networks Crossword Puzzles
Isaiah Adkins 2013-09-13
Across
- a reference to a published or unpublished source (not always the original source).
- To renew or revitalize; To reload a webpage on the internet
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- software used to view various kinds of Internet resources found on the Web.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
Down
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- An unauthorized person who secretly gains access to computer.
- a restricted computer network; a private network created using World Wide Web software
- ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text.
12 Clues: To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer. • software used to view various kinds of Internet resources found on the Web. • a reference to a published or unpublished source (not always the original source). • ...
Cisco Crossword 2013-09-06
Across
- Act of creating a virtual (rather than actual) version of something, including but not limited to a virtual hardware platform, operating system (OS), storage device, or network resources
- The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server
- Utilizes public telecommunications networks to conduct private data communications
- In May 2011 what did the UN declare a Fundamental Human right?
- Links two or more devices using some wireless distribution method and usually providing a connection through an access point to the wider Internet
- Headquater of Cisco Systems
- Software that provides self-service automated provisioning for private, public, or hybrid clouds
- Allow companies to securely communicate and collaborate seamlessly regardless of their location
Down
- Wide bandwidth characteristics of a transmission medium and its ability to transport multiple signals and traffic types simultaneously
- Designed to simplify traditional architectures and dramatically reduce the number of devices that must be purchased, cabled, configured, powered, cooled, and secured in the data center.
- Chief Technology & Strategy Officer (CTO) of Cisco Systems
- By 2020 how many billions things will be connected to The Network?
12 Clues: Headquater of Cisco Systems • Chief Technology & Strategy Officer (CTO) of Cisco Systems • In May 2011 what did the UN declare a Fundamental Human right? • By 2020 how many billions things will be connected to The Network? • Utilizes public telecommunications networks to conduct private data communications • ...
INTERNET AND A NEW MILLENIUM 2023-08-10
Across
- to write or write about (something) on a blog
- a period of 1000 years
- to use the Google search engine to obtain information about (someone or something) on the World Wide Web
- a computer program used for accessing sites or information on a network (such as the World Wide Web)
- an electronic communications network that connects computer networks and organizational computer facilities around the world
- to make a posting on the Twitter online message service
- to publish (something, such as a message) in an online forum (such as an electronic message board)
- to transfer (something, such as data or files) from a computer or other digital device to the memory of another device (such as a larger or remote computer) especially via the Internet
Down
- (of an activity or service) available on or performed using the internet or other computer network.
- to transfer (data, files, etc.) from one location (such as a large computer or the cloud) to anothe(such as a smaller computer, smartphone, or storage device)
- forms of electronic communication (such as websites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content (such as videos)
- a period of 100 years
12 Clues: a period of 100 years • a period of 1000 years • to write or write about (something) on a blog • to make a posting on the Twitter online message service • to publish (something, such as a message) in an online forum (such as an electronic message board) • (of an activity or service) available on or performed using the internet or other computer network. • ...
Good girl, bad blood. 2025-07-09
Across
- made or seeming to be made at the back of the throat, pg. 243
- a small waterfall, especially one of several falling down a steep slope with rocks, pg. 302
- to control or influence somebody/something, often in a dishonest way so that they do not realise it, pg. 203
- a dark red colour, pg. 160
- to have power over a person, company, country, etc. so that you are able to decide what they must do or how it is run, pg. 235
- an international computer network connecting other networks and computers that allows people to share information around the world, pg. 301
Down
- left and no longer wanted used or needed, pg.257
- Very great or extremely good, pg. 335
- feeling ill or unhappy, pg. 243
- a dark outline or shape of a person or an object that you see against a light background, pg. 297
- with a name that is not known or that is not made public, pg. 353
- of eyes or the way they look at somebody) seeming to notice things about another person that would not normally be noticed, especially in a way that makes that person feel anxious or embarrassed, pg. 335
12 Clues: a dark red colour, pg. 160 • feeling ill or unhappy, pg. 243 • Very great or extremely good, pg. 335 • left and no longer wanted used or needed, pg.257 • made or seeming to be made at the back of the throat, pg. 243 • with a name that is not known or that is not made public, pg. 353 • ...
Router used to connect networks 2021-10-06
unit 3 networks 2025-01-06
Andrea's Internet Crossword Puzzle 2013-12-02
Across
- A collaborative website which can be directly edited by anyone with access to it
- a reference to a published or unpublished source (not always the original source)
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- software used to view various kinds of Internet resources found on the Web
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- An unauthorized person who secretly gains access to computer files
Down
- TABS the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views/websites in the same browser
- A bully who operates online, in cyberspace; To bully online
- A system of connected computers that allows the sharing of files and equipment
- renew or revitalize; To reload a webpage on the internet
- Originally known as Web Log. Blogs are websites that contains dated text entries
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software
12 Clues: renew or revitalize; To reload a webpage on the internet • A bully who operates online, in cyberspace; To bully online • An unauthorized person who secretly gains access to computer files • software used to view various kinds of Internet resources found on the Web • A system of connected computers that allows the sharing of files and equipment • ...
Sean Nguyen 2014-04-04
Across
- - A piece of writhing that has been copied from someone else and is presented being your own work
- - An unanthorized person who gain access to computer files
- - software used to view various kinds of internet resource found on the web
- Use - The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of critcism comment, news reporting, teaching, scholarship, or research.
- - A bully who opperates online, in cyberspace; to bully online
- Operators - Using keywords such as AND, OR, NOT in web searches to narrpw search results.
Down
- - To renew or revitalize; To reload a webpage on the internet
- - A lit of citation that appear at the end of a paper, artuckem chapter or book.
- Networks - Online commminities where people meet, socialize, exchange digtal files, etc.
- - A system of connected computers that allows the sharing of files and equipment. There two types of network: local area network (LAN) and wide area network (WAN)
- - A part of a computer system or network that is designed to block unauthorized access while permitting outward comminication
- Resource Locator (URL) - Full website address.
12 Clues: Resource Locator (URL) - Full website address. • - An unanthorized person who gain access to computer files • - To renew or revitalize; To reload a webpage on the internet • - A bully who opperates online, in cyberspace; to bully online • - software used to view various kinds of internet resource found on the web • ...
IST Crossword 2013-09-08
Across
- Commercial software, usually packaged in cellophane wrapping and usually having a higher price tag
- A kind of shareware that allows the user to try the software, but some of the features are disabled
- 'Try before you buy' software. Software that is provided free and can be copied and distributed, but the licence agreement requires the to pay for the software if they continue using it after a specified period. Some shareware automatically becomes disabled after the free testing period has expired
- A connected set of computers (networks)
- Authorising to perform a particular task or make use of a particular software
Down
- Simular to public domain software.
- Software licence that permits an organisation to use the software on any number of computers on the same site
- Software licence that allows a program to be used over a network
- Software that can be freely distributed and used
- Uniform Resource Locator-an internet address
- The right to use, copy or control the work of authors or artists, including software developers
- A private network that uses a simular interface to the internet. Not everyone can access an intranet
12 Clues: Simular to public domain software. • A connected set of computers (networks) • Uniform Resource Locator-an internet address • Software that can be freely distributed and used • Software licence that allows a program to be used over a network • Authorising to perform a particular task or make use of a particular software • ...
My Internet Crossword 2018-03-29
Across
- Layer / This layer conveys the bit stream - electrical impulse, light or radio signal -- through th
- Link Layer / this is the level of Ethernet; Data packets are decoded/encoded into bits.
- / Interface Message Processor
- Layer / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
- Layer / Translates or converts the data from the Application Layer so that it can be read by the Application layer of the receiving computer—it does this in standard ways, such as converting text to ASCII or HTML, graphics to jpg or gif, or video to QuickTime or AVI.
- / fast and safe ethernet
Down
- Layer / Controls the communication link or session between the sending and receiving computers (starts and stops communication)
- Layer / he interface that the user sees and interacts with, allowing the user to “click send” to send an email, for example, or move a file from a local computer to a network drive.
- / ipconfig, ping, nslookup, tracert
- V4 / about 4.3 billion (2^32)
- / The four numbers are called (IP #)
- Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP
12 Clues: / fast and safe ethernet • / Interface Message Processor • V4 / about 4.3 billion (2^32) • / ipconfig, ping, nslookup, tracert • / The four numbers are called (IP #) • Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP • Link Layer / this is the level of Ethernet; Data packets are decoded/encoded into bits. • ...
Cyber Security 2020-07-19
Across
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
- A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A security measure designed to verify an individual`s authorization to access computer or security information.
- A piece of malware that can replicate itself in order to spread the infection to other connected computers.
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
- An environment in which digitized information is distributed on networks of computers.
- The largest WAN in the world.
- A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
- Shift cipher named after a famous Roman, Julius ?
- Machine used in WW2 to send secret messages in Germany.
- Statement of intention to inflict damage or hostile action.
12 Clues: The largest WAN in the world. • Shift cipher named after a famous Roman, Julius ? • Machine used in WW2 to send secret messages in Germany. • Statement of intention to inflict damage or hostile action. • An environment in which digitized information is distributed on networks of computers. • ...
Ryken Yudice crossword 2023-09-13
Across
- the monetary worth of something
- a systematised set of rules about which foods or combinations of foods one may not consume
- methods, systems, and devices which are the result of scientific knowledge being used for practical purposes.
- GMOs can be turned into products like cornstarch, corn syrup, soybean oil, canola oil, corn oil, or granulated sugar.
- perceived standards for what constitutes appropriate consumption, whether that be amounts of foods or specific food choices, for members of a social group.
- he customary beliefs, social forms, and material traits of a racial, religious, or social group.
- an expression of the ways of living developed by a community and passed on from generation to generation, including customs, practices, places, objects, artistic expressions and values.
Down
- the process by which microorganisms are prevented from entering a package during and after packaging.
- the use of technology to modify the genes of our food sources.
- a food that makes up the dominant part of a population's diet.
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- It must come from ruminant animals with cloven — or split — hooves, such as cows, sheep, goats, lambs, oxen, and deer.
12 Clues: the monetary worth of something • the use of technology to modify the genes of our food sources. • a food that makes up the dominant part of a population's diet. • a systematised set of rules about which foods or combinations of foods one may not consume • he customary beliefs, social forms, and material traits of a racial, religious, or social group. • ...
POLS Crossword Puzzle 2024-10-05
Across
- Actors are compelled to select outcomes that benefit one party while negatively affecting another.
- When two or more actors implement policies that improve well-being of at least one more actor without affecting any other.
- The personality, perceptions, choices, and activities of individual decision-makers and individual participants provide an explanation.
- States will build international relations around international law and institutions.
- Premeditated threat or use of violence against noncombatant targets by individuals or groups to obtain a political or social objective.
Down
- States try to influence the behavior of other actors by bargaining, negotiating, taking a specific action or refraining from such an action.
- The withdrawal of customary trade and financial relations for foreign - and security-policy purposes.
- An assemblage of units, object, or parts united by some form of regular interaction.
- Focuses on the international character of states as the most important feature of international relations.
- Art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality.
- Struggle for power, war is inevitable, bargaining and coercion, where cooperation is rare.
- An armed conflict that occurs between organized actors within a state and and that meets some minimum threshold for severity.
12 Clues: An assemblage of units, object, or parts united by some form of regular interaction. • States will build international relations around international law and institutions. • Struggle for power, war is inevitable, bargaining and coercion, where cooperation is rare. • ...
Modern Classroom Assessment 2022-03-02
Across
- this type of processing plans and executes actions.
- An approach to test design that emphasizes accessibility and fairness for all children, regardless of gender, first language, ethnicity, or disability
- This system sets priorities and control C energies avoided to engaging in learning are trying ones vest on an assessment
- the act of presenting or supporting as worthy or fit
- are the systematic basis for making inferences about the learning and development of students.
- The design of products and environments to be usable in a meaningful and similar way by all people.
Down
- is the introduction of extraneous, uncontrolled variables that affect assessment outcomes.
- this networks specializes in receiving and analyzing information
- Consistency and precision in scores, scores that are very close to what a student but typically receive on a given test are reliable.
- refers to the positive or negative social consequences of a particular test.
- The systematic collection of information about students design, administered, and scored by teachers for the students.
- The characteristics of an assessment that measures what it is supposed to measure. Meaning that the assessment measures what you assume it does, and it also means that the assessment measures what it is intended to measure.
12 Clues: this type of processing plans and executes actions. • the act of presenting or supporting as worthy or fit • this networks specializes in receiving and analyzing information • refers to the positive or negative social consequences of a particular test. • is the introduction of extraneous, uncontrolled variables that affect assessment outcomes. • ...
Internet Hardware 2022-10-17
Across
- a specification for a set of communication protocols to standardize the way wireless devices
- a networking device that forwards data packets between computer networks.
- a computer that stores web server software and a website's component files
- a group of devices that act as a single Wi-Fi network
- a large network of information that is not tied to a single location
- a series of computers linked together to form a network in a circumscribed location
Down
- A star network is a local area network (LAN) topology in which all nodes are directly connected to a common central computer that is often referred to as a hub.
- receives incoming data packets and redirects them to their destination on a local area network
- consists of two or more computers that are linked in order to share resources
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- a computer hardware device that converts data from a digital format into a format suitable for an analog transmission medium such as telephone or radio.
- a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network.
12 Clues: a group of devices that act as a single Wi-Fi network • a large network of information that is not tied to a single location • a networking device that forwards data packets between computer networks. • a computer that stores web server software and a website's component files • consists of two or more computers that are linked in order to share resources • ...
Anatomy of a Computer 2019-02-16
Across
- The word ______ is often used to describe a place on the outside of your PC where you can plug in a cable.
- Components- A ___ is a display adapter also known as a graphics card.
- Any place of hardware that isn’t mounted inside a PC’s case is called a ________.
