavior on the internet.A magnetic device that stores data.A network information that is not tied to a single place.A site that enables you to edit content from a web browser.A right from the owner to make copies of what the owner did.A device that operates differently from a CPU but works with it....

Crossword Vocabulary 2021-10-06

Crossword Vocabulary crossword puzzle
Across
  1. good behavior on the internet.
  2. The “brain” of your computer. It’s a hardware that enables your computer to process different information.
  3. A right from the owner to make copies of what the owner did.
  4. An act of compromising a digital network to access an account of a system.
  5. A faster type of device made mostly of flash memory that stores data.
  6. Stores data when the PC is on, but it erases the data when it’s shut down.
  7. a collection of security designed to prevent dangerous electronic access to a computer network system.
  8. irrelevant and disturbing messages such as commercials and advertisements.
Down
  1. A network information that is not tied to a single place.
  2. A site that enables you to edit content from a web browser.
  3. Security: A rule or policies that protect your data and information on the internet.
  4. An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
  5. A device that operates differently from a CPU but works with it.
  6. An act of using someone’s thought and ideas without crediting the author.
  7. An element of something.
  8. local area networks. A series of computers linked together to form a network.
  9. A magnetic device that stores data.
  10. drive a small memory drive that is used for storing and transferring data to or from a computer.
  11. use: The right to reuse copy-righted material or information on the internet.

19 Clues: An element of something.good behavior on the internet.A magnetic device that stores data.A network information that is not tied to a single place.A site that enables you to edit content from a web browser.A right from the owner to make copies of what the owner did.A device that operates differently from a CPU but works with it....

Crossword Vocabulary 2021-10-06

Crossword Vocabulary crossword puzzle
Across
  1. Local area networks. A series of computers linked together to form a network.
  2. Security A rule or policies that protect your data and information on the internet.
  3. A device that operates differently from a CPU but works with it.
  4. An act of using someone’s thought and ideas without crediting the author.
  5. A right from the owner to make copies of what the owner did.
  6. An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
  7. The “brain” of your computer. It’s a hardware that enables your computer to process different information.
  8. A network information that is not tied to a single place.
  9. An act of compromising a digital network to access an account of a system.
Down
  1. A small memory drive that is used for storing and transferring data to or from a computer.
  2. A collection of security designed to prevent dangerous electronic access to a computer network system.
  3. Good behavior on the internet.
  4. The right to reuse copy-righted material or information on the internet.
  5. Stores data when the PC is on, but it erases the data when it’s shut down.
  6. A faster type of device made mostly of flash memory that stores data.
  7. An element of something.
  8. A magnetic device that stores data.
  9. Irrelevant and disturbing messages such as commercials and advertisements.
  10. A site that enables you to edit content from a web browser.

19 Clues: An element of something.Good behavior on the internet.A magnetic device that stores data.A network information that is not tied to a single place.A site that enables you to edit content from a web browser.A right from the owner to make copies of what the owner did.A device that operates differently from a CPU but works with it....

Crossword Vocabulary 2021-10-06

Crossword Vocabulary crossword puzzle
Across
  1. An element of something.
  2. A device that operates differently from a CPU but works with it.
  3. A site that enables you to edit content from a web browser.
  4. A network information that is not tied to a single place.
  5. A small memory drive that is used for storing and transferring data to or from a computer.
  6. An act of using someone’s thought and ideas without crediting the author.
  7. A faster type of device made mostly of flash memory that stores data.
Down
  1. Good behavior on the internet.
  2. The “brain” of your computer. It’s a hardware that enables your computer to process different information.
  3. A right from the owner to make copies of what the owner did.
  4. A rule or policies that protect your data and information on the internet.
  5. An act of compromising a digital network to access an account of a system.
  6. Irrelevant and disturbing messages such as commercials and advertisements.
  7. Local area networks. A series of computers linked together to form a network.
  8. A collection of security designed to prevent dangerous access to a network system.
  9. A magnetic device that stores data.
  10. An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable.
  11. The right to reuse copy-righted material or information on the internet.
  12. Stores data when the PC is on, but it erases the data when it’s shut down.

