query Crossword Puzzles

Become a Subject Area Expert 2014-11-05

Become a Subject Area Expert crossword puzzle
Across
  1. A dynamic, object-oriented scripting language for developing websites and mobile apps. It powers the Ruby on Rails.
  2. Procedure or formula for solving a problem.
  3. The World Wide Web was invented by Sir Tim Berners-Lee and is an information system that allows users to view documents (called Web pages) using a piece of software called a Web browser.
  4. Research into packet switching started in the early 1960s and packet switched networks such as Mark I at NPL in the UK,[14] ARPANET, CYCLADES,[15][16] Merit Network,[17] Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks
  5. Class-based, object oriented programming language developed by Sun Microsystems in the 1990s.
  6. Client and server-side scripting language developed by Netscape that derives much of its syntax from C.
  7. The different activities in this phase, static analysis, peer review, and unit testing, leads to generation of implementation related vulnerabilities.
  8. Process by which a computer or a virtual machine performs the instructions of a computer program. The instructions in the program trigger sequences of simple actions on the executing machine. Those actions produce effects according to the semantics of the instructions in the program.
  9. Free source code editor and Notepad replacement that supports several languages.
  10. Hyper Text Markup Language, markup language for describing web documents (web pages).
  11. Detailed yet readable description of what a computer program or algorithm must do, expressed in a formally-styled natural language rather than in a programming language.
  12. Structured Query Language is a special-purpose language for managing data in relational database management systems.
  13. This phase is an add-on phase in the normal SDLC that plays an important role in increasing the overall security and resilience of the software being developed.
Down
  1. Numeric system that only uses two digits — 0 and 1. Computers operate in it, meaning they store data and perform calculations using only zeros and ones. Multiple digits can be used to store large numbers and perform complex functions.
  2. High-level, server-side scripting language for websites and mobile apps. Powers web apps for Instagram, Pinterest and Rdio through its associated web framework, Django, and is used by Google, Yahoo! and NASA.
  3. Formalized graphic representation of a logic sequence, work or manufacturing process, organization chart, or similar formalized structure.
  4. Programming framework created by Microsoft that developers can use to create applications more easily.
  5. In this phase all the business requirements are gathered and finalized by the project managers, the development team and the stakeholders.
  6. This phase is the final phase of SSDLC where the final software is implemented in the production environment.
  7. Intermediate-level language with object-oriented programming features, originally designed to enhance the C language.
  8. Multi-paradigm language developed by Microsoft as part of its .NET initiative.
  9. This process helps in discovering the vulnerabilities that were not discovered in the previous phases.
  10. (Hypertext Processor) free, server-side scripting language designed for dynamic websites and app development.
  11. Oldest and the most widely used language, providing the building blocks for other popular languages. Mostly used for implementing operating systems and embedded applications.
  12. Software architecture; the design of the system is designed.

25 Clues: Procedure or formula for solving a problem.Software architecture; the design of the system is designed.Multi-paradigm language developed by Microsoft as part of its .NET initiative.Free source code editor and Notepad replacement that supports several languages.Hyper Text Markup Language, markup language for describing web documents (web pages)....

Cades crossword puzzle 2024-01-02

Cades crossword puzzle crossword puzzle
Across
  1. A request for specific data from a database.
  2. Group of files waiting in the buffer to be printed.
  3. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  4. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  5. An electrical disturbance that can degrade communications
  6. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  7. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  8. Technology-related health condition that affects eyesight. See also CVS
  9. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  10. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
Down
  1. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  2. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  3. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  4. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  5. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  6. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  7. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  8. A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  9. The number of horizontal and vertical pixels in a display device
  10. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  11. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  12. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  13. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  14. The time it takes a signal to travel from one location to another on a network.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.An electrical disturbance that can degrade communicationsThe number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVS...

made by kayson 2024-01-02

made by kayson crossword puzzle
Across
  1. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  2. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  3. A request for specific data from a database.
  4. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  5. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  6. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  7. Technology-related health condition that affects eyesight. See also CVS
  8. Group of files waiting in the buffer to be printed.
  9. The time it takes a signal to travel from one location to another on a network.
  10. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  11. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  12. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  13. The number of horizontal and vertical pixels in a display device
  14. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  15. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
Down
  1. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  2. Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  3. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  4. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  5. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  6. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  7. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  8. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  9. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.The number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVSThe time it takes a signal to travel from one location to another on a network....

Made by Kendall 2024-01-03

Made by Kendall crossword puzzle
Across
  1. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  2. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  3. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  4. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  5. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  6. The number of horizontal and vertical pixels in a display device
  7. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  8. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  9. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  10. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  11. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
Down
  1. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  2. Group of files waiting in the buffer to be printed.
  3. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  4. Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  5. Technology-related health condition that affects eyesight. See also CVS
  6. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  7. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  8. The time it takes a signal to travel from one location to another on a network.
  9. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  10. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  11. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing
  12. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  13. A request for specific data from a database.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.The number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVSThe time it takes a signal to travel from one location to another on a network....

Datu bāzes 2024-09-26

Datu bāzes crossword puzzle
Across
  1. FIKSĒTA garuma virkne (var saturēt burtus, ciparus un speciālās rakstzīmes). Lieluma parametrs norāda kolonnas garumu rakstzīmēs — tas var būt no 0 līdz 255. Noklusējums ir 1
  2. Lai paātrinātu ieraksta kārtošanu veic tā .....
  3. Vienāds ar DECIMAL
  4. Funkcija ...... atgriež rindu skaitu, kas atbilst noteiktam kritērijam.
  5. ...... klauzula tiek izmantota, lai filtrētu ierakstus.
  6. ..... priekšraksts tiek izmantots, lai tabulās izveidotu indeksus.
  7. Paziņojums ....... tiek izmantots, lai datubāzē nomestu esošu tabulu.
  8. .... ir saistīta starp divām tabulām
  9. .... tiek izmantots, lai filtrētu ierakstus, pamatojoties uz vairāk nekā vienu nosacījumu, piemēram, ja vēlaties atgriezt visus klientus no Spānijas, kas sākas ar burtu “G”
  10. Satur virkni, kuras maksimālais garums ir 4 294 967 295 rakstzīmes
  11. , Funkcija .... atgriež lielāko atlasītās kolonnas vērtību.
  12. Paziņojums ..... tiek izmantots, lai tabulā ievietotu jaunus ierakstus.
  13. Satur virkni, kuras maksimālais garums ir 16 777 215 rakstzīmes
  14. Paziņojums ...... tiek izmantots, lai pievienotu, dzēstu vai mainītu esošās tabulas kolonnas.
  15. ... operators ļauj WHERE klauzulā norādīt vairākas vērtības.
  16. .... klauzula tiek izmantota, lai apvienotu rindas no divām vai vairākām tabulām, pamatojoties uz saistītu kolonnu starp tām.
  17. SQL ...... ir koda ievadīšanas metode, kas var iznīcināt jūsu datu bāzi
  18. .... tiek izmantots kopā ar citiem operatoriem, lai iegūtu pretēju rezultātu, ko sauc arī par negatīvu rezultātu.
  19. Atslēgvārds ....... atlasa ierakstus, kuriem abās tabulās ir atbilstošas ​​vērtības.
  20. Priekšraksts ...... kopē datus no vienas tabulas jaunā tabulā.
  21. Funkcija .... atgriež mazāko atlasītās kolonnas vērtību.
  22. Priekš BLOB (bināri lieli objekti). Maksimālais garums: 255 baiti
  23. ..... ierobežojums nodrošina, ka visas kolonnas vērtības ir atšķirīgas.
  24. ir lauks vai lauku grupa, kas vienozīmīgi identificē katru datu bāzes ierakstu
  25. Paziņojums ...... tiek izmantots, lai izveidotu jaunu SQL datu bāzi.
Down
  1. Ierobežojumu .... izmanto, lai ierobežotu vērtību diapazonu, ko var ievietot kolonnā.
  2. Paziņojums ..... tiek izmantots, lai datu bāzē izveidotu jaunu tabulu.
  3. .... priekšraksts tiek izmantots, lai mainītu esošos ierakstus tabulā.
  4. ...... priekšraksts tiek izmantots, lai atmestu esošu SQL datu bāzi.
  5. Vienāds ar BOOL
  6. BLOB (bināri lieli objekti). Ietver līdz 16 777 215 baitiem datu
  7. Ierobežojums ...... tiek izmantots, lai kolonnai iestatītu noklusējuma vērtību.
  8. .... tiek izmantots, lai filtrētu ierakstus, pamatojoties uz vairākiem nosacījumiem, piemēram, ja vēlaties atgriezt visus klientus no Vācijas, bet arī tos no Spānijas.
  9. Lai tabulas atbilstu realizējamiem uzdevumiem un lai tiktu noverstu datu dublēšanu, tiek veikta ta vienkāršošana un optimizēšana jeb .....
  10. Operatoru ..... izmanto, lai apvienotu divu vai vairāku SELECT priekšrakstu rezultātu kopu.
  11. Funkcija ... atgriež ciparu kolonnas vidējo vērtību.
  12. Operators ..... izvēlas vērtības noteiktā diapazonā. Vērtības var būt cipari, teksts vai datumi.
  13. Funkcija .... atgriež ciparu kolonnas kopējo summu.
  14. Satur virkni, kuras maksimālais garums ir 255 rakstzīmes
  15. Skats tiek izveidots ar priekšrakstu .......
  16. Vienāds ar INT
  17. BLOB (bināri lieli objekti). Ietilpst līdz 4 294 967 295 baitiem datu
  18. ..... tika pievienota SQL, jo WHERE atslēgvārdu nevar izmantot ar apkopotām funkcijām.
  19. .... priekšraksts tiek izmantots, lai dzēstu esošus ierakstus tabulā.
  20. Paziņojumā ....... rindas, kurām ir vienādas vērtības, tiek grupētas kopsavilkuma rindās, piemēram, "atrast klientu skaitu katrā valstī".
  21. Ierobežojums .... tiek izmantots, lai novērstu darbības, kas iznīcinātu saites starp tabulām.
  22. Operatoru ..... izmanto, lai pārbaudītu jebkura ieraksta esamību apakšvaicājumā.
  23. Ierobežojums ...... liek kolonnai NEPIEŅEM NULL vērtības.
  24. ..... tiek izmantoti, lai izskaidrotu SQL priekšrakstu sadaļas vai novērstu SQL priekšrakstu izpildi.
  25. komanda vai komandas, kas ļauj veikt manipulācijas ar datu bāzēm

50 Clues: Vienāds ar INTVienāds ar BOOLVienāds ar DECIMAL.... ir saistīta starp divām tabulāmSkats tiek izveidots ar priekšrakstu .......Lai paātrinātu ieraksta kārtošanu veic tā .....Funkcija .... atgriež ciparu kolonnas kopējo summu.Funkcija ... atgriež ciparu kolonnas vidējo vērtību....... klauzula tiek izmantota, lai filtrētu ierakstus....

Computer Science 2025-03-27

Computer Science crossword puzzle
Across
  1. A technique used to map data to fixed-size values for quick retrieval, often used in hash tables.
  2. A set of rules governing how data is transmitted between devices in a network.
  3. A signal that temporarily halts the CPU to allow immediate processing of a high-priority task.
  4. The ability of different classes to use the same method name but with different implementations.
  5. A system that translates domain names (like google.com) into IP addresses.
  6. A small, high-speed memory area that stores frequently accessed data for faster processing.
  7. A problem-solving algorithm that tries partial solutions and undoes them when necessary.
  8. A four-layer model used to structure network communications.
  9. A number system using only 0s and 1s, fundamental to computer operations.
  10. The practice of hiding implementation details and showing only essential features.
  11. The object-oriented programming principle that hides data inside a class and only allows controlled access.
  12. The process of repeatedly executing a set of instructions using loops.
  13. A base-16 number system used to simplify binary representation.
  14. A data structure that follows the Last In, First Out (LIFO) principle.
  15. A CPU design technique where multiple instructions are processed simultaneously at different stages.
  16. A data structure that follows the First In, First Out (FIFO) principle.
  17. The part of a machine instruction that specifies the operation to be performed.
  18. The fundamental protocol suite that enables communication over the internet.
  19. A technique where a computer uses secondary storage (e.g., a hard drive) to extend RAM.
  20. The latest version of the Internet Protocol, designed to provide more IP addresses.
  21. A device that directs data packets between different networks.
  22. A logical subdivision of a network that improves security and efficiency.
Down
  1. A method for representing real numbers in a way that supports fractions and large values.
  2. A computer architecture that separates memory for data and instructions, allowing simultaneous access.
  3. A method of data transmission where messages are broken into smaller units and reassembled at their destination.
  4. A field in one database table that links to the primary key of another table.
  5. The process of organising a database to reduce redundancy and improve integrity.
  6. A computer architecture where programs and data share the same memory.
  7. A notation used to describe the efficiency of an algorithm in terms of time or space complexity.
  8. A small, fast memory location within the CPU that stores temporary data and instructions.
  9. A computing technique that divides tasks into smaller parts and processes them simultaneously.
  10. The maximum data transfer rate of a network connection, usually measured in bits per second (bps).
  11. A divide-and-conquer sorting algorithm that splits an array into smaller parts and then merges them in order.
  12. A character encoding standard that supports multiple languages and symbols.
  13. The structured query language used to manage and manipulate relational databases.
  14. A data structure made up of nodes, where each node contains data and a reference to the next node.
  15. A unique identifier for a record in a database table.
  16. A security system that monitors and controls incoming and outgoing network traffic.
  17. A function that calls itself within its definition.

39 Clues: A function that calls itself within its definition.A unique identifier for a record in a database table.A four-layer model used to structure network communications.A device that directs data packets between different networks.A base-16 number system used to simplify binary representation....

AWS recap 2025-10-13

AWS recap crossword puzzle
Across
  1. Which AWS service provides managed relational databases?
  2. Which AWS service is used to run containerized applications?
  3. Which AWS service lets you monitor your applications and resources?
  4. Which AWS service offers fully managed message queues?
  5. Which AWS service manages SSL/TLS certificates and encryption keys?
  6. Which AWS storage service is best for long-term archival?
  7. Which AWS service lets you query data in S3 using SQL?
  8. What should you enable on your root account for extra login security?
  9. Which AWS service automates software build and deployment pipelines?
  10. Which AWS service allows you to run code without managing servers?
  11. Which AWS service lets you manage multiple AWS accounts centrally?
  12. Which AWS service helps developers create and manage APIs?
  13. Which AWS service tracks resource configuration changes and compliance?
  14. Which AWS framework includes the five pillars of best practices?
  15. Which AWS service delivers content globally with low latency?
  16. Which AWS tool helps estimate monthly costs?
  17. What cloud computing model provides rented infrastructure on AWS?
  18. Which AWS service provides domain registration and DNS management?
  19. Which AWS service helps you create and manage encryption keys?
  20. Which AWS service allows you to run virtual machines in the cloud?
  21. In the shared responsibility model, who is responsible for securing customer data?
  22. Which AWS service controls user access and permissions to AWS resources?
Down
  1. Which AWS service sends notifications to subscribers or other services?
  2. Which AWS service is used to isolate resources in a private virtual network?
  3. Which AWS service automates resource deployment using templates?
  4. Which EC2 pricing model bills by the second or hour with no long-term commitment?
  5. Which AWS service runs batch computing workloads efficiently?
  6. Which AWS feature automatically adjusts capacity to maintain performance?
  7. Which AWS service distributes traffic across multiple targets?
  8. Which AWS service provides object storage for any amount of data?
  9. What are AWS regions divided into to ensure high availability?
  10. Which AWS block storage service can be attached to EC2 instances?
  11. Which AWS tool helps visualize and analyze your spending?
  12. Which AWS service records account activity and API calls?
  13. Which AWS service provides a dedicated network link from on-premises to AWS?
  14. Which AWS tool gives recommendations to improve performance and reduce costs?
  15. Which AWS service provides a managed NoSQL database?
  16. Which AWS support plan includes a technical account manager?
  17. Which AWS tool provides status information about AWS services?
  18. Which EC2 pricing model offers discounts for 1- or 3-year commitments?
  19. Which AWS service provides managed virtual desktops?
  20. Which AWS offering lets users try services for free within usage limits?

42 Clues: Which AWS tool helps estimate monthly costs?Which AWS service provides a managed NoSQL database?Which AWS service provides managed virtual desktops?Which AWS service offers fully managed message queues?Which AWS service lets you query data in S3 using SQL?Which AWS service provides managed relational databases?...

English 2025-12-10

English crossword puzzle
Across
  1. A weakness that can be exploited.
  2. Long-term storage of old files.
  3. The way a system or user acts.
  4. A request for information from a database.
  5. A system on which applications can run.
  6. Connected computers that share data.
  7. A direct instruction given to a computer.
  8. Instructions written for computers.
  9. A person or system chosen for attack.
  10. A step taken to solve a problem.
  11. Accidental or unlawful release of information.
  12. A piece of hardware used in computing.
  13. A place where data is kept.
  14. To protect from harm or attacks.
  15. Continuous flow of data.
  16. Converting information into a secure code.
  17. Related to investigating cyber incidents.
  18. The right to keep personal data protected.
  19. The current condition of a system.
  20. A formal rule or guideline.
  21. A mistake or problem in a system.
  22. Someone who monitors or watches activity.
  23. Information stored or processed by computers.
  24. The chance that something bad may happen.
  25. An action taken after an incident.
  26. Unauthorized entry into a system.
  27. Protection against threats or attacks.
  28. To follow the path of an action or data flow.
  29. Use of technology to perform tasks without human input.
  30. A written record of actions or events.
  31. Permission to use or enter a system.
  32. Learning skills or knowledge.
  33. A simplified digital structure used to predict or analyze.
  34. A set of rules for communication.
  35. Monitoring to make sure rules are followed.
  36. A break in security where data is exposed.
  37. A specific area or internet address space.
  38. A part of a larger software system.
Down
  1. Official rule made by authorities.
  2. A tool that blocks unwanted network traffic.
  3. A formal review of systems or processes.
  4. Programs used by a computer.
  5. Searching for threats inside a network.
  6. Proof of an event or action.
  7. Related to money or cost.
  8. Numerical information used for analysis.
  9. Following laws, rules, or standards.
  10. Information sent from one place to another.
  11. A call for data or a service.
  12. A prediction based on information.
  13. The ability to manage or direct something.
  14. Belief that someone or something is reliable.
  15. Measurements used to evaluate performance.
  16. To watch or track activity.
  17. A user identity in a system.
  18. Studying information to understand it.
  19. A computer that provides resources to others.
  20. A set of connected computer components.
  21. A risk or danger.
  22. Too much data or activity for a system to handle.
  23. Something unusual that may signal a problem.
  24. The path data takes to reach a destination.
  25. To check a system for issues or threats.
  26. A saved copy of data in case of loss.
  27. A document describing an event or findings.
  28. A sign that danger or problems may occur.
  29. An event that disrupts normal operations.
  30. Delay in data communication.
  31. A connection point in a network.
  32. A secret code to access a system.
  33. A tool used to explore or test a system.
  34. Rules about what is morally right or wrong.
  35. Records of system activities.

73 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A place where data is kept.To watch or track activity.A formal rule or guideline.Programs used by a computer.Proof of an event or action.A user identity in a system.Delay in data communication.A call for data or a service.Learning skills or knowledge.Records of system activities....

SNOW 2012-11-08

SNOW crossword puzzle
Across
  1. When we navigate away from the form view without saving the record, a message appears, click "Leave this Page" to confirm cancellation. Which glide.ui. property can an admininstrator set to false to disable this confirmation message
  2. One of the key element in WS Security Profile when using SOAP messages
  3. Where will be the script written for creating a request via email in Service Now.(7,7)
  4. To Remove Remember me check box from login page this need to set true________.
  5. Displays configuration items and their relationships, such as computers on a network, in a navigational view
  6. What Application can be used to provide step by step sequence of dialog boxes that lead the user through a procedure?
  7. Which function when used in a business rule or any other server JavaScript, returns a user object.
  8. Function which Retrieves the field value of the current record and escapes it for use in Jelly scripts.
  9. The JavaScript class used to customize forms.
  10. Which is the business rule that is triggered on the sc_req_item table to start the work flow
  11. Which g_form function can be used to put an error message below the specified field [used like : g_form.functionName("field_name", "Hello World") ]
  12. Which option is used to insert a new record in the table and to show the new record inserted?(6,3,4)
  13. Used to apply consistently to records regardless of how they are accessed through forms, lists, or Web Services (8,4)
  14. The role once granted to a user after which he can customize Global Text Search groups and tables
  15. While parsing the XMl file the function that is used to retrieve the value of an element.
  16. Using which button action in the dictionary can we delete a table (6,5)
  17. Which module in service-now can be used for assigning read, write, create or delete operation for a type of record or ui-page? (6,7)
Down
  1. Property when set to true, a user can modify the data in the list view by using keyboard navigation, like in spreadsheet.
  2. One of the option only available to admin on the banner frame
  3. Related list that can be saved without navigating away from the form and which gets saved when the form changes are saved is called
  4. Which system role needs to be assigned to a user while working on system webservices?
  5. In the Action choice list for any system table it is the option, only available to an admin.
  6. What is an easy way to put buttons, links, and context menu items on forms and lists, making the UI more interactive, customizable, and specific to user activities. (2, 7)
  7. The table which is used for service catalog variable reporting
  8. What kind of a workflow activity can be used if we need to reset or transition to earlier activity
  9. To support multiple languages to translate annotation comments which table record can be used.
  10. Provides a graphical representation of other tables related to that table, either through class extension or reference (6,3)
  11. Filed value determines the SLA's behavior if it is attached to the task at a point later than the task's creation.(11,5)
  12. When we use GlideRecord , the function that is used to find the exact query that would run on the table
  13. Which is the utility that will be used to call the web services.

30 Clues: The JavaScript class used to customize forms.One of the option only available to admin on the banner frameThe table which is used for service catalog variable reportingWhich is the utility that will be used to call the web services.One of the key element in WS Security Profile when using SOAP messages...

COMPUTER TERMS 2014-11-10

COMPUTER TERMS crossword puzzle
Across
  1. Are external devices that extends the functionality of the PC
  2. The main input device for most computers
  3. uses Information system (tactical decisions)
  4. A small, high-speed memory area that is placed between the processor and the system memory
  5. uses information system (decisions about short-term objectives)
  6. A programmable electronic device that can store , retrieve, and process large amounts of data
  7. Connection that allows you to attach everything from mice to printers
  8. Has revolutionized the world of investment and finance
  9. Identifies the rows to be updated, selected and is composed of column names, expressions, constraints, sub-queries, and comparison operators
  10. The electrical channels through which various parts of the computer communicate
  11. Is the term used for all the physical components on a PC
  12. An input device that allows you to move the cursor around the screen
  13. a type of Transaction Processing Systems
  14. uses information system (on-the-job decisions)
  15. are combinations of hardware, software, and other resources used to facilitate communications and enhance productivity
  16. Structured Query Language
  17. is the theory and development of computer systems able to perform tasks that normally require human intelligence
  18. Improve the relationship among citizen and government
  19. The rows of such a table can be thought of as representing the records
  20. Covers the collection of details stored in database.
  21. plan, build, and implement systems that make use of computers that a company has or will acquire
  22. phase in which hardware, software and other components are acquired
  23. Picture Elements
  24. Sends information over the line one bit at a time
  25. Identification of specific markets to target them with advertising messages
Down
  1. gather information about how work is done in the applications area and to ascertain what information users need
  2. the focus is on developing a small model, or prototype, of the overall system
  3. allows designers to dramatically reduce the time they spend at the drafting board
  4. Single Website that offers many products and services at one internet location
  5. includes the use of computers to help manage manufacturing operations and to control machinery used in manufacturing processes
  6. It is sometimes called the Cathode Ray Tube
  7. uses Information system (strategic decisions)
  8. Ensures that only unique values can be assigned in each row for that field(s)
  9. They often approve broad plans for systems development within an organization
  10. systems development effort in which the user is primarily responsible for the development of the system
  11. The main circuit board in the computer where everything comes together
  12. Random Access Memory
  13. make use of diagrams, tables and checklists
  14. Enterprise resource planning
  15. integrate the entire company, or enterprise
  16. A collection of people, hardware, software, data, and procedures that interact to generate information to support the users of an organization.
  17. The brain of the computer
  18. A type of transaction Processing Systems
  19. a type of Transaction Processing Systems
  20. Is a list of information that is not necessarily related to any other lists or tables
  21. Data values for every column are stored in row
  22. Device requests time from the processor using the interrupt request
  23. Electronic Retailing
  24. Helps the computer do useful things
  25. Collection of elements and procedures that interact to accomplish a goal

50 Clues: Picture ElementsRandom Access MemoryElectronic RetailingThe brain of the computerStructured Query LanguageEnterprise resource planningHelps the computer do useful thingsThe main input device for most computersa type of Transaction Processing SystemsA type of transaction Processing Systemsa type of Transaction Processing Systems...

Quiz 2 Aplikom 2018-06-01

Quiz 2 Aplikom crossword puzzle
Across
  1. adalah salah satu perintah SQL yang berfungsi untuk memasukkan data awal pada tabel atau dapat juga untuk menambah data.
  2. menghubungkan beberapa perangkat sekaligus dalam sebuah jaringan
  3. adalah perangkat keras dan atau perangkat lunak yang melindungi sumber daya jaringan dari gangguan.
  4. adalah salah satu dari field property yang digunakan untuk menampilkan informasi yang berguna untuk user sebagai judul kolom, form atau laporan.
  5. adalah kumpulan dari komputer dan perangkat terhubung bersama melalui perangkat komunikasi dan media transmisi.
  6. adalah standar protokol internet yang memungkinkan terjadinya download dan upload.
  7. adalah tindakan ilegal saat menggunakan internet.
  8. jaringan yang menghubungkan komputer dan perangkat diwilayah geografis yang terbatas.
  9. adalah waktu yang dibutuhkan sinyal untuk perjalanan dari satu lokasi ke lokasi yang lain
  10. adalah primary key yang terhubung ke tabel yang lain yang saling berelasi.
  11. adalah tata letak komputer dan perangkat dalam jaringan komunikasi
  12. adalah standar jaringan yang menetapkan bagaimana pesan yang dirutekan dari satu ujung jaringan ke yang lain.
  13. adalah jumlah tuple dari suatu relasi
  14. adalah salah fitur excel yang digunakan untuk mencari nilai uang di masa depan.
  15. adalah tipe data pada access yang dapat menerima huruf, angka, spasi dan tanda baca.
  16. Merupakan sebuah kedai kopi, restoran, atau lokasi lainnya yang menyediakan komputer pribadi dengan akses internet untuk para pelanggannya
  17. pada access digunakan untuk menyimpan data (record)
  18. adalah program yang tersembunyi di komputer dan memungkinkan seseorang dari lokasi yang jauh untuk mengambil kendali.
  19. merupakan sistem navigasi yang terdiri dari satu atau lebih penerima-berbasis-bumi yang menerima dan menganalisa sinyal yang dikirim oleh satelit untuk menentukan lokasi geografis device penerima.
  20. adalah jumlah atribut dari suatu relasi
Down
  1. adalah arus kas yang berjumlah sama yang timbul pada setiap akhir periode
  2. berfungsi sebagai bahasa query interaktif sekaligus juga sebagai bahasa pemrograman basisdata.
  3. adalah proses mengubah data yang dapat dibaca kedalam karakter yang tidak dapat terbaca untuk mencegah akses yang tidak sah.
  4. merupakan kumpulan jaringan diseluruh dunia yang menghubungkan jutaan bisnis, pemerintahan, institusi pendidikan dan individu.
  5. adalah serangan internet yang menduplikasi diri, menggunakan sumberdaya dan dapat mematikan komputer atau jaringan
  6. adalah salah satu fitur excel yang digunakan untuk mencari nilai pada saat ini dengan memperhitungkan berbagai kemungkinan dimasa depan.
  7. adalah anuitas yang berlangsung selamanya.
  8. adalah satu satu perintah SQL yang berfungsi untuk menampilkan isi satu tabel atau beberapa tabel sekaligus
  9. adalah etika dalam menggunakan internet. Bisa jadi sebagai acuan berkomunikasi yang sopan di internet.
  10. atau yang dikenal sebagai record pada access yaitu baris dari suatu relasi.
  11. adalah layanan untuk memeriksa kerentanan dari perangkat komputer kita terhadap ancaman dari internet.
  12. adalah sebuah halaman web yang memiliki alamat unik.
  13. adalah atribut untuk pada suatu tabel yang mencirikan tabel tersebut dari tabel yang lainnya.
  14. adalah percakapan real-time yang diketik yang terjadi pada sebuah perangkat yang terhubung ke internet.
  15. adalah judul kolom dari suatu relasi
  16. adalah jumlah data yang dapat melewati saluran komunikasi.
  17. adalah kumpulan halaman web yang saling terhubung.
  18. mentransmisikan data secara wireless via infrared (IR) light waves.
  19. adalah satu contoh dari search engine.
  20. menggunakan sinyal radio untuk berkomunikasi dengan tag yang tertanam pada suatu kartu, binatang, alat atau bahkan manusia.