- Devices- A ______ uses fans to cool down a PC when extra heat is generated.
- access memory (RAM)- A _____ stores information that your are working and each PC’s has a maximum of _____.
- Supply- The ____ connects to some type of power source.
- It’s for desk tops, Pc, ________ is typically some type of box with lights, vents, and places for attaching cables.
Down
- The primary circuit board inside your PC, all components, inside and out, connect through the _______ in some way.
- A ____ is a device intended to store data when it’s not in use.
- Processing Unit (CPU) -It the heart of all the PC’s operations, and the performance of both hardware and software, ___________ relies on the processor’s performance.
- slots- using ______, your can add extra video cards, networks cards, printer ports, tv receivers and many other custom addition.
- All the components we mentioned so far are connected by some combination of _____.
12 Clues: Supply- The ____ connects to some type of power source. • A ____ is a device intended to store data when it’s not in use. • Components- A ___ is a display adapter also known as a graphics card. • Devices- A ______ uses fans to cool down a PC when extra heat is generated. • Any place of hardware that isn’t mounted inside a PC’s case is called a ________. • ...
Aliyah Tanguma 2015-05-04
Across
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- An unauthorized person who secretly gains access to computer files.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- a list of citations that appear at the end of a paper, article,chapter or book.
- A collaborative website which can be directly edited by anyone with access to it.
- To renew or revitalize; To reload a webpage on the internet.
Down
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- Known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
- A bully who operates online, in cyberspace; To bully online.
- A reference to a published source (not always the original sources).
- Software used to view various kinds of Internet resources found on the web.
12 Clues: A bully who operates online, in cyberspace; To bully online. • To renew or revitalize; To reload a webpage on the internet. • An unauthorized person who secretly gains access to computer files. • A reference to a published source (not always the original sources). • Software used to view various kinds of Internet resources found on the web. • ...
AP Comp Sci Principles Crossword 2023-05-02
Across
- any expression that can evaluate to true or false
- a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met
- using a "rule" to guide an algorithm, like always walking toward the north star if you were stuck in a forest
- uses a boolean expression to repeatedly run a block of code
- different paths that are repeated throughout the internet to make it more reliable
- a type of malware that can get into your computer and take your personal information and ruin your computer
Down
- polynomial in the number of steps an algorithm takes in the worst case based on the input size
- a special kind of variable used in a function to refer to one of the pieces of data provided as input to the function
- lots of people to help with a scientific project, like asking everyone around the world to count the butterflies they see one day
- a compression method that makes you lose some data in the process
- a networking device that forwards data packets between computer networks
- used to return the flow of control to the point where the procedure was called and to return the value of expression
12 Clues: any expression that can evaluate to true or false • uses a boolean expression to repeatedly run a block of code • a compression method that makes you lose some data in the process • a networking device that forwards data packets between computer networks • different paths that are repeated throughout the internet to make it more reliable • ...
My Internet Crossword 2018-03-29
Across
- Link Layer / this is the level of Ethernet; Data packets are decoded/encoded into bits.
- / Interface Message Processor
- Layer / This layer conveys the bit stream - electrical impulse, light or radio signal -- through th
- Layer / Translates or converts the data from the Application Layer so that it can be read by the Application layer of the receiving computer—it does this in standard ways, such as converting text to ASCII or HTML, graphics to jpg or gif, or video to QuickTime or AVI.
- / The four numbers are called (IP #)
- Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP
Down
- / fast and safe ethernet
- Layer / he interface that the user sees and interacts with, allowing the user to “click send” to send an email, for example, or move a file from a local computer to a network drive.
- V4 / about 4.3 billion (2^32)
- Layer / Controls the communication link or session between the sending and receiving computers (starts and stops communication)
- / ipconfig, ping, nslookup, tracert
- Layer / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
12 Clues: / fast and safe ethernet • V4 / about 4.3 billion (2^32) • / Interface Message Processor • / ipconfig, ping, nslookup, tracert • / The four numbers are called (IP #) • Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP • Link Layer / this is the level of Ethernet; Data packets are decoded/encoded into bits. • ...
Project 2023-05-11
Across
- Quality of life based on ownership of necessities and luxuries that make life easier.
- Communication by transmitting signals over a wire. Messages could be sent over long distances in a short period of time.
- Farming methods advanced, greater population, food supplies increased.
- Development of a system which supports machine production of goods
- A method of production that brought many workers and machines together into one building
- In early modern Europe, the class of well-off town dwellers whose wealth came from manufacturing, finance, commerce, and allied professions.
Down
- A branch of socialism that emphasizes exploitation and class struggle and includes both communism and other approaches.
- A belief that ultimate power resides in the people.
- Networks of iron (later steel) rails on which steam (later electric or diesel) locomotives pulled long trains at high speeds. First railroads were built in England in the 1830s. Success caused a railroad building boom lasting into the 20th Century (704)
- An increase in the percentage and in the number of people living in urban settlements.
- A simple, inexpensive, hand-powered spinning machine created by James Hargreaves in 1765.
- A system in which society, usually in the form of the government, owns and controls the means of production.
12 Clues: A belief that ultimate power resides in the people. • Development of a system which supports machine production of goods • Farming methods advanced, greater population, food supplies increased. • Quality of life based on ownership of necessities and luxuries that make life easier. • ...
Cyber Ethics 2025-06-10
Across
- This refers to an act of stealing and misusing someone's personal information
- It is a security system that prevents unauthorised people from accessing our system and network
- It refers to unwanted bulk emails that come from unknown sources
- It means accessing the internet in an illegal manner
- They refers to a set of procedures, moral principles and ethical practises that regulate the use of a computer and the internet
- Fraudulently obtaining money from depositors by claiming to be an authorised bank or a financial institution
Down
- It refers to criminal activities that involve the use of computers, networks, and the internet connections with the intent to cause harm to individuals or their digital devices
- We purchase a single licensed copy of the software and load it onto several computers contrary to the licence's terms
- The practice in which spam attackers keep sending bulk emails till the mail server gets full
- It is a program or a set of programs that disrupts the normal functioning of a computer
- It refers to an illegal intrusion into a computer system or network
- It is the process of transforming data into unreadable code
12 Clues: It means accessing the internet in an illegal manner • It is the process of transforming data into unreadable code • It refers to unwanted bulk emails that come from unknown sources • It refers to an illegal intrusion into a computer system or network • This refers to an act of stealing and misusing someone's personal information • ...
Crossword- STEM 2020-05-28
Across
- a machine capable of carrying out a complex series of actions automatically, especially one programmable by a computer.
- a container consisting of one or more cells, in which chemical energy is converted into electricity and used as a source of power.
- a set of related web pages located under a single domain name.
- an electronic device for storing and processing data, typically in binary form
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardised communication protocols.
- the process of assigning a code to something for classification or identification.
- a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Down
- a machine for printing text or pictures, especially one linked to a computer.
- energy that is produced by mechanical, electrical, or other means and used to operate a device.
- the branch of science and technology concerned with the design, building, and use of engines, machines, and structures.
- a complete and closed path around which a circulating electric current can flow.
- a form of energy resulting from the existence of charged particles
12 Clues: a set of related web pages located under a single domain name. • a form of energy resulting from the existence of charged particles • a machine for printing text or pictures, especially one linked to a computer. • an electronic device for storing and processing data, typically in binary form • ...
Block 6 Cyber Chapter 2 2020-08-10
Across
- the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society
- malicious logic that is inserted into an executable file to be triggered at a later time
- a technology that tracks and records key strokes hoping to get sensitive information like usernames and passwords
- an infiltration software that secretly monitors unsuspecting users
- associated with individuals using hacking skills within the law to conduct security assessments and help find vulnerabilities
- self-contained malware that has the ability to copy itself without parasitically infecting the host code
- an individual that utilizes cyber training to hack for the government or an ally
Down
- a means and method used by hackers to retain access to a system or network
- an attempt to fraudulently acquire sensitive information such as user’s name, passwords, or credit card information by pretending to be a trustworthy entity in an electronic communication
- an attack on a computer that exposes an undiscovered or unpatched vulnerability
- the action taken by a nation-state or international organization to use and/or target computers and networks to achieve military objectives
- free computer software that contains advertisements
12 Clues: free computer software that contains advertisements • an infiltration software that secretly monitors unsuspecting users • a means and method used by hackers to retain access to a system or network • an attack on a computer that exposes an undiscovered or unpatched vulnerability • an individual that utilizes cyber training to hack for the government or an ally • ...
Zachary's Internet Crossword Puzzel 2013-03-26
Across
- software used to view various kinds of Internet resources found on the Web
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- a list of citations that appear at the end of a paper, article, chapter or book.
- An unauthorized person who secretly gains access to computer files
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
Down
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
- A bully who operates online, in cyberspace; To bully online
- To renew or revitalize; To reload a webpage on the internet
- Domain names come with different extensions of the web address based
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
12 Clues: A bully who operates online, in cyberspace; To bully online • To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files • Domain names come with different extensions of the web address based • software used to view various kinds of Internet resources found on the Web • ...
Ilyssa's Internet Crossword Puzzle ! ;) 2013-03-26
Across
- a restricted computer network; a private network created using World Wide Web software, example: Hays CISD network
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- To renew or revitalize; To reload a webpage on the internet
- OPERATORS Using keywords such as AND, OR, NOT in web searches to narrow search results
- USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
- ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
Down
- A bully who operates online, in cyberspace; To bully online
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- An unauthorized person who secretly gains access to computer files
- software used to view various kinds of Internet resources found on the Web.
12 Clues: A bully who operates online, in cyberspace; To bully online • To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files • software used to view various kinds of Internet resources found on the Web. • OPERATORS Using keywords such as AND, OR, NOT in web searches to narrow search results • ...
Chapter 11: Distributing and Marketing 2014-12-01
Across
- use of advertising to inform consumers that a new or improved product or service is available and to persuade them to purchase it
- series of stages that a product goes through from first introduction to complete withdrawal from the market
- business transactions conducted over computer networks, in particular the World Wide Web
- amount of satisfaction one gets from a good or service
- gatering, recording, and analyzing data about the types of goods and services that people want
- info gathered by researchers about possible users of a product based on such characteristics as age, gender, income, education, and location
- practice of setting prices close to those charged by other companies selling similar products
- businesses that sell consumer goods directly to the public
Down
- businesses that purchase large quantities of goods from producers for resale to other businesses
- selling a new product at a low price to attract customers away from an established product
- offering a product for sale in a small area for a limited period of time to see how well it sells before offering it nationally
- all activities needed to move goods & services from producers to consumer
12 Clues: amount of satisfaction one gets from a good or service • businesses that sell consumer goods directly to the public • all activities needed to move goods & services from producers to consumer • business transactions conducted over computer networks, in particular the World Wide Web • ...
IMD161 - Chapter 1 2023-10-24
Across
- ____________refers to all the documents that institutions or individuals create or receive in the course of administrative and executive transactions.
- Records are important as __________ of communication, decisions, actions, and history.
- ________ records refer to documents relating to budgets, finance, personnel, supplies, and other administrative operations common to all departments or units.
- _________ of records relates to how records are recorded, including usage of symbols, layouts, formats, media and more.
Down
- ________ records are records that are created or received and maintained in any public sector agency.
- _________ records are records that are created, received and maintained by non-governmental organizations, families or individuals relating to their private and public affairs.
- This is one of the characteristics of records.
- The importance to manage records - to reduce the ________ of records.
- ________ can be preserved through internal elements of records (e.g. attached documents, attachment information, networks, numbers and reference code) or through external elements (e.g. metadata).
- Records must be reliable and trustworthy. The reliability of a record is linked to its creation.
- ________ of records includes text, data, symbols, images, sounds, graphics and other information which forms the record.
- The importance to manage records - to identify and protect _______ records
12 Clues: This is one of the characteristics of records. • The importance to manage records - to reduce the ________ of records. • The importance to manage records - to identify and protect _______ records • Records are important as __________ of communication, decisions, actions, and history. • ...
Vocabulary 1984 2023-01-23
Across
- This word means,showing willingness to allow the existence of opinions or behavior that one does not necessarily agree with.
- This word means, systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum.
- This word means,special words or expressions that are used by a particular profession or group and are difficult for others to understand.
- This word means,a secret plan by a group to do something unlawful or harmful.
- This word means,fail to resist pressure, temptation, or some other negative force.
- This word means, offering nothing that is stimulating or challenging.
- This word means, (especially of sound, taste, and color) pleasantly smooth or soft; free from harshness.
Down
- This word means,policy or practice based on the political and economic theory of socialism
- This word means, when a person, group, or government forces another person — or group of people — to submit or be controlled.
- This word means, the acceptance of or mental capacity to accept contrary opinions or beliefs at the same time, especially as a result of political indoctrination.
- This word means, discover or identify the presence or existence of.
- This word means, intense and eager enjoyment,interest, or approval.
12 Clues: This word means, discover or identify the presence or existence of. • This word means, intense and eager enjoyment,interest, or approval. • This word means, offering nothing that is stimulating or challenging. • This word means,a secret plan by a group to do something unlawful or harmful. • ...
tech terms 2025-04-16
Across
- is a computer hardware device that converts data from a digital format into a format suitable for an analog transmission medium such as telephone or radio.
- or Reboot: booting is a starting computer operating system, reboot is a start for a second time or third time.
- managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.
- Address a unique address that identifies a device on the internet or a local network
- standard markup language
- a network security device that monitors and filters incoming and outgoing network traffic bases on a organizations previously established security policies.
- systems: the program that, after being initially loaded into the computer by a boot program manages all of the other applications programs in a computer.
Down
- a megabyte means either 1,000,000 bytes or 1,048,576 bytes.
- a piece of data from a website that is stored within a web browser that the website can retrieve at a later time.