19 Clues: An element of something.Good behavior on the internet.A magnetic device that stores data.A network information that is not tied to a single place.A site that enables you to edit content from a web browser.A right from the owner to make copies of what the owner did.A device that operates differently from a CPU but works with it....

Geo crossword 2022-07-09

Geo crossword crossword puzzle
Across
  1. areas What is an area with dense transport networks and densely packed buildings called
  2. Consist of living and non-living things that are found naturally.
  3. What is a physical area on the Earth’ surface called?
  4. What is the movement of people from rural to urban areas called?
  5. What is the pollution caused by an increase in LED usage?
  6. What is the pollution related to and primarily caused by unnecessary honking called?
  7. What is the environment where people live on farms and villages called?
  8. What is poor air quality affecting half the world’s urban population called?
  9. What is the increase in the proportion of people living in urban areas called?
  10. What is the number of people living in a unit area of land called?
  11. What is a built up area called?
Down
  1. What is the environment that has not been affected by people?
  2. What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
  3. What is a multicultural society with many people from diverse cultural backgrounds called?
  4. What are the advantages of going to a city called?
  5. What is a physical area on the earth’s surface called?
  6. What are the disadvantages of going to a city called?
  7. What is the pollution caused by leakage fuel storage tanks into rivers?
  8. What job opportunities are called?
  9. to our surroundings and can either be physical or human.
  10. What is the area of the earth’s surface that holds special meaning for people?

21 Clues: What is a built up area called?What job opportunities are called?What are the advantages of going to a city called?What is a physical area on the Earth’ surface called?What are the disadvantages of going to a city called?What is a physical area on the earth’s surface called?to our surroundings and can either be physical or human....

Geo crossword 2022-07-09

Geo crossword crossword puzzle
Across
  1. What is a physical area on the earth’s surface called?
  2. What is the environment where people live on farms and villages called?
  3. What are the advantages of going to a city called?
  4. areas What is an area with dense transport networks and densely packed buildings called
  5. What is the number of people living in a unit area of land called?
  6. What is a physical area on the Earth’ surface called?
  7. What is a built up area called?
  8. What is the area of the earth’s surface that holds special meaning for people?
  9. What job opportunities are called?
  10. What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
  11. What is the pollution caused by leakage fuel storage tanks into rivers?
Down
  1. Consist of living and non-living things that are found naturally.
  2. What is the movement of people from rural to urban areas called?
  3. What is the increase in the proportion of people living in urban areas called?
  4. What is the pollution related to and primarily caused by unnecessary honking called?
  5. What are the disadvantages of going to a city called?
  6. What is poor air quality affecting half the world’s urban population called?
  7. What is the pollution caused by an increase in LED usage?
  8. What is a multicultural society with many people from diverse cultural backgrounds called?
  9. What is the environment that has not been affected by people?
  10. refer to our surroundings and can either be physical or human.

21 Clues: What is a built up area called?What job opportunities are called?What are the advantages of going to a city called?What are the disadvantages of going to a city called?What is a physical area on the Earth’ surface called?What is a physical area on the earth’s surface called?What is the pollution caused by an increase in LED usage?...

Networking 2023-09-15

Networking crossword puzzle
Across
  1. A protocol used for assigning IP addresses to devices on a network (4 letters).
  2. A device used to connect a network to the internet.
  3. protocol used for sending email messages (4 letters).
  4. A network topology where all devices are connected to a central hub (6 letters).
  5. A measure of the time it takes for data to travel from one point to another in a network.
  6. The organization responsible for assigning IP address blocks and domain names (3 letters).
  7. A technology that allows wireless devices to connect to a wired network (4 letters).
  8. The process of verifying the identity of a user or device on a network (8 letters).
  9. A device that separates a network into smaller collision domains.
  10. Data transfer protocol used for secure file transfers.
Down
  1. The process of dividing a network into smaller, more manageable segments (9 letters).
  2. A network service that translates human-readable domain names into IP addresses (4 letters).
  3. A protocol used to retrieve email from a mail server.
  4. A device or software component that filters and forwards network traffic between different network segments (6 letters).
  5. A unique identifier assigned to each device on a network (3 letters).
  6. A technology that allows multiple virtual networks to share the same physical infrastructure.
  7. The maximum amount of data that can be transmitted in a given time.
  8. A set of rules that govern how data is transmitted across a network.
  9. A device that connects multiple network segments and forwards data based on MAC addresses.
  10. The process of converting a private IP address into a public one for internet access.