40 Clues: adalah judul kolom dari suatu relasiadalah jumlah tuple dari suatu relasiadalah satu contoh dari search engine.adalah jumlah atribut dari suatu relasiadalah anuitas yang berlangsung selamanya.adalah tindakan ilegal saat menggunakan internet.adalah kumpulan halaman web yang saling terhubung.pada access digunakan untuk menyimpan data (record)...

Overview of the Research Process 2024-06-10

Overview of the Research Process crossword puzzle
Across
  1. Technique for systematically analyzing text, images, or media content
  2. Small-scale preliminary study conducted to evaluate feasibility and design
  3. Study that analyzes data from a population at a specific point in time
  4. Process of detecting and correcting errors in data
  5. Methodology involving the construction of theories through methodical gathering and analysis of data
  6. Method involving numerical data and statistical analysis
  7. Method to ensure each participant has an equal chance of being assigned to any group
  8. Method for identifying, analyzing, and reporting patterns within data
  9. Probability that a test will correctly reject a false null hypothesis
  10. A testable statement predicting a relationship between variables
  11. Comprehensive survey of existing research on a particular topic
  12. Group in an experiment that does not receive the treatment and is used as a benchmark
  13. Process of selecting a subset of individuals from a population
  14. Elements that can vary or change within a study
  15. Systematic error introduced into sampling or testing
  16. Research design that involves repeated observations over long periods
  17. Consistency of a measure over time
  18. Process of systematically applying statistical techniques to interpret data
  19. Degree to which a study accurately reflects or assesses the specific concept it is intended to measure
  20. Small, diverse group of participants used for discussing specific topics
  21. Range within which a population parameter is expected to lie with a specified probability
  22. Process by which a study is evaluated by experts in the same field before publication
Down
  1. Process by which participants are informed about the study and agree to take part
  2. Tendency for journals to publish positive results over non-significant findings
  3. Study of cultures through direct observation and interaction
  4. Statistical techniques that summarize or describe characteristics of a data set
  5. Measure of the relationship between two variables
  6. Fundamental query that guides the research study
  7. Research approach focusing on understanding phenomena through observation and interviews
  8. Collection Systematic gathering of information for research purposes
  9. Relationship where one variable directly affects another
  10. Process of defining abstract concepts in measurable terms
  11. Permission granted by a review board to conduct research involving human subjects
  12. External variable that could affect the outcome of an experiment
  13. Methods that allow researchers to make predictions or inferences about a population based on sample data
  14. Statistical technique that combines the results of multiple studies
  15. Research method involving questionnaires to gather data from a large group
  16. Sample where each member of the population has an equal chance of being selected
  17. Comprehensive summary of all relevant research on a specific topic
  18. Point in qualitative research where no new information or themes are observed in the data
  19. Use of multiple methods or data sources in qualitative research to develop a comprehensive understanding
  20. Error caused by observing a sample instead of the whole population
  21. In-depth analysis of a single subject or group
  22. Group that receives the treatment in a study
  23. Framework outlining the methods and procedures of a study
  24. Process of ensuring the accuracy of research instruments
  25. Repeating a study to verify its results
  26. Technique to prevent bias by keeping participants and researchers unaware of group assignments
  27. Measure of the probability that an observed difference could have occurred just by random chance
  28. Quantitative measure of the magnitude of a phenomenon

50 Clues: Consistency of a measure over timeRepeating a study to verify its resultsGroup that receives the treatment in a studyIn-depth analysis of a single subject or groupElements that can vary or change within a studyFundamental query that guides the research studyMeasure of the relationship between two variables...

Verification Types and Services 2023-08-09

Verification Types and Services crossword puzzle
Across
  1. A service created by ASM that allows for quick and efficient hospital verifications to other hospitals or health systems using MD-Staff. The purpose of the verification is to quickly review a provider’s current or previous standing with an outside health care organization.
  2. A license number assigned to health care providers that allows them to write prescriptions for controlled substances.
  3. A verification to confirm a unique identifier assigned to covered health care providers and is also used to create to help send health information electronically more quickly and effectively.
  4. A license that allows licensed health care practitioners to work with controlled substances.
  5. Verifies a variety of information (Education, board certifications, various licensure, etc.) with a single verification, but is still considered ‘primary source’.
  6. The most widely accepted professional online resource for verifying board certification information. The purpose of a board certification verification is to demonstrate or prove that a physician meets nationally recognized standards for education, knowledge, experience and skills, as well as maintains their certification through continuous learning (CMEs) and patient improvement in order to provide high quality care in a specific medical specialty or sub-specialty.
  7. A type of healthcare-specific background check, previously known as Talentwise.
  8. (SAM/GSA), An electronic directory of individuals and organizations that are not permitted to receive federal contracts or assistance from the United States government. This is a type of exclusion list, where the desired verification result is “No Results”.
  9. Continuous Query, Provides a report outlining any previous malpractice payments paid on behalf of a health care practitioner or actions taken against a health care practitioner.
  10. Provides a report outlining any previous malpractice payments paid on behalf of a health care practitioner or actions taken against a health care practitioner.
  11. License, A type of license verification that lets you know the provider’s current practicing status and other information (such as limitations, current disciplinary actions, etc.) within a particular state.
  12. An organization focused on detecting and preventing fraud, waste, abuse, misconduct and mismanagement in the government, and to promote economy, efficiency and effectiveness in the agency’s operations and programs. This is a type of exclusion list, where the desired verification result is “No Results”.
  13. An online resource that provides educational reporting, verification and research services. This is used for Medical Education verifications.
  14. A verification to identify criminal records for an individual on a national level.
  15. A type of healthcare-specific background check.
Down
  1. A type of verification that returns whether or not a provider has opted out of (or not enrolled) in federal health insurance (for people 65 or older).
  2. A license that allows a qualifying and authorized practitioner to prescribe controlled substances for maintenance or detoxification purposes.
  3. A service created by ASM that allows for quick and efficient verifications of hospital affiliations, educational institutions, employment records and peer references.
  4. A screening tool that provides insight into a healthcare professional’s medical background, specifically focusing on a disciplinary action levied against an individual or entity by a state licensing board. These can severely damage an organizations finances, operations and reputation and inhibit providers from participating in federal healthcare programs.
  5. A certification demonstrating that a physician meets nationally recognized standards for education, knowledge, experience and skills, as well as maintains their certification through continuous learning (CMEs) and patient improvement in order to provide high quality care in a specific medical specialty or sub-specialty.
  6. A type of verification that confirms a provider is covered (financially) in the event of malpractice.

21 Clues: A type of healthcare-specific background check.A type of healthcare-specific background check, previously known as Talentwise.A verification to identify criminal records for an individual on a national level.A license that allows licensed health care practitioners to work with controlled substances....

Crossword 2023-03-24

Crossword crossword puzzle
Across
  1. Tool we use for more casual communication
  2. Each Region has at least 3 of these to provide redundancy
  3. Manages running your RDBMS
  4. Which layer does the Network Load Balancer work at? (Name of the layer)
  5. Our highly performant proprietary RDBMS
  6. Amazon’s generic private-label brand on Amazon.com (include the full name)
  7. Tool we use to see the organization structure
  8. Accelerated workforce development program enabling early-career talent
  9. Data Warehousing
  10. Audiobook company
  11. Build, test, manage APIs
  12. Company that makes our electric delivery van
  13. City of Amazon HQ
  14. Manage containers
  15. Run virtual machines
  16. Our learning management system for TechU
  17. Create cost estimates for your use case
  18. Backup of an EBS volume
  19. Manage users, roles, and permissions
  20. Livestreaming platform owned by Amazon
  21. 16 of these help guide our every day actions and decisions at Amazon
  22. Managed ETL
  23. EDU/SLG Director
  24. Build, train, and deploy ML models
  25. Onboarding plans
  26. Create and manage cryptographic keys
  27. Current largest competitor to AWS
  28. Amazon's virtual meeting platform
  29. Manage Kubernetes Clusters
  30. Query S3
  31. Type of EC2 instance that helps companies adhere to compliance requirements and save on licensing
  32. Serverless containers
  33. Leading cloud service provider
  34. Our in-person cloud computing learning conference (include the colon symbol)
  35. Amazon's version of OneDrive, Google Drive, or Dropbox
  36. What does the arrow on the Amazon logo look like?
  37. Collaborative whiteboarding tool
  38. Monitor service usage
  39. ML to analyze text
  40. Business Intelligence Dashboards
  41. Signed before work on an engagement can begin
  42. Popular caffeinated beverage made from beans
  43. The easiest of the 3 ways to interact with AWS. Used to quickly develop and test
Down
  1. Content Distribution Network
  2. Deploy AWS services using templates
  3. What is the APN? (It’s AWS-related)
  4. MongoDB-compatible DB
  5. We currently have 31 of these across the world
  6. We track our hours in this
  7. Cheapest type of EC2 instance but can be interrupted
  8. Serverless compute
  9. LP related to Door Desks
  10. Connect IoT Devices to the cloud
  11. What is ENI an acronym for?
  12. Block storage
  13. Most recently added Well-Architected Pillar
  14. Every programmer’s first resource when debugging
  15. Graph Database
  16. Object storage
  17. CEO of AWS
  18. Amazon’s cargo airline
  19. Current CEO of Amazon
  20. Number 1 LP
  21. Active EDU/SLG Guilds
  22. The Herndon building number
  23. Our Virtual Assistant
  24. Logically isolated network on the cloud
  25. What year was AWS founded?
  26. Managed DNS
  27. Tool we use for email and formal communication
  28. Supermarket chain bought by Amazon
  29. Archival object storage
  30. A building that houses computer systems and associated components
  31. Internal tool to create development AWS accounts
  32. Manages running Big Data processing frameworks
  33. Tool we use to log our hours
  34. Our parent company
  35. MariaElena reminds us to complete these every Friday
  36. One place to store all data for analytics
  37. 6th layer of the OSI model
  38. Dedicated network connection to AWS
  39. Managed NoSQL key-value DB
  40. Hugely popular subscription service that provides 2-day shipping through Amazon.com
  41. The face of Amazon
  42. Create CloudFormation templates using code
  43. Platform that Stephane Maarek teaches on
  44. Track account API calls
  45. Company that made Webex

88 Clues: Query S3CEO of AWSNumber 1 LPManaged DNSManaged ETLBlock storageGraph DatabaseObject storageData WarehousingEDU/SLG DirectorOnboarding plansAudiobook companyCity of Amazon HQManage containersServerless computeOur parent companyThe face of AmazonML to analyze textRun virtual machinesMongoDB-compatible DBCurrent CEO of AmazonActive EDU/SLG Guilds...

Juken 6 2024-12-29

Juken 6 crossword puzzle
Across
  1. The process of increasing in size, number, or range.
  2. A large meeting or gathering of people with a common interest.
  3. The amount of space something occupies or the loudness of sound.
  4. An extra or special price for something of higher quality.
  5. The state of being sober, especially not being under the influence of alcohol or drugs.
  6. A reduction in rank or position.
  7. The act of coming together or meeting at a common point.
  8. An occurrence or happening.
  9. A measurable size or extent, like length, width, or height.
  10. A particular example or occurrence of something.
  11. To speak highly of or express approval.
  12. An unexpected or unintentional incident that causes harm or damage.
  13. The process of removing or getting rid of something.
  14. The act of getting rid of something.
  15. Something that is more important and should be dealt with first.
  16. The process of something being lowered in value or dignity.
  17. Objects used to perform a task or job.
  18. Trust or belief that someone will repay a loan or fulfill a promise.
  19. Numbers, especially individual numbers like 0-9.
  20. Individual parts or components that make up a whole.
  21. A specific situation or event.
  22. A question or inquiry.
  23. The complete disappearance of something, often a species.
  24. The belief that events are predetermined and cannot be changed.
  25. Great joy or celebration.
  26. The quality of being faithful or supportive.
  27. The act of registering or signing up for something.
  28. Clapping or showing approval with hands.
  29. A difficult, unpleasant situation.
  30. The process of writing down spoken words.
Down
  1. A formal mention or recognition of someone's achievements.
  2. A large, enthusiastic show of appreciation.
  3. A strong disapproval or judgment against something.
  4. A serious crime, like murder or robbery.
  5. A sequence of events in a story or plan.
  6. The quality of being exact or accurate.
  7. A gift or statement given in honor or admiration of someone or something.
  8. The quality of being brief or concise.
  9. A person with high authority in an organization.
  10. The act of avoiding or escaping something.
  11. A twisting or bending into an unusual shape.
  12. A delay or postponement of something.
  13. Competition or conflict between two or more parties.
  14. To express sadness or regret about something.
  15. The act of rising from the dead or returning to life.
  16. Difficulties or challenges in life.
  17. A pile or heap of things arranged on top of each other.
  18. The quality of being delicate or finely nuanced.
  19. Feeling regret or remorse for wrongdoing.
  20. The maximum amount something can hold or handle.
  21. Creating something on the spot without preparation.
  22. The quality of being sufficient or acceptable.
  23. The act of removing someone from a position or job.
  24. A situation where people are involved in a conflict or fight.
  25. A tightly tied loop or tangle, often in a string or rope.
  26. An additional performance given after the main one.
  27. The boundary or outermost part of something.
  28. Signs or symbols that indicate something, often as a score or grade.
  29. The process of judging or assessing something.
  30. An area surrounded by barriers or walls.

60 Clues: A question or inquiry.Great joy or celebration.An occurrence or happening.A specific situation or event.A reduction in rank or position.A difficult, unpleasant situation.Difficulties or challenges in life.The act of getting rid of something.A delay or postponement of something.The quality of being brief or concise....

Fundamentals of computing 2024-01-02

Fundamentals of computing crossword puzzle
Across
  1. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  2. Technology-related health condition that affects eyesight. See also CVS
  3. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  4. Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  5. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  6. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  7. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at low cost
  8. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  9. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  10. A request for specific data from a database
Down
  1. The number of horizontal and vertical pixels in a display device
  2. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  3. Employee who uses analytics and other big data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing
  4. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  5. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  6. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person
  7. The time it takes a signal to travel from one location to another on a network.
  8. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  9. An electrical disturbance that can degrade communications
  10. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  11. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  12. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  13. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  14. Group of files waiting in the buffer to be printed.

24 Clues: A request for specific data from a databaseGroup of files waiting in the buffer to be printed.An electrical disturbance that can degrade communicationsThe number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVS...

made by Giancarlo 2024-01-03

made by Giancarlo crossword puzzle
Across
  1. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  2. cache Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  3. System is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  4. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  5. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  6. A request for specific data from a database.
  7. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  8. Scientist Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  9. Aggregation A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  10. Disc Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  11. engineer Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
Down
  1. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  2. The time it takes a signal to travel from one location to another on a network.
  3. computing Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  4. Vision Syndrome Technology-related health condition that affects eyesight. See also CVS
  5. Device Convergence The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  6. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  7. processing unit The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  8. The number of horizontal and vertical pixels in a display device
  9. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  10. Defragmenter Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  11. Group of files waiting in the buffer to be printed.
  12. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  13. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.The number of horizontal and vertical pixels in a display deviceThe time it takes a signal to travel from one location to another on a network.Vision Syndrome Technology-related health condition that affects eyesight. See also CVS...

Made By Morgan 2024-01-03

Made By Morgan crossword puzzle
Across
  1. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  2. cache Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  3. System is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  4. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  5. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  6. A request for specific data from a database
  7. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  8. Scientist Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  9. Aggregation A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  10. Disc Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  11. engineer Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
Down
  1. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  2. The time it takes a signal to travel from one location to another on a network.
  3. computing Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  4. Vision Syndrome Technology-related health condition that affects eyesight. See also CVS
  5. Device Convergence The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  6. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  7. processing unit The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  8. The number of horizontal and vertical pixels in a display device
  9. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  10. Defragmenter Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  11. Group of files waiting in the buffer to be printed.
  12. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  13. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.

24 Clues: A request for specific data from a databaseGroup of files waiting in the buffer to be printed.The number of horizontal and vertical pixels in a display deviceThe time it takes a signal to travel from one location to another on a network.Vision Syndrome Technology-related health condition that affects eyesight. See also CVS...

COMPUTER TERMS 2022-02-07

COMPUTER TERMS crossword puzzle
Across
  1. A picture which usually stands for a computer program, computer file, folder, or an action for a program to do. Icons are usually small pictures
  2. A font is a graphical representation of text that may include a different typeface, point size, weight, color, or design.
  3. Websites such as Google are made for this, otherwise known as a query, is an entry into a search engine that provide the answers to a question or prompt
  4. To transfer (something, such as data or files) from a computer or other digital device to the memory of another device (such as a larger or remote computer) especially via the Internet.
  5. An application used to access and view websites. Common web browsers include Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, and Apple Safari.
  6. Messages distributed by electronic means from one computer user to one or more recipients via a network.
  7. An electronic device or hardware that accepts text files or images from a computer and transfers them to a medium such as paper
  8. To move data or to transfer it to or from a computer along a line such as a telephone line, a radio link, or a computer network.
  9. A global computer network providing a variety of information and communication
  10. The virtual location for applications, documents, data or other sub-folders. Folders help in storing and organizing files and data in the computer.
  11. A computer program that can copy itself and infect a computer without permission or knowledge of the user. It might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk
  12. The common storage unit in a computer, and all programs and data are "written" into a file and "read" from a file.
Down
  1. A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
  2. A panel of keys that operate a computer
  3. A small hardware input device used by hand. It controls the movement of the cursor on the computer screen and allows users to move and select
  4. A program with a set of instructions and documentation that tells a computer what to do or how to perform a task.
  5. A string of characters that allows access to a computer system or service
  6. A computer display , the screen is the physical surface on which visual information is presented. This surface is usually made of glass.
  7. an electronic device with a screen used for display (as of television pictures or computer information)
  8. A set of characters (letters and/or numbers) that identifies a user (such as on a computer system, website, or social media platform
  9. An output hardware device that connects to a computer to generate sound. The signal used to produce the sound that comes from a computer speaker is created by the computer's sound card
  10. The part of the computer that stores all your data. It houses the hard disk, where all your files and folders are physically located.
  11. A unit of computer information consisting of 1,024 megabytes: GB can be a synonym e or can refer to 1,000,000,000 bytes
  12. To move text or graphics up or down or across a display screen

24 Clues: A panel of keys that operate a computerTo move text or graphics up or down or across a display screenA string of characters that allows access to a computer system or serviceA global computer network providing a variety of information and communication...

Potenza Silvia termini 2022-01-18

Potenza Silvia termini crossword puzzle
Across
  1. archivio di dati disposti in modo organizzato e correlati tra di loro
  2. operazione che permette di creare una copia di sicurezza in un file
  3. economy nuova forma di economia caratterizzata dall’utilizzo di internet per la vendita di prodotti e sevizi
  4. madre è la scheda principale dove sono collegati tutti i componenti hardware del computer
  5. è l’unità di informazione strutturata di un database
  6. marchio che indica la protezione dei diritti dell’autore
  7. (sistema): è il sistema di numerazione in cui si utilizzano solo cifre indicate da 0-1
  8. insieme dei dispositivi elettronici e meccanici del computer
  9. misura di un’unità di informazione, corrisponde a 1024 MB
  10. è un tipo di tastiera diffusa in america, ma anche in italia
  11. li strumenti è una barra dove sono raccolte delle icone che funzionano da pulsanti
  12. tecnica di riconoscimento ottico di caratteri di stampa
  13. è il processo dei dati da un database secondo certi criteri
  14. è un dispositivo che serve per smistare messaggi in una rete locale
  15. informatico di particolare abilità e ha per obbiettivo la divulgazione dell’informatica
  16. singolo documento di lavoro individuato da un nome
  17. codice segreto per accedere a risorse e informazioni private
  18. è l’insieme dei programmi che permettono il funzionamento di un computer
  19. interfaccia grafica dei software
  20. software rilasciato per dimostrazione, ma non è abilitato in tutte le funzioni
  21. se il termine è riferito ad una risposta del sistema, significa che è attiva
  22. è la posta elettronica, ossia sono i messaggi inviati tramite computer collegati a internet
  23. cache: memoria interna al processore, ad altissima velocità di accesso
  24. procedura per la creazione e la copia sul disco fisso di archivi e programmi
Down
  1. è il dizionario dei sinonimi e contrari
  2. è il singolo punto luminoso del monitor
  3. è un area di lavoro visualizzata sullo schermo ed è dedicata a un’applicazione
  4. disegno di dimensioni ridotte che richiama la funzione ad essa associata
  5. ciascuna delle pagine che compongono una presentazione tipo Power Point
  6. è la tastiera tipicamente italiana
  7. è una sequenza di operazioni elementari che permettono di risolvere un problema in tempo finito
  8. è un programma che permette l’accesso alla rete internet e alle pagine web
  9. è un operazione che permette di caricare o scaricare dalla rete un file sul proprio computer
  10. dispositivo che permette di collegare computer a una rete locale
  11. è un componente hardware esterno al computer
  12. contiene file e altre cartelle
  13. sequenza di comandi per velocizzare le operazioni svolte frequentemente
  14. indica la velocità di rotazione del disco fisso
  15. è il modo in cui vengono organizzati testo e video all’interno di una pagina, per il video o per la stampa
  16. è una grandezza che varia in continuo, non è rappresentata da un valore numerico
  17. è ciascuna delle pagine che compongono una presentazione tipo PowerPoint
  18. è il profilo di un utente che corrisponde a una casella e a un indirizzo di posta
  19. finestra progettata per visualizzare i dati di uno o più record di un database
  20. è un programma in grado di riconoscere un virus presente in un file ed eliminarlo
  21. collegamento tra un documento e l’altro

45 Clues: contiene file e altre cartelleinterfaccia grafica dei softwareè la tastiera tipicamente italianaè il dizionario dei sinonimi e contrariè il singolo punto luminoso del monitorcollegamento tra un documento e l’altroè un componente hardware esterno al computerindica la velocità di rotazione del disco fisso...

COMPUTER TERMS 2022-02-07

COMPUTER TERMS crossword puzzle
Across
  1. To move data or to transfer it to or from a computer along a line such as a telephone line, a radio link, or a computer network.
  2. An output hardware device that connects to a computer to generate sound. The signal used to produce the sound that comes from a computer speaker is created by the computer's sound card
  3. A unit of computer information consisting of 1,024 megabytes: GB can be a synonym e or can refer to 1,000,000,000 bytes
  4. A small hardware input device used by hand. It controls the movement of the cursor on the computer screen and allows users to move and select
  5. A set of characters (letters and/or numbers) that identifies a user (such as on a computer system, website, or social media platform
  6. A picture which usually stands for a computer program, computer file, folder, or an action for a program to do. Icons are usually small pictures
  7. A font is a graphical representation of text that may include a different typeface, point size, weight, color, or design.
  8. DRIVE The part of the computer that stores all your data. It houses the hard disk, where all your files and folders are physically located.
  9. Messages distributed by electronic means from one computer user to one or more recipients via a network.
  10. An application used to access and view websites. Common web browsers include Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, and Apple Safari.
  11. A computer program that can copy itself and infect a computer without permission or knowledge of the user. It might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk
  12. To transfer (something, such as data or files) from a computer or other digital device to the memory of another device (such as a larger or remote computer) especially via the Internet.
Down
  1. A program with a set of instructions and documentation that tells a computer what to do or how to perform a task.
  2. A global computer network providing a variety of information and communication
  3. A string of characters that allows access to a computer system or service
  4. A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
  5. A computer display , the screen is the physical surface on which visual information is presented. This surface is usually made of glass.
  6. An electronic device or hardware that accepts text files or images from a computer and transfers them to a medium such as paper
  7. an electronic device with a screen used for display (as of television pictures or computer information)
  8. A panel of keys that operate a computer
  9. The virtual location for applications, documents, data or other sub-folders. Folders help in storing and organizing files and data in the computer.
  10. The common storage unit in a computer, and all programs and data are "written" into a file and "read" from a file.
  11. To move text or graphics up or down or across a display screen
  12. Websites such as Google are made for this, otherwise known as a query, is an entry into a search engine that provide the answers to a question or prompt

24 Clues: A panel of keys that operate a computerTo move text or graphics up or down or across a display screenA string of characters that allows access to a computer system or serviceA global computer network providing a variety of information and communication...

COMPUTER TERMS 2014-11-10

COMPUTER TERMS crossword puzzle
Across
  1. Are external devices that extends the functionality of the PC
  2. Helps the computer do useful things
  3. integrate the entire company, or enterprise
  4. Covers the collection of details stored in database.
  5. The electrical channels through which various parts of the computer communicate
  6. are combinations of hardware, software, and other resources used to facilitate communications and enhance productivity
  7. Ensures that only unique values can be assigned in each row for that field(s)
  8. A type of transaction Processing Systems
  9. a type of Transaction Processing Systems
  10. Improve the relationship among citizen and government
  11. The main input device for most computers
  12. phase in which hardware, software and other components are acquired
  13. Device requests time from the processor using the interrupt request
  14. gather information about how work is done in the applications area and to ascertain what information users need
  15. Collection of elements and procedures that interact to accomplish a goal
  16. includes the use of computers to help manage manufacturing operations and to control machinery used in manufacturing processes
  17. systems development effort in which the user is primarily responsible for the development of the system
  18. It is sometimes called the Cathode Ray Tube
  19. A collection of people, hardware, software, data, and procedures that interact to generate information to support the users of an organization.
  20. Identification of specific markets to target them with advertising messages
  21. Structured Query Language
  22. uses information system (on-the-job decisions)
  23. Single Website that offers many products and services at one internet location
  24. The rows of such a table can be thought of as representing the records
  25. Data values for every column are stored in row
  26. Is the term used for all the physical components on a PC
Down
  1. A programmable electronic device that can store , retrieve, and process large amounts of data
  2. Has revolutionized the world of investment and finance
  3. make use of diagrams, tables and checklists
  4. is the theory and development of computer systems able to perform tasks that normally require human intelligence
  5. The brain of the computer
  6. They often approve broad plans for systems development within an organization
  7. Sends information over the line one bit at a time
  8. plan, build, and implement systems that make use of computers that a company has or will acquire
  9. allows designers to dramatically reduce the time they spend at the drafting board
  10. a type of Transaction Processing Systems
  11. Picture Elements
  12. An input device that allows you to move the cursor around the screen
  13. Electronic Retailing
  14. uses information system (decisions about short-term objectives)
  15. uses Information system (strategic decisions)
  16. Connection that allows you to attach everything from mice to printers
  17. uses Information system (tactical decisions)
  18. A small, high-speed memory area that is placed between the processor and the system memory
  19. Identifies the rows to be updated, selected and is composed of column names, expressions, constraints, sub-queries, and comparison operators
  20. the focus is on developing a small model, or prototype, of the overall system
  21. The main circuit board in the computer where everything comes together
  22. Enterprise resource planning
  23. Is a list of information that is not necessarily related to any other lists or tables
  24. Random Access Memory

50 Clues: Picture ElementsElectronic RetailingRandom Access MemoryThe brain of the computerStructured Query LanguageEnterprise resource planningHelps the computer do useful thingsa type of Transaction Processing SystemsA type of transaction Processing Systemsa type of Transaction Processing SystemsThe main input device for most computers...