- the traditional technology for connecting devices in a wired local area network.
- portable document format
- is a file or code, typically delivered over a network, that infects, explorers, steals or conducts virtually any behavior an attacker wants.
12 Clues: portable document format • standard markup language • a megabyte means either 1,000,000 bytes or 1,048,576 bytes. • the traditional technology for connecting devices in a wired local area network. • Address a unique address that identifies a device on the internet or a local network • ...
What is the internet? 2025-03-13
Across
- Stands for Uniform Resources Locator. It is the address for a website.
- A collection of servers that lists commonly used website addresses and their IP addresses. There are thousands around the world
- Stands for the World Wide Web. It is a collection of web pages that can be browsed using a web browser.
- A single page that is exactly the same for each user that accesses it.
- A web page that is built based on user preferences and viewing history. It is personalized to the user that is viewing it
- Sets of rules used for communication.
Down
- In a _______ network, all data and resources are connected through a single location.
- A term used to describe the numeric pattern assigned to each device on a network. Used to locate devices.
- A global network of networks
- Stands for HyperText Markup Language. It is the language used for most websites used on the WWW.
- In a _______ network, all data and resources are shared through multiple locations and paths throughout the network.
- A piece of software that is used to browse websites on the WWW. It accesses and downloads the website data and builds the page.
12 Clues: A global network of networks • Sets of rules used for communication. • Stands for Uniform Resources Locator. It is the address for a website. • A single page that is exactly the same for each user that accesses it. • In a _______ network, all data and resources are connected through a single location. • ...
Neural Networks and Deep Learning 2025-09-23
5 Clues: Learns to compress and reconstruct data. • Has loops allowing information to persist over time. • Uses convolutional layers to detect spatial patterns. • Information flows in one direction—from input to output. • A type of RNN with memory cells to retain long-term dependencies.
e-commerce crossword puzzle 2013-09-20
Across
- a system comprising vast telecommunications networks, satellites, and fiber optics that allow you to access information from other computers and their users.
- a global collection of graphical and hypertext internet pages that can be read, viewed, and interacted with via computer
Down
- a grogram used to view, downloaded, surf, or access web documents
- the common underlying language or protocol through which systems communicate on the internet
4 Clues: a grogram used to view, downloaded, surf, or access web documents • the common underlying language or protocol through which systems communicate on the internet • a global collection of graphical and hypertext internet pages that can be read, viewed, and interacted with via computer • ...
NETWORKING CONCEPTS 2025-06-09
Across
- A card used to physically attach a computer to a network.
- Use twisted pair cable containing eight wires.These wires are arranged in a special order and an RJ-45 connector crimped at both ends of the table.
- Points or Routers Have a wireless antennna,which increases the communication range of the radio signals.
Down
- Used instead of the normal network cards that are used in wired networks.
4 Clues: A card used to physically attach a computer to a network. • Used instead of the normal network cards that are used in wired networks. • Points or Routers Have a wireless antennna,which increases the communication range of the radio signals. • ...
Daniel Knox Crossword puzzle 2014-04-04
Across
- bully who operates online, in cyberspace; To bully online
- To renew or revitalize; To reload a webpage on the internet
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- a piece of writing that has been copied from someone else and is presented as being your own work
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
Down
- Online Communites where people socialize
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic
- An unauthorized person who secretly gains access to computer files
- - A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- a restricted computer network; a private network created using World Wide Web software, example: Hays CISD network
12 Clues: Online Communites where people socialize • bully who operates online, in cyberspace; To bully online • To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files • a piece of writing that has been copied from someone else and is presented as being your own work • ...
Network security 2022-07-18
Across
- type of malicious code or software that looks legitimate but can take control of your computer
- an online scam similar to phishing, where a website's traffic is manipulated, and confidential information is stolen.
- Groups of criminals who unite to carry out cyber attacks in support of political causes.
- Also known as “white hats,” ethical hackers are security experts that perform these security assessments
- type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
- The practice of protecting systems, networks, and programs from digital attacks
Down
- “Flags” are secrets purposely placed by companies or hackers. Planting the flag itself refers to placing these flags
- the practice of using a software program or hardware device (keylogger ) to record all keystrokes on a computer keyboard, either overtly as a surveillance tool or covertly as spyware
- a type of malicious software, or malware, that spreads between computers and causes damage to data and software
- malware that employs encryption to hold a victim's information at ransom
- any program or file that is intentionally harmful to a computer, network or server.
- A person who breaks into a computer system
12 Clues: A person who breaks into a computer system • malware that employs encryption to hold a victim's information at ransom • The practice of protecting systems, networks, and programs from digital attacks • any program or file that is intentionally harmful to a computer, network or server. • ...
Vocabulary 1984 2023-01-23
Across
- This word means,showing willingness to allow the existence of opinions or behavior that one does not necessarily agree with.
- This word means, systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum.
- This word means,special words or expressions that are used by a particular profession or group and are difficult for others to understand.
- This word means,a secret plan by a group to do something unlawful or harmful.
- This word means,fail to resist pressure, temptation, or some other negative force.
- This word means, offering nothing that is stimulating or challenging.
- This word means, (especially of sound, taste, and color) pleasantly smooth or soft; free from harshness.
Down
- This word means,policy or practice based on the political and economic theory of socialism
- This word means, when a person, group, or government forces another person — or group of people — to submit or be controlled.
- This word means, the acceptance of or mental capacity to accept contrary opinions or beliefs at the same time, especially as a result of political indoctrination.
- This word means, discover or identify the presence or existence of.
- This word means, intense and eager enjoyment,interest, or approval.
12 Clues: This word means, discover or identify the presence or existence of. • This word means, intense and eager enjoyment,interest, or approval. • This word means, offering nothing that is stimulating or challenging. • This word means,a secret plan by a group to do something unlawful or harmful. • ...
Unit 2: Networks of Exchange - Geography Vocab 2025-09-23
Across
- Seasonal winds that shaped Indian Ocean trade.
- A chain of islands.
- Vast grassland region of Central Asia, home to nomads.
- Semi-dry grassland south of the Sahara Desert.
- A province in northwest China important to the Silk Road.
Down
- Large fertile region in northern China where dynasties developed.
- Major land-based trade route that linked China to the Middle East and Europe.
- Coastal trading culture and language in East Africa.
8 Clues: A chain of islands. • Seasonal winds that shaped Indian Ocean trade. • Semi-dry grassland south of the Sahara Desert. • Coastal trading culture and language in East Africa. • Vast grassland region of Central Asia, home to nomads. • A province in northwest China important to the Silk Road. • Large fertile region in northern China where dynasties developed. • ...
Neural Networks and Deep Learning 2025-09-23
5 Clues: Learns to compress and reconstruct data. • Has loops allowing information to persist over time. • Uses convolutional layers to detect spatial patterns. • Information flows in one direction—from input to output. • A type of RNN with memory cells to retain long-term dependencies.
Group C cross word puzzle 2022-11-23
Across
- s outdoor media placed in or on any mode of public transportation.
- marketing strategy that involves strategic alliance of multiple brand names jointly used on a single product or service
- a message in the public interest disseminated by the media without charge to raise public awareness and change behavior.
- the practice of purchasing ad spots on popular radio stations to promote your products and services.
- advertisement in the form of editorial content.
- A parody advertisement is a fictional advertisement for a non-existent product, either done within another advertisement for an actual product, or done simply as parody of advertisements—used either
- planned event designed to attract the public's attention to the event's organizers or their cause.
Down
- a type of inbound marketing that doesn't appear as an advertisement.
- Advertising mail
- a modern merchandising strategy for brands to reach their target audiences without using overt traditional advertising.
- a type of promotional media that's paid for by an advertiser, but created and shared by another brand, influencer, or publisher.
- a marketing technique where references to specific brands or products are incorporated into another work, such as a film or television program, with specific promotional intent.
- a type of digital marketing that utilizes social networks such as Facebook, Twitter, and Instagram to deliver paid ads to your target audience.
- an advertisement strategy in which a company uses surprise and/or unconventional interactions in order to promote a product or service.
- a well-known person endorses a product or service.
- full-screen ads that cover the interface of their host app.
- he practice of making spoofs or parodies of corporate and political advertisements.
17 Clues: Advertising mail • advertisement in the form of editorial content. • a well-known person endorses a product or service. • full-screen ads that cover the interface of their host app. • s outdoor media placed in or on any mode of public transportation. • a type of inbound marketing that doesn't appear as an advertisement. • ...
Mesh Networking 2020-05-11
Across
- a company that provides subscribers with access to the Internet.
- the area or extent covered by or included in something
- easily and securely control your HomeKit accessories from all your Apple devices.
- a node that duplicates the available wireless signal from a router across a wider range.
- controlled by or connected to another computer or to a network.
- receiving data (especially video and audio material) over a computer network
Down
- a number of interconnected computers, machines, or operations.
- part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- broadcast the internet signal from the modem to the wireless devices within a home.
- the device that an ISP (Internet Service Provider) uses to connect a home to the web.
- the state of being protected against the criminal or unauthorized use of electronic data.
- a form of play or sport, especially a competitive one played according to rules
- any device that transmits and/or receives a wireless signal. In Mesh Wi-Fi Networks, nodes are placed throughout a home to provide a wireless signal to your devices.
- • a network in which each computer or processor is connected to a number of others, especially so as to form a multidimensional lattice.
- allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
15 Clues: the area or extent covered by or included in something • a number of interconnected computers, machines, or operations. • controlled by or connected to another computer or to a network. • a company that provides subscribers with access to the Internet. • receiving data (especially video and audio material) over a computer network • ...
Tomasz Sadowy 2023-04-25
Across
- a method in artificial intelligence that teaches computers to process data in a way that is inspired by the human brain
- the logic circuitry that responds to and processes the basic instructions that drive a computer
- a result that can only have one of two possible values: true or false
- a machine learning technique that teaches computers to do what comes naturally to humans
Down
- a group of binary digits or bits (usually eight) operated on as a unit.
- the process of fixing or removing incorrect, corrupted, incorrectly formatted, duplicate, or incomplete data within a dataset.
- a computer program that can copy itself and infect a computer without permission or knowledge of the user
- the process of converting information or data into a code, especially to prevent unauthorized access.
- a standardized set of rules for formatting and processing data.
- the language used to tell your web browser what each part of a website is
- a computer program or device that provides a service to another computer program and its user, also known as the client
- a malicious attempt to disrupt the normal traffic of a targeted server
- the traditional technology for connecting devices in a wired local area network
- a small segment of a larger message of data sent over computer networks
- how much time it takes for a data packet to travel from one designated point to another
15 Clues: a standardized set of rules for formatting and processing data. • a result that can only have one of two possible values: true or false • a malicious attempt to disrupt the normal traffic of a targeted server • a group of binary digits or bits (usually eight) operated on as a unit. • a small segment of a larger message of data sent over computer networks • ...
Ancient Civilizations 2023-07-06
Across
- A system of writing used by ancient Egyptians, consisting of pictures and symbols.
- A group of territories or nations ruled by a single leader or government.
- The remains of ancient buildings, cities, or civilizations, often preserved for historical and archaeological study.
- A fortified hilltop or elevated area containing ancient Greek buildings, typically temples and other important structures.
- Relating to the ancient civilization of the Maya, known for their advanced calendar system and monumental architecture.
- A ruler of ancient Egypt who had great power and was considered a god-like figure.
- A prehistoric monument in England consisting of massive stones arranged in a circular pattern.
- A three-dimensional sculpture representing a person or deity, often made of stone or metal.
- A religious structure or building used for worship and ceremonies in ancient civilizations.
Down
- A complex society with advanced social, cultural, and technological development.
- The study of ancient cultures and civilizations through the excavation and analysis of artifacts and structures.
- Large structures with a square or triangular base and four triangular sides, built by ancient civilizations as tombs or monuments.
- A preserved body, often wrapped in bandages, created through the process of mummification in ancient Egypt.
- Relating to the ancient civilization of the Inca, known for their remarkable stone structures and road networks.
- An ancient amphitheater in Rome used for gladiatorial contests, public spectacles, and other events.
15 Clues: A group of territories or nations ruled by a single leader or government. • A complex society with advanced social, cultural, and technological development. • A system of writing used by ancient Egyptians, consisting of pictures and symbols. • A ruler of ancient Egypt who had great power and was considered a god-like figure. • ...
Liam Virus Crossword 2018-04-11
Across
- Email virus that caused DDOS attacks to users infected with the virus
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- A number of interconnected computers, machines, or operations.
- The first email Virus
- A worm virus that replicates through the address book and was known for being slow and insidious
- Email Virus whose intention was to steal identities and make money
- A Message distributed by electronic means from one computer user to one or more recipients via a network
Down
- A type of network virus that finds backdoors in networks and replicates itself in order to do harm
- A Network Virus that takes remote control of computer to steal info and make money
- A distributed denial of service caused by overwhelming a computer or server with information from other sources
- A virus discovered in the pentagon that infected computers through the use of a flash drive
- The programs and other operating information used by a computer
- A type of virus that attempts to disguise itself as another file or program in order to remain undetected. Cannot easily spread
- Virus that worked to shut down Government websites and microsoft servers
- A type of software that infects computers through a variety of ways and can cause damage or harm
15 Clues: The first email Virus • A number of interconnected computers, machines, or operations. • The programs and other operating information used by a computer • Email Virus whose intention was to steal identities and make money • Email virus that caused DDOS attacks to users infected with the virus • ...
D-Crypt Crossword 2022-01-25
Across
- A celestial moon symbol on the power button of your computer
- Use me daily, your life won’t exist without me. Currently, I’m under Meta.
- If you miss me, it’ll be a disaster in C++ and C. I’m unnecessary in python.
- I'm at one place, but I'm still all around you. You use me everyday, and I have all your photos
- You must be brave and fearless to get me, I’m a free and open-source web browser.