20 Clues: A device used to connect a network to the internet.A protocol used to retrieve email from a mail server.protocol used for sending email messages (4 letters).Data transfer protocol used for secure file transfers.A device that separates a network into smaller collision domains.The maximum amount of data that can be transmitted in a given time....

ict 2024-05-15

ict crossword puzzle
Across
  1. accessing a system using malicious methods
  2. creating an emotional connection with someone with the intention of doing them harm
  3. text messages
  4. something that is circulated widely by being shared through networks to large numbers of internet users
  5. all the data that a user creates online, which is recorded and stored
  6. compilation of personal information about an individual
  7. created by the individuals who use the service
  8. a group of things that are arranged very close together
  9. to see a document, page or film before it is produced in its final form and published
  10. information that a website stores on a user's computer so that the website recognizes the user when they uses it again
Down
  1. mass communication such as broadcasting, publishing an the internet
  2. to make a mark against some information to show that it is important.
  3. Using the internet to send text, image or multimedia in order to upset or embarrass someone.
  4. people or account to whom a user is connected
  5. a colloquialism used to tell someone to say nothing about a particular subject, or to be quiet.
  6. a message sent to an internet discussion group so that all members of the group can read it
  7. a collection of information about a user
  8. very rude or insulting
  9. a type of advertising used by internet companies in which computer users pass on advertising messages or images trough email
  10. a label that you can add to a post

20 Clues: text messagesvery rude or insultinga label that you can add to a posta collection of information about a useraccessing a system using malicious methodspeople or account to whom a user is connectedcreated by the individuals who use the servicecompilation of personal information about an individual...

Crack It !!! 2012-12-11

Crack It !!! crossword puzzle
Across
  1. A character normally sent at the beginning/end of a synchronous transmission to provide timing and bit synchronization
  2. A modems characteristic when it is sending a carrier signal on a multipoint line when it has not been polled
  3. The undesirable noise or disturbance that occurs on a communications channel, caused by natural or man-made signals
  4. A method of data communications using 75 bps as a transmission speed
  5. A memory device type that loses its stored contents upon electrical power fluctuation or failure
  6. Interference from radio transmission signals or microwave communication causing a received signal to deflect from the target
Down
  1. A network station designed to interconnect two otherwise incompatible devices or networks
  2. Any combination of two or more technologies
  3. The control block or blocks of data added prior to the actual message
  4. Using a constant time interval between bits or characters to insure that all data communications equipment is in step with each other
  5. The waiting time, or delay between a stations request to a transmission channel,and completion
  6. The disturbance or interference of open-air radio transmission to deliberately prevent communication
  7. A reduction in a signals level as expressed in decibels

13 Clues: Any combination of two or more technologiesA reduction in a signals level as expressed in decibelsA method of data communications using 75 bps as a transmission speedThe control block or blocks of data added prior to the actual messageA network station designed to interconnect two otherwise incompatible devices or networks...

module 2 2017-03-22

module 2 crossword puzzle
Across
  1. in case of a fire you could quickly cut off the supply or in case of an intrusion you could cut off the supply, or the circulation of the air conditioning system
  2. the process of identifying uncertain investment decision
  3. plays a very important role in keeping the environmental at a constant temperature
  4. These are cables that protect against the interference from generators or equipment around the computing facility
  5. identify critical business operations when there's a accident, disasters
  6. reduce the oxygen the heat. You suppress the fuels, we have the oxygen, you suppress oxygen and heat
Down
  1. only authorized disclosure should be allowed
  2. is needed for HVAC , such as if there's a blackout in electricity, the probability that is also down is minimized
  3. When you put positive air pressure in the room, when the door opens the air flows out not in
  4. dictates that only authorized modifications should be allowed
  5. security that happens physically and through actions securing networks and information systems
  6. dictates that our resources should be available in a timely fashion to authorized personnel
  7. measures taken to protect systems, buildings, and related supporting infrastructure against threats associated with their physical environment

13 Clues: only authorized disclosure should be allowedthe process of identifying uncertain investment decisiondictates that only authorized modifications should be allowedidentify critical business operations when there's a accident, disastersplays a very important role in keeping the environmental at a constant temperature...