11th Semester 1 Vocab Final 2023-01-09

11th Semester 1 Vocab Final crossword puzzle
Across
  1. Lax or careless in attending to duty
  2. Comradeship; lighthearted good will
  3. Extra; exceeding what is necessary; repetitive or needlessly wordy in expression
  4. To bring action against, in a court of law; to continue an activity until it is completed; to continue an activity until it is completed
  5. To escape from, usually by daring, cleverness, or skill; to escape the grapes or understanding of
  6. A new word, expression, or usage
  7. required or commanded by authority
  8. A principle or belief held by a person or an organization
  9. Having a tendency; inclined; likely to do or have something
  10. Using several languages; a person who speaks several languages
  11. Something enormous in size or power
  12. Exemption from punishment or injury
  13. The main, central, or critical point or feature
  14. Something false or empty that is presented a s genuine; a fake; not genuine; fake; to put on the false appearance of; to feign
  15. Difficult to understand
  16. Impressively great in size, force, or extent; extraordinary; marvelous
  17. Of or relating to the brain; appealing to or requiring the use of intellect; intellectual
  18. To add to; to increase the size, extent, or quantity of
  19. To banish or exclude from a group; to shun
  20. Lacking skill or judgment; incompetent; clumsy
  21. A regional dialect, especially a nonstandard one that has no written tradition
  22. Ineffective; feeble; useless; Careless and irresponsible
  23. A purifying or refreshing release of emotional tension, especially as an effect of tragic drama
  24. An original type, form, or instance that serves as a basis or standard for those that follow; ta test or trial model; an early typical example
  25. With regard and esteem; politely
Down
  1. A critical or explanatory note
  2. Dependent on begging for a living; a beggar
  3. Easily managed or controlled
  4. Moral disapproval
  5. To criticize sharply; strong criticism
  6. Hateful or mocking laughter; ridicule
  7. easily done or achieved with little effort or difficulty; working, acting, or speaking with effortless ease and fluency; arrived at without sufficient care or effort; superficial
  8. To think deeply about; to turn a matter over and over in one’s mind; to chew cud, or partially digested food
  9. To regain; to make up for
  10. marked by or attending to use sly deception; crafty; executed with or exhibiting ingenuity; skill in deception; skill or cleverness in execution or performance
  11. Absurd; contrary to nature, reason, or common sense
  12. A questions; an inquiry; to question, often with doubt
  13. To cancel or reverse an order or a policy
  14. Perhaps; possibly
  15. to make difficult to understand; to darken; to make dim or difficult to see:
  16. Capable of being shaped or formed, as by hammering or pressure; easily controlled or influenced
  17. Eating and drinking little or in moderation; restricted to bare necessities
  18. To take the first steps in a process; to begin something; to formally admit someone into an organization, a with ritual
  19. To strive to equal or excel, especially through imitation; to approach or achieve equality with; to compete with successfully
  20. Second from the last; next to lat
  21. To prevent from making progress; to frustrate or thwart efforts
  22. Superior strength, skill, courage, or daring
  23. The act of escaping or avoiding by cleverness or deceit
  24. To come together at the same point from different directions; to meet
  25. To urge with gentle, repeated appeals, teasing, or flattery; to wheedle

50 Clues: Moral disapprovalPerhaps; possiblyDifficult to understandTo regain; to make up forEasily managed or controlledA critical or explanatory noteA new word, expression, or usageWith regard and esteem; politelySecond from the last; next to latrequired or commanded by authorityComradeship; lighthearted good willSomething enormous in size or power...

WORDS 2020-05-10

WORDS crossword puzzle
Across
  1. text at the top of a page in an electronic document or hard copy.
  2. a computer file used to store electronic information or documents that you no longer need to use regularly
  3. a disc capable of storing a significant amount more data than a standard compact disc
  4. disc is any media read using a laser assembly
  5. disk is a disk of which both sides are used to store data.
  6. a data storage ring on a computer floppy diskette or hard drive that is capable of storing information.
  7. something that is logical and easy to pickup with little or no instruction.
  8. crash is a physical defect with a disk drive that causes the read/write heads to stop working
  9. a single item of data within a database
  10. a program that allows a user to interact computers in person or over a network.
  11. a design that defines the overall look of characters.
  12. new, improved, or fixed software, which replaces older versions of the same software.
  13. a style of font that slants the letters evenly to the right.
  14. time is the time taken for a hard disk controller to locate a specific piece of stored data.
  15. any text that is darkened to help emphasize a remark or comment.
  16. an optical disc format developed by thirteen consumer electronics and PC companies.
  17. a field or option used to locate information within a database or another location.
  18. a function or process of finding letters, words, files, web pages, or other data.
Down
  1. (information) is less important information than related things
  2. a small graphical representation of a program or file.
  3. the action of selecting an object or section of text and moving it, usually to drop in an alternate area.
  4. a row of boxes, often at the top of an application window, that control various functions of the software.
  5. is a term used to describe the process of quickly pressing a mouse button twice while keeping it still.
  6. a piece of computer equipment that you use for copying data from a computer onto a DVD.
  7. technology which provides two individual recordable layers on a single sided DVD disc
  8. the process of organizing data in a particular order allowing for information to be found easier.
  9. a circular magnetic plate that is used for storing data in a hard disk
  10. a program, script, or macro designed to cause damage, steal personal information, modify data, send e-mail, display messages, or some combination of these actions.
  11. a system of organization of icons on a screen
  12. heads are the small parts of a disk drive which move above the disk platter and transform the platter's magnetic field into electrical current (read the disk) or, vice versa, transform electrical current into magnetic field (write the disk)
  13. a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data
  14. an icon, graphic, or text that links to another file or object
  15. an area at the bottom of a document page that contains data common to other pages.
  16. an area in a computer's memory where files or programs are stored
  17. an object on a computer that stores data, information, settings, or commands used with a computer program.
  18. a large quantity of indexed digital information
  19. a software program that allows the user to create, manipulate, retrieve, and store information in a database.

37 Clues: a single item of data within a databasedisc is any media read using a laser assemblya system of organization of icons on a screena large quantity of indexed digital informationa design that defines the overall look of characters.a small graphical representation of a program or file.disk is a disk of which both sides are used to store data....

Mindtap 10-12 2021-06-08

Mindtap 10-12 crossword puzzle
Across
  1. a series of statements that instructs a program or app how to complete a task.
  2. designers of webpages.
  3. device that accepts the transmission of data, instructions, or information.
  4. a network that connects computers and devices in a limited geographical area such as a home, school, or office building.
  5. a working model of the proposed system’s essential functionality.
  6. infrared Data Association; standard for devices to transmit data wirelessly to each other via infrared (IR) light waves.
  7. materials or substances capable of carrying one or more communications signals.
  8. a listing of activities that modify the contents of the database.
  9. system an information system that captures and stores the knowledge of human experts and then imitates human reasoning and decision making.
  10. a network standard that specifies how two UWB devices use short-range radio waves to communicate at high speeds with each other.
  11. employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  12. large-scale data sets that require advanced technologies beyond the capabilities of typical database software, to gather, store, process, retrieve, or analyze.
Down
  1. Network in which one or more computers act as a server, and the other computers on the network request services from the server.
  2. a number, letter, punctuation mark, or other symbol that is represented by a single byte in the ASCII coding scheme.
  3. short for Long Term Evolution; a network standard that defines how high-speed cellular transmissions use broadcast radio to transmit data for mobile communications.
  4. network protocol that defines how messages (data) are routed from one end of a network to the other, ensuring the data arrives correctly. Short for Transmission Control Protocol/Internet Protocol.
  5. showing users exactly how they will use the new hardware and software in the system.
  6. employee who integrates and expands the company’s initiatives for mobile users.
  7. a network standard that specifies no central computer or device on the network (nodes) should control when data can be transmitted.
  8. a measure of how suitable the development of a system will be to the organization.
  9. Standard that specifies that computers and devices on the network share or pass a special signal, called a token, in a unidirectional manner and in a preset order.
  10. the process of comparing data with a set of rules or values to determine if the data meets certain criteria.
  11. a group of related fields.
  12. a combination of one or more related characters or bytes and is the smallest unit of data a user accesses.
  13. an object-oriented programming language developed by Sun Microsystems.
  14. a window on the screen that provides areas for entering or modifying data in a database.
  15. a request for specific data from a database.
  16. employee who designs the layout, navigation, and overall appearance of a website with a focus on user experience and specifies a website’s appearance using HTML5, JavaScript, CSS, media, and other web design technologies.
  17. a professional, typically hired based on technical expertise, who provides technology services to his or her clients.
  18. broadband Internet connection provided through the telephone network via a DSL modem. See also digital subscriber line

30 Clues: designers of webpages.a group of related fields.a request for specific data from a database.materials or substances capable of carrying one or more communications signals.device that accepts the transmission of data, instructions, or information....

Lexicon Crossword 2016-10-24

Lexicon Crossword crossword puzzle
Across
  1. capacity for producing a desired result or effect
  2. moved to or showing sudden annoyance
  3. counsel, advice, or caution
  4. the quality of being generous in forgiving an insult or injury; free from petty resentfulness or vindictiveness; high-minded; noble
  5. the language, especially the vocabulary, peculiar to a particular trade, profession, or group; unintelligible or meaningless talk or writing; gibberish
  6. the violation or profanation of anything sacred or held sacred; the stealing of anything consecrated to the service of God
  7. the state or quality of being frank, open, and sincere in speech or expression; candidness
  8. a small steep-sided watercourse or gulch with a nearly flat floor: usually dry except after heavy rains. (southwest U.S.)
  9. used to indicate an omission or suppression of letters or words
  10. watchful; being on one’s guard against danger
  11. exceptional or superior ability, skill, or strength; a valiant or daring deed
  12. lasting a very short time; short-lived; transitory
  13. serving to indicate or point out
  14. to give way to superior force; yield
  15. a set or system of names or terms, as those used in a particular science or art, by an individual or community, etc.
  16. the quality of being frivolous; ineffectiveness; uselessness
  17. to spread from person to person
  18. tending to overcome the distrust or hostility
  19. to make easier or less difficult
  20. the act of spreading widely
  21. gloomily or sullenly ill-humored, as a person or mood
  22. Construction- the voice which shows through in a piece from the author
  23. capable of burning, corroding, or destroying living tissue.
Down
  1. an inquiry from a writer to an editor of a magazine, newspaper, etc., regarding the acceptability of or interest in an idea for an article, news story, or the like: usually presented in the form of a letter that outlines or describes the projected piece
  2. the principle or practice of unselfish concern for or devotion to the welfare of others
  3. directly opposed or contrasted; opposite.
  4. absorbed in thought; meditative.
  5. to arrange in proper order; set out in an orderly manner; arrange clearly
  6. distrusting or disparaging the motives of othersDigressive- departing from the main subject
  7. Official approval; commendation or sanction
  8. proceeding by reasoning or argument rather than intuition.
  9. the quality or state of being distant, or reserved
  10. a roundabout or indirect way of speaking; the use of more words than necessary to express an idea.
  11. high ranking
  12. to scold; rebuke
  13. intellectual or aesthetic taste; mental appreciation
  14. a prolonged lamentation or mournful complaint.
  15. intended for instruction; instructive; teaching a moral lesson
  16. a simple past tense and past participle of work; elaborated; embellished
  17. a chief.
  18. not returned or reciprocated
  19. a philosophical movement or system having various forms, but generally stressing practical consequences as constituting the essential criterion in determining meaning, truth, or value
  20. Play- an allegorical form of the drama current from the 14th to 16th centuries and employing such personified abstractions as Virtue, Vice, Greed, Gluttony, etc.
  21. gloomy, depressing, or dismal
  22. to ascertain the number of
  23. calm, peaceful
  24. open to or having several possible meanings or interpretations
  25. a poem in such distichs or verses.
  26. to analyze in terms of grammar

49 Clues: a chief.high rankingcalm, peacefulto scold; rebuketo ascertain the number ofcounsel, advice, or cautionthe act of spreading widelynot returned or reciprocatedgloomy, depressing, or dismalto analyze in terms of grammarto spread from person to personabsorbed in thought; meditative.serving to indicate or point outto make easier or less difficult...

Chapters 1-5 & 7-14 & 16-19, 21-26 2018-11-05

Chapters 1-5 & 7-14 & 16-19, 21-26 crossword puzzle
Across
  1. Original description of a study prepared by the researcher who conducted it.
  2. The degree to which an instrument measures what it purports to measure.
  3. Achieved through accurate measuring tools, controls over confounding variables, and powerful statistical methods.
  4. Sampling to the point at which no new information is obtained and redundancy is achieved.
  5. The peak is off center and one tail is longer than the other.
  6. Confidence in the truth of the data and interpretations of them.
  7. Stability of data over time and conditons.
  8. Researchers view the text as a whole and try to capture its meanings.
  9. Rank evidence sources according to the strength of the evidence they provide.
  10. Seeks solutions to existing problems and tends to be of greater immediate utility of EBP.
  11. Method of integrating quantitative findings statistically.
  12. The process of selecting a portion of the population for a study.
  13. A code that is not possible
  14. Used to predict outcomes.
  15. The ability of a measure to detect change over time in a construct that has changed, commensurate with the amount of change that has occurred.
  16. ANOVA context, the variance is referred to as...
  17. Technique of asking participants to take photographs of themselves and then interpret them.
  18. Documents the extent to which the goals of the program are attained.
  19. Involves judgements about whether findings from an inquiry can be extrapolated to a different setting or group of people.
  20. Route respondents through different sets of questions depending on the responses.
  21. Focuses on the lived experiences of humans and is an approach to learning what the life experiences of people are like and what they mean.
  22. Distribution with two peaks.
  23. Reflect the ratio of two probabilities.
Down
  1. Relationship where the participants in the qualitative strand are a subset of the participants in the quantitative strand.
  2. Involves exposing the same people to more than one condition.
  3. Tendency of observers to be influenced by one characteristic in judging other, unrelated, characteristics.
  4. Influence that distorts study results.
  5. Focuses on story in studies in which purpose is to explore how people make sense of events in their lives.
  6. Refers to the accuracy and consistency of information obtained in a study.
  7. The extent to which the sample is similar to the population and avoids bias.
  8. Participants have adequate information about the research.
  9. Enhances the base of knowledge or to formulate or refine a theory.
  10. A design that emerges in the field as the study unfolds.
  11. Statement of predicted relationships between two or more variables.
  12. Observed result could reflect chance fluctuations.
  13. Risks no greater than those ordinarily encountered in daily life or during routine tests or procedures.
  14. Evaluations are the cornerstone.
  15. Characteristic or quality that takes on different values.
  16. Paradigm most often associated with Mixed Methods research.
  17. A system of classifying and organizing terms.
  18. A daily record of events and conversations in the field.
  19. Relationship or association between two variables.
  20. Specific query researchers want to answer in addressing the research problem.
  21. Careful appraisal of a study's strengths and weaknesses.
  22. Effects of Taking a pretest on people's performance on a posttest.
  23. A listing of each variable together with information about placement in the file, codes associated with the values values of the variable, and other basic information.

46 Clues: Used to predict outcomes.A code that is not possibleDistribution with two peaks.Evaluations are the cornerstone.Influence that distorts study results.Reflect the ratio of two probabilities.Stability of data over time and conditons.A system of classifying and organizing terms.ANOVA context, the variance is referred to as......

cybersecurity 2023-11-21

cybersecurity crossword puzzle
Across
  1. Attacco in cui molti sistemi compromessi vengono utilizzati per colpire un singolo sistema, causando un'interruzione del servizio
  2. Messaggi indesiderati, spesso di natura pubblicitaria, inviati in massa via email
  3. Persona che utilizza le proprie competenze informatiche per superare le barriere di sicurezza, spesso con scopi illegali
  4. Metodo di attacco che consiste nel provare tutte le possibili combinazioni di password per accedere a un sistema
  5. Tipo di malware che si replica automaticamente per diffondersi ad altri computer
  6. Injection Tecnica di attacco informatico che manipola le query SQL per accedere o manipolare database
  7. Tecnica di frode online che reindirizza gli utenti da un sito web legittimo a uno fraudolento
  8. Pratica di intercettazione e analisi di pacchetti di dati che passano attraverso una rete
  9. Sistema di sicurezza che monitora e controlla il traffico di rete in entrata e in uscita basandosi su regole predefinite
  10. Rete di computer infetti controllati da un attaccante, spesso utilizzati per lanciare attacchi su larga scala
  11. Manipolazione psicologica delle persone per indurle a rivelare informazioni confidenziali
  12. Debolezza in un sistema che può essere sfruttata da un attaccante
  13. Insieme di computer e altri dispositivi interconnessi che condividono risorse e scambiano dati
  14. Sequenza segreta di caratteri utilizzata per autenticare l'identità di un utente
  15. Protocollo di sicurezza che stabilisce un collegamento crittografato tra un server web e un browser
  16. Strumento utilizzato in attacchi di forza bruta per decifrare password, sfruttando una grande raccolta di hash precalcolati
  17. Day Vulnerabilità di sicurezza non ancora scoperta dal produttore del software o da esperti di sicurezza
  18. Pratica di proteggere sistemi, reti e programmi dagli attacchi digitali
  19. Tipo di malware che cripta i file della vittima e richiede un riscatto per la loro decrittazione
  20. Arte di scrivere o risolvere codici per proteggere informazioni, rendendole leggibili solo da chi possiede la chiave di decrittazione
Down
  1. Accesso segreto a un sistema o a dati che bypassa le normali procedure di autenticazione
  2. Tecnica di protezione delle comunicazioni attraverso l'uso di codici
  3. Funzione che converte un input (o 'messaggio') in una stringa di lunghezza fissa, tipicamente utilizzata per scopi di sicurezza.
  4. Tecnica di frode online per ingannare gli utenti al fine di ottenere dati personali o finanziari sensibili
  5. Tipo di malware che utilizza il modem di un computer per chiamare numeri telefonici a pagamento senza il consenso dell'utente
  6. Tipo di malware che si maschera da software legittimo per ingannare gli utenti affinché lo installino, consentendo l'accesso non autorizzato al sistema
  7. Software dannoso progettato per danneggiare, disturbare o ottenere l'accesso non autorizzato a sistemi informatici
  8. Tipo di spyware che registra le battiture sulla tastiera per rubare informazioni come password e dettagli bancari
  9. Software progettato per prevenire, rilevare e rimuovere malware
  10. Processo di verifica dell'identità di un utente o di un dispositivo
  11. Codice, dati o comandi che sfruttano una vulnerabilità in software o hardware
  12. Tipo di malware che raccoglie informazioni da un computer senza il consenso dell'utente
  13. Rete privata virtuale che estende una rete privata attraverso una rete pubblica, consentendo agli utenti di inviare e ricevere dati attraverso reti condivise o pubbliche come se i loro dispositivi di calcolo fossero direttamente connessi alla rete privata
  14. Atto ingannevole volto a ottenere un vantaggio personale o finanziario
  15. Componente aggiuntivo del browser che può fornire funzionalità aggiuntive ma può anche essere usato come spyware o malware
  16. Insieme di software che consente a un utente non autorizzato di ottenere il controllo di un sistema informatico senza essere rilevato
  17. Software che mostra automaticamente o scarica pubblicità sul dispositivo dell'utente
  18. Aggiornamento software rilasciato dai produttori per correggere bug o vulnerabilità

38 Clues: Software progettato per prevenire, rilevare e rimuovere malwareDebolezza in un sistema che può essere sfruttata da un attaccanteProcesso di verifica dell'identità di un utente o di un dispositivoTecnica di protezione delle comunicazioni attraverso l'uso di codiciAtto ingannevole volto a ottenere un vantaggio personale o finanziario...

made by matthew 2024-01-02

made by matthew crossword puzzle
Across
  1. A request for specific data from a database.
  2. Group of files waiting in the buffer to be printed
  3. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  4. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  5. An electrical disturbance that can degrade communications
  6. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  7. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  8. Technology-related health condition that affects eyesight. See also CVS
  9. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  10. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
Down
  1. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  2. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  3. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  4. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  5. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  6. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  7. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  8. Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  9. The number of horizontal and vertical pixels in a display device
  10. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  11. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  12. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  13. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  14. The time it takes a signal to travel from one location to another on a network.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printedAn electrical disturbance that can degrade communicationsThe number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVS...

made by kayson 2024-01-02

made by kayson crossword puzzle
Across
  1. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  2. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  3. Group of files waiting in the buffer to be printed.
  4. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  5. Technology-related health condition that affects eyesight. See also CVS
  6. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  7. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  8. A request for specific data from a database.
  9. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  10. The number of horizontal and vertical pixels in a display device
Down
  1. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  2. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  3. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  4. Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  5. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  6. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  7. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  8. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  9. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  10. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  11. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  12. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  13. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  14. The time it takes a signal to travel from one location to another on a network.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.The number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVSThe time it takes a signal to travel from one location to another on a network....

Made by kensley 2024-01-02

Made by kensley crossword puzzle
Across
  1. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  2. A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  3. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  4. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  5. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  6. The time it takes a signal to travel from one location to another on a network.
  7. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  8. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  9. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme
  10. An electrical disturbance that can degrade communications
Down
  1. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  2. Technology-related health condition that affects eyesight. See also CVS
  3. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  4. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  5. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  6. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  7. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  8. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  9. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer
  10. A request for specific data from a database.
  11. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  12. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  13. The number of horizontal and vertical pixels in a display device
  14. Group of files waiting in the buffer to be printed.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.An electrical disturbance that can degrade communicationsThe number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVS...

made by kyla 2024-01-02

made by kyla crossword puzzle
Across
  1. Disc Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser
  2. Defragmenter Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster
  3. Aggregation A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme
  4. Group of files waiting in the buffer to be printed
  5. Device Convergence The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require
  6. A cyberextortions is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  7. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
  8. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  9. radio frequency identification technology uses radio signals to communicate with a tag placed or attached to an object an animal or a person
  10. Scientist scientist employee who uses analytics and other big data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing
  11. computing Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies
  12. The number of horizontal and vertical pixels in display device
Down
  1. Vision Syndrome Technology-related health condition that affects eyesight. See also CVS
  2. A collection of data organized in a manner that allows access, retrieval, and use of that data
  3. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences
  4. The time it takes a signal to travel from one location to another on a network.
  5. cache cache that helps spend the processes of a computer by storing frequently used instructions and data
  6. processing unit The electronic component of a computer that interprets and carries out the basic instructions that operate a computer
  7. a request for specific data from database
  8. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  9. a magnetically coated ribbon of plastic that is capable of strong large amounts of data and i information at a low cost
  10. engineer Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  11. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  12. System is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.

24 Clues: a request for specific data from databaseGroup of files waiting in the buffer to be printedThe number of horizontal and vertical pixels in display deviceThe time it takes a signal to travel from one location to another on a network.Vision Syndrome Technology-related health condition that affects eyesight. See also CVS...

Made By James Broughton 2024-01-02

Made By James Broughton crossword puzzle
Across
  1. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  2. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  3. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  4. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  5. Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  6. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  7. Technology-related health condition that affects eyesight. See also CVS
  8. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  9. Group of files waiting in the buffer to be printed.
  10. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  11. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  12. The number of horizontal and vertical pixels in a display device
Down
  1. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  2. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  3. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  4. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  5. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  6. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  7. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  8. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  9. A request for specific data from a database.
  10. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  11. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  12. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  13. The time it takes a signal to travel from one location to another on a network.

25 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.The number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVSThe time it takes a signal to travel from one location to another on a network....

Made By Taylor 2024-01-03

Made By Taylor crossword puzzle
Across
  1. A request for specific data from a database.
  2. Group of files waiting in the buffer to be printed.
  3. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  4. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  5. An electrical disturbance that can degrade communications
  6. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  7. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  8. Technology-related health condition that affects eyesight. See also CVS
  9. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  10. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
Down
  1. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  2. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  3. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  4. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  5. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  6. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  7. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  8. A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  9. The number of horizontal and vertical pixels in a display device
  10. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  11. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  12. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  13. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  14. The time it takes a signal to travel from one location to another on a network.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.An electrical disturbance that can degrade communicationsThe number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVS...

made by tyler 2024-01-03

made by tyler crossword puzzle
Across
  1. A request for specific data from a database.
  2. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  3. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  4. Group of files waiting in the buffer to be printed.
  5. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  6. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  7. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  8. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  9. Technology-related health condition that affects eyesight. See also CVS
  10. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  11. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
Down
  1. Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  2. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  3. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  4. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  5. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  6. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  7. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  8. The number of horizontal and vertical pixels in a display device
  9. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  10. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  11. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  12. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  13. The time it takes a signal to travel from one location to another on a network.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.The number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVSThe time it takes a signal to travel from one location to another on a network....

GEO310 Intro 2025-09-03

GEO310 Intro crossword puzzle
Across
  1. The smallest individual unit of a raster image. Each _____ holds a value that represents a specific attribute of the area it covers.
  2. Data: A type of qualitative data that categorizes information without a natural order or rank. Examples include country names or land cover types.
  3. Unit: A spatial unit used for data collection, storage, and presentation. Common examples include census tracts, counties, or zip code areas.
  4. A data model that represents geographic data as a grid of cells or pixels. Each pixel has a value representing a specific attribute, such as elevation, temperature, or land cover. This type of data is well-suited for continuous phenomena like imagery and elevation models.
  5. Map: A map that focuses on a specific theme or subject, such as population density, climate, or income levels.
  6. Line: A line that encloses the map's content. It helps to define the overall map area and separate it from marginal information.
  7. The heading of the map, which provides a concise description of its content, purpose, and sometimes location.
  8. Additional text below the title that provides more specific information about the map's content (often the location but with smaller font that the heading of the map).
  9. A smaller map within a larger map that shows a specific area in greater detail or a remote location relative to the main map.
  10. Autocorrelation: The principle that objects or attributes closer to each other in space are more related than objects farther apart.
  11. A key that explains the symbols, colors, and patterns used on a map. It is essential for interpreting the map's features.
  12. Line: The outermost line that delineates the map's entire content, including the map body, legend, title, and other elements.
Down
  1. A data model that represents geographic features as points, lines, and polygons. This type of data is ideal for discrete features like roads, rivers, and property boundaries.
  2. Data: Data that describes qualities or characteristics that cannot be measured numerically, such as land use type or vegetation class. It is often represented by distinct different colors or patterns on a map.
  3. A cartographic element, usually a north arrow or graticules, that helps a user orient the map.
  4. Class: A homogeneous collection of common features, each having the same spatial representation (point, line, or polygon) and set of attributes. It is a fundamental data structure within a geodatabase.
  5. Data: A type of data that categorizes information with a specific, meaningful order or rank. Examples include levels of pollution (low, medium, high) or highway classifications (interstate, state route).
  6. A container used to store, manage, and query geographic datasets. It can hold a variety of data types, including feature classes, raster datasets, and tables.
  7. Resolution: The ground area represented by a single cell in a raster image.
  8. Mapping Unit: The smallest size of a feature that is important enough to be distinguished in a particular feature class. Any feature smaller than the ________ mapping unit may be excluded or merged with larger features.
  9. The ratio or relationship between a distance or area on a map and the corresponding distance or area on the ground. It can be expressed as a representative fraction (e.g., 1:24,000) or a graphic.
  10. A non-topological, vector-based data storage format for storing the location, shape, and attributes of geographic features. It is one of the most common file formats for geospatial data.

22 Clues: Resolution: The ground area represented by a single cell in a raster image.A cartographic element, usually a north arrow or graticules, that helps a user orient the map.The heading of the map, which provides a concise description of its content, purpose, and sometimes location....