- I acquire the most evolving technology, I’m a platform not a currency with a large market share.
- So, I came early to the office and switched the place of ‘M’ and ‘N’. Some would say I’m a Monster, but others would say I’m a Nomster.
Down
- I'm not the oldest programming language, but 13 billion devices run on me,
- A hub to lots of open-source projects and documentations. One of the best collaboration platforms.
- A blue bird platform which recently received an Indian CEO.
- What is an alien’s favorite place on a computer?
- An emerging industry with a combination of finance and technology.
- A famous problem, where you find the shortest possible route that visits every city exactly once and returns to the starting point.
- Neural networks are my passion. I’m the godfather of Deep Learning
- One of the most popular avatars of Vishnu. Now, it helps us to access memory quickly in computers.
15 Clues: What is an alien’s favorite place on a computer? • A blue bird platform which recently received an Indian CEO. • A celestial moon symbol on the power button of your computer • An emerging industry with a combination of finance and technology. • Neural networks are my passion. I’m the godfather of Deep Learning • ...
Tx history unit 10 puzzle 2022-04-21
Across
- space comprises the earth’s atmosphere and the space
- a financial gain
- is the process by which an economy is transformed from primarily agricultural to one based on the manufacturing of goods.
- A long and severe recession in an economy or market.
- the part of the economy devoted to the production, processing, and distribution of food, including the financial institutions that fund these activities.
- is a period of temporary economic decline during which trade and industrial activities are reduced
- the single worldwide computer network that interconnects other computer networks, enabling data and other information to be exchanged.
- is a return to a normal state of health, mind, or strength.
Down
- statistical data relating to the population and particular groups within it.
- The process of increasing the percentage and number of people living in urban settlements.
- the act of competing.
- offered by companies to the customers to provide utility and satisfy their wants.
- sectors (areas that are distinct from others) that produce goods and services within an economy (EX. the automobile industry; the steel industry).
- The basic facilities and installations that help a government or community-run, including roads, schools, phone lines, sewage treatment plants, and power generation.
- an economic model which states that the price at which a good is sold is determined by the good’s supply and its demand.
15 Clues: a financial gain • the act of competing. • space comprises the earth’s atmosphere and the space • A long and severe recession in an economy or market. • is a return to a normal state of health, mind, or strength. • statistical data relating to the population and particular groups within it. • ...
The world of networking and connections 2025-04-28
Across
- a unique address that identifies a device on the internet or a local network
- the maximum possible data transfer rate of a network or internet connection
- the delay before a transfer of data begins following an instruction for its transfer
- a system that turns domain names into IP addresses, which allow browsers to get to websites and other internet resources
- a communications standard that enables application programs and computing devices to exchange messages over a network
- a network configuration where devices are interconnected in a decentralized manner
Down
- a network security device that separates a trusted internal network from an external network deemed untrustworthy, such as the internet.
- a network structure that combines two or more different types of topologies, such as star, ring, bus, or mesh
- a computer network that connects computers within a metropolitan area
- a device that forwards data packets to the appropriate parts of a computer network
- Point a term used for a network device that bridges wired and wireless networks
- a wirelesms computer network that links two or more devices using wireless communication to form a local area network
- a device that links multiple computers and devices together
- is a network setup in which each device is connected to a central node called a hub
- a widely used system for identifying devices on a network with unique addresses made up of four numbers
15 Clues: a device that links multiple computers and devices together • a computer network that connects computers within a metropolitan area • the maximum possible data transfer rate of a network or internet connection • a unique address that identifies a device on the internet or a local network • ...
Unit 1.5 Crossword 2024-09-20
Across
- A large territory ruled by a single authority, often encompassing diverse peoples and cultures
- A West African storyteller and oral historian who preserves and shares the history, traditions, and genealogies of their people
- A mystical branch of Islam that spread in parts of Africa, emphasizing personal spiritual experiences
- Ruler of the Mali Empire (1312-1337) known for his wealth and famous pilgrimage to Mecca
- An important oral history about Sundiata Keita, the founder of the Mali Empire
- The coastal area of East Africa where Swahili culture developed, blending African and Arab influences
- Material from elephant tusks that was valuable in trade, often carved into intricate works of art
- A place of worship for Muslims, often featuring distinctive architectural styles in different African regions
Down
- A type of colorful woven fabric from West Africa, traditionally associated with Akan royalty
- Trade routes across the Sahara Desert connecting West Africa to North Africa and the Mediterranean
- A powerful kingdom in southern Africa known for its impressive stone structures and far-reaching trade networks
- A handwritten document, often beautifully decorated, used to record knowledge and stories
- A precious metal that was a major export from parts of Africa, particularly West Africa
- An important center of Islamic learning in West Africa, home to the University of Sankore
- The impact of this religion on African cultures and societies, including religion, architecture, education, and governance
15 Clues: An important oral history about Sundiata Keita, the founder of the Mali Empire • A precious metal that was a major export from parts of Africa, particularly West Africa • Ruler of the Mali Empire (1312-1337) known for his wealth and famous pilgrimage to Mecca • A handwritten document, often beautifully decorated, used to record knowledge and stories • ...
Cyber Ethics 2025-05-23
Across
- It is a computer program that disrupts the normal functioning of a computer.
- They are technical people who are experts in breaking into systems to steal important data.
- Hacking which is done for a good cause,such as national security.
- It can be defined as the legal rules and restrictions imposed on online rulers.
- When software is copied and distributed illegally.
- It refers to the unwanted bulk emails that come from unknown sources.
- It is the criminal practice of using social influence over the telephone system.
- There is an equivalent term to hacking.
Down
- It refers to the act of using or imitating the language and thoughts of another person as one's original work.
- It is the process of transforming data into unreadable code.
- It refers to criminal activities that involve the use of computers,networks,and the internet connections with the intent to cause harm to individuals.
- It is a set of procedures,moral principles that regulate the use of a computer.
- It is an act of sending an email to a user,misleading him to believe that it is from a trusted person or organisation.
- It is malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on.
- It is security system that prevents unauthorised people from accessing your system and network.
15 Clues: There is an equivalent term to hacking. • When software is copied and distributed illegally. • It is the process of transforming data into unreadable code. • Hacking which is done for a good cause,such as national security. • It refers to the unwanted bulk emails that come from unknown sources. • ...
Cyber ethics. 2025-06-11
Across
- an impression or information about a person that exists other internet because of his online activity.
- a set of procedures,moral principles,and ethical practices that regulate the use of a computer and the internet.
- a malicious technique of tracking a web user into clicking on something different from what the user perceives he/she is clicking on.
- an act of stealing and misusing someone's personal information.
- purchase a single licenced copy of the software and load it onto several computers contrary to the licence's terms.
- criminal activities involving the use of computers,networks,and the internet connections with the intent to cause harm to individuals or digital devices.
Down
- unwanted bulk emails that come from unknown sources.
- an act of harming or harassing a person through information technology in a deliberate manner.
- an illegal intrusion into a computer system or network.
- act of using or imitating the language and thoughts of another person as one's original work.
- process where software is copied and distributed illegally.
- fraudly obtained money from depositors by claiming be an authorised bank or a financial institution.
- the legal rules and restrictions imposed on online users.
- an act of sending an email to a user,misleading him to believe that it is from a trusted person or organisation
- a program or a set of programs that disrupts the normal functioning of a computer.
15 Clues: unwanted bulk emails that come from unknown sources. • an illegal intrusion into a computer system or network. • the legal rules and restrictions imposed on online users. • process where software is copied and distributed illegally. • an act of stealing and misusing someone's personal information. • ...
Etymology 2021-08-27
3 Clues: movie with the fast snail • thing characteristic of its kind or illustrating a general rule. • global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
iT CRIME 2024-11-07
3 Clues: a deception committed for gain. • the act or process of tricking someone into revealing information • the practice of protecting an organization's computer systems, networks, digital devices, data—from unauthorized access and malicious activity.
Crossword CGSoriano 2019-03-03
Across
- a unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.
- The standard network technology that connects computers to each other and to the Internet via cables.
- is a networking device that forwards data packets between computer networks.
Down
- consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves.
- Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. .
- The Internet's system for converting alphabetic names into numeric IP addresses
- a computer or computer program which manages access to a centralized resource or service in a network.
- is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server.
8 Clues: is a networking device that forwards data packets between computer networks. • The Internet's system for converting alphabetic names into numeric IP addresses • The standard network technology that connects computers to each other and to the Internet via cables. • ...
community perspective 2023-03-01
Across
- One highlight of local/grassroots perspective wherein the members of the community may involve themselves in various community activities
- This community perspective uses self-organization and encourages the local citizens to contribute to the community by taking responsibilities and actions
- It is most often associated with the study, diagnosis of mental illnesses
- This field is focused in the study of society, social orders, socialization and culture
Down
- One of the perspectives in community wherein it understands that community is composed of the ways people interact with each other, react, and expect each other to act and interact
- The ultimate of this discipline is to improve the lives of others such that their needs are satisfied
- Institutional community is a _______ model as it is defined by its networks and institutions
- This field examines the various aspects of humans, such as their biology, behavior, culture and social interactions
8 Clues: It is most often associated with the study, diagnosis of mental illnesses • This field is focused in the study of society, social orders, socialization and culture • Institutional community is a _______ model as it is defined by its networks and institutions • ...
What is Digital Marketing? 2013-10-20
Across
- A personal website or web page on which an individual records opinions, links to other sites, etc. on a regular basis.
- A software application designed to run on smartphones, tablet computers and other mobile devices.
- Publications that are regularly developed and distributed by businesses and organizations to their customers through the Internet.
- Commercial transactions conducted electronically on the Internet.
- A process of gaining traffic and visibility from search engines through both paid and unpaid efforts. It encompasses Search Engine Optimization and Pay Per Click campaign.
Down
- The means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- A set of related web pages served from a single web domain that connects to the Internet.
- A model, software, or strategy for managing a company’s interactions with current and future customers,for example, the introduction of Salesforce.com and marketing automation software to the company.
8 Clues: Commercial transactions conducted electronically on the Internet. • A set of related web pages served from a single web domain that connects to the Internet. • A software application designed to run on smartphones, tablet computers and other mobile devices. • ...
Module 3 Vocabulary Review 2024-02-16
Across
- British law asserting Parliament's authority over the colonies, passed alongside the repeal of the Stamp Act.
- Part of the First Amendment protecting the right to practice religion freely.
- British law imposing taxes on printed materials in the American colonies, leading to widespread opposition.
- Philosophers of the 17th and 18th centuries who promoted ideas such as individual rights, reason, and the social contract.
- Colonial networks for communication and coordination of resistance against British policies.
- A form of government where power resides in elected representatives and leaders are chosen by the people.
- British law requiring colonists to house and provision British soldiers, sparking colonial resentment.
- of Liberty Colonial organization advocating for independence from British rule, known for protests and resistance.
- Proposal by Benjamin Franklin for colonial unity and defense during the French and Indian War.
- Part of the First Amendment prohibiting the establishment of a state religion.
- An agreement signed by Pilgrims in 1620 to establish a self-governing colony based on majority rule.
Down
- The first elected legislative assembly in the American colonies, established in 1619.
- The government's power to take private property for public use, with compensation.
- A form of government where citizens elect representatives to make decisions on their behalf.
- The first constitution of the United States, emphasizing states' sovereignty and weak central government.
- British policy of loose enforcement of colonial trade laws, allowing colonies more autonomy.
- Legal principle that prevents an individual from being tried twice for the same crime.
17 Clues: Part of the First Amendment protecting the right to practice religion freely. • Part of the First Amendment prohibiting the establishment of a state religion. • The government's power to take private property for public use, with compensation. • The first elected legislative assembly in the American colonies, established in 1619. • ...
AP Research 2021-05-21
Across
- A type of data that is not numerical and often describes characteristics.
- A unique series of numbers and letters assigned to every device connected to a computer network with the purpose of making an internet-connected device identifiable.
- Statement or legal document where a company explains how a customer’s privacy and personal data will be handled.
- The quality of being fair and following conduct.
- The body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
- The group of participants taken and used from the population that should be representative of the population as a whole.
- A prediction for a research study made before the research process was conducted.
- Tech corporation famous for devices such as the iPhone,iPad, and Macbook.
Down
- A type of data collected in research that can be recorded as numbers or counts.
- A shortcoming in research that influences the validity of a study’s conclusions or results.
- Research method that combines quantitative and qualitative data.
- The collection of information from a sample of people through their responses to questions.
- A real-world effect of your argument.
- Unanswered questions or problems in others' research.
- The moral rules researchers must follow to protect the safety of participants.
- Tables that help organize qualitative data.
- The study of documents or other forms of text to determine the presence of certain words, themes, or concepts.
17 Clues: A real-world effect of your argument. • Tables that help organize qualitative data. • The quality of being fair and following conduct. • Unanswered questions or problems in others' research. • Research method that combines quantitative and qualitative data. • A type of data that is not numerical and often describes characteristics. • ...
IT 2020-11-12
Across
- Central processing unit
- Any program that performs a specific function.
- A name used in conjunction with a password to gain access to a computer system or a network service.
- Software programs designed to damage or do other unwanted actions on a computer.
- A device used for connecting two Local Area Networks.
- A term that has commonly come to mean "connected to the Internet".
- A functional unit that provides shared services to workstations or to other functional units over a data network.
Down
- A collection of information organized so that a computer application can quickly access selected information; it can be thought of as an electronic filing system.
- A wireless networking technology that allows users to send voice and data from one electronic device to another via radio waves.
- A collection of data that has a name.
- A small piece of information you may be asked to accept when connecting to certain servers via a web browser.
- Stands for one picture element.
- A secret combination of characters used to access a secured resource such as a computer, a program, a directory, or a file.