Network 2022-03-25

Network crossword puzzle
Across
  1. naming system that allows communication across devices on a network.
  2. consists of two or more computers that are linked in order to share resources
  3. consists of two or more computers that are linked in order to share resources
  4. network interface identification and location addressing
  5. a network cable that contains strands of glass fibers inside an insulated casing.
  6. a network cable that contains strands of glass fibers inside an insulated casing.
  7. a family of wired computer networking technologies commonly used in local area networks,
Down
  1. formatted unit of data carried by a packet-switched network
  2. connectivity with routing to provide a fast internet connection
  3. used to connect one network device to other network devices or to connect two or more computers to share printers, scanners etc.
  4. delays in communication over a network.
  5. the percentage of bits that have errors relative to the total number of bits received in a transmission, usually expressed as ten to a negative power.
  6. continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur.
  7. the wireless technology used to connect computers, tablets, smartphones and other devices to the internet.
  8. consists of two or more computers that are linked in order to share resources with client machines they are considered as...

15 Clues: delays in communication over a network.network interface identification and location addressingformatted unit of data carried by a packet-switched networkconnectivity with routing to provide a fast internet connectionnaming system that allows communication across devices on a network....

Sociology 2023-12-01

Sociology crossword puzzle
Across
  1. a model that illustrates how an individual’s health is socially embedded within their networks, communities,etc
  2. the state of being symptomatic or unhealthy for a disease or condition.
  3. economic and sociological combined total measure of a person's work experience and of an individual's or family's economic access to resources and social position in relation to others
  4. race with the highest maternal mortality rates
  5. Those with ---- prestige are seen to have an advantage when related to health
  6. stress ---- is when one stressful event leads to a series of stressful events and situations
Down
  1. the illnesses and diseases the mother receives after birthing a baby
  2. anticipation and worry stress that comes with membership in a socially marginalized and stigmatized group
  3. the description of social life in medical terms–erases the cultural impacts on health and leaves blame to solely biology or personal behaviors
  4. The rate of deaths in a population over a year expressed per 1000
  5. the subjective experience of a disease, condition, or a set of symptoms
  6. A state of complete physical, mental and social well being
  7. Anything that challenges and threatens the body’s internal stability and equilibrium, such as blood pressure or even cellular processes

13 Clues: race with the highest maternal mortality ratesA state of complete physical, mental and social well beingThe rate of deaths in a population over a year expressed per 1000the illnesses and diseases the mother receives after birthing a babythe state of being symptomatic or unhealthy for a disease or condition....

World History Review 2023-01-03

World History Review crossword puzzle
Across
  1. Series of Holy Wars between Christians and Muslims that spread Islamic achievements and opened new trading networks
  2. Some common things that were traded along the Silk Road included Spices, cultures, goods, and...
  3. This was a major contribution to the development of civilizations because it recorded existing laws for all to see
  4. Romans designed their governments to incorporate this on the power of different parts of government
  5. In the Middle East during neolithic times, the development of farming brought about this
  6. Complex societies with advanced knowledge of farming, trade, government, and art
Down
  1. A trade route that connected China to the Romans
  2. These things were established during the Middle Ages to improve economic and social conditions of artisans, set quality standards for goods produced, and more
  3. Important long-term contributions of ancient Greek and Roman civilizations are primarily found in this area
  4. This was a document was eventually used to strengthen the idea that a monarch's power was not absolute
  5. Feudal systems organized this during the Middle Ages
  6. Manorial systems organized this during the Middle Ages
  7. A type of government in which citizens have the right to vote on the laws

13 Clues: A trade route that connected China to the RomansFeudal systems organized this during the Middle AgesManorial systems organized this during the Middle AgesA type of government in which citizens have the right to vote on the lawsComplex societies with advanced knowledge of farming, trade, government, and art...