Maurice Book Five! 2025-11-17

Maurice Book Five! crossword puzzle
Across
  1. The high-fashion charitable event where Maurice has to coordinate ensembles with the reality TV family.
  2. The opulent, recently installed fixture on the desk of a major political figure.
  3. The surprising location where the forgotten passkey was eventually recovered.
  4. The singing songwriter responsible for maintaining the freshness of Maurice’s chocolate supply.
  5. The persuasive tactic Maurice intends to use in lieu of actual qualifications.
  6. "Let’s go get some ice cream and watch _____," a common digital distraction.
  7. The language education application Maurice uses for his daily learning streak.
  8. Maurice’s highly offensive, racially charged video game invention.
  9. The famous song-and-dance man hired as the main entertainment for Maurice’s dinner parties.
  10. The transparently aggressive game currently being programmed by Maurice.
  11. The exaggerated duration Maurice reserves for his midday meal.
  12. The postal worker who drew his own firearm on the gun-toting beaver.
  13. The organizational software Tony suggests for credentials, which Maurice perpetually skips.
  14. The demeaning title Maurice embodies before receiving a sharp corrective from his butler, Jeeves.
  15. The crucial, misplaced item preventing Maurice from accessing his immense digital wealth.
  16. Maurice’s dismissive retort upon being told he needs to prepare a CV.
  17. The eccentric character who makes a brief appearance in the landmark Maurice #900.
  18. The name of the politician's female employee.
  19. The fleeting, seasonal sandwich that motivated Maurice to build an indoor McDonalds.
  20. The classic, subcompact automobile Maurice decides to park in his living room.
  21. The NBA star whose poster adorns the wall in strip #879.
  22. "People who talk on their phones in public are killing _____...," according to Maurice
  23. The location-based, monster-catching game that is definitely NOT a clone of a popular app.
  24. The fabled, colder northern nation often referred to as "The Promised Land".
  25. Randall P. Girdner's preferred characters from RealFunghi Comics.
Down
  1. Maurice's staggering net worth after cashing out his cryptocurrency haul.
  2. The heavily tattooed rap-rock artist who is the latest recruit to the X-Men.
  3. The unfortunate medical incident a certain politician suffers while using the aforementioned golden fixture.
  4. The delayed fun of a tech mogul after a call with a politician.
  5. The famous plumber Maurice was legally barred from using in his video game development plans!
  6. The ironic, aspirational acronym for Designated Organization Underwriting Charity and Helping Elevate a Better And Greater Society.
  7. The blockbuster superhero film Maurice intends to redo, with help from Randall P. Girdner.
  8. Maurice’s lavish real estate acquisition made possible by his new fortune.
  9. Maurice’s trouser-free homage to the famously temperamental Disney duck.
  10. A decentralized digital currency inspired by a certain financially savvy beaver.
  11. The caloric coping mechanism Maurice employs to handle election anxiety.
  12. The one academic milestone Maurice conspicuously failed to complete in high school.
  13. The single greatest reason to subscribe to the expensive Sunday Comix newsletter.
  14. The billionaire's eternal, existential query.
  15. The fast-food chain where Maurice claims, “...hit that kid…”
  16. The cursed, wish-granting artifact responsible for a certain figure's success.
  17. The necessary follow-up action after delivering a blow to a bigot.
  18. The Korean musical artist and member of Maurice’s ever-growing entourage.

43 Clues: The billionaire's eternal, existential query.The name of the politician's female employee.The NBA star whose poster adorns the wall in strip #879.The fast-food chain where Maurice claims, “...hit that kid…”The exaggerated duration Maurice reserves for his midday meal.The delayed fun of a tech mogul after a call with a politician....

Crossword - CompLec 2014-11-09

Crossword - CompLec crossword puzzle
Across
  1. Device requests time from the processor using the interrupt request
  2. uses Information system (tactical decisions)
  3. the focus is on developing a small model, or prototype, of the overall system
  4. Helps the computer do useful things
  5. A small, high-speed memory area that is placed between the processor and the system memory
  6. The main circuit board in the computer where everything comes together
  7. allows designers to dramatically reduce the time they spend at the drafting board
  8. uses Information system (strategic decisions)
  9. integrate the entire company, or enterprise
  10. is the theory and development of computer systems able to perform tasks that normally require human intelligence
  11. systems development effort in which the user is primarily responsible for the development of the system
  12. An input device that allows you to move the cursor around the screen
  13. uses information system (decisions about short-term objectives)
  14. Identification of specific markets to target them with advertising messages
  15. phase in which hardware, software and other components are acquired
  16. A type of transaction Processing Systems
  17. It is sometimes called the Cathode Ray Tube
  18. uses information system (on-the-job decisions)
  19. make use of diagrams, tables and checklists
  20. a type of Transaction Processing Systems
  21. are combinations of hardware, software, and other resources used to facilitate communications and enhance productivity
Down
  1. A programmable electronic device that can store , retrieve, and process large amounts of data
  2. Collection of elements and procedures that interact to accomplish a goal
  3. The brain of the computer
  4. Sends information over the line one bit at a time
  5. Covers the collection of details stored in database.
  6. a type of Transaction Processing Systems
  7. The electrical channels through which various parts of the computer communicate
  8. The rows of such a table can be thought of as representing the records
  9. includes the use of computers to help manage manufacturing operations and to control machinery used in manufacturing processes
  10. Structured Query Language
  11. Improve the relationship among citizen and government
  12. Single Website that offers many products and services at one internet location
  13. A collection of people, hardware, software, data, and procedures that interact to generate information to support the users of an organization.
  14. They often approve broad plans for systems development within an organization
  15. gather information about how work is done in the applications area and to ascertain what information users need
  16. Are external devices that extends the functionality of the PC
  17. Picture Elements
  18. Is a list of information that is not necessarily related to any other lists or tables
  19. Ensures that only unique values can be assigned in each row for that field(s)
  20. plan, build, and implement systems that make use of computers that a company has or will acquire
  21. Has revolutionized the world of investment and finance
  22. Enterprise resource planning
  23. Is the term used for all the physical components on a PC
  24. Identifies the rows to be updated, selected and is composed of column names, expressions, constraints, sub-queries, and comparison operators
  25. Electronic Retailing
  26. Data values for every column are stored in row
  27. The main input device for most computers
  28. Random Access Memory
  29. Connection that allows you to attach everything from mice to printers

50 Clues: Picture ElementsElectronic RetailingRandom Access MemoryThe brain of the computerStructured Query LanguageEnterprise resource planningHelps the computer do useful thingsa type of Transaction Processing SystemsA type of transaction Processing SystemsThe main input device for most computersa type of Transaction Processing Systems...

COMPUTER TERMS 2022-02-07

COMPUTER TERMS crossword puzzle
Across
  1. To move data or to transfer it to or from a computer along a line such as a telephone line, a radio link, or a computer network.
  2. An output hardware device that connects to a computer to generate sound. The signal used to produce the sound that comes from a computer speaker is created by the computer's sound card
  3. A unit of computer information consisting of 1,024 megabytes: GB can be a synonym e or can refer to 1,000,000,000 bytes
  4. A small hardware input device used by hand. It controls the movement of the cursor on the computer screen and allows users to move and select
  5. A set of characters (letters and/or numbers) that identifies a user (such as on a computer system, website, or social media platform
  6. A picture which usually stands for a computer program, computer file, folder, or an action for a program to do. Icons are usually small pictures
  7. A font is a graphical representation of text that may include a different typeface, point size, weight, color, or design.
  8. DRIVE The part of the computer that stores all your data. It houses the hard disk, where all your files and folders are physically located.
  9. Messages distributed by electronic means from one computer user to one or more recipients via a network.
  10. An application used to access and view websites. Common web browsers include Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, and Apple Safari.
  11. A computer program that can copy itself and infect a computer without permission or knowledge of the user. It might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk
  12. To transfer (something, such as data or files) from a computer or other digital device to the memory of another device (such as a larger or remote computer) especially via the Internet.
Down
  1. A program with a set of instructions and documentation that tells a computer what to do or how to perform a task.
  2. A global computer network providing a variety of information and communication
  3. A string of characters that allows access to a computer system or service
  4. A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
  5. A computer display , the screen is the physical surface on which visual information is presented. This surface is usually made of glass.
  6. An electronic device or hardware that accepts text files or images from a computer and transfers them to a medium such as paper
  7. an electronic device with a screen used for display (as of television pictures or computer information)
  8. A panel of keys that operate a computer
  9. The virtual location for applications, documents, data or other sub-folders. Folders help in storing and organizing files and data in the computer.
  10. The common storage unit in a computer, and all programs and data are "written" into a file and "read" from a file.
  11. To move text or graphics up or down or across a display screen
  12. Websites such as Google are made for this, otherwise known as a query, is an entry into a search engine that provide the answers to a question or prompt

24 Clues: A panel of keys that operate a computerTo move text or graphics up or down or across a display screenA string of characters that allows access to a computer system or serviceA global computer network providing a variety of information and communication...

Wightman GIS Day 2022 2022-11-11

Wightman GIS Day 2022 crossword puzzle
Across
  1. one of the two main data categories in GIS. This data is made up of individual items with discrete values.
  2. one of the two main data categories in GIS. This data is made up of a collage of “cells” to represent data.
  3. Wightman’s GIS Analyst, likely to be found in the garden during summer months.
  4. Type of view in ArcGIS Pro where you create deliverables for your project.
  5. Information associated with an individual feature. This information is stored in a spreadsheet and is connected to the associated feature class.
  6. One of Wightman’s GIS Technicians, ask this one about pigeons and thrifting.
  7. The biggest name in GIS, Wightman is a partner company with this organization responsible for the ArcGIS suite of products.
  8. Common storage file type that stores location, attribute, and shape of features for ONE layer.
  9. Each individual unit of data in GIS. Each above ground marker, pipe segment, or parcel would be examples of this.
  10. A map layer that operates in the background of your data like what you would see in Google maps. Updates automatically to your location as you pan around your screen.
  11. A logic statement used to display features based on specified attributes in GIS.
  12. The practice of creating representations of a map’s data using small pictures, colors, and shapes, among other things.
  13. One of the three types of vector data in GIS representing a single feature that doesn’t have length or area in GIS.
  14. Information pertaining to the origination and authoring of GIS data that contains information about it (such as how it was collected, formatting, use, etc).
Down
  1. Items that make up the contents or focus of a map.
  2. This is used to display features on the earth (a three-dimensional object) onto a two-dimensional plane (map). Each one has its benefits and its deficiencies in mapping.
  3. Type of view in ArcGIS Pro where you edit data in your project.
  4. A collection of geographic datasets of various types. Each dataset is compromised of feature classes, raster datasets, and tables to organize and display the data
  5. Operational data layer stored in ArcGIS Online. This data layer allows for the creation and editing of features in GIS. Allows for storing photos or file attachments.
  6. ArcGIS Online, abbreviated.
  7. Wightman’s GIS Practice Area Leader, likely to be found on the links if it’s nice enough.
  8. One of the three types of vector data in GIS representing a single feature that has length but does NOT have area.
  9. The real-world distance represented by distance on a map. This is displayed using a scale bar, a ratio, or even just verbally.
  10. The file extension for a project created and edited in ArcGIS Pro.
  11. Feature ____: Collection of related feature classes that share a common coordinate system. These are used to integrate related feature classes spatially or thematically.
  12. The “S” in GIS.
  13. One of the three types of vector data in GIS representing a single feature that contains a full area measurement.
  14. A box on a map used to show what the symbols on the map correspond to.
  15. Wightman’s coolest GIS Technician (I typed the clues), basketball and video games fill this one’s life.

29 Clues: The “S” in GIS.ArcGIS Online, abbreviated.Items that make up the contents or focus of a map.Type of view in ArcGIS Pro where you edit data in your project.The file extension for a project created and edited in ArcGIS Pro.A box on a map used to show what the symbols on the map correspond to....

Bizit-Synergynest 2021-03-31

Bizit-Synergynest crossword puzzle
Across
  1. ________is an open source software framework for fast batch data processing across parallel servers.
  2. Analytics 1.0 is the era of ____________. (Note: use the 5th letter to open the first password protected file).
  3. __________Analytics is one of the approach used to filter the outlying information and analyze only the required data.
  4. Analytics 2.0 is the era of _____.
  5. By employing the mobile phone data a good dataset would contain “ _______rates” and “recording periods” that can be used for estimating the origin-destination matrix. .( Note: use the 2nd letter to open the first password protected file).
  6. What type of problem does sports team encounter mostly?
  7. The demand for the travel can be estimated using ______________data.
  8. In this article which is the technology that is compared to make analytics accessible?
  9. What is the important use of this analytics in terms of reducing costs?(Note: use the 6th letter to open the first password protected file).
  10. Analytics 2.0 is the era of __________
  11. Analytics 3.0 is the era of _____________ offerings.
  12. ____________ Analysis combines the quantitative and qualitative matrix to aid the decision-making process.
  13. ____________ signal can serve as an early warning system for budding problems. However, they are indicative, not confirmatory.
  14. Intelligent Transportation Systems enables the connection among people, vehicles,______________, and services.
  15. The next-generation quantitative analysts were called __________, as they possessed both computational and analytical skills. (Note: use the 6th letter to open the first password protected file).
Down
  1. _________ Methods were used to rapidly generate models from the fast-moving data.(Note: use the 7th letter to open the first password protected file).
  2. Technology and -------------- are the important helps organizations to use data and analytics to the core.(Note: use the 6th letter to open the first password protected file).
  3. What is the most effective thing in making a common language?
  4. Who are exposed to the lab work to work along with bio mechanists to solve problem?
  5. ______________Data is the one that possess challenges in data collection and cleaning due to its vast information.
  6. If the source is a Surveillance video which is the analytical approach that is used to estimate the traffic count and violation.
  7. ___________Information are collected from the social signals that are generated by the public transportation systems. (Note: use the 14th letter to open the first password protected file).
  8. Apart from managers and sports scientists who is important in learning a common language?
  9. What was mainly monitored by the Kraft group to engage customers?( Note: use the 6th letter to open the first password protected file).
  10. Data management have expanded considerably, and almost every organization will end up with a _____________ environment .
  11. To deal with relatively unstructured data, companies turned to a new class of databases known as__________ . (Note: use the 1st letter to open the first password protected file).
  12. How many variety of questions are put forth by Gelman to drive decisions?(Note: use the 4th letter to open the first password protected file).
  13. _________Is an instance of crowd sourcing mechanism that eliminates the need for paid individuals for collecting the geographic information .
  14. _________ was the era of the enterprise data warehouse, used to capture information, and of business intelligence software, used to query and report it.
  15. ________________ Information are extracted from social networking sites using NLP . (Note: use the 6th letter to open the first password protected file).
  16. To improve the prediction accuracy _______________ approach is used to combine all the social transportation data.( Note: use the 10th letter to open the first password protected file).

31 Clues: Analytics 2.0 is the era of _____.Analytics 2.0 is the era of __________Analytics 3.0 is the era of _____________ offerings.What type of problem does sports team encounter mostly?What is the most effective thing in making a common language?The demand for the travel can be estimated using ______________data....

Made By Brice 2024-01-02

Made By Brice crossword puzzle
Across
  1. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  2. Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  3. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  4. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  5. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  6. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  7. Group of files waiting in the buffer to be printed.
  8. The number of horizontal and vertical pixels in a display device
  9. Scientist Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  10. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  11. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  12. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
Down
  1. Technology-related health condition that affects eyesight. See also CVS
  2. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  3. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  4. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  5. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  6. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  7. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  8. A request for specific data from a database.
  9. The time it takes a signal to travel from one location to another on a network.
  10. cache Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  11. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  12. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.The number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVSThe time it takes a signal to travel from one location to another on a network....

Made by Madelyn 2024-01-02

Made by Madelyn crossword puzzle
Across
  1. - A collection of data organized in a manner that allows access, retrieval, and use of that data
  2. - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  3. - An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  4. - A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  5. - The time it takes a signal to travel from one location to another on a network
  6. - An electrical disturbance that can degrade communications
  7. - A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  8. - Technology-related health condition that affects eyesight. See also CVS
  9. - A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  10. - Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  11. - Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  12. - Group of files waiting in the buffer to be printed.
Down
  1. - The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  2. - The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  3. - is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  4. - A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  5. - Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  6. - Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing
  7. - Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  8. - Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  9. - The number of horizontal and vertical pixels in a display device
  10. - A request for specific data from a database
  11. - Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  12. - A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.

24 Clues: - A request for specific data from a database- Group of files waiting in the buffer to be printed.- An electrical disturbance that can degrade communications- The number of horizontal and vertical pixels in a display device- Technology-related health condition that affects eyesight. See also CVS...

Made by Madison 2024-01-02

Made by Madison crossword puzzle
Across
  1. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  2. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  3. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  4. The time it takes a signal to travel from one location to another on a network.
  5. Technology-related health condition that affects eyesight. See also CVS
  6. Group of files waiting in the buffer to be printed.
  7. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  8. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  9. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  10. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  11. A request for specific data from a database.
Down
  1. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  2. A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  3. the number of horizontal and vertical pixels in a display device
  4. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  5. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  6. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  7. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  8. someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  9. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  10. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  11. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  12. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  13. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.the number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVSThe time it takes a signal to travel from one location to another on a network....

Made by Ethan 2024-01-02

Made by Ethan crossword puzzle
Across
  1. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  2. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  3. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  4. Technology-related health condition that affects eyesight. See also CVS
  5. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  6. The time it takes a signal to travel from one location to another on a network.
  7. An electrical disturbance that can degrade communications
  8. Group of files waiting in the buffer to be printed.
  9. A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  10. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  11. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  12. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  13. The number of horizontal and vertical pixels in a display device
  14. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  15. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
Down
  1. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  2. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  3. A request for specific data from a database.
  4. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  5. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  6. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  7. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  8. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  9. A collection of data organized in a manner that allows access, retrieval, and use of that data.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.An electrical disturbance that can degrade communicationsThe number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVS...

made by gabe 2024-01-03

made by gabe crossword puzzle
Across
  1. A request for specific data from a database.
  2. technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  3. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  4. Scientist Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  5. The number of horizontal and vertical pixels in a display device
  6. engineer Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  7. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  8. Group of files waiting in the buffer to be printed.
  9. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  10. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  11. Device Convergence The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
Down
  1. cache Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  2. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  3. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money
  4. The time it takes a signal to travel from one location to another on a network
  5. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  6. computing Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  7. Disc Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  8. Vision Syndrome Technology-related health condition that affects eyesight. See also CVS
  9. Aggregation A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  10. System is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  11. Defragmenter Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  12. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  13. processing unit The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.The number of horizontal and vertical pixels in a display deviceThe time it takes a signal to travel from one location to another on a networkVision Syndrome Technology-related health condition that affects eyesight. See also CVS...

Made By Riley 2024-01-03

Made By Riley crossword puzzle
Across
  1. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  2. engineer Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  3. cache Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  4. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  5. Group of files waiting in the buffer to be printed.
  6. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  7. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  8. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  9. The number of horizontal and vertical pixels in a display device
Down
  1. Syndrome Technology-related health condition that affects eyesight. See also CVS
  2. processing unit The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  3. The time it takes a signal to travel from one location to another on a network.
  4. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  5. Scientist Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  6. computing Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  7. Aggregation A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  8. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  9. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  10. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  11. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  12. Disc Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  13. A request for specific data from a database.
  14. A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  15. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.The number of horizontal and vertical pixels in a display deviceThe time it takes a signal to travel from one location to another on a network.Syndrome Technology-related health condition that affects eyesight. See also CVS...

Shofiyah hafshoh / XI-BDP 1 2024-02-20

Shofiyah hafshoh / XI-BDP 1 crossword puzzle
Across
  1. bagian dari customer review yang menggunakan bentuk simbol bintang dalam mengekspresikan pendapat dari pelanggan adalah istilah dari
  2. apa istilah untuk perjanjian dimana pelanggan menyetujui sebelum menggunakan layanannya
  3. istilah yang ditujukan untuk pemilik apa di marketplace atau e-commerce adalah
  4. Suatu ruang informasi yang dipakai oleh pengenal global yang disebut mengidentifikasi sumber program untuk mengatasi sumber daya alam adalah
  5. optimisasi mesin pencari yang bertujuan untuk meningkatkan volume dan kualitas grafik kunjungan melalui mesin pencari menuju situs web tertentu dengan memanfaatkan mekanisme kerja atau algoritma mesin pencari tersebut adalah istilah dari
  6. singkatan dari search engine result pages adalah
  7. Disebut apakah aktivitas yang melibatkan Dua pihak atau lebih untuk mempertukarkan sesuatu milik yang satu dengan sesuatu yang lain atau milik pihak lain
  8. istilah dalam dunia bisnis online yang biasanya akan muncul pada penjual online atau seller yang menjual barang bekas dengan minim kerusakan
  9. nama search engine pertama sebelum lahirnya google yang diciptakan oleh Larry Page dan Sergey Brin adalah
  10. Link yang berperan penting dalam meningkatkan ranking di mesin pencari dan mengarahkan traffic organik ke suatu website adalah istilah dari
  11. halaman informasi yang disediakan melalui jalur internet sehingga bisa diakses diseluruh dunia selama terkoneksi dengan jaringan internet, merupakan pengertian dari
  12. Disebut apakah proses tawar-menawar yang dilakukan oleh pembeli dan penjual untuk mendapat kesepakatan harga
  13. bisnis yang dilakukan melalui sistem komputer daring interaktif yang menghubungkan konsumen dan penjual secara elektronik.
  14. selisih antara harga jual dan harga beli produk disebut
  15. istilah apa yang digunakan untuk menjual barang yang sudah pernah dipakai
  16. apa istilah untuk jasa yang ditawarkan oleh produsen kepada konsumennya setelah transaksi penjualan dilakukan sebagai jaminan mutu untuk produk yang ditawarkannya.
Down
  1. media promosi yang dicetak dengan print digtal yang umumnya berbentul potrait atau vertikal adalah
  2. Apa istilah dari proses untuk mengakses komputer dengan memasukkan identifikasi dari akun pengguna dan kata sandi guna mendapatkan hak akses menggunakan sumber daya komputer tujuan
  3. istilah untuk proses penyampaian barang atau jasa dari produsen ke konsumen dan para pemakai adalah
  4. daftar yang terurut yang berisi informasi tertentu tentang benda atau barang yang didaftar adalah pengertian dari
  5. microblog adalah istilah untuk
  6. Apa istilah untuk proses mengirimkan dan memindahkan data dari perangkat lokal seperti komputer atau ponsel cerdas ke server atau platform media sosial yang akan menyimpan dan mengelola konten tersebut
  7. istilah untuk produk yang sudah tidak dijual lagi
  8. Disebut apakah seseorang yang memiliki kemampuan menggerakkan orang lain dalam jumlah banyak untuk melakukan suatu tindakan tertentu dan tidak terbatas dalam ruang dan waktu
  9. Disebut apakah pihak yang memiliki kepentingan dalam perusahaan dan dapat mempengaruhi atau dipengaruhi oleh bisnis
  10. proses yang biasa dilakukan pelanggan saat mendapat produk yang tidak sesuai sehingga ingin mengembalikan produk ke penjual disebut apa
  11. disebut apakah pertukaran atau jual beli mata uang
  12. istilah dari deretan angka biner angka 32 bit sampai 128 bit yang dipakai sebagai alamat identifikasi untuk tiap komputer host dalam jaringan internet adalah
  13. nama unik yang diberikan untuk mengidentifikasi nama server komputer seperti web server atau email server dijaringan komputer ataupun internet adalah
  14. biaya yang dikeluarkan oleh penjual saat mengirimkan paket kepada pembeli adalah
  15. perangkat lunak yang berfungsi menampilkan dan melakukan interaksi dengan dokumen-dokumen yang disediakan oleh server adalah
  16. istilah yang digunakan dalam konteks mesin pencari dan merujuk pada kata kunci atau frasa yang dimasukkan oleh pengguna untuk mencari informasi di internet adalah
  17. Disebut apakah bentuk usaha berjualan barang secara online tanpa perlu menyimpan stok barang tersebut

33 Clues: microblog adalah istilah untuksingkatan dari search engine result pages adalahistilah untuk produk yang sudah tidak dijual lagidisebut apakah pertukaran atau jual beli mata uangselisih antara harga jual dan harga beli produk disebutistilah apa yang digunakan untuk menjual barang yang sudah pernah dipakai...

KROSSFIRE - MEGA HR KONCALVE 2020-08-21

KROSSFIRE - MEGA HR KONCALVE crossword puzzle
Across
  1. Father won the Nobel Prize for the discovery of the mechanism of replication. Two sons also won the Nobel prize - one for transcription mechanism and one for discovering the enzymes related to his father’s discovery, name the family
  2. A database that gives you information about both the victim, suspect and the murderer
  3. What does your sick CSF, the famous sitcom ‘How I met your Mother’ and Coldplay have in common along with a physiological condition causing your brain to swell?
  4. I intercalate between the planar bases of the DNA and provide visibility beyond the visible light range only
  5. An antioxidant concoction of sugar, black tea and yeast
  6. An artificially designed injectable analogue that reduces the symptoms of polyuria and protects from retinopathy due to a particular disorder without giving you an allergic response
  7. I am a common lab equipment who helped Kary to come up with the idea of PCR
  8. This term is often associated with atomic bombs and could define the phenomena of collision between an electron and positron producing two photons
  9. I can protect you from shocks and also regulate the acidity
  10. Teenagers could be pretty perturbed about these bumps as they think that could make them look ugly
  11. It is home to microbes which gives them the ambience to propagate
  12. It uses hashing algorithms and helps us to find short common patterns in query and database sequences, joining them into an alignment
  13. Equipment that functions by using a force that pushes everything away from its centre
  14. A collective term for various symptoms of cognitive impairment
  15. I am the wallpaper of the pear but I do ensure you your progeny
  16. Localised area of necrosis due to blockage in vascular supply
  17. A medically certified product used to break down blockages and improve survival rates
  18. What metal will you eat if you love green leafy vegetables?
Down
  1. An academic term
  2. You could pop me as a pellet or I could course through your blood, but I surely shall provide you relief
  3. CRISPR Cas 13a associated diagnostic tool which is named after the famous British detective
  4. Self funding a business project is termed as
  5. These proteins or glycoproteinaceous structures act as the social hub of our cells
  6. FDA approved method for detecting COVID-19 virus in patients
  7. A passive form of this was legalized in India on 7th march, 2011, only for patients in a “permanent vegetative state”
  8. The solution to the pandemic might be this, as it has been to diseases like polio and smallpox
  9. I come from your plasma to enter your sarcomeres and curb your negativities and save you from the positive force
  10. I sweep across the nasopharynx and then by the oropharynx to make you positive in this pandemic
  11. I trigger you while you sip your wine as well as when you do pilates, how odd! Who could I be?
  12. It is a set of research ethics which was named after a very famous trial. This particular trial was held to investigate a state-sponsored persecution which has been documented multiple times in international televisions
  13. Military system of the liver
  14. This drug could be administered to treat SHOX deletions/ mutations
  15. When we play with numbers and identify their relations which branch of science are we studying?
  16. SARS-Cov-2 belongs to this genus
  17. I help you strain out all your toxicity using diffusion and convection as the principle behind my equipment

35 Clues: An academic termMilitary system of the liverSARS-Cov-2 belongs to this genusSelf funding a business project is termed asAn antioxidant concoction of sugar, black tea and yeastI can protect you from shocks and also regulate the acidityWhat metal will you eat if you love green leafy vegetables?...

AP COMPUTER PRINCIPLES 2018-09-06

AP COMPUTER PRINCIPLES crossword puzzle
Across
  1. provides information about a certain item's content.
  2. the virtual world of computers.
  3. a temporary network connection created for a specific purpose.
  4. consists of multiple devices that communicate with one another.
  5. a central file storage location.
  6. information stored using a series of ones and zeros.
  7. refers to the process of receiving data over the Internet.
  8. the location where data that is being used come from.
  9. a namespace that organizes a set of related classes and interfaces.
  10. information processed or stored by a computer.
  11. An acronym occasionally used to reflect an advancement in transmission or transfer speed.
  12. commonly used to describe the resolution of digital cameras.
  13. often used to measure the size of large files.
  14. reduces a file's size with no loss of quality.
  15. a set of instructions designed to perform a specific task.
  16. allow users to be part of a virtual community.
  17. the process of generating a final digital product from a specific type of input.
  18. refers to an electricalsignal that is converted into a pattern of bits.
  19. applications and services offered over the Internet.
  20. a small chip that resides in computers and other electronic devices.
  21. any letter, number, space, punctuation mark, or symbol that can be typed on a computer.
Down
  1. a data organization, management and storage format that enables efficient access.
  2. usernames or IP addresses, that are denied access to a certain system or protocol.
  3. another word for question.
  4. a type of data and information mining process where data is searched, gathered. datamining he process of analyzing large amounts of data in order to discover patterns.
  5. a unique address that identifies a device on the Internet or a local network.
  6. a system used to track objects, people, or animals using tags that respond to radio waves.
  7. a list of items that are granted access to a certain system or protocol.
  8. a technology that recognizes text within a digital image.
  9. a repository that houses computing facilities like servers, routers, switches and firewalls.
  10. refers to a central place where data is stored and maintained.
  11. digital telecommunications network which allows nodes to share resources.
  12. the science of protecting information by transforming it into a secure format.
  13. term used to describe unsightly debris that accrues as the result of the experience of digital living.
  14. a programming language designed for the visual arts community.
  15. the ownership of intangible and non-physical goods.
  16. is a dot matrix data structure that represents a generally rectangular grid of pixel
  17. The translation of data into a secret code.
  18. small little dots which make up up images on a display
  19. a device that reads and/or writes data to a disk.
  20. representations of economic, engineering, manufacturing, social, and other types of situations
  21. processor speeds, or overall processing power for computers will double every two years.
  22. continuous transmission of information
  23. provides a standard way to represent characters using numeric codes.
  24. a file containing detailed records on a particular person or subject.
  25. (short for binary digit) is the smallest unit of measurement used to quantify computer data.
  26. a small amount of data sent over a network, such as a LAN or the Internet.