- The process of transferring one or more files from your local computer to a remote computer.
- The physical components of a computer including the keyboard, monitor, disk drive, and internal chips and wiring.
- Any software that covertly gathers user information, usually for advertising purposes.
- Random Access Memory.
- A program or computer that connects to and requests information from a server.
- A group of interconnected computers capable of exchanging information.
19 Clues: Random Access Memory. • Central processing unit • Stands for one picture element. • A collection of data that has a name. • Any program that performs a specific function. • A device used for connecting two Local Area Networks. • A term that has commonly come to mean "connected to the Internet". • A group of interconnected computers capable of exchanging information. • ...
IT 2020-11-12
Across
- A collection of information organized so that a computer application can quickly access selected information; it can be thought of as an electronic filing system.
- Any software that covertly gathers user information, usually for advertising purposes.
- A group of interconnected computers capable of exchanging information.
- A program or computer that connects to and requests information from a server.
- A device used for connecting two Local Area Networks.
- The physical components of a computer including the keyboard, monitor, disk drive, and internal chips and wiring.
- A small piece of information you may be asked to accept when connecting to certain servers via a web browser.
- Software programs designed to damage or do other unwanted actions on a computer.
- A collection of data that has a name.
Down
- A wireless networking technology that allows users to send voice and data from one electronic device to another via radio waves.
- A secret combination of characters used to access a secured resource such as a computer, a program, a directory, or a file.
- A functional unit that provides shared services to workstations or to other functional units over a data network.
- Any program that performs a specific function.
- The process of transferring one or more files from your local computer to a remote computer.
- Stands for one picture element.
- Central processing unit
- A name used in conjunction with a password to gain access to a computer system or a network service.
- A term that has commonly come to mean "connected to the Internet".
- Random Access Memory.
19 Clues: Random Access Memory. • Central processing unit • Stands for one picture element. • A collection of data that has a name. • Any program that performs a specific function. • A device used for connecting two Local Area Networks. • A term that has commonly come to mean "connected to the Internet". • A group of interconnected computers capable of exchanging information. • ...
Fundamentals 2020-09-16
Across
- An electronic discussion group maintained over the internet or tied into a bulletin board system.
- is a machine-readable representation of information in a visual format on a surface.
- It refers to the state of being connected to the networked computer system or the Internet.
- The Internet (also known simply as the net is the worldwide, publicly accessible system of interconnected computer networks
- Software that allows one to calculate numbers in a format that is similar to pages in a conventional ledger.
- is the part of a CPU that 'erects its operation
- allows you to create spreadsheets much like paper ledgers that can perform automatic calculations.
- is a unit of information or computer storage equal to approximately one billion bytes
- It refers to the act of transmitting data from a remote computer
Down
- A manually operated input device for moving or entering positional information
- A security system usually consisting of hardware and software that prevents unauthorised persons from accessing
- is a computer peripheral or general control device
- A protocol that permits a wireless exchange of information between computers.
- is commonly used as a unit of storage measurement in computers, regardless of the type of data being stored
- A peripheral used to input data by pressing keys
- A packet of information that travels between a browser and the web server
- is a unit of information or computer storage equal to 1024 bytes.
- It is a discussion or informational site published on the world wide web.
- A symbol (such as picture or a folder) that represents a certain function on your computer.
19 Clues: is the part of a CPU that 'erects its operation • A peripheral used to input data by pressing keys • is a computer peripheral or general control device • It refers to the act of transmitting data from a remote computer • is a unit of information or computer storage equal to 1024 bytes. • A packet of information that travels between a browser and the web server • ...
Inka 2021-03-03
Across
- is an optical instrument used to capture an image.
- is the global system of interconnected computer networks
- is a mobile operating system based on a modified version of the Linux kernel
- is an electric oven that heats and cooks food
- is the set of physical phenomena associated with the presence and motion of matter that has a property of electric charge.
- is a piece of computer hardware or software (computer program) that provides functionality for other programs or devices.
- is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves
- is a portable telephone that can make and receive calls
- is used colloquially for a photo-voltaic module.
Down
- is a hand-held pointing device that detects two-dimensional motion relative to a surface.
- is an American multinational technology company that created the iPhone.
- is a family of wireless network protocols.
- is a semiconductor light source that emits light when current flows through it.
- is a detection system that uses radio waves to determine the range, angle, or velocity of objects
- is a semiconductor device used to amplify or switch electronic signals and electrical power.
- is a device that emits light through a process of optical amplification.
- is the global system of interconnected computer networks
- is a laboratory instrument used to examine objects that are too small.
- transistor is a semiconductor device used to amplify or switch electronic signals and electrical power.
- is a telecommunication medium used for transmitting moving images in monochrome or in color.
20 Clues: is a family of wireless network protocols. • is an electric oven that heats and cooks food • is used colloquially for a photo-voltaic module. • is an optical instrument used to capture an image. • is a portable telephone that can make and receive calls • is the global system of interconnected computer networks • ...
Ashley's Crossword of Terms 2014-10-09
Across
- The electronic exchange of information.
- A personal website or web page on which an individual records opinions, links to other sites, etc. on a regular basis.
- The prevention of unauthorized access or damage to computers using wireless networks.
- The precautions that all technology users must take to guarantee their personal safety and the security of their work.
- The full electronic perception in society.
- The standards of conduct expected by other digital technology users.
- Software that is intended to damage or disable computers and computer systems.
- One who knows what is right and wrong, exhibits intelligent technology behavior, and makes good choices when using technology.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- The use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.
- The elements of physical and psychological well-being related to digital technology use.
Down
- Websites and applications that enable users to create and share content or to participate in social networking.
- The privileges and freedoms extended to all digital technology users, and the behavioral expectations that come with them.
- The buying and selling of goods online.
- A dishonest scheme
- A website that allows collaborative editing of its content and structure by its users
- Sending someone sexually explicit photographs or messages via cell phone.
- The capability to use digital technology and knowing when and how to use it.
- The legal rights and restrictions governing technology use.
19 Clues: A dishonest scheme • The electronic exchange of information. • The buying and selling of goods online. • The full electronic perception in society. • The legal rights and restrictions governing technology use. • The standards of conduct expected by other digital technology users. • Sending someone sexually explicit photographs or messages via cell phone. • ...
Think Before You Click - Crossword Puzzle 2021-10-18
Across
- sending an email, posting photos on a social media site and using your webcam
- Media facebook and TikTok are types of ________
- always _______your computer when you leave your desk
- choose a password that is easy for you to ____________ but hard for you someone to guess
- be cautious of plugging in these types of drives. Always scan them (acronym)
- Engineering the art of manipulating people to get access to sensitive information
- a fraudulent email purportedly from a reputable company attempting to get personal information
- usually comprises the display device of the computer
- the global system of interconnected computer networks that link billions of devices
Down
- the address of a webpage. Check the validity of it before clicking on it (acronym)
- irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc
- a crime where a computer is used as a tool to commit an offense
- a technology that allows us to access our files through the internet from anywhere in the world
- harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction
- physical or human characteristics that can be used to digitally identify a person and grant access to systems, devices or data
- security tool that creates a secure, encrypted connection between you and the Internet (acronym)
- someone who seeks and exploits weaknesses in a computer system or computer network
- Service Desk where do UTC employee report their ICT issues
18 Clues: Media facebook and TikTok are types of ________ • always _______your computer when you leave your desk • usually comprises the display device of the computer • Service Desk where do UTC employee report their ICT issues • a crime where a computer is used as a tool to commit an offense • be cautious of plugging in these types of drives. Always scan them (acronym) • ...
Final Chapter 1-3 2018-11-05
Across
- what mouse operations do you move the mouse until the pointer is positioned on the item of choice
- is a personal computer that users can carry from place to place
- what gesture do you press and hold one finger on an object and then move the finger to the new location
- is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals
- what is an electronic version of a printed book, readable on computers and other digital devices
- a style of table does not contain a physical keyboard
- what is not a type of message you can send with a smartphone
- what gesture do you move two fingers together
- what conveys meaning and is useful to users
- what gesture do you press and hold one finger on an object and then move the finger to the new location
Down
- what is a type of personal computer designed so all of its components fit entirely on or under a desk or table
- what mouse operations do you quickly press and release the left mouse button twice without moving the mouse
- in which gesture do you quickly touch and release one finger one time
- what gesture displays a shortcut menu
- which kind of desktop uses the same case to house the screen and processing circuitry
- what consists of electronic components that store instructions waiting to be executed and data needed by those instructions
- what gesture do you move two fingers apart
- what gesture do you press and hold one finger and then move the finger horizontally or vertically on the screen
18 Clues: what gesture displays a shortcut menu • what gesture do you move two fingers apart • what conveys meaning and is useful to users • what gesture do you move two fingers together • a style of table does not contain a physical keyboard • what is not a type of message you can send with a smartphone • is a personal computer that users can carry from place to place • ...
The amazing anthropology crossword 2016-09-07
Across
- When researchers become involved in activities in addition to watching them, this is called ________ ________.
- A ________ study looks at how something has changed over time.
- The time that a researcher spends studying a group of people is called ________.
- A consensus is reached when all members of a group ________ on something.
- If you look at a ________ of light from black to white, there are many shades of gray in the middle.
- Many previous studies in anthropology were ________ in that they did not look at change over time.
- ________ refers to the way in which humans organize themselves in groups and networks.
- Chimamanda Adichie introduces the Igbo word nkali to point out the importance of ________ in deciding which stories become dominant.
Down
- ________ is the study of humans and their development.
- One problem with early anthropologists is that they used their studies to _______ societies, always putting themselves at the top.
- If a researcher goes out into the world to directly observe and interact with people, this is ________ research.
- If a person has _______, he/she has the capacity to act independently and make choices about life.
- If you focus on beliefs, symbols, and thoughts in people’s minds, this is a/an ________ perspective.
- One definition of ________ refers to the learned behavior and beliefs that are shared by a group of people.
- In Chemistry and in daily English, ________ is the force or state of keeping together.
15 Clues: ________ is the study of humans and their development. • A ________ study looks at how something has changed over time. • A consensus is reached when all members of a group ________ on something. • The time that a researcher spends studying a group of people is called ________. • ...
Living in the IT Era 2019-11-17
Across
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A panel of keys that operate a computer or typewriter.
- The state or extent of being connected or interconnected.
- A printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
- A particularly powerful mainframe computer.
- A small rodent that typically has a pointed snout, relatively large ears and eyes, and a long tail.
- Almost or nearly as described, but not completely or according to strict definition.
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- Controlled by or connected to another computer or to a network.
Down
- A computer of medium power, more than a microcomputer but less than a mainframe.
- Refers to ad-supported programs, games, or utilities that are distributed as adware
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- Transferring data from a remote computer to one's own computer.
- A computer that is portable and suitable for use while traveling.
- A video camera that inputs to a computer connected to the Internet, so that its images can be viewed by Internet users.
15 Clues: A particularly powerful mainframe computer. • A panel of keys that operate a computer or typewriter. • The state or extent of being connected or interconnected. • Transferring data from a remote computer to one's own computer. • Controlled by or connected to another computer or to a network. • A computer that is portable and suitable for use while traveling. • ...
Exam 1 Review 2019-02-18
Across
- A ____ is a high-capacity communications medium that joins networks and central network devices across long distances.
- A process that scrambles the data so that it cannot be read if intercepted by unauthorized users.
- A(n) ____ is a device that can transmit and receive, such as transmitting and receiving signals on a communications cable.
- Which layer governs a user’s access to network services?
- Which layer provides flow control and ensures data reliability from source to destination?
- Any device connected to a network is generically termed a(n) ____ or station.
Down
- A ____ specifies how networked data is formatted into discrete units, such as packets or frames.
- An example of a wireless PAN technology.
- Used for protecting a network may be created using routers.
- Software installed on an operating system that is used to communicate with the NIC and manages how frames are sent
- What attaches a network node to the communications media? (acronym)
- The ____ topology consists of running cable from one PC or file server to the next, like links in a chain.
- The term ____ refers to wrapping the information in one layer inside the information within the next layer.
- A ____ consists of interconnected computers, printers, and other computer equipment in close physical proximity. (acronym)
- A network ____ has two components: the physical layout of network cables, and devices and the logical path followed by the network packets or frames.
15 Clues: An example of a wireless PAN technology. • Which layer governs a user’s access to network services? • Used for protecting a network may be created using routers. • What attaches a network node to the communications media? (acronym) • Any device connected to a network is generically termed a(n) ____ or station. • ...
Patel-Hiring and Staff 2024-02-22
Across
- is the process of hiring someone from within your existing business structure to fill a vacant position for your company
- a person or organization that employs people.
- the process of identifying, attracting, interviewing, selecting, hiring and onboarding employees.
- voluntarily leave a job or other position.
- the assessment of an available pool of job candidates, other than existing staff, to see if there are any sufficiently skilled or qualified to fill and perform existing job vacancies.
- a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts
- the action of bringing something or coming to an end.
Down
- a form employers use to collection information about you to see if you are a good fit for the position
- a person employed for wages or salary, especially at nonexecutive level.
- the amount of money taken by a business in a particular period.
- the process of introducing a newly hired employee into an organization.
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- a structured conversation where one participant asks questions, and the other provides answers
- a formal document that a job applicant creates to itemize their qualifications for a position.
- further the progress of (something, especially a cause, venture, or aim); support or actively encourage
15 Clues: voluntarily leave a job or other position. • a person or organization that employs people. • the action of bringing something or coming to an end. • the amount of money taken by a business in a particular period. • the process of introducing a newly hired employee into an organization. • a person employed for wages or salary, especially at nonexecutive level. • ...
USA and China : Two opposing powers 2024-12-18
Across
- bring (goods or services) into a country from abroad for sale
- a tax or duty to be paid on a particular class of imports or exports.