Lesson 25 vocab 2015-04-23

Lesson 25 vocab crossword puzzle
Across
  1. A form of electronic communication that allows you to send and receive text messages in "real time" from friends and colleagues who are currently online.
  2. Units of data sent across a network.
  3. contains user name of individual, the @ symbol, The user's domain name.
  4. A list of e-mail address you can use to send the same message to a group.
  5. E-mail software provided with Windows Vista.
  6. unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail.
Down
  1. Text or graphics added to the end of outgoing e-mail messages.
  2. a list of e-mail address you can use to send the same message to a group.
  3. Using a cell phone or other mobile device to send and receive written messages.
  4. transmission of electronic messages over networks.
  5. A software application installed on the local PC, network, or Web, such as e-mail, text messages, and instant messaging programs.
  6. to save or transfer data to a storage device or folder for the purpose of saving space or organizing the data.
  7. part of the e-mail programs; used to keep a list of contacts and their e-mail addresses.
  8. A document, image, figure, or other file that you can attach to an e-mail message.

14 Clues: Units of data sent across a network.E-mail software provided with Windows Vista.transmission of electronic messages over networks.Text or graphics added to the end of outgoing e-mail messages.contains user name of individual, the @ symbol, The user's domain name.a list of e-mail address you can use to send the same message to a group....

IC3 Lesson 30 Vocabulary 2015-05-18

IC3 Lesson 30 Vocabulary crossword puzzle
Across
  1. Security feature used for larger networks that controls computers from one point
  2. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  4. Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
  5. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
  1. Encrypts the information in an SSL Certificate
  2. Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
  3. Hackers using spyware to control your browser
  4. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
  5. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
  6. A malicious program that records keystrokes
  7. Deciphers the information in an SSL Certificate
  8. A program that hackers use to capture IDs and passwords on a network

13 Clues: A malicious program that records keystrokesHackers using spyware to control your browserEncrypts the information in an SSL CertificateDeciphers the information in an SSL CertificateA program that hackers use to capture IDs and passwords on a networkSecurity feature used for larger networks that controls computers from one point...

Lesson 30 Vocabulary 2015-05-22

Lesson 30 Vocabulary crossword puzzle
Across
  1. A program that hackers use to capture IDs and passwords on a network.
  2. A malicious program that records keystrokes.
  3. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
  4. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  5. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  6. Hackers using spyware to control your browser.
  7. security feature used for larger networks that controls computers from one point.
  8. installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
  9. Encrypts the information in an SSL Certificate.
Down
  1. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
  2. attacks Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  4. Deciphers the information in an SSL Certificate.

13 Clues: A malicious program that records keystrokes.Hackers using spyware to control your browser.Encrypts the information in an SSL Certificate.Deciphers the information in an SSL Certificate.A program that hackers use to capture IDs and passwords on a network.security feature used for larger networks that controls computers from one point....

WEEK 1 OVERVIEW 2023-03-24

WEEK 1 OVERVIEW crossword puzzle
Across
  1. ____ IS THE PROCESS OF VOLUNTARILY COMPLYING WITH A SET OF PROFESSIONAL STANDARDS DEALING WITH POLCIES AND PROCDURE, PROCESSES AND ACTIONS
  2. JEFFCOM IS THE ___ BETWEEN THE COMMUNITY AND EMERGENCY SERVICES
  3. WHAT IS THE MOST IMPORTANT W IN THE 6 W'S
  4. MEANS DOING THE RIGHT THING
  5. A HYSTERIA CONTROLLING TECHNIQUE WHERE YOU REPEAT A PHRASE THAT HAS WHAT YOU WANT THE CALLER TO DO AND WHY OVER AND OVER
  6. WHAT IS THE BUTTON THAT IS PRESSED IN THE CASE OF A MAJOR INFRASTRUCTURE OR COMMUNICATION CENTER EMERGENCY AND RE-ROUTES CALLS TO DENVER
Down
  1. WHAT IS THE ART AND SCIENCE OF COMMUNICATION OVER A DISTANCE BY TELEPHONE, TELEGRAPH AND RADIO
  2. NAME OF THE LANGUAGE LINE THAT WE USE
  3. CAN BE FOUND BETWEEEN THE MENS AND THE WOMANS RESTROOM ON EVERY FLOOR
  4. JEFFCOM 4 CORE VALUES ARE ENCOURAGEMENT _______ ETHICS AND PROFESSIONALISM
  5. ___ IS THE GENERAL RESPONSE FROM THE BODY TO ANY UNUSUAL DEMAND MADE ON IT, PLEASANT OR UNPLEASANT, EMOTIONAL, PHYSICAL OR MENTAL
  6. EMERGENCY 911 CALLS GO OVER DEDICTED TELEPHONE NETWORKS AND ARE AUTOMATICCLY ROUTED TO THE APPROPRIATE EMERGENCY COMMNICATION CENTER BASED ON THE CALLERS LOCATION
  7. PEOPLE ON THE EMPLOYEE BOARD THAT HAVE A GOLD STAR ON THEM ARE APART OF THIS GROUP