47 Clues: another word for question.the virtual world of computers.a central file storage location.continuous transmission of informationThe translation of data into a secret code.information processed or stored by a computer.often used to measure the size of large files.reduces a file's size with no loss of quality....

APCSA 1 2023-05-12

APCSA 1 crossword puzzle
Across
  1. A request for information from a database or search engine.
  2. A blueprint of methods that a class must implement, specifying the contract or behavior expected from the class.
  3. A keyword in Java used to define a variable or method that belongs to the class itself rather than an instance of the class.
  4. A keyword in Java used to declare classes or methods that cannot be instantiated and require subclasses to provide implementation.
  5. The core component of an operating system that manages system resources and provides essential services.
  6. A programming construct that allows executing a set of instructions repeatedly until a certain condition is met.
  7. A mechanism in Java that allows a class to inherit properties and behaviors from another class.
  8. Computing The delivery of computing services, such as storage, servers, and software, over the internet on a pay-as-you-go basis.
  9. Acronymn for artificial intelligence
  10. The process of converting information into a coded form to protect its confidentiality and integrity.
  11. Transmission Control Protocol/Internet Protocol, the foundational protocols of the internet that enable communication between devices.
  12. Learning A field of artificial intelligence that enables computer systems to learn and improve from experience without being explicitly programmed.
  13. The development of computer systems capable of performing tasks that typically require human intelligence
  14. HyperText Markup Language, the standard markup language used for creating web pages.
  15. Acronymn for a programming paradigm that organizes code into objects
  16. A named storage location in a program that holds a value or data.
  17. An event that occurs during the execution of a program, disrupting the normal flow of instructions. It can be handled using exception handling mechanisms.
  18. Large and complex data sets that require specialized processing techniques for analysis and insights.
  19. The point of interaction between a user and a computer system or between different components of a system.
Down
  1. The set of rules that dictate the structure and format of programming languages.
  2. A set of rules or guidelines that govern the exchange of data between devices in a network.
  3. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  4. The coordination of multiple threads to ensure that they access shared resources in a controlled manner, preventing data inconsistency or conflicts.
  5. The ability of an object to take on different forms or exhibit different behaviors based on the context.
  6. A high-speed data storage mechanism that stores frequently accessed information for faster retrieval.
  7. A programming technique in which a function calls itself directly or indirectly to solve a problem.
  8. A programming language commonly used for client-side web development.
  9. The process of identifying and fixing errors or bugs in a software program.
  10. A way to organize related classes and interfaces into a single namespace, providing a means of modularization and avoiding naming conflicts
  11. The process of converting an object of one type to another type, either implicitly or explicitly.
  12. The ability to define multiple methods with the same name but different parameter lists within a class.
  13. A number system that uses only two digits, 0 and 1, to represent values.
  14. A set of step-by-step instructions to solve a specific problem or perform a task.
  15. Extensible Markup Language, a markup language used for storing and transporting data.
  16. A collection of interconnected devices and communication pathways that allow sharing of resources and information.
  17. A software program that translates high-level programming code into a lower-level language (such as machine code) that can be executed by a computer.

36 Clues: Acronymn for artificial intelligenceA request for information from a database or search engine.A named storage location in a program that holds a value or data.Acronymn for a programming paradigm that organizes code into objectsA programming language commonly used for client-side web development....

GEO310 Intro 2025-09-03

GEO310 Intro crossword puzzle
Across
  1. The smallest individual unit of a raster image. Each _____ holds a value that represents a specific attribute of the area it covers.
  2. Data: A type of qualitative data that categorizes information without a natural order or rank. Examples include country names or land cover types.
  3. Unit: A spatial unit used for data collection, storage, and presentation. Common examples include census tracts, counties, or zip code areas.
  4. A data model that represents geographic data as a grid of cells or pixels. Each pixel has a value representing a specific attribute, such as elevation, temperature, or land cover. This type of data is well-suited for continuous phenomena like imagery and elevation models.
  5. Map: A map that focuses on a specific theme or subject, such as population density, climate, or income levels.
  6. Line: A line that encloses the map's content. It helps to define the overall map area and separate it from marginal information.
  7. The heading of the map, which provides a concise description of its content, purpose, and sometimes location.
  8. Additional text below the title that provides more specific information about the map's content (often the location but with smaller font that the heading of the map).
  9. A smaller map within a larger map that shows a specific area in greater detail or a remote location relative to the main map.
  10. Autocorrelation: The principle that objects or attributes closer to each other in space are more related than objects farther apart.
  11. A key that explains the symbols, colors, and patterns used on a map. It is essential for interpreting the map's features.
  12. Line: The outermost line that delineates the map's entire content, including the map body, legend, title, and other elements.
Down
  1. A data model that represents geographic features as points, lines, and polygons. This type of data is ideal for discrete features like roads, rivers, and property boundaries.
  2. Data: Data that describes qualities or characteristics that cannot be measured numerically, such as land use type or vegetation class. It is often represented by distinct different colors or patterns on a map.
  3. A cartographic element, usually a north arrow or graticules, that helps a user orient the map.
  4. Class: A homogeneous collection of common features, each having the same spatial representation (point, line, or polygon) and set of attributes. It is a fundamental data structure within a geodatabase.
  5. Data: A type of data that categorizes information with a specific, meaningful order or rank. Examples include levels of pollution (low, medium, high) or highway classifications (interstate, state route).
  6. A container used to store, manage, and query geographic datasets. It can hold a variety of data types, including feature classes, raster datasets, and tables.
  7. Resolution: The ground area represented by a single cell in a raster image.
  8. Mapping Unit: The smallest size of a feature that is important enough to be distinguished in a particular feature class. Any feature smaller than the ________ mapping unit may be excluded or merged with larger features.
  9. The ratio or relationship between a distance or area on a map and the corresponding distance or area on the ground. It can be expressed as a representative fraction (e.g., 1:24,000) or a graphic.
  10. A non-topological, vector-based data storage format for storing the location, shape, and attributes of geographic features. It is one of the most common file formats for geospatial data.

22 Clues: Resolution: The ground area represented by a single cell in a raster image.A cartographic element, usually a north arrow or graticules, that helps a user orient the map.The heading of the map, which provides a concise description of its content, purpose, and sometimes location....

GEO310 Intro 2025-09-03

GEO310 Intro crossword puzzle
Across
  1. The smallest individual unit of a raster image. Each _____ holds a value that represents a specific attribute of the area it covers.
  2. Data: A type of qualitative data that categorizes information without a natural order or rank. Examples include country names or land cover types.
  3. Unit: A spatial unit used for data collection, storage, and presentation. Common examples include census tracts, counties, or zip code areas.
  4. A data model that represents geographic data as a grid of cells or pixels. Each pixel has a value representing a specific attribute, such as elevation, temperature, or land cover. This type of data is well-suited for continuous phenomena like imagery and elevation models.
  5. Map: A map that focuses on a specific theme or subject, such as population density, climate, or income levels.
  6. Line: A line that encloses the map's content. It helps to define the overall map area and separate it from marginal information.
  7. The heading of the map, which provides a concise description of its content, purpose, and sometimes location.
  8. Additional text below the title that provides more specific information about the map's content (often the location but with smaller font that the heading of the map).
  9. A smaller map within a larger map that shows a specific area in greater detail or a remote location relative to the main map.
  10. Autocorrelation: The principle that objects or attributes closer to each other in space are more related than objects farther apart.
  11. A key that explains the symbols, colors, and patterns used on a map. It is essential for interpreting the map's features.
  12. Line: The outermost line that delineates the map's entire content, including the map body, legend, title, and other elements.
Down
  1. A data model that represents geographic features as points, lines, and polygons. This type of data is ideal for discrete features like roads, rivers, and property boundaries.
  2. Data: Data that describes qualities or characteristics that cannot be measured numerically, such as land use type or vegetation class. It is often represented by distinct different colors or patterns on a map.
  3. A cartographic element, usually a north arrow or graticules, that helps a user orient the map.
  4. Class: A homogeneous collection of common features, each having the same spatial representation (point, line, or polygon) and set of attributes. It is a fundamental data structure within a geodatabase.
  5. Data: A type of data that categorizes information with a specific, meaningful order or rank. Examples include levels of pollution (low, medium, high) or highway classifications (interstate, state route).
  6. A container used to store, manage, and query geographic datasets. It can hold a variety of data types, including feature classes, raster datasets, and tables.
  7. Resolution: The ground area represented by a single cell in a raster image.
  8. Mapping Unit: The smallest size of a feature that is important enough to be distinguished in a particular feature class. Any feature smaller than the ________ mapping unit may be excluded or merged with larger features.
  9. The ratio or relationship between a distance or area on a map and the corresponding distance or area on the ground. It can be expressed as a representative fraction (e.g., 1:24,000) or a graphic.
  10. A non-topological, vector-based data storage format for storing the location, shape, and attributes of geographic features. It is one of the most common file formats for geospatial data.

22 Clues: Resolution: The ground area represented by a single cell in a raster image.A cartographic element, usually a north arrow or graticules, that helps a user orient the map.The heading of the map, which provides a concise description of its content, purpose, and sometimes location....

Krzyżówka zadanie 2025-12-10

Krzyżówka zadanie crossword puzzle
Across
  1. Use of technology to perform tasks without human input.
  2. A sign that danger or problems may occur.
  3. Information stored or processed by computers.
  4. A request for information from a database.
  5. Accidental or unlawful release of information.
  6. A risk or danger.
  7. A specific area or internet address space.
  8. A user identity in a system.
  9. Related to money or cost.
  10. A tool that blocks unwanted network traffic.
  11. A document describing an event or findings.
  12. The current condition of a system.
  13. Related to investigating cyber incidents.
  14. To check a system for issues or threats.
  15. A computer that provides resources to others.
  16. Too much data or activity for a system to handle.
  17. Numerical information used for analysis.
  18. A saved copy of data in case of loss.
  19. Unauthorized entry into a system.
  20. A piece of hardware used in computing.
  21. A written record of actions or events.
  22. Someone who monitors or watches activity.
  23. A set of rules for communication.
  24. Measurements used to evaluate performance.
  25. A call for data or a service.
  26. Permission to use or enter a system.
  27. Proof of an event or action.
  28. Programs used by a computer.
  29. A person or system chosen for attack.
  30. The ability to manage or direct something.
  31. Long-term storage of old files.
  32. A prediction based on information.
  33. A formal review of systems or processes.
Down
  1. A direct instruction given to a computer.
  2. A formal rule or guideline.
  3. To watch or track activity.
  4. A part of a larger software system.
  5. Official rule made by authorities.
  6. Searching for threats inside a network.
  7. Something unusual that may signal a problem.
  8. Continuous flow of data.
  9. A system on which applications can run.
  10. Instructions written for computers.
  11. An event that disrupts normal operations.
  12. A weakness that can be exploited.
  13. Monitoring to make sure rules are followed.
  14. A secret code to access a system.
  15. To follow the path of an action or data flow.
  16. A mistake or problem in a system.
  17. Information sent from one place to another.
  18. A connection point in a network.
  19. A place where data is kept.
  20. Protection against threats or attacks.
  21. Records of system activities.
  22. To protect from harm or attacks.
  23. Delay in data communication.
  24. The way a system or user acts.
  25. The right to keep personal data protected.
  26. Belief that someone or something is reliable.
  27. A set of connected computer components.
  28. The path data takes to reach a destination.
  29. A simplified digital structure used to predict or analyze.
  30. An action taken after an incident.
  31. Connected computers that share data.
  32. The chance that something bad may happen.
  33. Converting information into a secure code.
  34. Following laws, rules, or standards.
  35. A break in security where data is exposed.
  36. A step taken to solve a problem.
  37. Rules about what is morally right or wrong.
  38. A tool used to explore or test a system.
  39. Studying information to understand it.
  40. Learning skills or knowledge.

73 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A formal rule or guideline.To watch or track activity.A place where data is kept.A user identity in a system.Delay in data communication.Proof of an event or action.Programs used by a computer.Records of system activities.A call for data or a service.Learning skills or knowledge....

PaulinaNatalia 2025-12-10

PaulinaNatalia crossword puzzle
Across
  1. An action taken after an incident.
  2. A place where data is kept.
  3. To protect from harm or attacks.
  4. A tool that blocks unwanted network traffic.
  5. Converting information into a secure code.
  6. The right to keep personal data protected.
  7. A computer that provides resources to others.
  8. A tool used to explore or test a system.
  9. The path data takes to reach a destination.
  10. Programs used by a computer.
  11. A part of a larger software system.
  12. Information sent from one place to another.
  13. A step taken to solve a problem.
  14. A direct instruction given to a computer.
  15. Use of technology to perform tasks without human input.
  16. Learning skills or knowledge.
  17. Following laws, rules, or standards.
  18. A sign that danger or problems may occur.
  19. The way a system or user acts.
  20. Protection against threats or attacks.
  21. Rules about what is morally right or wrong.
  22. Connected computers that share data.
  23. Delay in data communication.
  24. A specific area or internet address space.
  25. A mistake or problem in a system.
  26. Instructions written for computers.
  27. A connection point in a network.
  28. Permission to use or enter a system.
  29. A risk or danger.
  30. Too much data or activity for a system to handle.
  31. Official rule made by authorities.
  32. A system on which applications can run.
  33. Belief that someone or something is reliable.
  34. Information stored or processed by computers.
  35. A prediction based on information.
  36. A document describing an event or findings.
  37. A formal review of systems or processes.
Down
  1. Unauthorized entry into a system.
  2. Related to money or cost.
  3. Continuous flow of data.
  4. Someone who monitors or watches activity.
  5. The ability to manage or direct something.
  6. Something unusual that may signal a problem.
  7. A call for data or a service.
  8. A break in security where data is exposed.
  9. A request for information from a database.
  10. Numerical information used for analysis.
  11. Records of system activities.
  12. A set of connected computer components.
  13. A set of rules for communication.
  14. A secret code to access a system.
  15. Monitoring to make sure rules are followed.
  16. To watch or track activity.
  17. To check a system for issues or threats.
  18. A formal rule or guideline.
  19. Related to investigating cyber incidents.
  20. Long-term storage of old files.
  21. Searching for threats inside a network.
  22. Proof of an event or action.
  23. Measurements used to evaluate performance.
  24. An event that disrupts normal operations.
  25. A weakness that can be exploited.
  26. A written record of actions or events.
  27. The chance that something bad may happen.
  28. A user identity in a system.
  29. A simplified digital structure used to predict or analyze.
  30. Studying information to understand it.
  31. To follow the path of an action or data flow.
  32. The current condition of a system.
  33. Accidental or unlawful release of information.
  34. A person or system chosen for attack.
  35. A saved copy of data in case of loss.
  36. A piece of hardware used in computing.

73 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A place where data is kept.To watch or track activity.A formal rule or guideline.Programs used by a computer.Proof of an event or action.Delay in data communication.A user identity in a system.A call for data or a service.Records of system activities.Learning skills or knowledge....

COMPUTER TERMS 2014-11-10

COMPUTER TERMS crossword puzzle
Across
  1. Ensures that only unique values can be assigned in each row for that field(s)
  2. Electronic Retailing
  3. plan, build, and implement systems that make use of computers that a company has or will acquire
  4. Improve the relationship among citizen and government
  5. Device requests time from the processor using the interrupt request
  6. A small, high-speed memory area that is placed between the processor and the system memory
  7. uses Information system (tactical decisions)
  8. It is sometimes called the Cathode Ray Tube
  9. Single Website that offers many products and services at one internet location
  10. are combinations of hardware, software, and other resources used to facilitate communications and enhance productivity
  11. Is the term used for all the physical components on a PC
  12. includes the use of computers to help manage manufacturing operations and to control machinery used in manufacturing processes
  13. Random Access Memory
  14. uses information system (on-the-job decisions)
  15. integrate the entire company, or enterprise
  16. The rows of such a table can be thought of as representing the records
  17. A collection of people, hardware, software, data, and procedures that interact to generate information to support the users of an organization.
  18. Structured Query Language
  19. Enterprise resource planning
  20. Helps the computer do useful things
  21. Picture Elements
  22. Data values for every column are stored in row
Down
  1. A type of transaction Processing Systems
  2. a type of Transaction Processing Systems
  3. Has revolutionized the world of investment and finance
  4. is the theory and development of computer systems able to perform tasks that normally require human intelligence
  5. phase in which hardware, software and other components are acquired
  6. Are external devices that extends the functionality of the PC
  7. Covers the collection of details stored in database.
  8. gather information about how work is done in the applications area and to ascertain what information users need
  9. The main input device for most computers
  10. The main circuit board in the computer where everything comes together
  11. uses information system (decisions about short-term objectives)
  12. the focus is on developing a small model, or prototype, of the overall system
  13. allows designers to dramatically reduce the time they spend at the drafting board
  14. The brain of the computer
  15. a type of Transaction Processing Systems
  16. Collection of elements and procedures that interact to accomplish a goal
  17. uses Information system (strategic decisions)
  18. systems development effort in which the user is primarily responsible for the development of the system
  19. make use of diagrams, tables and checklists
  20. They often approve broad plans for systems development within an organization
  21. Sends information over the line one bit at a time
  22. Identification of specific markets to target them with advertising messages
  23. Identifies the rows to be updated, selected and is composed of column names, expressions, constraints, sub-queries, and comparison operators
  24. A programmable electronic device that can store , retrieve, and process large amounts of data
  25. Connection that allows you to attach everything from mice to printers
  26. Is a list of information that is not necessarily related to any other lists or tables
  27. The electrical channels through which various parts of the computer communicate
  28. An input device that allows you to move the cursor around the screen

50 Clues: Picture ElementsElectronic RetailingRandom Access MemoryThe brain of the computerStructured Query LanguageEnterprise resource planningHelps the computer do useful thingsA type of transaction Processing Systemsa type of Transaction Processing SystemsThe main input device for most computersa type of Transaction Processing Systems...

UNIX Crossword, The 2017-02-17

UNIX Crossword, The crossword puzzle
Across
  1. shows the different between two text files
  2. tells you what the current time is
  3. searches for files in a directory hierarchy
  4. tells computer about the capabilities of your terminal
  5. shows what processes are running on the system
  6. calls up the GNU C compiler
  7. creates a directory
  8. removes sections from each line of files
  9. prints out the last few lines of a file
  10. the original line editor that came with UNIX
  11. evaluates logical or integer arithmatic expressions
  12. strips last component from filename
  13. paginates a file
  14. determines file type
  15. this is used by cron to determine what needs to be run
  16. sorts lines of text based on criteria
  17. delays for a specified amount of time
  18. enables you to temporarily switch to a shell owned by another user
  19. files with names starting with a period are known as _____ files
  20. shows first few lines of files
  21. lists the contents of a directory
  22. compare two sorted files line by line
  23. used to send various signals to processes whose PIDs are known
  24. most commonly used text editor on UNIX/linux
  25. version of grep that allows the use of logical operators in specifying the search pattern
  26. this is the clock daemon that will run commands for you on a regularly scheduled basis
  27. print out calendar for the specified month or year
  28. tests for file types and compare values
  29. display or set your tty settings
  30. used to send output to a printer
  31. shows or omits repeated lines
  32. relays standard input to the standard output while capturing a copy in a file
Down
  1. shows how the directory tree is built by mounted filesystems
  2. program that reads input from the standard input and writes to the standard output
  3. it is a unix convention to store binaries in a ____ directory
  4. without any files specified, cat reads from the standard ______
  5. arbitrary precision infix calculator
  6. changes the timestamps of a file or creates file if it doesn't exist
  7. unix is a pun on ______ which was an operating system the early developers were working on
  8. merges lines of files
  9. removes an empty directory
  10. prints lines matching a pattern
  11. system process that is designed to run in the background
  12. ability to run more than one command at a time
  13. program that returns an exit status of non zero
  14. diverting the standard output to a file is known as a _____ion operation
  15. strips directory and suffix from filenames
  16. a link that can span file system boundaries is called a ______ link
  17. creates copy of file under a different name or path
  18. print out arguments to the command
  19. stream editor for filtering and transforming text using a regular expression syntax
  20. a pattern scanning and processing language with algorithmic syntax used in scripting
  21. what we usually call a command line interpreter
  22. renames a file
  23. the connection of the standard output of one process to the standard input of another is known as a _____
  24. the -n option to this command prints the hostname of the computer
  25. concatenates files
  26. program that returns an exit status of zero
  27. initializes a terminal or query terminfo database
  28. used to create a link to a file
  29. every process was a unique ___ number
  30. translates or deletes characters
  31. this is the line oriented portion of vi

63 Clues: renames a filepaginates a fileconcatenates filescreates a directorydetermines file typemerges lines of filesremoves an empty directorycalls up the GNU C compilershows or omits repeated linesshows first few lines of filesprints lines matching a patternused to create a link to a filedisplay or set your tty settingsused to send output to a printer...

Made by Kayla 2024-01-02

Made by Kayla crossword puzzle
Across
  1. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  2. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  3. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  4. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  5. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  6. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  7. The number of horizontal and vertical pixels in a display device
  8. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  9. An electrical disturbance that can degrade communications
  10. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  11. A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  12. A request for specific data from a database.
Down
  1. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  2. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  3. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  4. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  5. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  6. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  7. The time it takes a signal to travel from one location to another on a network.
  8. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  9. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  10. Technology-related health condition that affects eyesight. See also CVS
  11. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  12. Group of files waiting in the buffer to be printed.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.An electrical disturbance that can degrade communicationsThe number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVS...

Ricky's 2024-01-02

Ricky's crossword puzzle
Across
  1. A request for specific data from a database.
  2. Group of files waiting in the buffer to be printed.
  3. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  4. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  5. An electrical disturbance that can degrade communications
  6. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  7. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  8. Technology-related health condition that affects eyesight. See also CVS
  9. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  10. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
Down
  1. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  2. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  3. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  4. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  5. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  6. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  7. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  8. A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  9. The number of horizontal and vertical pixels in a display device
  10. A collection of data organized in a manner that allows access, retrieval, and use of that data
  11. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  12. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  13. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  14. The time it takes a signal to travel from one location to another on a network.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.An electrical disturbance that can degrade communicationsThe number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVS...

made by aliya 2024-01-02

made by aliya crossword puzzle
Across
  1. A request for specific data from a database
  2. Group of files waiting in the buffer to be printed.
  3. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  4. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  5. An electrical disturbance that can degrade communications
  6. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  7. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  8. Technology-related health condition that affects eyesight. See also CVS
  9. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  10. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
Down
  1. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  2. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  3. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  4. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  5. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  6. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  7. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  8. Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  9. The number of horizontal and vertical pixels in a display device
  10. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  11. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  12. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  13. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  14. The time it takes a signal to travel from one location to another on a network

24 Clues: A request for specific data from a databaseGroup of files waiting in the buffer to be printed.An electrical disturbance that can degrade communicationsThe number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVS...

Made By Jazz 2024-01-02

Made By Jazz crossword puzzle
Across
  1. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  2. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  3. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  4. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  5. The number of horizontal and vertical pixels in a display device
  6. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  7. Technology-related health condition that affects eyesight. See also CVS
  8. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  9. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
Down
  1. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  2. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  3. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  4. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  5. The time it takes a signal to travel from one location to another on a network.
  6. Group of files waiting in the buffer to be printed.
  7. A request for specific data from a database.
  8. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  9. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  10. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  11. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  12. Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  13. An electrical disturbance that can degrade communications
  14. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  15. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.An electrical disturbance that can degrade communicationsThe number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVS...

made by NaHaven 2024-01-03

made by NaHaven crossword puzzle
Across
  1. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  2. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  3. The time it takes a signal to travel from one location to another on a network
  4. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
  5. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer
  6. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  7. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  8. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person
  9. Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster
  10. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost
  11. Group of files waiting in the buffer to be printed
  12. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes
  13. A request for specific data from a database.
Down
  1. The number of horizontal and vertical pixels in a display device
  2. An electrical disturbance that can degrade communications
  3. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money
  4. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme
  5. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require
  6. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  7. Technology-related health condition that affects eyesight. See also CVS
  8. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  9. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative
  10. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices
  11. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printedAn electrical disturbance that can degrade communicationsThe number of horizontal and vertical pixels in a display deviceTechnology-related health condition that affects eyesight. See also CVS...

Vocab Test AP Lang 2024-12-02

Vocab Test AP Lang crossword puzzle
Across
  1. An intense desire for wealth, often at the expense of morals.
  2. Polished and sophisticated, often with good manners.
  3. The vocabulary of a language, group, or subject.
  4. Done hastily with little attention to detail.
  5. A person with deep knowledge or exceptional skill in a particular area.
  6. To revoke or cancel something, often formally.
  7. Incapable of producing any useful result; pointless.
  8. To relieve or ease an intense feeling or situation.
  9. To avoid or neglect a duty or responsibility.
  10. Excessively talkative, often about trivial matters.
  11. To guess or infer something without conclusive evidence.
  12. To deliberately avoid or shun something.
  13. Lazy or unwilling to exert effort.
  14. In a way that is dangerously unstable or insecure.
  15. To stimulate into action, often through shock or excitement.
  16. An implied or suggested meaning, often emotional or cultural.
  17. A strong dislike or hatred, often directed at something morally wrong.
  18. To confirm or support a statement or theory with evidence.
  19. Quick and witty conversational exchange.
  20. An independent thinker who resists conformity.
  21. The combination of ideas or elements to form a whole.
  22. To correct or make right something that is wrong.
  23. To feel intense dislike or disgust for something.
  24. A lack or scarcity of something, especially something essential.
  25. Someone who flatters others to gain advantage.
  26. Childish or immature, often in a negative sense.
  27. Idealistic to an impractical or unrealistic degree.
  28. An insufficient quantity or scarcity of something.
  29. The quality of being open and honest, often bluntly so.
  30. To suppress or hold back, often forcibly.
  31. Empty and bleak, often evoking feelings of loneliness or abandonment.
Down
  1. The humorous misuse of a word by confusing it with a similar-sounding one.
  2. A question or inquiry, often seeking information or clarification.
  3. Cheerful and carefree, often to an excessive or inappropriate degree.
  4. Sullen or gloomy in temperament or mood.
  5. Overly sentimental, often to the point of being tearful.
  6. Rude or disrespectful, often inappropriately so.
  7. To prevent or hinder someone’s plans or efforts.
  8. To influence or change something, often subtly or indirectly.
  9. A principle or belief, often foundational to a philosophy or religion.
  10. Informal language or expressions typical of conversation.
  11. A driving force or motivation behind an action.
  12. Unnecessarily repetitive or superfluous.
  13. To suggest something without stating it directly.
  14. To deduce or conclude information from evidence and reasoning.
  15. Brief and to the point, often in a way that seems abrupt.
  16. The result or outcome of a particular action or cause.
  17. An excessive or overabundant amount of something.
  18. About to happen, often with a sense of urgency.
  19. Demanding great effort or endurance, often challenging.
  20. Wickedness or moral depravity.
  21. Brief and clear, without unnecessary words.
  22. To express an opinion, often formally.
  23. The ability to understand and share another person's feelings.
  24. Childishly irritable or bad-tempered.
  25. Fluent and persuasive in speech or writing.
  26. A firmly held belief or a sense of certainty about something.
  27. To read or examine something carefully or in detail.
  28. Lacking empathy or concern, often in a cold-hearted manner.
  29. Extremely thin and bony, often from hunger or illness.

60 Clues: Wickedness or moral depravity.Lazy or unwilling to exert effort.Childishly irritable or bad-tempered.To express an opinion, often formally.Sullen or gloomy in temperament or mood.Unnecessarily repetitive or superfluous.To deliberately avoid or shun something.Quick and witty conversational exchange.To suppress or hold back, often forcibly....