- the action of buying and selling goods and services
- an amount of money, such as a tax, that you have to pay to a government or organization
- the network of Chinese military and commercial facilities and relationships along its sea lines of communication, which extend from the Chinese mainland to Port Sudan in the Horn of Africa
- a situation in which countries try to damage each other's trade, typically by the imposition of tariffs or quota restrictions.
- a thing that is borrowed, especially a sum of money that is expected to be paid back with interest.
Down
- The dishonest appropriation of property belonging to another with the intention of permanently depriving the other of it
- a business arrangement in which two or more parties agree to pool their resources for the purpose of accomplishing a specific task
- send (goods or services) to another country for sale.
- an ancient trade route that linked the Western world with the Middle East and Asia
- tower above and cast a shadow over.
- make an attack in return for a similar attack
- strategy initiated by the People's Republic of China that seeks to connect Asia with Africa and Europe via land and maritime networks
- short for gross domestic product
15 Clues: short for gross domestic product • tower above and cast a shadow over. • make an attack in return for a similar attack • the action of buying and selling goods and services • send (goods or services) to another country for sale. • bring (goods or services) into a country from abroad for sale • a tax or duty to be paid on a particular class of imports or exports. • ...
DIGITAL TECHONOLGIES 2024-10-28
Across
- The internet, regarded as an abstract amorphous omnipresent space for processing and storage
- An industrial specification for wireless personal area networks
- A set of keys used to operate a typewriter, computer etc
- unit of computing A storage equal to eight bits
- The part of a computer that stores variable executable code or data or unalterable executable code or default data
- A device which scans documents in order to convert them to a digital medium
- A computer memory chip that stores values but does not allow updates, in which the values are non-volatile in that they are retained even when the computer is unpowered
- The visualised data or imagery displayed on a computer screen
Down
- A person who uses a computer or a computing network, especially a person who has received an account
- A task or program that is or was executing
- Multiple computers and other devices connected to share information
- The main memory of a computer or smartphone available for program execution or data storage
- The smallest unit of storage in a digital computer, consisting of a binary digit
- A device, usually attached to a computer, used to print text or images onto paper
- An input device that is moved over a pad or other flat surface to produce a corresponding movement of a pointer on a graphical display
15 Clues: A task or program that is or was executing • unit of computing A storage equal to eight bits • A set of keys used to operate a typewriter, computer etc • The visualised data or imagery displayed on a computer screen • An industrial specification for wireless personal area networks • Multiple computers and other devices connected to share information • ...
Data Transmission 2025-04-10
Across
- Uses parity bit for error detection. 使用奇偶位检测错误。
- Value to verify data block integrity. 验证数据块完整性的值。
- Two-way data, not simultaneous. 双向数据,非同时。
- Marks packet end with error check. 标记数据包结束并含错误检查。
- Check (CRC) Error check using 1-bit sum. 使用1位和的错误检查。
- Two-way data at once. 双向数据同时进行。
- Contains sender/receiver info and sequence number. 包含发送者/接收者信息和序列号。
- One-way data flow. 单向数据流。
Down
- packets between networks. 在网络间引导数据包。
- data in a packet. 数据包中的实际数据。
- Small unit of data sent over a network. 网络传输的小数据单位。
- Data split into packets, sent independently. 数据分成包,独立发送。
- Multiple bits over multiple wires. 多位通过多线。
- One bit at a time over one wire. 一次一位通过单线。
- Makes data unreadable without a key. 无密钥使数据不可读。
15 Clues: One-way data flow. 单向数据流。 • data in a packet. 数据包中的实际数据。 • Two-way data at once. 双向数据同时进行。 • packets between networks. 在网络间引导数据包。 • Two-way data, not simultaneous. 双向数据,非同时。 • Multiple bits over multiple wires. 多位通过多线。 • One bit at a time over one wire. 一次一位通过单线。 • Uses parity bit for error detection. 使用奇偶位检测错误。 • Makes data unreadable without a key. 无密钥使数据不可读。 • ...
HOIIIYA 2023-01-25
Across
- information especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view.
- discover or identify the presence or existence of.
- special words or expressions that are used by a particular profession or group and are difficult for others to understand.
- intense and eager enjoyment, interest, or approval.
- systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum.
- the state or practice of refraining from extramarital, or especially from all, sexual intercourse.
- a political and economic theory of social organization which advocates that the means of production, distribution, and exchange should be owned or regulated by the community as a whole.
Down
- the acceptance of or mental capacity to accept contrary opinions or beliefs at the same time, especially as a result of political indoctrination.
- the action of subjecting a country or person to one's control, or the fact of being subjected.
- of or characteristic of the middle class, typically with reference to its perceived materialistic values or conventional attitudes.
- showing willingness to allow the existence of opinions or behavior that one does not necessarily agree with.
- fail to resist pressure, temptation, or some other negative force.
- a secret plan by a group to do something unlawful or harmful.
- easy-going and relaxed
- offering nothing that is stimulating or challenging
15 Clues: easy-going and relaxed • discover or identify the presence or existence of. • intense and eager enjoyment, interest, or approval. • offering nothing that is stimulating or challenging • a secret plan by a group to do something unlawful or harmful. • fail to resist pressure, temptation, or some other negative force. • ...
Puzzle No. 3 2022-09-06
Across
- Derived from the terms Quick Response and Phishing wherein threat actors use Quick Response or QR codes to carry out their modus operandi.
- Authentication factor - Things you have.
- Important life event which is commonly used as a password.
- Malicious aggressive software that puts unwanted advertising on your computer screen.
- Security technology that requires multiple methods of authentication.
- Form of malware that locks your files or your device until a sum of money is paid to the attacker.
- "It's easy to stay ____ online."
- A type of malware that are designed to damage a computer device by corrupting data, reformatting hard disk, or completely shutting down your system.
- Authentication factor - Things you know.
Down
- Authentication factor - Things you are.
- Individuals who transfer money or other goods on behalf of others, and are a crucial component to the success of financial crimes, particularly money laundering for funds earned through illegal means such as drugs, fraud, or human trafficking.
- A type of malware which is designed to spy on or track your browsing habits and internet activity.
- Microsoft’s cloud-based storage platform which allows DBP employees share files and folders to others.
- A type of malware that is disguised as a normal, harmless file or app designed to trick you into downloading malware.
- A type of malware which spread over computer networks by exploiting operating system vulnerabilities.
15 Clues: "It's easy to stay ____ online." • Authentication factor - Things you are. • Authentication factor - Things you have. • Authentication factor - Things you know. • Important life event which is commonly used as a password. • Security technology that requires multiple methods of authentication. • ...
modern technologies 2026-01-08
Across
- a branch of artificial intelligence in which systems learn from data and improve their performance without being explicitly programmed
- the protection of computer systems and networks from digital attacks or unauthorized access
- a network of physical objects connected to the internet that can collect and exchange data
- extremely large data sets that are analyzed to reveal patterns, trends, and associations
- a decentralized digital system for recording transactions securely across multiple computers
- the use of technology to perform tasks with minimal human intervention
Down
- a technology that overlays digital information onto the real world through devices like smartphones or glasses
- electronic devices that can connect to the internet and operate interactively with users or other devices
- a type of computing that uses quantum mechanics to process information much faster than traditional computers
- the ability of machines or software to perform tasks that normally require human intelligence, such as reasoning or decision-making
- energy produced from natural resources that are constantly replenished, such as solar or wind power
- the field of technology focused on designing, building, and operating robots
- the delivery of computing services such as storage, servers, and software over the internet
- a technology that creates a fully immersive digital environment using computer-generated simulations
- the fifth generation of mobile network technology that enables faster data speeds and more reliable connections
15 Clues: the use of technology to perform tasks with minimal human intervention • the field of technology focused on designing, building, and operating robots • extremely large data sets that are analyzed to reveal patterns, trends, and associations • a network of physical objects connected to the internet that can collect and exchange data • ...
Insider Threat 2022-08-25
Across
- Warning signs of an insider being at risk of becoming an insider threat might include change in an insider's ____
- Insider of this type consciously engages in actions to harm an organization typically for personal benefit or personal grievance
- Insider of this type exposes an organization to a threat through knowingly engaging in risky or careless actions that go against best practices or policies
Down
- A consequence of insider threats, in addition to theft or sabotage to an organization, includes damage to an organization's ______
- Insider of this type causes an unintended risk to an organization through a mistake
- Anyone who has or had access to or knowledge of an organization's assets (including: personnel, facilities, information, systems, or networks)
- Additional warnings signs might include accessing or downloading data outside of their unique ____
7 Clues: Insider of this type causes an unintended risk to an organization through a mistake • Additional warnings signs might include accessing or downloading data outside of their unique ____ • Warning signs of an insider being at risk of becoming an insider threat might include change in an insider's ____ • ...
media tech 2022-04-13
3 Clues: or gain unauthorized access to a computer system. • software that is specifically designed to disrupt, • a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
AbrevX 2018-01-16
Across
- Medical savings account available to taxpayers who are enrolled in a High-Deductible Health Plan.
- Health care services to medically undeserved communities and vulnerable populations.
- Digital version of a paper chart that contains all of a patient’s medical history from one practice.
- Seal of approval for provider networks and managed care organizations.
- The first federal legislation protecting the rights of America's workers who earn pension benefit.
- Type of Medicare health plan offered by a private company that contracts with Medicare to provide you with all your Medicare Part A and Part B benefits.
- Low-cost care which offer insurance and health care as a single product.
Down
- Treatment of mental health and/or substance abuse disorders.
- The percentage of total average costs for covered benefits that a plan will cover.
- Federal law that may allow you to temporarily keep health coverage if your employment ends, you lose coverage as a dependent of the covered employee or if there is another qualifying event.
- The health benefits program for federal employees that is administered through the U.S. Office of Personnel Management.
- Medical equipment that can be repeatedly used but not useful to a person in the absence of illness or injury.
- Early and Periodic Screening,-----, and ------.
- The federal agency that administers the Medicare,Medicaid, and Children’s Health Insurance Programs.
- Comprehensive healthcare reform law (ACA/PPACA).
15 Clues: Early and Periodic Screening,-----, and ------. • Comprehensive healthcare reform law (ACA/PPACA). • Treatment of mental health and/or substance abuse disorders. • Seal of approval for provider networks and managed care organizations. • Low-cost care which offer insurance and health care as a single product. • ...
Media:Key Terms 2023-04-21
Across
- A rule that specifies that American radio and broadcasting must provide equivalent access to competing political candidates.
- Regulates interstate and international communications through cable, radio, television, etc. Goal is to promote connectivity.
- Misrepresent facts and use them in order to distort information and to show a certain viewpoint.
- The theory that the media has an affect on how the public perceives certain groups. It forms their judgments.
- A person who searches for and tries to expose real or alleged corruption, scandal, or other wrongdoing, especially in politics
- A news agency that supplies information by wire to newspapers, radio, and television
Down
- A style of newspaper reporting that emphasized sensationalism over facts.
- The media may use certain events to project a different meaning to what is truly going on.
- contest or competition; the primary election
- laws that allow reporters to conceal a source's identity. Statutes that make communications between reporters and informants confidential, allowing reporters to protect the identity of any person who reveals information to them.
- a ruthless form of journalism
- news about politics, concerning issues, welfare, economics, international relations, and scientific developments.
- news that aren’t so concerning, such as information about celebrities and human-interest stories.
- Determines the type of information that gets displayed on the media
- mandated broadcast networks devote time to contrasting views on issues of public importance.
15 Clues: a ruthless form of journalism • contest or competition; the primary election • Determines the type of information that gets displayed on the media • A style of newspaper reporting that emphasized sensationalism over facts. • A news agency that supplies information by wire to newspapers, radio, and television • ...
Going Further with Mesh WiFi Networking 2020-05-14
Across
- Parental _____ help ensure a safe internet experience for kids.
- Wired connection. The traditional technology for connecting devices in a wired local area network or wide area network.
- A network _____ can include any device that transmits and/or receives a wireless signal. A router is an example of this.
- Allows users to communicate and control connected accessories in their home.
- With traditional networks, the _______ strength degrades the further you’re away from the wireless node (router).
- High-Definition Multimedia _____ (HDMI)
- A network security system that monitors and controls incoming and outgoing network traffic.
Down
- _____ Wi-Fi Networking provides customers with superior range that is fully customizable to every need.
- The device that an ISP (Internet Service Provider) uses to connect a home to the web.
- A _____ broadcasts the internet signal from the modem to the wireless devices within a home.
- Duplicates the available wireless signal from a router across a wider range.
- Name of a wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.
- Mesh Wi-Fi systems reduce the “_____" and interference of nearby wireless systems to maximize performance.
- A customer’s available _____ or internet speed can impact the amount of nodes required to deliver a high-performance connection to the devices in a home.
- A small network appliance and entertainment device that can receive digital data for visual and audio content.
15 Clues: High-Definition Multimedia _____ (HDMI) • Parental _____ help ensure a safe internet experience for kids. • Duplicates the available wireless signal from a router across a wider range. • Allows users to communicate and control connected accessories in their home. • The device that an ISP (Internet Service Provider) uses to connect a home to the web. • ...
Mesh Networking 2020-05-11
Across
- a company that provides subscribers with access to the Internet.
- the area or extent covered by or included in something
- easily and securely control your HomeKit accessories from all your Apple devices.
- a node that duplicates the available wireless signal from a router across a wider range.
- controlled by or connected to another computer or to a network.
- receiving data (especially video and audio material) over a computer network
Down
- a number of interconnected computers, machines, or operations.
- part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- broadcast the internet signal from the modem to the wireless devices within a home.
- the device that an ISP (Internet Service Provider) uses to connect a home to the web.
- the state of being protected against the criminal or unauthorized use of electronic data.