13 Clues: MEANS DOING THE RIGHT THINGNAME OF THE LANGUAGE LINE THAT WE USEWHAT IS THE MOST IMPORTANT W IN THE 6 W'SJEFFCOM IS THE ___ BETWEEN THE COMMUNITY AND EMERGENCY SERVICESCAN BE FOUND BETWEEEN THE MENS AND THE WOMANS RESTROOM ON EVERY FLOORJEFFCOM 4 CORE VALUES ARE ENCOURAGEMENT _______ ETHICS AND PROFESSIONALISM...

Chapter 6 Crossword 2022-10-11

Chapter 6 Crossword crossword puzzle
Across
  1. Tax that is paid to SARS when goods are imported.
  2. Government helps the businesses in this sector to compete on international markets
  3. involves the movement of product/service to ensure that it reaches the desired market on time.
  4. Phase of the product life cycle where sales volumes are either maintained or decrease
  5. the use of the internet and social networks as part of the business’s marketing campaign.
Down
  1. The business offers the product/service to the market at a high price and justifies the price based on the “uniqueness of the product/service”
  2. Promotional strategy used to reach a mass audience in order to inform them and persuade them to buy the product/service
  3. Considered to be the most essential element of the marketing mix
  4. Facebook, Twitter, Blogs and short promotional messages to watch on You Tube.
  5. A business charging R1 999 instead of R2 000
  6. Clothing would be categorised as this type of good
  7. A news item or story which conveys information about a business, product, service in the media.
  8. The business itself will portray certain values (image).If the unique features of the products and the image of the business are combined, it is known as the ____.

13 Clues: A business charging R1 999 instead of R2 000Tax that is paid to SARS when goods are imported.Clothing would be categorised as this type of goodConsidered to be the most essential element of the marketing mixFacebook, Twitter, Blogs and short promotional messages to watch on You Tube....

Constraints, revenue streams and types of briefs 2023-12-05

Constraints, revenue streams and types of briefs crossword puzzle
Across
  1. Funding raised through social media through networks - contributors are offered an incentive for how much they contribute
  2. During production there is a lot of support that can be accessed to finance the project
  3. Money paid for a brand to be associated with final media product
  4. A brief where the client will hire a separate independent media company to create the product and the process is overseen by a commissioner from the client
  5. When planning a production timescales are built backwards from a final deadline
Down
  1. A product must be financially viable to be successful so a budget is set at the start of the project
  2. A brief where the client and producer work together to develop the brief for the project
  3. A brief where there is no documentation and a verbal agreement is reached
  4. The brief is outlined within a contract of employment
  5. Money from businesses willing to invest
  6. Intellectual property of the product is licensed to other partners e.g. for merchandising
  7. Money from brands in return for their material being on pages or on screen during production
  8. A brief where a meeting between the client & producer takes place where the client will outline requirements

13 Clues: Money from businesses willing to investThe brief is outlined within a contract of employmentMoney paid for a brand to be associated with final media productA brief where there is no documentation and a verbal agreement is reachedWhen planning a production timescales are built backwards from a final deadline...