GEO310 Intro 2025-09-03

GEO310 Intro crossword puzzle
Across
  1. The smallest individual unit of a raster image. Each _____ holds a value that represents a specific attribute of the area it covers.
  2. Data: A type of qualitative data that categorizes information without a natural order or rank. Examples include country names or land cover types.
  3. Unit: A spatial unit used for data collection, storage, and presentation. Common examples include census tracts, counties, or zip code areas.
  4. A data model that represents geographic data as a grid of cells or pixels. Each pixel has a value representing a specific attribute, such as elevation, temperature, or land cover. This type of data is well-suited for continuous phenomena like imagery and elevation models.
  5. Map: A map that focuses on a specific theme or subject, such as population density, climate, or income levels.
  6. Line: A line that encloses the map's content. It helps to define the overall map area and separate it from marginal information.
  7. The heading of the map, which provides a concise description of its content, purpose, and sometimes location.
  8. Additional text below the title that provides more specific information about the map's content (often the location but with smaller font that the heading of the map).
  9. A smaller map within a larger map that shows a specific area in greater detail or a remote location relative to the main map.
  10. Autocorrelation: The principle that objects or attributes closer to each other in space are more related than objects farther apart.
  11. A key that explains the symbols, colors, and patterns used on a map. It is essential for interpreting the map's features.
  12. Line: The outermost line that delineates the map's entire content, including the map body, legend, title, and other elements.
Down
  1. A data model that represents geographic features as points, lines, and polygons. This type of data is ideal for discrete features like roads, rivers, and property boundaries.
  2. Data: Data that describes qualities or characteristics that cannot be measured numerically, such as land use type or vegetation class. It is often represented by distinct different colors or patterns on a map.
  3. A cartographic element, usually a north arrow or graticules, that helps a user orient the map.
  4. Class: A homogeneous collection of common features, each having the same spatial representation (point, line, or polygon) and set of attributes. It is a fundamental data structure within a geodatabase.
  5. Data: A type of data that categorizes information with a specific, meaningful order or rank. Examples include levels of pollution (low, medium, high) or highway classifications (interstate, state route).
  6. A container used to store, manage, and query geographic datasets. It can hold a variety of data types, including feature classes, raster datasets, and tables.
  7. Resolution: The ground area represented by a single cell in a raster image.
  8. Mapping Unit: The smallest size of a feature that is important enough to be distinguished in a particular feature class. Any feature smaller than the ________ mapping unit may be excluded or merged with larger features.
  9. The ratio or relationship between a distance or area on a map and the corresponding distance or area on the ground. It can be expressed as a representative fraction (e.g., 1:24,000) or a graphic.
  10. A non-topological, vector-based data storage format for storing the location, shape, and attributes of geographic features. It is one of the most common file formats for geospatial data.

22 Clues: Resolution: The ground area represented by a single cell in a raster image.A cartographic element, usually a north arrow or graticules, that helps a user orient the map.The heading of the map, which provides a concise description of its content, purpose, and sometimes location....

Zodiac baby 2025-09-26

Zodiac baby crossword puzzle
Across
  1. Under the influence of this star, Syedna TUS encouraged Mumineen to teach their children how to struggle against their negative impulses, always overcoming their anger and other negative character traits. Doing so will ensure that all their undertakings are pure and solely for the sake of Allah.
  2. Under the influence of this star, Maula’s TUS urged parents to positively influence their children, ensuring that they are shielded from what harms, citing the use of Lisan al-Dawat as a potent tool to this end.
  3. Under the influence of this star, Syedna al-Dai al-Ajal TUS urged parents to refrain from quarrelling within the family. He reminded them that children are deeply sensitive to such conflicts, and what they witness leaves a lasting impact on their pure and impressionable hearts.
  4. In order to nurture our children so that they too may reach the heights of prosperity, Syedna TUS counseled Mumineen to ensure that their children always remember Imam Husain AS.
  5. Under the influence of this star, children should be encouraged by their parents to query and ask questions, so much so that children should feel as though their parents exist in order to help them solve their problems. In turn, they too will grow up to be patient and tolerant of others.
  6. Linking this star’s principle to daily life, Syedna al-Dai al-Ajal TUS cited the hadith shareef: “Planning is half of life.”
  7. Citing an example of this star’s trait, Maula TUS shared a story when Syedna Taher Saifuddin RA was asked to share a positive trait about himself, he responded by saying that his best feature was that he was a trustworthy confidant. Syedna TUS guided parents on fostering confidentiality in their children.
Down
  1. Under the influence of this star, parents should know when to be firm and when to be gentle with their children, depending on what each situation requires.
  2. Under the influence of this star, children should strive to undertake those acts of khidmat that most others are unwilling to take on, even if doing so requires them to exert effort and make sacrifices.
  3. Under the influence of this star, children should also be encouraged to work hard instead of spending time on their phones. Syedna al-Dai al-Ajal TUS directly asked all the children, “You have stopped using phones, haven’t you?”
  4. Syedna al-Dai al-Ajal TUS encouraged parents to cultivate this star’s quality of focus in their children—particularly through the practice of namaz, which demands physical and spiritual orientation toward the qibla.
  5. Syedna TUS emphasized this star’s principal virtue in the importance of nurturing gratitude within children so they appreciate the blessings Allah has granted them rather than envying others.

12 Clues: Linking this star’s principle to daily life, Syedna al-Dai al-Ajal TUS cited the hadith shareef: “Planning is half of life.”Under the influence of this star, parents should know when to be firm and when to be gentle with their children, depending on what each situation requires....

8 2025-01-12

8 crossword puzzle
Across
  1. query, shifrlash, tranzaksiya, zahiralash, DBMS, mormalizatsiya
Down

    1 Clue: query, shifrlash, tranzaksiya, zahiralash, DBMS, mormalizatsiya

    PS 2023-09-23

    PS crossword puzzle
    Across
    1. Binary, Library,Hacker,Tilde,Hotfix,Query,Data
    Down

      1 Clue: Binary, Library,Hacker,Tilde,Hotfix,Query,Data

      ragno termini informatici 2022-01-17

      ragno termini informatici crossword puzzle
      Across
      1. dati
      2. rete di computer interna
      3. (line printer) è un tipo di porta utilizzata per connettere dispositivi di stampa
      4. disegni e immagini che si possono inserire nei documenti
      5. valore che non rappresenta un valore numerico
      6. computer rete intelligente che non ha memoria di massa
      7. elettronico programma di calcolo numerico
      8. programma del linguaggio
      9. (network etiquette) regole comportamentali per la comunicazione su internet
      10. computer piccoli che se li attacchi a una tastiera a un video possono essere compiuter da scrivania
      11. quantità di dati che può viaggiare su una connessione
      12. disk principale unità di memorizzazione
      13. (optical character recognition) tecnica di riconoscimento ottico di caratteri a stampa
      14. documento complesso che integra in modo interattivo testo, immagini video e suoni.
      15. indica le risorse internet per insegnanti alunni ecc
      16. (high speed serial bus) è un collegamento di tipo seriale
      17. collegamenti utilizzati per connettere periferiche
      18. disk disco dimensioni tre pollici e mezzo
      19. è la memoria in cui vengono collocati i dati in fase di elaborazione
      20. utilizzo di internet per la comunicazione tra aziende e clienti abituali
      21. dominio software disponibile gratuitamente non coperto da copyright
      22. dispositivo di stampa di grandi dimensioni adatto per il disegno tecnico
      23. (hyper text markup language) linguaggio utilizzato per costruire ipertesti
      24. memoria di sola lettura
      25. computer collegato in rete che scambia dati con server
      26. bug pericolo di blocco
      27. azienda che fornisce servizi di connessione a internet
      28. (megabyte) unità di misura dell'informazione che corrisponde a 1024 KB
      29. archivio di dati disposti in modo organizzato
      30. programma che può provocare danni
      31. (computer aided engineering) software per l'ingegneria
      32. vendita oggetti o servizi di via telematica
      33. processor pensati per sistemi server di fascia media
      34. cartella
      35. dispositivo dalle funzionalità analoghe a quelle del mouse
      36. mini computer tascabile
      37. indica testo collegato tramite link
      38. operazione che permette di creare una copia di sicurezza di un file
      39. espressione usata per indicare la trasmissione di dati inviati uno per volta
      40. computer collegato ad alcuni siti
      41. comandi per velocizzare le operazioni
      42. operativo è l'insieme dei programmi che gestiscono hardware
      43. sistema di protezione del computer
      44. (musical instrument digital interface) interfaccia musicale per strumenti digitali
      45. lock key tasto che blocca la scrittura in maiuscolo
      46. (disk operating system) sistema operativo che non ha interfaccia grafica
      47. logico permette la selezione di informazioni
      48. processo di estrazione dei dati
      49. insieme di dispositivi del computer parti logiche
      50. (file transfer protocol) protocollo per la trasmissione di dati su internet
      51. software rilasciato per dimostrazione
      52. (world wide web) rete globale
      53. (erasa programmable read only memory) memoria a solo lettura programmabile e cancellabile
      54. scheda madre
      55. map mappa di bit
      56. raggruppamento di 8 byte
      57. (computer aided instruction) software per l'istruzione assistita da processi di produzione
      58. cache memoria interna del processore ad altissima velocità di al secondo
      59. dispositivo per la scrittura e la lettura di CDROM
      60. software utilizzato dal sistema operativo per gestire dispositivi hardware
      61. (computer aided design) software per la progettazione
      62. sistema di cifratura dei dati
      63. rendere utilizzabile floppy
      64. è il modo in cui vengono organizzati testo e video al'interno di una pagina
      65. a barre
      66. (arithmetic-logic unit) esegue le istruzioni logiche e di calcolo
      67. esecuzione di più programmi simultaneamente
      68. file allegato con un messaggio di posta elettronica
      69. programma che permette l'accesso alla rete internet
      70. (integrated services of digital network) sistema pubblico di trasmissione dati
      71. tipo di sistema operativo a interfaccia grafica
      72. (domain name system) sistema che gestisce gli indirizzi dei domini internet
      73. spazio su internet dove si incontrano gruppi
      74. casella postale dove vengono accumulati messaggi di posta elettronica
      75. cura dei fattori che permettono di migliorare le condizioni del posto di lavoro
      Down
      1. prospetto stampato che contiene i dati estratti da un database
      2. (structured query language) linguaggio di interrogazioni di database strutturati
      3. economy forma di economia caratterizzata da internet
      4. posta elettronica
      5. (small computer system interface) potente e flessibile interfaccia di connessione
      6. (asymmetric digital subscriber line) collegamento a internet
      7. elemento fondamentale di un tabella
      8. (wide area network) rete di medie grandi dimensioni
      9. sigla utilizzata per indicare i possibili problemi
      10. insieme di programmi che permettono un funzionamento di un computer
      11. caratteri
      12. (liquid crystal display) monitor di elevata qualità a cristalli liquidi
      13. dispositivo hardware collegare tra loro più reti o nodi di differenti reti
      14. compito rimediare un errore
      15. nome di un sito web
      16. parti di una pagina web
      17. (what you see is what you get) permette di vedere sullo schermo il risultato delle operazioni effettuate
      18. l'applicazione per risolvere un problema
      19. (local area network) rete locale di computer che utilizza appositi cavi di collegamento
      20. dispositivo che permette di collegare computer a una rete locale
      21. unità di misura dell'informazione corrispondente a 1024 byte
      22. è il singolo punto luminoso del monitor
      23. ricevere informazioni e trasferirle in un altro computer
      24. (bit per secondo) unità di misura della velocità dei dati
      25. (simple mail transfer protocol) standard per la trasmissione della posta in internet
      26. (metropolitan area network) area metropolitana
      27. un tipo di grafico utilizzato per rappresentare dati
      28. pagine che presentano una presentazione
      29. list servizio di internet che permette lo scambio di informazioni
      30. provvisoria modalità di avvio del computer
      31. valore numerico di una grandezza
      32. ingresso di un programma
      33. unità di misura
      34. (sistema) sistema di numerazione indicate con 0 e 1
      35. (joint photographic experts group) formato grafico elaborato da un comitato di esperti di fotografia
      36. page
      37. fisso
      38. autorità italiana che attribuisce gli indirizzi internet
      39. unità di misura della velocità cpu
      40. software coperto da copyright solo per un periodo di prova
      41. programma per la produzione e la gestione dei dati
      42. nome in cui è indicato il testo
      43. (basic input output system) è costituita dalla memoria rom
      44. (microsoft disk operating) un sistema con interfaccia grafica
      45. scherzo informatic non dannoso
      46. (global area network) rete a livello mondiale che collega computer situati a paesi diversi
      47. chiave
      48. software gratuito ma tutelato dalle leggi copyright
      49. (information and communication technology)
      50. area di lavoro visualizzata sullo schermo
      51. è un tipo di sistema operativo
      52. computer con potenti processori grande quantità di memoria ram
      53. software presente della memoria rom
      54. madre scheda principale dove sono collegati tutti i componenti hardware
      55. tastiera tipicamente italiana
      56. circuito integrato che elabora i dati
      57. tipo di tastiera diffuso in america ma anche in italia
      58. (transmission control protocol internet protocol) trasmissione sul web
      59. è l'unita di informazione strutturata un data base
      60. degli strumenti una barra dove sono raccolte delle icone
      61. disegno di dimensioni ridotte
      62. finestra progettata per visualizzare i dati di uno o di più record
      63. dei menu barra dove sono disponibili le principali funzioni di una applicazione
      64. scambio di dati in formato elettronico
      65. profilo utente
      66. informazione su diversi livelli organizzati gerarchicamente
      67. input output ingresso uscita
      68. riferito ai dati di uscita di un programma o informazione di uscita
      69. operazione che permette di caricare o scaricare dalla rete un file sul proprio computer
      70. di ricerca
      71. indirizzo di internet
      72. (gigabyte)
      73. è lo stato del computer in cui vengono disattivati i video e altri componenti dell'unità centrale
      74. (internet service provider) fornitore servizi internet
      75. disk unità di memorie di massa di dimensioni superiori
      76. (computer aided manufacturing) software per i processi di produzione
      77. (graphical user interface) immagini e icone invece di testo scritto

      152 Clues: datipagefissochiavea barrecartellacaratteridi ricerca(gigabyte)scheda madreprofilo utenteunità di misuraposta elettronicamap mappa di bitnome di un sito webindirizzo di internetparti di una pagina webmemoria di sola letturamini computer tascabilerete di computer internaprogramma del linguaggioingresso di un programmabug pericolo di blocco...

      ELL Glossary 2023-08-25

      ELL Glossary crossword puzzle
      Across
      1. Word attack is an aspect of reading instruction that includes intentional strategies for learning to decode, sight read, and recognize written words.
      2. A newcomer program addresses the needs of recent immigrant students, most often at the middle and high school level, especially those with limited or interrupted schooling in their home countries. Major goals of newcomer programs are to acquire beginning English language skills along with core academic skills and to acculturate to the U.S. school system. Some newcomer programs also include primary language development and an orientation to the student's new community (Genesee, et al, 1999).
      3. The ability to recognize words correctly when reading.
      4. The ability to translate a word from print to speech, usually by employing knowledge of sound-symbol correspondences. It is also the act of deciphering a new word by sounding it out.
      5. The first language a person acquires in life, or identifies with as a member of an ethnic group. This term variably means (a) the language learned from the mother, (b) the first language learned, (c) the native language of an area or country, (d) the stronger (or dominant) language at any time of life, (e) the language used most by a person, (f) the language toward which the person has the more positive attitude and affection (Baker, 2000).
      6. A measure of someone's intelligence as indicated by an intelligence test, where an average score is 100. An IQ score is the ratio of a person's mental age to his chronological age multiplied by 100.
      7. Language majority refers to a person or language community that is associated with the dominant language of the country.
      8. A cloze passage is a reading comprehension exercise in which words have been omitted in a systematic fashion. Students fill in the blanks, and their responses are counted correct if they are exact matches for the missing words. Cloze exercises assess comprehension and background knowledge, and they are also excellent indicators of whether the reading level and language level of the text are appropriate for a given student.
      9. Metacognition is the process of "thinking about thinking." For example, good readers use metacognition before reading when they clarify their purpose for reading and preview the text.
      10. A mode of expressing words and phrases by using pictures of objects whose names resemble those words.
      11. A query narrowly tailored to task, purpose, and audience, as in a research query that is sufficiently precise to allow a student to achieve adequate specificity and depth within the time and format constraints.
      12. A part of writing and preparing presentations concerned chiefly with improving the clarity, organization, concision, and correctness of expression relative to task, purpose, and audience; compared to revising, a smaller-scale activity often associated with surface aspects of a text
      13. Temporary guidance or assistance provided to a student by a teacher, another adult, or a more capable peer, enabling the student to perform a task he or she otherwise would not be able to do alone, with the goal of fostering the student's capacity to perform the task on his or her own later on.
      14. Basic knowledge about print and how it is typically organized on a page. For example, print conveys meaning, print is read left to right, and words are separated by spaces.
      Down
      1. The smallest meaningful unit of language. A morpheme can be one syllable (book) or more than one syllable (seventeen). It can be a whole word or a part of a word such as a prefix or suffix. For example, the word ungrateful contains three morphemes: un, grate, and ful.
      2. Ability to detect differences in sounds; may be gross ability, such as detecting the differences between the noises made by a cat and dog, or fine ability, such as detecting the differences made by the sounds of letters "m" and "n."
      3. The inherent difficulty of reading and comprehending a text combined with consideration of reader and task variables; in the Standards, a three-part assessment of text difficulty that pairs qualitative and quantitative measures with reader-task considerations (CCSS, pp. 31, 57; Reading, pp. 416).
      4. Lau Remedies are policy guidelines for the education of English language learners, based on the ruling in the Lau vs. Nichols suit, mandating school districts' compliance with the civil rights requirements of Title VI (Lyons, 1992).
      5. Bilingualism is the ability to use two languages. However, defining bilingualism can be problematic since there may be variation in proficiency across the four language dimensions (listening, speaking, reading and writing) and differences in proficiency between the two languages. People may become bilingual either by acquiring two languages at the same time in childhood or by learning a second language sometime after acquiring their first language.
      6. The rate at which a child can recite "overlearned" stimuli such as letters and single-digit numbers.
      7. A student performance done without scaffolding from a teacher, other adult, or peer; in the Standards, often paired with proficient(ly) to suggest a successful student performance done without scaffolding; in the Reading standards, the act of reading a text without scaffolding, as in an assessment; see also proficient(ly), scaffolding.
      8. A language-based disability that affects both oral and written language. It may also be referred to as reading disability, reading difference, or reading disorder.
      9. Part of word that is "fixed to" either the beginnings of words (prefixes) or the endings of words (suffixes). The word disrespectful has two affixes, a prefix (dis-) and a suffix (-ful).
      10. Entry criteria are a set of guidelines that designate students as English language learners and help place them appropriately in bilingual education, ESL, or other language support services. Criteria usually include a home language survey and performance on an English language proficiency test.
      11. A multisensory approach to remediating dyslexia created by Dr. Samuel Orton, a neuropsychiatrist and pathologist, and Anna Gillingham, an educator and psychologist.
      12. Term used by the federal government, most states, and local school districts to identify those students who have insufficient English to succeed in English-only classrooms. Increasingly, English language learner (ELL) or English learner (EL) are used in place of LEP.
      13. A letter or letter combination that spells a single phoneme. In English, a grapheme may be one, two, three, or four letters, such as e, ei, igh, or eigh.
      14. The smallest unit of speech that serves to distinguish one utterance from another in a language.
      15. Onsets and rimes are parts of syllables or monosyllabic words in spoken language. These units are smaller than syllables but may be larger than phonemes. An onset is the initial consonant sound of a syllable (the onset of bag is b-; of swim is sw-). The rime is the part of a syllable that contains the vowel and all that follows it (the rime of bag is -ag; of swim is -im).
      16. Vocabulary refers to the words a reader or speaker knows the meaning of and can understand and use. Listening vocabulary refers to the words a person knows when hearing them in oral speech. Speaking vocabulary refers to the words a person is able to use in his or her own speech. Reading vocabulary refers to the words a person knows when seeing them in print. Writing vocabulary refers to the words a person is able to use in his or her own writing.

      30 Clues: The ability to recognize words correctly when reading.The smallest unit of speech that serves to distinguish one utterance from another in a language.The rate at which a child can recite "overlearned" stimuli such as letters and single-digit numbers....

      TTS TLJ NUR KOMARIAH 2020-02-09

      TTS TLJ NUR KOMARIAH crossword puzzle
      Across
      1. aplikasi web untuk mengelola konten sebuah (atau lebih) situs internet.
      2. memori yang hanya dapat dibaca dan data tetap tersimpan walaupun tanpa daya.
      3. sistem file yang banyak digunakan untuk format media penyimpan portabel
      4. Adalah sistem manajemen database relational (RDBMS, relational database management) yang open source yang menggunakan Structured Query Language (SQL, yang merupakan bahasa populer untuk menambahkan, mengkases dan memproses data dalam database).
      5. salah satu bentuk kesalahan yang ditemukan dalam aplikasi ataupun perangkat keras.
      6. Pemaparan spesifikasi perangkat keras dan sistem operasi yang sedang digunakan.
      7. Uniform Resource Locator.
      8. adalah sebuah aturan atau standar yang mengatur atau mengijinkan terjadinya hubungan, komunikasi, dan perpindahan data antara dua atau lebih titik komputer.
      9. Penghubung (jalur) utama sistem jaringan untuk menghubungkan antar LAN berjarak jauh, yaitu penghubung jaringan titik ke titik.
      10. Sistem jalur komunikasi data dua arah yang terpisah antara Tx dan Rx.
      11. usaha untuk mengembalikan data asli melalui data backup.
      12. Merupakan komputer user tunggal yang terkoneksi dengan server dalam satu sistem jaringan.
      13. Spesifikasi peralatan pendukung yang dibutuhkan oleh sebuah PC agar dapat bekerja secara optimal.
      14. merupakan perangkat jaringan yang memiliki fungsi memperluas suatu jaringan sekaligus membuat sebuah segmen jaringan
      15. Alat untuk memindahkan dan menyaring informasi
      16. protokol digunakan untuk mendukung proses transfer file dalam sistem jaringan menggunakan protokol TCP/IP (Internet/intranet).
      17. sistem penyimpan informasi nama domain, yaitu berupa basis data terdistribusi dalam sistem jaringan (Internet).
      18. metode untu kmengambil email dari server. Sebagian besar program email (disebut juga klien email) menggunakan protokol POP, walaupun ada juga yang mendukung penggunaan teknologi IMAP (Internet Message Access Protocol) yang lebih baru.
      19. kegiatan untuk membuat reka maya dari sesuatu, seperti komputer virtual, sistem operasi, media penyimpan ataupun perangkat jaringan.
      20. Penggabungan beberapa sinyal untuk dikirimkan secara bersamaan pada suatu kanal transmisi.Perangkat yang melakukan multiplexing disebut multiplexer (Mux) .
      21. kabel yang di gunakan pada topologi bus.
      22. perintah pada linux untuk akses komputer jarak jauh.
      Down
      1. Commercial Client Terminal berupa komputer yang digunakan user dengan menggunakan layanan akses data atau prangkat keras dalam sistem jaringan.
      2. Istilah kesahan sistem yang perlu diperhatikan sebelum mengoperasikan sistem.
      3. perintah pada linux untuk engganti user ID.
      4. operasi untuk membuka akses terhadap suatu media penyimpan dari user.
      5. Bentuk dari komunikasi elektronik yang menggunakan gelombang elektromagnetik yang kontinu, seperti televisi dan radio.
      6. card berfungsi untuk menerjemahkan/mengubah sinyal digital dari komputer menjadi tampilan grafis pada layar monitor.
      7. alternatif lokasi repositori paket dari repositori paket utama yang sudah tersedia. Dengan adanya mirror yang posisi jaringannya terdapat dekat dengan pengguna maka permasalahan minimnya alokasi bandwidth yang tersedia diharapkan dapat tertangani dengan baik.
      8. bentuk bilangan biner yang diolah oleh komputer dalam bentuk sinyal digital.
      9. mengubah sinyal digital menjadi sinyal analog atau sebaliknya.
      10. usaha untuk mengembalikan kendali terhadap suatu sistem.
      11. standar interface serial untuk komunikasi data dimana dirancang satu port USB komputer dihubungkan ke beberapa peripheral atau devais secara bersama.
      12. kumpulan protokol komunikasi data yang digunakan sebagai kendali prosedur transfer data dan koneksi dengan internet.
      13. Tujuan pengiriman data
      14. Sebuah konsep sinyal pembawa yang mengalir dalam sistem jaringan yang bertugas membawa informasi paket data yang dikirimkan.
      15. merupakan pemroses data dalam sebuah perangkat komputer.
      16. Adalah sebuah program yang mudah digunakan untuk mengkonfigurasi dan mengelola situs internet anda (control panel), berfungsi sama seperti CPanel, digunakan sebagai panel kendali di RuangWeb.com.
      17. server yang merupakan sumber informasi utama terkait pendaftaran suatu domain.
      18. dasar pembentuk Sistem Elektronika Digital yang berfungsi untuk mengubah satu atau beberapa Input (masukan) menjadi sebuah sinyal Output (Keluaran) Logis.
      19. Monitor yang bekerja dengan cara memancarkan sinar katoda (elektron) berkecepatan tinggi di dalam tabung yang hampa udara.
      20. Port untuk menghubungkan PC dengan printer.
      21. Kumpulan dari fakta atau simbol
      22. kumpulan seluruh halaman yang disajikan oleh sebuah perusahaan, individu, organisasi atau entitas lainnya
      23. Servis dalam komputer yang berfungsi menerjemahkan alamat IP menjadi alamat URL atau sebaliknya.
      24. Operating system yang digunakan untuk komunikasi data suara/video.

      46 Clues: Tujuan pengiriman dataUniform Resource Locator.Kumpulan dari fakta atau simbolkabel yang di gunakan pada topologi bus.perintah pada linux untuk engganti user ID.Port untuk menghubungkan PC dengan printer.Alat untuk memindahkan dan menyaring informasiperintah pada linux untuk akses komputer jarak jauh....

      Common Computer Terms 2015-03-04

      Common Computer Terms crossword puzzle
      Across
      1. A spreadsheet file containing one or more worksheets
      2. A predefined formula that performs calculations by using specific values, called arguments
      3. All the characters in a particular typeface.
      4. The process of bringing (importing) data into an application which has been exported from another application
      5. A toolbar contain buttons with that can be clicked to provide a shortcut to tasks.
      6. Contains the Start button, the clock and currently running tasks.
      7. A facility in operating system to store items of text or graphics when they have been cut or copied, so they can be pasted to a different location.
      8. A facility, which allows the user to make columns with or without borders, can be used instead of tabulating.
      9. A cell or range reference in a formula whose location remains the same (absolute) when copied.
      10. A process where the words in a document are matched against a list of words in a dictionary. If a word in the document does not match one, it is signalled as a spelling error.
      11. To change the look of a document, text, graphics, characters.
      12. A document that can be used as a pattern for creating other similar documents.
      13. The orientation of the document when printed; wider than it is long.
      14. Files that are sent separately from, but attached to, an e-mail message.
      15. An equation that performs operations on worksheet data.
      16. Two or more computers connected together for the sharing of resources such as printers and drives.
      17. Software you can use free of charge for a trial period, usually 30 days, after which time you are expected to pay for the program.
      18. The act of copying information from a distant computer to your local computer.
      19. Programs: a series of instructions that tell the computer hardware what to do; can also be the interface between the user and the computer system.
      20. When your text reaches the right-hand margin in a document it automatically starts on the next line.
      21. Can be represented by a range of symbols, usually round dots, which are used to set apart points in paragraph style.
      22. engine A tool to help locate information on the Internet.
      Down
      1. A software program that translates and allows you to view HTML files.
      2. The rectangles created at the intersection of columns and rows.
      3. Notation that you create to list sites you visit often or would like to quickly return to.
      4. The etiquette rules of the Internet.
      5. To locate the cause of trouble and removes, fixes or treats it.
      6. The process of taking (exporting) data from an application, i.e. a database, and placing it into another application, i.e. a spreadsheet
      7. Paragraph alignment: left, centre, right or fully justified.
      8. Text files that visited Web sites store on you computer’s hard disk.
      9. Computerized worksheet on which text, numbers and formulas can be entered for fast, accurate calculations.
      10. The main or introductory Web page for a site.
      11. The location where browsers keep a copy of recently visited pages.
      12. Hardware devices which are attached to the computer eg printer, speakers, scanner etc.
      13. A program that is loaded onto your computer without your knowledge and runs without your consent. Most viruses can also replicate themselves
      14. Software applications that expand a browser’s basic capabilities by becoming extensions of the browser itself.
      15. The process of merging a main document with a data source to produce form letters
      16. The process of asking a question of a database. Queries are used to view, change, and analyse data in different ways
      17. The physical components of the computer system eg keyboard, mouse, speakers etc.
      18. The location where new e-mail messages arrive.
      19. The orientation of the document when printed; longer than it is wide.
      20. An organised collection of related information.
      21. The name of a particular Internet site.