- a form of play or sport, especially a competitive one played according to rules
- any device that transmits and/or receives a wireless signal. In Mesh Wi-Fi Networks, nodes are placed throughout a home to provide a wireless signal to your devices.
- • a network in which each computer or processor is connected to a number of others, especially so as to form a multidimensional lattice.
- allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
15 Clues: the area or extent covered by or included in something • a number of interconnected computers, machines, or operations. • controlled by or connected to another computer or to a network. • a company that provides subscribers with access to the Internet. • receiving data (especially video and audio material) over a computer network • ...
The amazing anthropology crossword 2016-09-07
Across
- ________ is the study of humans and their development.
- In Chemistry and in daily English, ________ is the force or state of keeping together.
- ________ refers to the way in which humans organize themselves in groups and networks.
- When researchers become involved in activities in addition to watching them, this is called ________ ________.
- One definition of ________ refers to the learned behavior and beliefs that are shared by a group of people.
- A consensus is reached when all members of a group ________ on something.
Down
- Many previous studies in anthropology were ________ in that they did not look at change over time.
- If a person has _______, he/she has the capacity to act independently and make choices about life.
- Chimamanda Adichie introduces the Igbo word nkali to point out the importance of ________ in deciding which stories become dominant.
- If a researcher goes out into the world to directly observe and interact with people, this is ________ research.
- A ________ study looks at how something has changed over time.
- The time that a researcher spends studying a group of people is called ________.
- If you look at a ________ of light from black to white, there are many shades of gray in the middle.
- If you focus on beliefs, symbols, and thoughts in people’s minds, this is a/an ________ perspective.
- One problem with early anthropologists is that they used their studies to _______ societies, always putting themselves at the top.
15 Clues: ________ is the study of humans and their development. • A ________ study looks at how something has changed over time. • A consensus is reached when all members of a group ________ on something. • The time that a researcher spends studying a group of people is called ________. • ...
Digital Citizenship Terms 2017-01-10
Across
- never share this will anyone
- the practice of taking someone else's work or ideas and passing them off as one's own
- the use of electronic communication to bully a person, typically by sending messages of anintimidating or threatening nature.
- how you act when you are online and using computers
- the means of communication, as radio and television, newspapers, magazines, and the Internet, that reach or influence people widely
- using good manners when you are online
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
Down
- a legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution
- media can be created, viewed, distributed, modified and preserved on digital electronics devices
- a recording created by digitally combining and synchronizing instrumental tracks with vocal tracks from two or more different songs
- creating and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks
- hostile and insulting interaction between internet uses, often involving the use of profanity.
- the contract between the licensor and purchaser, establishing the purchaser's right to use the software
- a digital double that could be used in a variety of environments, like gaming or virtual reality meetings
- a group of computers
15 Clues: a group of computers • never share this will anyone • using good manners when you are online • how you act when you are online and using computers • the practice of taking someone else's work or ideas and passing them off as one's own • hostile and insulting interaction between internet uses, often involving the use of profanity. • ...
Vocab List 2 2019-09-09
Across
- fail to resist pressure, temptation, or some other negative force
- a political and economic theory of social organization which advocates that the means of production, distribution, and exchange should be owned or regulated by the community as a whole
- showing willingness to allow the existence of opinions or behavior that one does not necessarily agree with
- the action of subjecting a country or person to one's control, or the fact of being subjected
- offering nothing that is stimulating or challenging
- special words or expressions that are used by a particular profession or group and are difficult for others to understand
- systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum
- intense and eager enjoyment, interest, or approval
Down
- the state or practice of refraining from extramarital, or especially from all, sexual intercourse
- softened or matured by age or experience
- information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view
- a secret plan by a group to do something unlawful or harmful
- the acceptance of or mental capacity to accept contrary opinions or beliefs at the same time, especially as a result of political indoctrination
- of or characteristic of the middle class, typically with reference to its perceived materialistic values or conventional attitudes
- discover or identify the presence or existence of
15 Clues: softened or matured by age or experience • discover or identify the presence or existence of • intense and eager enjoyment, interest, or approval • offering nothing that is stimulating or challenging • a secret plan by a group to do something unlawful or harmful • fail to resist pressure, temptation, or some other negative force • ...
Clayton's Hiring and Staffing Crossword Puzzle 2024-02-22
Across
- A document that is used to apply for a job and includes personal information, education, skills, and work experience.
- The rate at which employees leave a company and are replaced by new hires
- The process of changing the tasks, responsibilities, and duties of a job to make it more efficient, effective, and satisfying for the employee
- An individual, company, or organization that hires employees to work for them
- A document that outlines a person's education, work experience, skills, and achievements that is used as part of a job application
- Online platforms that allow users to create, share, or exchange information, ideas, and opinions in virtual communities and networks
- The process of ending an employee's employment with a company or organization
- The function of managing an organization's workforce, including hiring, training, compensating, and retaining employees
Down
- The process of hiring new employees from outside the organization
- The process of advancing an employee to a higher position with more responsibilities and higher pay
- The process of filling job vacancies from within the organization
- A detailed report about a person's credit history, including credit scores, payment history, and outstanding debts
- The process of reducing the size of an organization by eliminating jobs and/or employees
- The process of finding and attracting potential candidates for a job vacancy
- A person who is hired to work for a company or organization in exchange for payment
15 Clues: The process of hiring new employees from outside the organization • The process of filling job vacancies from within the organization • The rate at which employees leave a company and are replaced by new hires • The process of finding and attracting potential candidates for a job vacancy • ...
year 9 Computing Crossword 2024-09-04
Across
- A handheld input device used to select actions on a computer monitor
- A short description of the contents of the email
- A command that is given in order for a computer to do something
- Bullying which takes place online through email, text or social networks
- An output device turning digital data into a hard copy on paper
- A computer file such as an image or a presentation sent with an email
- An output device which displays data on a screen
- The legal right to control the uses of intellectual property such as music or art, which prevents the copying or reproducing of intellectual property without permission.
Down
- Placing a set of instructions in an order
- Step by step set of rules that can be followed in order to solve a problem
- An input device enabling data to be entered into a digital devices—usually a QWERTY keyboard taking its name from the first 6 keys on the top left row
- Process of putting data into a computer
- Malware is an umbrella term given to a variety of hostile software programs specifically written to cause damage or steal data such as a virus, or spyware
- Short for Electronic Mail which is a way of exchanging digital messages to one or more recipients.
- Methods of getting digital data out of a computer after processing
15 Clues: Process of putting data into a computer • Placing a set of instructions in an order • A short description of the contents of the email • An output device which displays data on a screen • A command that is given in order for a computer to do something • An output device turning digital data into a hard copy on paper • ...
Networking concepts and cyber ethics 2025-06-10
Across
- This refers to an act of stealing and misusing someone's personal information.
- It enables you to connect your computer to the available internet connection over the existing telephone lines.
- This is a network device that is used to connect all the computers in a network with each other.
- A user is given a unique login name and password.
- This is also known as digital footprint.
- It is used to physically attach a computer to a network so that it can participate in network communication
- This topology uses a single communication line or one main cable to which all the nodes are directly connected.
- It refers to the act of using or imitating the language and thoughts of another person as one's original work.
- The simplest way to prevent plagiarism is through this process.
Down
- It refers to being aware of the ethical practices, and behaving responsibly and appropriately while using the internet.
- it can be refer as the legal rules and restrictions imposed on online users.
- A device that connects two different types of networks with each other,for example,a LAN with WAN.
- This is a computer network that is mainly created for an individual person.
- It refers to an illegal intrusion into a computer system or network.
- This is the process of transforming data into unreadable code.
15 Clues: This is also known as digital footprint. • A user is given a unique login name and password. • This is the process of transforming data into unreadable code. • The simplest way to prevent plagiarism is through this process. • It refers to an illegal intrusion into a computer system or network. • ...
Daniel 2021-03-15
Across
- will send multiple requests to the attacked web resource
- a collection of instructions and data that tell the computer how to work.
- network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- believed to be responsible for causing substantial damage to the nuclear program of Iran.
- Electronic mail is a method of exchanging messages between people using electronic devices
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
Down
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- the fraudulent attempt to obtain sensitive information or data,
- small collection of genetic code
- a system of words, letters, figures, or other symbols substituted for other words, letters, etc., especially for the purposes of secrecy.
- horse is any malware which misleads users of its true intent
- a person who uses computers to gain unauthorized access to data.
- computer resource for recording data in a computer storage device
- type of malware that spreads copies of itself from computer to computer.
- group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.
15 Clues: small collection of genetic code • will send multiple requests to the attacked web resource • horse is any malware which misleads users of its true intent • the fraudulent attempt to obtain sensitive information or data, • a person who uses computers to gain unauthorized access to data. • computer resource for recording data in a computer storage device • ...
Business Studies - Keywords 2021-11-25
Across
- The ability of a business to pay its short-term debts
- A system of setting agreed standards for every stage of production
- An agreement with the bank which allows a business to spend more money than it has in its account up to an agreed limit
- Provision of finance by a bank which the business will repay with interest over an agreed period of time
- The reduction in average costs as a result of increasing the scale of operations
- The level of output where revenue equals total costs
- The capital needed to finance the day-to-day running expenses and pay the short-term debts of business
- The purchase of an asset by paying a fixed repayment amount per time period over an agreed period of time
Down
- Checking the quality of goods through inspection
- Profit remaining after all expenses, tax and dividends have been paid and which is ploughed back into business
- The difference between revenue and cost of sales
- The cost of purchasing the goods used to make the products sold
- Costs that change in direct proportion to output
- Financing a business idea by obtaining small amounts of capital from a large number of people, most often using the internet and social media networks
- Ensuring a good or service that meets the needs and requirements of its customer
15 Clues: Checking the quality of goods through inspection • The difference between revenue and cost of sales • Costs that change in direct proportion to output • The level of output where revenue equals total costs • The ability of a business to pay its short-term debts • The cost of purchasing the goods used to make the products sold • ...
STANDARD PROTOCOLS IN DIGITAL MEDICAL IMAGING AND KEY TECHNOLOGIES 2021-11-11
Across
- the encoding methodology used to send data over the network or write to a physical storage media.
- THE NETWORK ARCHITECTURE UTILISED BY PACS TO COMMUNICATE INFORMATION OVER THE NETWORK.
- A network that spans a wider geograhical area eg. an entire country.
- CONTROLS THE BRIGHTNESS OF THE RADIOGRAPHIC IMAGE
- A VOLUMETRIC PICTURE ELEMENT
Down
- a sub-specialty that is vital to radiology and is devoted to how information about medical images are exchanged within the radiology departments and throughout the medical enterprise.
- A SECURITY FEATURE THAT IS USED IN NETWORKING THAT extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
- A 2D rectangular array of regularly sampled picture elements
- THE FIRST STEP IN IMAGE COMPRESSION IN DIGITAL IMAGING
- the electronic transmission of diagnostic imaging studies from one location to another for the purposes of REMOTE interpretation and/or consultation.
- Encompasses a broad range of technologies necessary for the storage, retrieval, distribution, and display of images.
- AKA REVERSIBLE COMPRESSION. allow complete and exact recovery of the original data from the compressed data
- an all-encompassing data transfer, storage, and display protocol built and designed to cover all functional aspects of digital medical imaging.
- WINDOW__________ CONTROLS THE CONTRAST OF THE RADIOGRAPHIC IMAGE
- TYPE OF COMPRESSION THAT'S IRREVERSIBLE
15 Clues: A VOLUMETRIC PICTURE ELEMENT • TYPE OF COMPRESSION THAT'S IRREVERSIBLE • CONTROLS THE BRIGHTNESS OF THE RADIOGRAPHIC IMAGE • THE FIRST STEP IN IMAGE COMPRESSION IN DIGITAL IMAGING • A 2D rectangular array of regularly sampled picture elements • WINDOW__________ CONTROLS THE CONTRAST OF THE RADIOGRAPHIC IMAGE • ...
Network Topologies 2016-10-27
Across
- program that lets computers communicate within a local area network
- was a proprietary suite of networking protocols developed for their Macintosh computers.
- a range of frequencies within a given band, in particular that used for transmitting a signal.
- a structure carrying a road, path, railway, etc. across a river, road, or other obstacle.
- is the most effective way to achieve data security.
- refers to the original frequency range of a transmission signal before it is converted, or modulated, to a different frequency range.
- a is a common connection point for devices in a network.
- a desktop computer or workstation that is capable of obtaining information and applications from a server
Down
- protection from unauthorized access with a firewall.
- a group or system of interconnected people or things.
- a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.
- allowing the transmission of signals in both directions but not simultaneously.
- a device used to connect two different networks, especially a connection to the Internet.
- the process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand.
- A number related to the speed of data transmission in a system. The rate indicates the number of electrical oscillations per second that occurs within a data transmission.
15 Clues: is the most effective way to achieve data security. • protection from unauthorized access with a firewall. • a group or system of interconnected people or things. • a is a common connection point for devices in a network. • program that lets computers communicate within a local area network • ...
Vocab 2019-01-16
Across
- showing willingness to allow the existence of opinions or behavior that one does not necessarily agree with
- the action of subjecting a country or person to one's control, or the fact of being subjected
- offering nothing that is stimulating or challenging
- discover or identify the presence or existence of
- the acceptance of or mental capacity to accept contrary opinions or beliefs at the same time, especially as a result of political indoctrination
- a political and economic theory of social organization which advocates that the means of production, distribution, and exchange should be owned or regulated by the community as a whole
- fail to resist pressure, temptation, or some other negative force
Down
- tube systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum
- of or characteristic of the middle class, typically with reference to its perceived materialistic values or conventional attitudes
- the state or practice of refraining from extramarital, or especially from all, sexual intercourse
- information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view
- intense and eager enjoyment, interest, or approval
- a secret plan by a group to do something unlawful or harmful
- special words or expressions that are used by a particular profession or group and are difficult for others to understand
- relaxed and good-humored
15 Clues: relaxed and good-humored • discover or identify the presence or existence of • intense and eager enjoyment, interest, or approval • offering nothing that is stimulating or challenging • a secret plan by a group to do something unlawful or harmful • fail to resist pressure, temptation, or some other negative force • ...