      43 Clues: The etiquette rules of the Internet.The name of a particular Internet site.All the characters in a particular typeface.The main or introductory Web page for a site.The location where new e-mail messages arrive.An organised collection of related information.A spreadsheet file containing one or more worksheets...

      Common Computer Terms 2015-03-04

      Common Computer Terms crossword puzzle
      Across
      1. To change the look of a document, text, graphics, characters.
      2. Text files that visited Web sites store on you computer’s hard disk.
      3. The act of copying information from a distant computer to your local computer.
      4. The location where new e-mail messages arrive.
      5. Can be represented by a range of symbols, usually round dots, which are used to set apart points in paragraph style.
      6. A spreadsheet file containing one or more worksheets
      7. An equation that performs operations on worksheet data.
      8. Hardware devices which are attached to the computer eg printer, speakers, scanner etc.
      9. The name of a particular Internet site.
      10. The process of merging a main document with a data source to produce form letters
      11. To locate the cause of trouble and removes, fixes or treats it.
      12. The orientation of the document when printed; longer than it is wide.
      13. A predefined formula that performs calculations by using specific values, called arguments
      14. Software applications that expand a browser’s basic capabilities by becoming extensions of the browser itself.
      15. A program that is loaded onto your computer without your knowledge and runs without your consent. Most viruses can also replicate themselves
      16. Files that are sent separately from, but attached to, an e-mail message.
      17. A toolbar contain buttons with that can be clicked to provide a shortcut to tasks.
      18. The main or introductory Web page for a site.
      19. The orientation of the document when printed; wider than it is long.
      20. The location where browsers keep a copy of recently visited pages.
      21. Notation that you create to list sites you visit often or would like to quickly return to.
      Down
      1. A software program that translates and allows you to view HTML files.
      2. engine A tool to help locate information on the Internet.
      3. Programs: a series of instructions that tell the computer hardware what to do; can also be the interface between the user and the computer system.
      4. A facility in operating system to store items of text or graphics when they have been cut or copied, so they can be pasted to a different location.
      5. The process of bringing (importing) data into an application which has been exported from another application
      6. The process of asking a question of a database. Queries are used to view, change, and analyse data in different ways
      7. The physical components of the computer system eg keyboard, mouse, speakers etc.
      8. Computerized worksheet on which text, numbers and formulas can be entered for fast, accurate calculations.
      9. Paragraph alignment: left, centre, right or fully justified.
      10. The etiquette rules of the Internet.
      11. An organized collection of related information.
      12. The rectangles created at the intersection of columns and rows.
      13. Software you can use free of charge for a trial period, usually 30 days, after which time you are expected to pay for the program.
      14. Two or more computers connected together for the sharing of resources such as printers and drives.
      15. A process where the words in a document are matched against a list of words in a dictionary. If a word in the document does not match one, it is signalled as a spelling error.
      16. When your text reaches the right-hand margin in a document it automatically starts on the next line.
      17. The process of taking data from an application, i.e. a database, and placing it into another application, i.e. a spreadsheet
      18. A facility, which allows the user to make columns with or without borders, can be used instead of tabulating.
      19. Contains the Start button, the clock and currently running tasks.

      40 Clues: The etiquette rules of the Internet.The name of a particular Internet site.The main or introductory Web page for a site.The location where new e-mail messages arrive.An organized collection of related information.A spreadsheet file containing one or more worksheetsAn equation that performs operations on worksheet data....

      UNIX Commands, AT&T Bell Laboratories 2022-08-02

      UNIX Commands, AT&T Bell Laboratories crossword puzzle
      Across
      1. concatenates files
      2. unix is a pun on ______ which was an operating system the early developers were working on
      3. print out arguments to the command
      4. enables you to temporarily switch to a shell owned by another user
      5. tells you what the current time is
      6. deletes files
      7. creates a directory
      8. shows or sets the file mode creation mask
      9. this is used by cron to determine what needs to be run
      10. compare two sorted files line by line
      11. prints lines matching a pattern
      12. lists the contents of a directory
      13. strips directory and suffix from filenames
      14. changes the timestamps of a file or creates file if it doesn't exist
      15. shows the different between two text files
      16. tests for file types and compare values
      17. most commonly used text editor on UNIX/linux
      18. without any files specified, cat reads from the standard ______
      19. used to create a link to a file
      20. print out calendar for the specified month or year
      21. the connection of the standard output of one process to the standard input of another is known as a _____
      22. shows how the directory tree is built by mounted filesystems
      23. shows first few lines of files
      24. creates copy of file under a different name or path
      25. saves a typescript of an interactive terminal session
      26. file perusal filter similar to more but with more features
      27. initializes a terminal or query terminfo database
      28. relays standard input to the standard output while capturing a copy in a file
      29. stream editor for filtering and transforming text using a regular expression syntax
      30. the original line editor that came with UNIX
      31. program that reads input from the standard input and writes to the standard output
      32. used to send output to a printer
      33. calls up the GNU C compiler
      34. the -n option to this command prints the hostname of the computer
      35. shows what processes are running on the system
      36. evaluates logical or integer arithmatic expressions
      37. shows or omits repeated lines
      38. files with names starting with a period are known as _____ files
      39. displays information about users on the system
      40. it is a unix convention to store binaries in a ____ directory
      Down
      1. program that returns an exit status of non zero
      2. display or set your tty settings
      3. renames a file
      4. removes sections from each line of files
      5. this is the clock daemon that will run commands for you on a regularly scheduled basis
      6. a link that can span file system boundaries is called a ______ link
      7. a pattern scanning and processing language with algorithmic syntax used in scripting
      8. version of grep that allows the use of logical operators in specifying the search pattern
      9. used to send various signals to processes whose PIDs are known
      10. system process that is designed to run in the background
      11. paginates a file
      12. this is the line oriented portion of vi
      13. shows who is currently logged on
      14. diverting the standard output to a file is known as a _____ion operation
      15. arbitrary precision infix calculator
      16. what we usually call a command line interpreter
      17. program that returns an exit status of zero
      18. searches for files in a directory hierarchy
      19. changes file permission mode settings
      20. shows a listing of last logged in users
      21. determines file type
      22. delays for a specified amount of time
      23. every process was a unique ___ number
      24. sorts lines of text based on criteria
      25. prints out the last few lines of a file
      26. file perusal filter for viewing on terminal
      27. tells computer about the capabilities of your terminal
      28. strips last component from filename
      29. ability to run more than one command at a time
      30. translates or deletes characters
      31. merges lines of files
      32. removes an empty directory

      72 Clues: deletes filesrenames a filepaginates a fileconcatenates filescreates a directorydetermines file typemerges lines of filesremoves an empty directorycalls up the GNU C compilershows or omits repeated linesshows first few lines of filesprints lines matching a patternused to create a link to a filedisplay or set your tty settings...

      Per 2 Chapter 11 - Chavez A 2023-02-27

      Per 2 Chapter 11 - Chavez A crossword puzzle
      Across
      1. provides very weak security and should not be relied upon for confidentiality
      2. releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
      3. clears the DNS resolver cache on the host
      4. displays the DNS resolver cache, which contains host and domain names that have been recently queried
      5. opens the System Information window, which shows a summary of system components, including hardware components and software information
      6. These are identified with a dollar sign ($) at the end of the share name.
      7. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
      8. This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
      9. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
      10. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
      11. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
      12. The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
      13. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
      Down
      1. Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).
      2. forces a DHCP client to renew its DHCP address lease from the DHCP server
      3. The Windows 10 profile allows the user to customize the sharing options. The PC is discoverable on the network.
      4. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
      5. This is used to create customized system image files that will be installed on computers in the enterprise.
      6. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
      7. displays the Group Policy settings that are in effect for a currently logged in user
      8. a command-line terminal emulation protocol and program that works over port 23
      9. opens the Remote Desktop utility
      10. a private network that connects remote sites or users together over a public network, like the internet
      11. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
      12. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
      13. Data is sent unencrypted and with no authentication.
      14. displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name
      15. opens Microsoft Management Console (MMC)
      16. This is used to update a local machine and verify that the machine is getting Group Policy updates.
      17. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
      18. the command that is used to query the DNS server to discover IP addresses or host names
      19. uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications

      32 Clues: opens the Remote Desktop utilityopens Microsoft Management Console (MMC)clears the DNS resolver cache on the hostData is sent unencrypted and with no authentication.forces a DHCP client to renew its DHCP address lease from the DHCP serverThese are identified with a dollar sign ($) at the end of the share name....

      period 2 chapter 11- Eric Zavala 2023-02-27

      period 2 chapter 11- Eric Zavala crossword puzzle
      Across
      1. This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
      2. a dynamic disk that has been moved to a computer from another computer running Windows
      3. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
      4. monitors programs on the computer and warns users when an action might present a threat to the computer
      5. a private network that connects remote sites or users together over a public network, like the internet
      6. displays the Group Policy settings that are in effect for a currently logged in user
      7. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network paththe command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
      8. opens Microsoft Management Console
      9. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
      10. a dynamic disk that is corrupted, turned off, or disconnected
      11. a basic disk that is being converted into a dynamic disk
      12. These are identified with a dollar sign ($) at the end of the share name.
      13. a command-line terminal emulation protocol and program that works over port 23
      14. contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
      Down
      1. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
      2. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
      3. This is used to create customized system image files that will be installed on computers in the enterprise.
      4. This is used to update a local machine and verify that the machine is getting Group Policy updates.
      5. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
      6. provides very weak security and should not be relied upon for confidentiality
      7. a disk that does not contain a valid signature
      8. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
      9. used by most application installation programs to install software. In 32-bit versions of Windows, all programs are 32-bit and are installed in the folder C:\Program Files. In 64-bit systems, 64-bit programs are installed in the folder C:\Program Files, while 32-bit programs are installed in the folder C:\Program Files (x86).
      10. It displays details for all DirectX components and drivers that are installed in a computer.
      11. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
      12. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
      13. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
      14. opens the Remote Desktop utility
      15. a volume that is functioning properly
      16. the command that is used to query the DNS server to discover IP addresses or host names

      30 Clues: opens the Remote Desktop utilityopens Microsoft Management Consolea volume that is functioning properlya disk that does not contain a valid signaturea basic disk that is being converted into a dynamic diska dynamic disk that is corrupted, turned off, or disconnectedThese are identified with a dollar sign ($) at the end of the share name....

      Per 2 Chapter 11- Thompson,E 2023-02-27

      Per 2 Chapter 11- Thompson,E crossword puzzle
      Across
      1. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
      2. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
      3. This process creates a file system on a partition to be stored
      4. The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
      5. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
      6. uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
      7. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
      8. These are addresses from a reserved range in the 169.254.x.y network space
      9. Data is sent unencrypted and with no authentication.
      10. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
      11. Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).
      12. displays the DNS resolver cache, which contains host and domain names that have been recently queried
      13. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
      14. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
      15. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
      16. used by most application installation programs to install software. In 32-bit versions of Windows, all programs are 32-bit and are installed in the folder C:\Program Files. In 64-bit systems, 64-bit programs are installed in the folder C:\Program Files, while 32-bit programs are installed in the folder C:\Program Files (x86).
      17. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
      18. Provides features not supported by basic disks
      Down
      1. clears the DNS resolver cache on the host
      2. clears the DNS resolver cache on the host
      3. these are identified with a dollar sign ($) at the end of the share name.
      4. The Windows 10 network profile disables file and printer sharing and network discovery on the link. The PC is hidden from the network.
      5. This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
      6. This is used to open or execute a file using elevated permission.
      7. monitors programs on the computer and warns users when an action might present a threat to the computer
      8. releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
      9. the command that is used to query the DNS server to discover IP addresses or host names
      10. a private network that connects remote sites or users together over a public network, like the internet
      11. provides very weak security and should not be relied upon for confidentiality
      12. displays the DNS resolver cache, which contains host and domain names that have been recently queried
      13. contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
      14. a command-line terminal emulation protocol and program that works over port 23

      32 Clues: clears the DNS resolver cache on the hostclears the DNS resolver cache on the hostProvides features not supported by basic disksData is sent unencrypted and with no authentication.This process creates a file system on a partition to be storedThis is used to open or execute a file using elevated permission....

      Per 3 Chapter 11 - Carmona J 2023-02-27

      Per 3 Chapter 11 - Carmona J crossword puzzle
      Across
      1. This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
      2. clears the DNS resolver cache on the host
      3. provides very weak security and should not be relied upon for confidentiality
      4. uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
      5. the command that is used to query the DNS server to discover IP addresses or host names
      6. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
      7. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
      8. contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
      9. used by most application installation programs to install software. In 32-bit versions of Windows, all programs are 32-bit and are installed in the folder C:\Program Files. In 64-bit systems, 64-bit programs are installed in the folder C:\Program Files, while 32-bit programs are installed in the folder C:\Program Files (x86).
      10. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
      11. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
      12. displays the DNS resolver cache, which contains host and domain names that have been recently queried
      13. This is used to open or execute a file using elevated permission.
      14. The Windows 10 network profile disables file and printer sharing and network discovery on the link. The PC is hidden from the network
      15. Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS)
      16. The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
      Down
      1. releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
      2. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
      3. displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name
      4. displays the Group Policy settings that are in effect for a currently logged in user
      5. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
      6. Data is sent unencrypted and with no authentication.
      7. This is used to create customized system image files that will be installed on computers in the enterprise.
      8. a private network that connects remote sites or users together over a public network, like the internet
      9. this command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
      10. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
      11. forces a DHCP client to renew its DHCP address lease from the DHCP server
      12. opens Microsoft Management Console (MMC)
      13. a command-line terminal emulation protocol and program that works over port 23
      14. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
      15. This is used to update a local machine and verify that the machine is getting Group Policy updates.

      31 Clues: opens Microsoft Management Console (MMC)clears the DNS resolver cache on the hostData is sent unencrypted and with no authentication.This is used to open or execute a file using elevated permission.forces a DHCP client to renew its DHCP address lease from the DHCP serverprovides very weak security and should not be relied upon for confidentiality...

      Per 2 Chapter 11- Calderon, D 2023-02-23

      Per 2 Chapter 11- Calderon, D crossword puzzle
      Across
      1. The applications and processes tabs have been combined
      2. command that prepares a disk with the appropriate file system
      3. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
      4. easily share files and devices on a network
      5. To view a thumbnail image of a running program, hover the mouse over the program icon on the taskbar
      6. command to delete
      7. command to mount and configure a disk image that will be deployed to other computers
      8. command that moves something to a different folder
      9. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
      10. command to manipulate the power state of a computer
      11. To add an application to the taskbar for easy access, right-click the icon of an application and select Pin to taskbar
      12. a private network that connects remote sites or users together over a public network, like the internet
      13. command to shutdown a process that is running on a computer
      14. allows files and applications that require higher privileges to be opened
      15. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
      16. you have forgotten your password for a network application
      17. A user complains about receiving frequent notifications about applications that are making changes to the computer
      18. forces a DHCP client to renew its DHCP address lease from the DHCP server
      19. command to display the name of the computer that the prompt is open on and the user account
      20. The fastest way to get to these settings is to right-click an empty area of the desktop and select this
      21. command that deletes a file
      22. One of the two command line utilities of Windows
      23. Used by most applications installation programs
      24. command to find out which processes are running on a computer
      25. Resize a window by dragging it to one of the edges of the screen
      Down
      1. To display a list of tasks that are unique to the application, right-click the application’s icon in the taskbar
      2. these users can only make configuration changes that affect their own profile
      3. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
      4. these users can access files from other users
      5. Folders created for every user by default which provides storage location for common files and media
      6. Minimize all windows that are not being used by clicking and holding the title bar of one window and shaking it with the mouse
      7. command that displays contents of a text type file
      8. command that check a disk for errors
      9. When windows OS is installed, most files that are used to run the computer are stored here
      10. A user wants to work on network files while offline
      11. releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
      12. First version in which antivirus was integrated into the OS
      13. By default windows stores most of the files here
      14. Supports gadgets on the desktop
      15. Provides access to the various storage devices available on the computer
      16. command to repair or replace protected system files that may have been corrupted
      17. command to rename a folder or file
      18. This tab shows all running applications
      19. the command that is used to query the DNS server to discover IP addresses or host names
      20. View the desktop icons that are behind open windows by placing your cursor over the Show desktop button found at the right edge of the taskbar

      45 Clues: command to deletecommand that deletes a fileSupports gadgets on the desktopcommand to rename a folder or filecommand that check a disk for errorsThis tab shows all running applicationseasily share files and devices on a networkthese users can access files from other usersUsed by most applications installation programs...

      Linux Crossword 2023-02-16

      Linux Crossword crossword puzzle
      Across
      1. used to send various signals to processes whose PIDs are known
      2. this is the line oriented portion of vi
      3. removes sections from each line of files
      4. the original line editor that came with UNIX
      5. shows the difference between two text files
      6. evaluates logical or integer arithmatic expressions
      7. changes file permission mode settings
      8. shows a listing of last logged in users
      9. without any files specified, cat reads from the standard ______
      10. every process was a unique ___ number
      11. paginates a file
      12. program that returns an exit status of zero
      13. tells computer about the capabilities of your terminal
      14. a link that can span file system boundaries is called a ______ link
      15. creates copy of file under a different name or path
      16. prints out the last few lines of a file
      17. relays standard input to the standard output while capturing a copy in a file
      18. files with names starting with a period are known as _____ files
      19. deletes files
      20. shows or omits repeated lines
      21. shows who is currently logged on
      22. used to send output to a printer
      23. shows first few lines of files
      24. used to create a link to a file
      25. this is used by cron to determine what needs to be run
      26. calls up the GNU C compiler
      27. a pattern scanning and processing language with algorithmic syntax used in scripting
      28. most commonly used text editor on UNIX/linux
      29. tests for file types and compare values
      30. file perusal filter similar to more but with more features
      31. file perusal filter for viewing on terminal
      32. shows what processes are running on the system
      33. shows or sets the file mode creation mask
      34. tells you what the current time is
      35. sorts lines of text based on criteria
      36. prints lines matching a pattern
      37. merges lines of files
      38. print out arguments to the command
      Down
      1. determines file type
      2. program that reads input from the standard input and writes to the standard output
      3. stream editor for filtering and transforming text using a regular expression syntax
      4. shows how the directory tree is built by mounted filesystems
      5. compare two sorted files line by line
      6. diverting the standard output to a file is known as a _____ion operation
      7. the -n option to this command prints the hostname of the computer
      8. searches for files in a directory hierarchy
      9. arbitrary precision infix calculator
      10. the connection of the standard output of one process to the standard input of another is known as a _____
      11. display or set your tty settings
      12. initializes a terminal or query terminfo database
      13. this is the clock daemon that will run commands for you on a regularly scheduled basis
      14. program that returns an exit status of non zero
      15. removes an empty directory
      16. renames a file
      17. saves a typescript of an interactive terminal session
      18. delays for a specified amount of time
      19. displays information about users on the system
      20. what we usually call a command line interpreter
      21. strips last component from filename
      22. ability to run more than one command at a time
      23. unix is a pun on ______ which was an operating system the early developers were working on
      24. changes the timestamps of a file or creates file if it doesn't exist
      25. concatenates files
      26. it is a unix convention to store binaries in a ____ directory
      27. lists the contents of a directory
      28. enables you to temporarily switch to a shell owned by another user
      29. print out calendar for the specified month or year
      30. creates a directory
      31. strips directory and suffix from filenames
      32. old invocation of grep that allows the use of logical operators in specifying the search pattern
      33. translates or deletes characters
      34. system process that is designed to run in the background

      72 Clues: deletes filesrenames a filepaginates a fileconcatenates filescreates a directorydetermines file typemerges lines of filesremoves an empty directorycalls up the GNU C compilershows or omits repeated linesshows first few lines of filesused to create a link to a fileprints lines matching a patterndisplay or set your tty settings...

      CAT Linux Crossword 2023-02-16

      CAT Linux Crossword crossword puzzle
      Across
      1. the connection of the standard output of one process to the standard input of another is known as a _____
      2. display or set your tty settings
      3. print out arguments to the command
      4. what we usually call a command line interpreter
      5. saves a typescript of an interactive terminal session
      6. the -n option to this command prints the hostname of the computer
      7. print out calendar for the specified month or year
      8. every process was a unique ___ number
      9. used to send output to a printer
      10. most commonly used text editor on UNIX/linux
      11. shows who is currently logged on
      12. tells computer about the capabilities of your terminal
      13. searches for files in a directory hierarchy
      14. arbitrary precision infix calculator
      15. creates a directory
      16. shows how the directory tree is built by mounted filesystems
      17. used to create a link to a file
      18. without any files specified, cat reads from the standard ______
      19. displays information about users on the system
      20. determines file type
      21. shows or sets the file mode creation mask
      22. this is the line oriented portion of vi
      23. the original line editor that came with UNIX
      24. removes an empty directory
      25. program that returns an exit status of non zero
      26. shows a listing of last logged in users
      27. changes file permission mode settings
      28. program that returns an exit status of zero
      29. calls up the GNU C compiler
      30. this is used by cron to determine what needs to be run
      31. ability to run more than one command at a time
      32. merges lines of files
      33. evaluates logical or integer arithmatic expressions
      34. shows first few lines of files
      35. stream editor for filtering and transforming text using a regular expression syntax
      36. sorts lines of text based on criteria
      37. removes sections from each line of files
      38. unix is a pun on ______ which was an operating system the early developers were working on
      Down
      1. diverting the standard output to a file is known as a _____ion operation
      2. prints out the last few lines of a file
      3. tests for file types and compare values
      4. compare two sorted files line by line
      5. old invocation of grep that allows the use of logical operators in specifying the search pattern
      6. shows what processes are running on the system
      7. used to send various signals to processes whose PIDs are known
      8. changes the timestamps of a file or creates file if it doesn't exist
      9. this is the clock daemon that will run commands for you on a regularly scheduled basis
      10. deletes files
      11. tells you what the current time is
      12. files with names starting with a period are known as _____ files
      13. translates or deletes characters
      14. strips directory and suffix from filenames
      15. renames a file
      16. program that reads input from the standard input and writes to the standard output
      17. shows the difference between two text files
      18. it is a unix convention to store binaries in a ____ directory
      19. file perusal filter for viewing on terminal
      20. file perusal filter similar to more but with more features
      21. prints lines matching a pattern
      22. a link that can span file system boundaries is called a ______ link
      23. strips last component from filename
      24. a pattern scanning and processing language with algorithmic syntax used in scripting
      25. concatenates files
      26. creates copy of file under a different name or path
      27. relays standard input to the standard output while capturing a copy in a file
      28. enables you to temporarily switch to a shell owned by another user
      29. delays for a specified amount of time
      30. paginates a file
      31. system process that is designed to run in the background
      32. initializes a terminal or query terminfo database
      33. shows or omits repeated lines
      34. lists the contents of a directory

      72 Clues: deletes filesrenames a filepaginates a fileconcatenates filescreates a directorydetermines file typemerges lines of filesremoves an empty directorycalls up the GNU C compilershows or omits repeated linesshows first few lines of filesused to create a link to a fileprints lines matching a patterndisplay or set your tty settings...

      WTRFG Vocabulary Test 2024-09-23

      WTRFG Vocabulary Test crossword puzzle
      Across
      1. to make agitated and angry : UPSET
      2. in a casual way that shows a relaxed lack of concern or interest
      3. inclined to or exhibiting assertiveness, hostility, or combativeness
      4. a fabrication of poles interwoven with slender branches
      5. a question in the mind
      6. a stock of needed materials or supplies
      7. to scoop out with or as if with a gouge
      8. different from the usual or normal
      9. feeling or expressing great joy : EXULTANT
      10. ownership of land
      11. prevailing tendency, mood, or inclination
      12. adhesive substance for application to wounds or sores
      13. internal parts; intestines
      14. to shake or tremble in one's voice while speaking
      15. the state after death; immeasurable time
      16. to climb awkwardly or with effort especially by using both the hands and the feet
      17. cruel, violent, and harmful in nature
      18. a federal official who carries out court orders, captures criminals, and performs other duties similar to a sheriff.
      19. to come to an end
      20. to shrink back involuntarily (as from pain) : FLINCH
      21. to move in an erratic fluttering manner
      22. to think about deeply at length
      23. to gape or stare stupidly
      24. appointed or selected for a particular purpose or duty
      25. an animal unusually small of its kind
      26. prickly shrubs or vines that have thorns or spikes
      27. to jut out from the surrounding surface or context
      28. infected and inflamed, causing pus to form
      29. to be present in large numbers or in great quantity : to be prevalent
      30. to pour water or any other liquid over something to extinguish fire or put it out
      31. of or relating to the throat or neck
      32. distributed or assigned as per plan or schedule
      33. SOMBER, GLOOMY
      34. to move sideways in a sneaky or cautious manner
      35. a place at a train station for the reception and forwarding goods or freight
      36. a creek in a marsh or tide flat
      37. INCONSIDERATE, THOUGHTLESS
      38. an exclamation used to drive away animals or birds
      39. to cause to lose one's bearings; confuse
      Down
      1. a person from a backwoods area
      2. weight, heaviness, bulk
      3. nonsense, balderdash
      4. to give or concede reluctantly or with displeasure
      5. BRINK, THRESHOLD
      6. the place where someone or something is going or headed towards
      7. wild in appearance
      8. to laugh in a covert or partly suppressed manner
      9. the need for immediate action or attention
      10. loss of hope and surrender to despair
      11. a liquid or lotion used for soothing pains and stiffness in muscles
      12. to make powerless or ineffective; stun
      13. to cry loudly : wail
      14. a rough sharp or jagged projecting part; unexpected difficulty or obstacle
      15. a container in which cream is stirred or shaken to make butter
      16. to observe or think about something with triumphant and often satisfaction, gratification, or delight
      17. to hesitate or stumble while speaking or doing something
      18. dense thickets of tall reeds or bamboo-like plants
      19. an emotion combining dread and wonder
      20. to confound with fear, amazement, or awe
      21. syrup from the juice of a sorgo that resembles cane syrup
      22. being in or facing the direction toward which the wind is blowing
      23. to put under water
      24. a sudden and brief storm with strong winds and heavy rain or snow
      25. having no give or slack : tightly drawn
      26. a part remote from the center : BORDER
      27. to satisfy one's thirst or desire completely
      28. marked by temperance, moderation, or seriousness
      29. in a state of extreme physical or nervous fatigue
      30. to prevent someone from being included or considered

      69 Clues: SOMBER, GLOOMYBRINK, THRESHOLDownership of landto come to an endwild in appearanceto put under waternonsense, balderdashto cry loudly : waila question in the mindweight, heaviness, bulkto gape or stare stupidlyinternal parts; intestinesINCONSIDERATE, THOUGHTLESSa person from a backwoods areato think about deeply at length...