Managing Risk to Avoid Supply-Chain Breakdown 2013-03-24
Across
- Distortion increases in the supply chain as you get farther away from the end consumer, known as the ___ effect.
- Managers can lower excess risks by making existing capacity more...
- Intellectual property risk has grown rapidly as supply chains become less...
- This occurs when a supplier, through high utilization or another cause of inflexibility, cannot respond to changes in demand.
- This company lost over $400 million in sales because they employed a single sourcing policy and there was a fire at their only supplier.
- If the level of risk is high, managers need to focus on this.
- This risk refers to unanticipated increases in acquisition costs resulting from fluctuating exchange rates or supplier price hikes.
Down
- The more a company networks its ___, the greater the threat that a failure anywhere can cause failure everywhere.
- Results from a mismatch between a company's projections and actual demand.
- For products with high holding costs and/or a high rate of obsolescence, using ___ suppliers is a better strategy.
- This can be countered by creating financial hedges, balancing cost and revenue flows by region and building flexible global capacity.
- Holding inventory is appropriate for __ products with relatively low holding costs.
- Sears stock plummeted more than 30% in one day because of this type of risk.
- Natural disasters lead to this type of risk.
- A group exercise that helps managers and their companies understand and prioritize supply chain risks.
15 Clues: Natural disasters lead to this type of risk. • If the level of risk is high, managers need to focus on this. • Managers can lower excess risks by making existing capacity more... • Results from a mismatch between a company's projections and actual demand. • Intellectual property risk has grown rapidly as supply chains become less... • ...
Adaeze C. 2014-11-13
Across
- computer or device on network that holds and manages network resources and answers to requests for information. Other types are file and print.
- stands for wireless fidelity; type of broadband internet connection that works with radio signals to give high speed internet connections
- world wide connection of networks that connect many businesses, government agencies, educational institutions, and individual
- stands for Uniform Resource Locator; an address for documents on Web.
- quality of a picture or the screen on a computer.
- made of 8 bits also is a unit of memory on a computer chip that can hold the equivalent of one character.
- when being connected to the Internet.
Down
- something that is for usage by a end user.
- things on a computer that you can see and feel (examples: keyboard, monitor, and printer)
- stands for hyper-text markup language; file format for documents seen using browser network. Language of web.
- page- main page of Web site.
- box- box that shows up on display screen and asks for input or gives you information.
- stands for internet etiquette; code of acceptable behaviors one should abide while on internet
- places on computer you can't touch - set of instructions that gives computer directions on what to do
- part of filename that usually tells the program in which the file was made and will use to open.
15 Clues: page- main page of Web site. • when being connected to the Internet. • something that is for usage by a end user. • quality of a picture or the screen on a computer. • stands for Uniform Resource Locator; an address for documents on Web. • box- box that shows up on display screen and asks for input or gives you information. • ...
Adaeze C. 2014-11-13
Across
- computer or device on network that holds and manages network resources and answers to requests for information. Other types are file and print.
- stands for wireless fidelity; type of broadband internet connection that works with radio signals to give high speed internet connections
- world wide connection of networks that connect many businesses, government agencies, educational institutions, and individual
- stands for Uniform Resource Locator; an address for documents on Web.
- quality of a picture or the screen on a computer.
- made of 8 bits also is a unit of memory on a computer chip that can hold the equivalent of one character.
- when being connected to the Internet.
Down
- something that is for usage by a end user.
- things on a computer that you can see and feel (examples: keyboard, monitor, and printer)
- stands for hyper-text markup language; file format for documents seen using browser network. Language of web.
- page- main page of Web site.
- box- box that shows up on display screen and asks for input or gives you information.
- stands for internet etiquette; code of acceptable behaviors one should abide while on internet
- places on computer you can't touch - set of instructions that gives computer directions on what to do
- part of filename that usually tells the program in which the file was made and will use to open.
15 Clues: page- main page of Web site. • when being connected to the Internet. • something that is for usage by a end user. • quality of a picture or the screen on a computer. • stands for Uniform Resource Locator; an address for documents on Web. • box- box that shows up on display screen and asks for input or gives you information. • ...
Ancient Civilizations 2023-07-06
Across
- The study of ancient cultures and civilizations through the excavation and analysis of artifacts and structures.
- A system of writing used by ancient Egyptians, consisting of pictures and symbols.
- A ruler of ancient Egypt who had great power and was considered a god-like figure.
- A group of territories or nations ruled by a single leader or government.
- A complex society with advanced social, cultural, and technological development.
- The remains of ancient buildings, cities, or civilizations, often preserved for historical and archaeological study.
- A three-dimensional sculpture representing a person or deity, often made of stone or metal.
- A prehistoric monument in England consisting of massive stones arranged in a circular pattern.
- A preserved body, often wrapped in bandages, created through the process of mummification in ancient Egypt.
Down
- Large structures with a square or triangular base and four triangular sides, built by ancient civilizations as tombs or monuments.
- A fortified hilltop or elevated area containing ancient Greek buildings, typically temples and other important structures.
- A religious structure or building used for worship and ceremonies in ancient civilizations.
- Relating to the ancient civilization of the Maya, known for their advanced calendar system and monumental architecture.
- An ancient amphitheater in Rome used for gladiatorial contests, public spectacles, and other events.
- Relating to the ancient civilization of the Inca, known for their remarkable stone structures and road networks.
15 Clues: A group of territories or nations ruled by a single leader or government. • A complex society with advanced social, cultural, and technological development. • A system of writing used by ancient Egyptians, consisting of pictures and symbols. • A ruler of ancient Egypt who had great power and was considered a god-like figure. • ...
Cybersecurity Awareness 2024-09-06
Across
- measures that reduce the likelihood of an unwanted occurrence or lessen its consequences
- software that compromises the operation of a system by performing an unauthorized function or process
- a computer program that can replicate itself, infect a computer without permission or knowledge of the user, and spread further
- an attack method that uses trial and error to crack passwords
- abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages
- a type of malware that conceals its true content to fool a user into thinking it's a harmless file
- the fraudulent practice of sending test messages purporting to be form reputable companies in order to convince individuals to reveal personal information
Down
- the ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption
- a digital form of social engineering to deceive individuals into providing sensitive information or exposing their system to malware
- limits network traffic between networks or systems
- an unauthorized user who attempts to or gains access to an information system
- the process of verifying one's identity
- a technology that allows a program to interact with the internals of another program running on a different machine
- An attempt to gain unauthorized access to system services, resources, or information
- a string of characters used to authenticate an identity or to verify authorizes access
15 Clues: the process of verifying one's identity • limits network traffic between networks or systems • an attack method that uses trial and error to crack passwords • an unauthorized user who attempts to or gains access to an information system • An attempt to gain unauthorized access to system services, resources, or information • ...
CSP Vocab 2023-04-25
Across
- easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user
- a code for representing English characters as numbers, with each letter assigned a number from 0 to 127
- the process of adding realism to a computer graphics by adding 3-D qualities, such as shadows and variations in color and shade
- the application of each step of an algorithm in the order in which the statements are given.
- A sequence of characters that can be stored in a variable or list
- uses radio waves to connect devices (computers, smart phones, printers)
- The process of finding a path from sender to receiver
Down
- to transmit data from a computer to an online repository or service such as a bulletin board service, or drop box, or network.
- a memory location to hold different values in your program.
- a generic name for a list of email address or IP addresses that are considered to be spam free.
- stores the computer's programs and data temporarily while power is on
- the global public network of independent and autonomous networks that are governed by the Internet Protocol Suite (TCP/IP
- an Internet service that translates domain names into IP addresses
- the process of using a secret key to convert plaintext into ciphertext.
- consists of the programs that control the computer.
15 Clues: consists of the programs that control the computer. • The process of finding a path from sender to receiver • a memory location to hold different values in your program. • A sequence of characters that can be stored in a variable or list • an Internet service that translates domain names into IP addresses • ...
Puzzle No. 1 2022-09-08
Across
- A type of malware which spread over computer networks by exploiting operating system vulnerabilities.
- Individuals who transfer money or other goods on behalf of others, and are a crucial component to the success of financial crimes, particularly money laundering for funds earned through illegal means such as drugs, fraud, or human trafficking.
- Form of malware that locks your files or your device until a sum of money is paid to the attacker.
- A type of malware which is designed to spy on or track your browsing habits and internet activity.
- Authentication factor - Things you are.
- Malicious aggressive software that puts unwanted advertising on your computer screen.
- Security technology that requires multiple methods of authentication.
Down
- Microsoft’s cloud-based storage platform which allows DBP employees share files and folders to others.
- Authentication factor - Things you have.
- Derived from the terms Quick Response and Phishing wherein threat actors use Quick Response or QR codes to carry out their modus operandi.
- Authentication factor - Things you know.
- "It's easy to stay ____ online."
- A type of malware that are designed to damage a computer device by corrupting data, reformatting hard disk, or completely shutting down your system.
- Important life event which is mistakenly used as a passcode.
- A type of malware that is disguised as a normal, harmless file or app designed to trick you into downloading malware.
15 Clues: "It's easy to stay ____ online." • Authentication factor - Things you are. • Authentication factor - Things you have. • Authentication factor - Things you know. • Important life event which is mistakenly used as a passcode. • Security technology that requires multiple methods of authentication. • ...
Artificial Intelligence Terminologys 2023-09-07
Across
- Network A computer system inspired by the human brain's structure, used for tasks like pattern recognition.
- A computer program that simulates human conversation, often used for customer support.
- Reality (AR) Technology that overlays computer-generated information or visuals onto the real world.
- The use of technology to perform tasks or processes with minimal human intervention.
- A set of instructions that a computer follows to solve a problem or perform a task.
- Vision AI's ability to interpret and understand visual information from the world, such as images and videos.
- Reality (VR) Technology that immerses users in a computer-generated, interactive 3D environment.
Down
- Recognition Technology that converts spoken language into written text, often used in voice assistants.
- of Things (IoT) A network of interconnected devices that can collect and exchange data over the internet.
- The design and creation of robots that can perform tasks autonomously or semi-autonomously.
- Learning A type of AI that allows computers to learn from data and improve at tasks without being explicitly programmed.
- Learning A subset of machine learning that uses neural networks with many layers to process complex data.
- Information, facts, or statistics that can be processed or analyzed by a computer.
- Language Processing (NLP) AI technology that enables computers to understand, interpret, and generate human language.
- Data Extremely large and complex datasets that require advanced techniques for processing and analysis.
15 Clues: Information, facts, or statistics that can be processed or analyzed by a computer. • A set of instructions that a computer follows to solve a problem or perform a task. • The use of technology to perform tasks or processes with minimal human intervention. • A computer program that simulates human conversation, often used for customer support. • ...
crosswordpuzzle 12 2024-09-23
Across
- Programs designed to perform specific tasks for users, such as word processing or spreadsheets.
- A type of software that provides low-level control for a device's hardware and is usually embedded within it.
- A copy of data stored separately to protect against data loss or corruption.
- Software designed to manage and control computer hardware and provide a platform for application software.
- The physical components of a computer system, such as the motherboard, CPU, and memory.
- The process of evaluating software to ensure it meets requirements and is free of defects.
Down
- A device that forwards data packets between different networks, directing traffic on the Internet.
- Software that allows users to access and navigate the World Wide Web, such as Chrome or Firefox
- The standard base-10 numeral system used by humans, consisting of digits from 0 to 9.
- A unit of digital information that consists of 8 bits.
- A standard for connecting peripherals to a computer, allowing data transfer and power supply.
- A preliminary version of a product used to test concepts and gather feedback before full-scale production.
- A structured process for developing software, including phases such as planning, design, implementation, testing, and maintenance.
- A software development methodology that emphasizes iterative development and collaboration among cross-functional teams.
- A linear and sequential approach to software development where each phase must be completed before the next begins.
15 Clues: A unit of digital information that consists of 8 bits. • A copy of data stored separately to protect against data loss or corruption. • The standard base-10 numeral system used by humans, consisting of digits from 0 to 9. • The physical components of a computer system, such as the motherboard, CPU, and memory. • ...
Cyber Ethics 2025-06-15
Across
- are technical people who are experts in breaking into systems to steal important data, password,etc
- it is the process of transforming data into unreadable code.
- it is a program that disrupts the normal functioning of a computer.
- it refers to an illegal intrusion into a computer system or network.
- it is a security system that prevents unauthorised people from accessing your system and network.
- it refers to the act of using or imitating the language and thoughts of another person as one's original work.
- it is an act of harming a person through information technology in a deliberate manner.
- it refers to criminal activities that involve the use of computers,networks and etc.
Down
- it this process the encrypted information convert into a unreadable from.
- it is a criminal practice of using social influence over the telephone system.
- it refers to unwanted bulk emails that come from unknown sources.
- it is An act of sending an email to a user misleading him to believe that it is from a trusted person or organisation.
- it is the combination of two words malicious and software.
- it is a malicious technique of tricking a we'd user into clicking something different from what the user perceives he/she is clicking on.
- it is the combination of two terms,'net' and 'ettiquette'.
15 Clues: it is the combination of two words malicious and software. • it is the combination of two terms,'net' and 'ettiquette'. • it is the process of transforming data into unreadable code. • it refers to unwanted bulk emails that come from unknown sources. • it is a program that disrupts the normal functioning of a computer. • ...