      Techno word puzzle 2025-03-31

      Techno word puzzle crossword puzzle
      Across
      1. An AI-powered recommendation engine widely used by e-commerce platforms.
      2. The mechanism in React that allows components to render only what has changed.
      3. A cloud service that provides pre-trained AI models for speech and text recognition.
      4. A built-in React Hook used to manage side effects like fetching data.
      5. A state management tool that follows the “predictable state container” principle.
      6. A term for designing software that continues to function even if some parts fail.
      7. A CSS property that controls element visibility without removing it from layout flow.
      8. A CSS method that arranges elements dynamically within a container.
      9. The CSS property used to create a smooth scrolling effect.
      10. A distributed event streaming platform used for building real-time data pipelines.
      11. A container orchestration tool for managing microservices at scale.
      12. The feature in ES6 that allows object properties to be extracted into variables.
      13. A mechanism in JavaScript that runs asynchronous operations in a non-blocking manner.
      14. A lightweight alternative to services for managing global states in Angular applications.
      15. A technique where a function is delayed to avoid being called too frequently, useful in search inputs.
      16. A CI/CD service from GitHub that automates builds and deployments.
      17. A web-based visualization tool often used in React projects.
      18. A concept in React that optimizes re-rendering by memoizing values.
      19. A tool used in Webpack to convert modern JavaScript code into older syntax.
      20. The UX principle that ensures users don’t have to memorize information but instead recognize patterns.
      21. What does Angular use to handle asynchronous data and events?
      22. A database technology that allows you to store and query JSON-like documents efficiently.
      23. Angular’s mechanism for passing data from a parent to a child component.
      24. A key Webpack feature that eliminates unused JavaScript from the final bundle.
      25. A frontend optimization technique that renders pages at build time.
      26. A modern CSS layout system that defines grid-based structures.
      27. An Angular decorator that defines metadata for components.
      Down
      1. A cloud-based logging service that provides real-time insights into application behavior.
      2. A JS data structure that maintains a key-value pair, but unlike objects, keys can be any type.
      3. The term for breaking down a large JS bundle into smaller, on-demand pieces for faster load time.
      4. A browser API that allows loading images only when they enter the viewport.
      5. A cloud service for real-time message-based communication between microservices.
      6. A cloud service for hosting static sites and frontend applications.
      7. A caching strategy where frequently accessed assets are stored closer to users.
      8. A core Angular module used to define routes.
      9. A JavaScript library commonly used for creating interactive charts and graphs.
      10. An AI model known for generating images based on text prompts.
      11. A Google-provided tool that audits web pages for performance, accessibility, and best practices.
      12. A browser API that schedules a function to run before the next repaint.
      13. A CSS preprocessor that adds features like nesting and variables.
      14. A term for designing interfaces that work seamlessly across multiple screen sizes.
      15. A performance metric that measures the time it takes for a webpage to become interactive.
      16. A change detection strategy in Angular that optimizes performance by checking only modified parts.
      17. A term for executing JavaScript code outside of the browser, often used for server-side development.
      18. A performance optimization technique that prevents unnecessary re-renders of a component.
      19. A Webpack concept where assets are loaded only when required.
      20. The process of running unit tests automatically on each code push in CI/CD.
      21. The JS method that transforms an array into a single value using a callback.
      22. The directive used to create structural changes in the DOM based on conditions.
      23. A technique that improves UI feedback by preventing layout shifts.

      50 Clues: A core Angular module used to define routes.The CSS property used to create a smooth scrolling effect.An Angular decorator that defines metadata for components.A web-based visualization tool often used in React projects.A Webpack concept where assets are loaded only when required.What does Angular use to handle asynchronous data and events?...

      AP Human Geography - Noah Kretz 1aaa 2019-05-06

      AP Human Geography - Noah Kretz 1aaa crossword puzzle
      Across
      1. (IDK,1)A thematic map using shading to show a pattern of a variable.
      2. (CC,1)A computer system that can capture, store, query, analyze, and display geographic data.
      3. (VIT,2)Was one of the first to argue that the worlds rate of population increase was far outrunning the development of food population. This is important because he brought up the point that we may be outrunning our supplies because of our exponentially growing population.
      4. (VIT, 5)The deliberate effort to modify a portion of Earth's surface through the cultivation of crops and the raising of livestock. This is important because it is the main focus of the unit.
      5. (CC, 4)Tending to move toward a center.
      6. (VIT, 6)A period in the 18th and 19th century where great advances were made in agriculture, manufacturing, and transportation. It is important because it was the start of all technological advancements.
      7. (CC, 4)Tending to move away from a center.
      8. (CC, 2)Permanent movement from one region of the country to another.
      9. (CC,1)A system that accurately determines the precise position of something on Earth.
      10. (VIT, 4)The formal act of acquiring territory by conquest. This is important because this is how much of the land owned today was claimed.
      11. (CC, 5)Farming that yields a large amount of output per acre through less intensive farming.
      12. (IDK, 6)Principles for mass production based on assembly-line techniques.
      13. (VIT, 3)A way of classifying languages at the global scale.It is important because every recognized language can be found in this.
      14. (CC, 2)Permanent movement within one region of a country.
      15. (IDK, 3)The visible imprint of human activity on the landscape.
      16. (IDK, 3)A religion entered on the belief that inanimate objects, such as mts., trees, rivers, and boulders.
      17. (CC, 6)The distance people are willing to travel for a service.
      18. (CC, 6)The amount of people needed for a company to be profitable.
      Down
      1. (CC, 7)The physical character of place; what is found at the location.
      2. (CC, 3)The process of people adopting the dominant culture.
      3. (CC, 7)the location of a place relative to other places.
      4. (IDK, 5)The land and its ownership and cultivation.
      5. (VIT,1)The study of the spatial characteristics of humans and human activities. It's important because it is the base for everything in the topic.
      6. (IDK,1)The spread of an idea from persons or nodes of authority to other persons or places.
      7. (VIT, 7)The area of a city where retail and office activities are clustered. It is important because the center of the city is usually the most important part.
      8. (CC, 5)Farming that yields a large amount of output per acre through concentrated farming.
      9. (IDK, 7)The county within which the city is located, and adjacent counties meeting one of several tests indicating a functional connection to the central city.
      10. (IDK, 7)A process by which banks draw lines on a map and refuse to lend money to purchase or improve property within boundaries.
      11. (IDK, 5)The growing of fruits, vegetables, and flowers for human consumption.
      12. (IDK, 4)the doctrine that territory should be controlled by the country to which they are ethnically or historically related.
      13. (IDK, 4)The study of the effects of economic geography on the powers of the state.
      14. (IDK,2)The portion of Earth's surface occupied by permanent human settlement.
      15. (CC, 3)The process of adopting fully the dominant culture and abandon their own culture.
      16. (IDK,2)The seasonal migration of livestock between mountains and lowland pastures.
      17. (IDK, 6)Areas communities have set aside for industrial uses.

      35 Clues: (CC, 4)Tending to move toward a center.(CC, 4)Tending to move away from a center.(IDK, 5)The land and its ownership and cultivation.(CC, 7)the location of a place relative to other places.(CC, 2)Permanent movement within one region of a country.(CC, 3)The process of people adopting the dominant culture....

      AP Human Geography - Noah Kretz 1aaa 2019-05-06

      AP Human Geography - Noah Kretz 1aaa crossword puzzle
      Across
      1. (IDK,2)The portion of Earth's surface occupied by permanent human settlement.
      2. (IDK, 7)A process by which banks draw lines on a map and refuse to lend money to purchase or improve property within boundaries.
      3. (VIT,1)The study of the spatial characteristics of humans and human activities. It's important because it is the base for everything in the topic.
      4. (CC, 4)Tending to move away from a center.
      5. (VIT, 7)The area of a city where retail and office activities are clustered. It is important because the center of the city is usually the most important part.
      6. (VIT, 5)The deliberate effort to modify a portion of Earth's surface through the cultivation of crops and the raising of livestock. This is important because it is the main focus of the unit.
      7. (CC,1)A computer system that can capture, store, query, analyze, and display geographic data.
      8. (VIT,2)Was one of the first to argue that the worlds rate of population increase was far outrunning the development of food population. This is important because he brought up the point that we may be outrunning our supplies because of our exponentially growing population.
      9. (CC, 7)the location of a place relative to other places.
      10. (IDK, 6)Principles for mass production based on assembly-line techniques.
      11. (CC, 5)Farming that yields a large amount of output per acre through less intensive farming.
      12. (IDK, 7)The county within which the city is located, and adjacent counties meeting one of several tests indicating a functional connection to the central city.
      13. (IDK, 4)the doctrine that territory should be controlled by the country to which they are ethnically or historically related.
      14. (IDK,2)The seasonal migration of livestock between mountains and lowland pastures.
      15. (IDK, 3)The visible imprint of human activity on the landscape.
      16. (CC, 2)Permanent movement from one region of the country to another.
      17. (VIT, 3)A way of classifying languages at the global scale.It is important because every recognized language can be found in this.
      18. (VIT, 6)A period in the 18th and 19th century where great advances were made in agriculture, manufacturing, and transportation. It is important because it was the start of all technological advancements.
      19. (IDK, 3)A religion entered on the belief that inanimate objects, such as mts., trees, rivers, and boulders.
      20. (IDK, 5)The land and its ownership and cultivation.
      Down
      1. (CC, 4)Tending to move toward a center.
      2. (IDK, 4)The study of the effects of economic geography on the powers of the state.
      3. (IDK, 6)Areas communities have set aside for industrial uses.
      4. (CC, 3)The process of people adopting the dominant culture.
      5. (IDK,1)A thematic map using shading to show a pattern of a variable.
      6. (CC, 3)The process of adopting fully the dominant culture and abandon their own culture.
      7. (CC, 7)The physical character of place; what is found at the location.
      8. (CC, 5)Farming that yields a large amount of output per acre through concentrated farming.
      9. (IDK,1)The spread of an idea from persons or nodes of authority to other persons or places.
      10. (CC,1)A system that accurately determines the precise position of something on Earth.
      11. (CC, 6)The distance people are willing to travel for a service.
      12. (CC, 2)Permanent movement within one region of a country.
      13. (VIT, 4)The formal act of acquiring territory by conquest. This is important because this is how much of the land owned today was claimed.
      14. (CC, 6)The amount of people needed for a company to be profitable.
      15. (IDK, 5)The growing of fruits, vegetables, and flowers for human consumption.

      35 Clues: (CC, 4)Tending to move toward a center.(CC, 4)Tending to move away from a center.(IDK, 5)The land and its ownership and cultivation.(CC, 7)the location of a place relative to other places.(CC, 2)Permanent movement within one region of a country.(CC, 3)The process of people adopting the dominant culture....

      talkTerminology: S 2024-07-15

      talkTerminology: S crossword puzzle
      Across
      1. A software and hardware combination that delivers web content to users over the Internet or an intranet. The primary role is to store, process, and deliver web pages to web browsers upon request.
      2. ____ Stitching. A binding method where folded sheets are stapled through the fold line, commonly used for booklets and magazines.
      3. ____ mail. A class of mail used for bulk mailings that do not require immediate delivery, often used for advertising.
      4. Individuals or groups who have an interest in the activities and decisions of an organization, such as employees, customers, investors, and the community.
      5. In printing, a group of pages folded together to form a part of a book before binding. A signature begins as a flat sheet printed on both sides, containing multiple pages of the printed material. The sheet is folded in a specific way to create a booklet-like section.
      6. Official approval of a particular stage or component of a project, allowing it to move forward.
      7. Abbreviation for person who has a specific area of expertise and can speak to it from an authoritative and credible position.
      8. ____ Case. Only the first letter of the first word in a sentence and proper nouns are capitalized.
      9. Abbreviation for the list of results that a search engine returns in response to a specific word or keyword phrase query.
      10. The practice of writing for public figures, specifically for delivery at events, conferences, or public addresses.
      11. The process of sewing or stapling the pages of a book or booklet together.
      Down
      1. ____ Stitching. A binding method where the pages are stapled or stitched together along one edge of the document.
      2. A critical pre-production document that is a visual narrative of video frames composed of drawings/images, audio, FX, and writing representing the shots planned for a video project.
      3. A large, eye-catching billboard, often featuring special effects like neon lighting or moving parts.
      4. ____ logo. A version of a logo that's arranged vertically instead of horizontally. Often used when space is limited, such as on mobile websites, clothing tags, business cards, and invoices. Alternate for vertical logo.
      5. The relative portion of total advertising exposures a brand receives in a specific market, compared to its competitors.
      6. A news service that takes a single story and places it on several media outlets websites nation/worldwide, example: The Associated Press.
      7. Social Media ____. The use of social media platforms to communicate with the public, manage the day-to-day organization's online presence, and engage with audiences.
      8. Dividing a mailing list into smaller groups based on specific criteria, such as demographics or purchase history.
      9. A direct mail piece that is mailed without an envelope, often folded and sealed.
      10. A set of standards for the writing, formatting, and design of documents. Alternate for brand guidelines.
      11. A short extract from a recorded interview, chosen for its pungency or appropriateness.
      12. A visual or textual representation of the basic structure/architecture of a website. It provides an overview of the website's organizational hierarchy and general page representation.
      13. ____ advertising. Ads displayed on platforms like Facebook, Instagram, TikTok, X, and LinkedIn.
      14. ____ TV. The delivery of television content over the internet, allowing viewers to watch shows, movies, live events, and other types of video programming on demand, without the need for traditional cable or satellite services. Streaming TV can occur on CTVs as well as other devices such as smartphones and tablets.
      15. Abbreviation for the practice of increasing the quantity and quality of traffic to a website through organic search results and ranking position.
      16. The edge of a book where the pages are bound together, often containing the book’s title and author.

      27 Clues: The process of sewing or stapling the pages of a book or booklet together.A direct mail piece that is mailed without an envelope, often folded and sealed.A short extract from a recorded interview, chosen for its pungency or appropriateness.Official approval of a particular stage or component of a project, allowing it to move forward....

      Per 1 Chapter 11 - Aragon, A 2023-02-27

      Per 1 Chapter 11 - Aragon, A crossword puzzle
      Across
      1. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
      2. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
      3. opens the Remote Desktop utility
      4. This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
      5. displays the DNS resolver cache, which contains host and domain names that have been recently queried
      6. This is used to update a local machine and verify that the machine is getting Group Policy updates.
      7. This is used to create customized system image files that will be installed on computers in the enterprise.
      8. Provides storage locations for files and medias
      9. releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
      10. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
      11. These are identified with a dollar sign ($) at the end of the share name.
      12. a dynamic disk that has been moved to a computer from another computer running Windows
      13. Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).
      14. the command that is used to query the DNS server to discover IP addresses or host names
      15. uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
      16. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
      Down
      1. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
      2. displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name
      3. Access to files that require higher user privilege
      4. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
      5. These are addresses from a reserved range in the 169.254.x.y network space
      6. forces a DHCP client to renew its DHCP address lease from the DHCP server
      7. contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
      8. displays the Group Policy settings that are in effect for a currently logged in user
      9. A feature that enables a user to encrypt all data on a disk drive or removable drive
      10. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
      11. a basic disk that is being converted into a dynamic disk
      12. Cache - Allows remote computers to share access to a single cache of data from shared folders and files
      13. shows a menu in which you can access applications and power options
      14. provides very weak security and should not be relied upon for confidentiality
      15. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
      16. a private network that connects remote sites or users together over a public network, like the internet
      17. a command-line terminal emulation protocol and program that works over port 23
      18. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
      19. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.

      35 Clues: opens the Remote Desktop utilityProvides storage locations for files and mediasAccess to files that require higher user privilegea basic disk that is being converted into a dynamic diskshows a menu in which you can access applications and power optionsforces a DHCP client to renew its DHCP address lease from the DHCP server...

      CAP105-30 Midterm Review 2017-03-22

      CAP105-30 Midterm Review crossword puzzle
      Across
      1. point The ____ is a blinking vertical bar that indicates where text, graphics, and other items will be inserted. from wd1 2 wds
      2. A(n) ____ address is a number that uniquely identifies each computer or device connected to the Internet. from dc2
      3. A(n) ____ is a Web site that offers a variety of Internet services from a single, convenient location. from dc2
      4. ____ is the process of transferring data in a continuous and even flow. from dc2
      5. ____ software is a type of application software that allows users to create and manipulate documents containing mostly text and sometimes graphics. from dc3 2 wds
      6. A(n) ____ is a private combination of characters associated with the user name that allows access to certain computer resources. from dc4
      7. ____ is a series of instructions that tells a computer what to do and how to do it. from DC1
      8. The purpose of __________ is to optimize the use of RAM. from dc4 2 wds
      9. ____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. from dc5
      10. The term ____ refers to online or Internet-based illegal acts. from dc5
      11. ____ are words or phrases that describe a document. from wd1
      12. A personal ____, is a utility that detects and protects a personal computer from unauthorized intrusions. from dc4
      13. A(n) ____ boot is the process of using the operating system to restart a computer. from dc4
      14. When users ____ a document, they change its appearance. from dc3
      15. A software ____ is a collection of individual application programs sold as a single package. from dc3
      Down
      1. The _____, or typeface, defines the appearance and shape of letters, numbers, and special characters. from wd1
      2. The ____ is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals. from dc2
      3. With a ____, you interact with software using text, graphics, and visual images. from DC1 3 wds
      4. A(n) ____ device like the one in the accompanying figure authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. from dc5
      5. A(n) ____ is the destructive event or prank malware is intended to deliver. from dc5
      6. A content ____ is a business that gathers and organizes Web content and then distributes, or feeds, the content to subscribers for free or a fee. from dc2
      7. A _____ is a window that can remain open and visible while you work in the document. from wd1
      8. A(n) ______ is a request for specific data from a database from dc3
      9. A ____ computer is a computer that can perform all of its input, processing, output, and storage activities by itself. from DC1
      10. Each ____ on the Ribbon surrounds a collection of groups, and each group contains related commands. from wd1
      11. ____ consist(s) of a computer’s electronic components that store instructions waiting to be executed and data needed by those instructions. from DC1
      12. Computer ____ entails having knowledge and understanding of computers and their uses. from DC1
      13. A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. from dc5
      14. ____ software is application software that assists people in becoming more effective and efficient while performing their daily business activities. from dc3
      15. A(n) ____ interface controls how you enter data and instructions and how information is displayed on the screen. from dc4

      30 Clues: ____ are words or phrases that describe a document. from wd1When users ____ a document, they change its appearance. from dc3A(n) ______ is a request for specific data from a database from dc3The purpose of __________ is to optimize the use of RAM. from dc4 2 wdsThe term ____ refers to online or Internet-based illegal acts. from dc5...

      Potenza termini 2022-01-12

      Potenza termini crossword puzzle
      Across
      1. è un tipo di tastiera diffusa in america, ma anche in italia
      2. è il nome con cui è indicato il tasto che abilità la scrittura in maiuscolo
      3. operazione che permette di creare una copia di sicurezza in un file
      4. è ciascuna delle pagine che compongono una presentazione tipo PowerPoint
      5. regole comportamentali per la comunicazione su internet
      6. se il termine è riferito ad una risposta del sistema, significa che è attiva
      7. madre è la scheda principale dove sono collegati tutti i componenti hardware del computer
      8. archivio di dati disposti in modo organizzato e correlati tra di loro
      9. è un sistema di protezione del computer da accessi indesiderati
      10. è una sequenza di operazioni elementari che permettono di risolvere un problema in tempo finito
      11. economy: nuova forma di economia caratterizzata dall’utilizzo di internet per la vendita di prodotti e sevizi
      12. misura di un’unità di informazione, corrisponde a 1024 MB
      13. memoria a sola lettura programmabile e cancellabile
      14. dispositivo che permette di collegare computer a una rete locale
      15. casella postale dove vengono accumulati i messaggi di posta elettronica
      16. è il processo dei dati da un database secondo certi criteri
      17. di particolare abilità e ha per obbiettivo la divulgazione dell’informatica
      18. è la tastiera tipicamente italiana
      19. sequenza di comandi per velocizzare le operazioni svolte frequentemente
      20. interfaccia grafica dei software
      21. tecnica di riconoscimento ottico di caratteri di stampa
      22. codice segreto per accedere a risorse e informazioni private
      23. (sistema): è il sistema di numerazione in cui si utilizzano solo cifre indicate da 0-1
      24. è una grandezza che varia in continuo, non è rappresentata da un valore numerico
      25. è l’unità di informazione strutturata di un database
      26. insieme dei dispositivi elettronici e meccanici del computer
      27. è un programma in grado di riconoscere un virus presente in un file ed eliminarlo
      Down
      1. software rilasciato per dimostrazione, ma non è abilitato in tutte le funzioni
      2. collegamento tra un documento e l’altro
      3. marchio che indica la protezione dei diritti dell’autore
      4. finestra progettata per visualizzare i dati di uno o più record di un database
      5. è un componente hardware esterno al computer
      6. procedura per la creazione e la copia sul disco fisso di archivi e programmi
      7. è la posta elettronica, ossia sono i messaggi inviati tramite computer collegati a internet
      8. utilizzo di internet per la comunicazione tra aziende
      9. contiene file e altre cartelle
      10. scherzo informatico non dannoso che fa pensare di essere contagiati da un virus
      11. è un area di lavoro visualizzata sullo schermo ed è dedicata a un’applicazione
      12. sistema operativo di dominio pubblico
      13. è il profilo di un utente che corrisponde a una casella e a un indirizzo di posta
      14. è un dispositivo che serve per smistare messaggi in una rete locale
      15. è il modo in cui vengono organizzati testo e video all’interno di una pagina, per il video o per la stampa
      16. è il dizionario dei sinonimi e contrari
      17. indica la velocità di rotazione del disco fisso
      18. è un documento che integra in modo interattivo testi, immagini e video
      19. ciascuna delle pagine che compongono una presentazione tipo Power Point
      20. è un operazione che permette di caricare o scaricare dalla rete un file sul proprio computer
      21. è l’insieme dei programmi che permettono il funzionamento di un computer
      22. disegno di dimensioni ridotte che richiama la funzione ad essa associata
      23. è il singolo punto luminoso del monitor
      24. singolo documento di lavoro individuato da un nome
      25. cache: memoria interna al processore, ad altissima velocità di accesso
      26. è un programma che permette l’accesso alla rete internet e alle pagine web
      27. li strumenti: è una barra dove sono raccolte delle icone che funzionano da pulsanti

      54 Clues: contiene file e altre cartelleinterfaccia grafica dei softwareè la tastiera tipicamente italianasistema operativo di dominio pubblicocollegamento tra un documento e l’altroè il dizionario dei sinonimi e contrariè il singolo punto luminoso del monitorè un componente hardware esterno al computerindica la velocità di rotazione del disco fisso...

      COVID-19: Coding and General Knowledge 2020-08-14

      COVID-19: Coding and General Knowledge crossword puzzle
      Across
      1. New code effective April 1, 2020, off-cycle update.
      2. CDC’s Influenza SARS-CoV-2 (Flu SC2) Multiplex Assay is a single test used to detect the COVID-19 virus and two types of the _______ virus.
      3. Coders should ______ the provider if the provider documented the diagnosis COVID-19
      4. Worn to minimize exposure to COVID-19.
      5. “Corona” in Coronovirus refers to the appearance of a ____ surrounding the virus.
      6. Study and control of disease or injury patterns in populations.
      7. Condition in children who had or been exposed to COVID-19 causing inflammation of different body parts.
      8. There are ____ phases of human clinical trials that a potential vaccine must undergo to determine if it is safe and effective in preventing infection.
      9. A chemical used in a lab to test patient swab samples to determine a positive or negative COVID-19 result.
      10. Social distance is ____ feet.
      11. Rapid result mucous swab test used to identify an active infection.
      12. COVID-19 is an ___ virus, like the measles and unlike DNA viruses, like smallpox. RNA
      13. Body system most affected by COVID-19 infection.
      14. Name for nonautologous plasma obtained from patients recovered from COVID-19 and transfused into current, acute COVID-19 patients.
      15. The most at-risk COVID-19 patients have the underlying health condition(s) cardiovascular disease, ______, and chronic lung disease.
      16. the test results were back and the test results come back
      17. Contact ¬¬¬______ is the process of identifying, notifying, and monitoring anyone who came in close contact with an infectious, COVID-19 positive individual.
      18. Codes Z09 and _____ are reported when a patient who previously had COVID-19 is seen for a follow-up exam and the COVID-19 test is negative.
      19. Blood test that identifies past COVID-19 infection.
      20. Pneumonia confirmed as due to COVID-19 is coded ______.
      Down
      1. Alternative to in-person medical appointments.
      2. Geographic origin of COVID-19.
      3. Veklury, ‎GS-5734, and RDV are other names for _______.
      4. Epicenter City in May 2020.
      5. Ventilator patients may be placed in the _____ position in order to improve ventilation-perfusion, help keep alveolae open at end-expiration, and improve gas exchange.
      6. Approach for new PCS convalescent plasma transfusion code.
      7. Hospitals will send COVID-19 patient data to a federal contractor called, _______, or to their state health departments.
      8. Codes from PCS Tables ____ and XW1, New Technology Group 5, are reported for administration of a therapeutic substance to treat COVID-19 when a unique code does not exist.
      9. COVID-19 is thought to have a _____ origin, likely bats.
      10. The common _____ and LAMP tests look for genetic strands of a given virus in a sample collected from a patient.
      11. Class of surgeries cancelled to increase hospital capacity for COVID-19 patients.
      12. First word in “SARS.”
      13. Code 8E0ZXY6 may be reported for COVID-19 patients placed in _______.
      14. COVID-19 existing on the hands can be killed by washing for 20 seconds with common household ______, which bursts the virus’ protective bubble.
      15. Code ____ was reported for COVID-19 cases for discharges that occurred prior to April 1, 2020.
      16. A pregnant patient admitted because of COVID-19 should receive a principal diagnosis code from category _____.
      17. Code _____ is reported if a patient has a known or suspected exposure to COVID- 19, is exhibiting signs/symptoms associated with COVID-19, and the test results are negative, inconclusive, or unknown.
      18. Federal agency that licenses, evaluates and monitors vaccines.
      19. Recommended quarantine time, in weeks.
      20. Code ______ is reported as a secondary diagnosis for the sequelae, residual effect or complication of a previous COVID-19 infection.

      40 Clues: First word in “SARS.”Epicenter City in May 2020.Social distance is ____ feet.Geographic origin of COVID-19.Worn to minimize exposure to COVID-19.Recommended quarantine time, in weeks.Alternative to in-person medical appointments.Body system most affected by COVID-19 infection.New code effective April 1, 2020, off-cycle update....

      APHumGeo Block 2 Review-Hunter Cook 2021-04-23

      APHumGeo Block 2 Review-Hunter Cook crossword puzzle
      Across
      1. A system that accurately determines the precise location of something on Earth. (1 CC)
      2. A simplified form of speech developed from two or more languages. (3 IDK)
      3. a two dimensional or flat scale model of the Earth’s surface or portion of it. (1 VIT)
      4. The portion of Earth’s surface occupied by permanent human settlement. (2 IDK)
      5. the deliberate effort to modify a portion of Earth's surface through the cultivation of crops and the raising of livestock for subsistence or economic grain(5 VIT)
      6. The position that a state should be annexed because of ethnicity or prior historical possession. (4 IDK)
      7. A widespread occurrence of an infectious disease in a community at a particular time. (2 CC)
      8. The Brazilian equivalent of a shanty town, which are generally found on the edge of the city. (7 IDK)
      9. Enclaves of ethnic groups settled outside of their homelands. (3 IDK)
      10. Yields a large amount of output per acre through less intensive farming
      11. nationalistic forces that bind a country together. (3 CC)
      12. Beliefs, customs, and traditions of a specific group of people. (3 VIT)
      13. a model to explain the forces that control the prices of agricultural commodities and how those variable prices affect patterns of agricultural land utilization (5 IDK)
      14. Cities with more than 10 million people (6, IDK)
      15. Forces that divide a country (3 CC)
      16. is a country whose political boundaries correspond with its cultural boundaries. ex France (4, VIT)
      17. Service sector industries that require a high level of specialized knowledge or technical skill. Examples include scientific research and high level management. (7 CC)
      18. the policy or practice of acquiring full or partial political control over another country, occupying it with settlers, and exploiting it economically. (4 CC)
      19. A new term used to describe cities that have 20 million or more people (6, IDK)
      20. Disease that occurs over a wide geographic area and affects a very high proportion of the population. (2 CC)
      21. the name given to a place on Earth (1 IDK)
      22. A region caught between stronger colliding external cultural political forces, under persistent stress, and often fragmented by aggressive rivals. (4 IDK)
      23. Yields a large amount of output per acre through concentrated farming (uses a small amount of land). (5 CC)
      Down
      1. Indicator of level of development for each country, constructed by United Nations, combining income, literacy, education, and life expectancy (7 VIT)
      2. A computer system that can capture, store, query, analyze, and display geographic data. (1 CC)
      3. A policy of extending a country's power and influence through diplomacy or military force. (4 CC)
      4. used to show a quantitative difference between mapped features by varying the size of symbols. Data is classified into ranges that are each then assigned a symbol size to represent the range. (1 IDK)
      5. The very sparsely habited, uninhabited, or uninhabitable area of the world. (2 IDK)
      6. business district The area of a city where retail and office activities are clustered. (6, VIT)
      7. The percentage growth of a population in a year, computed as the crude birth rate minus the crude death rate. (2 VIT)
      8. Farms that produce high consumer demand products and either trucks them to market or to processing plants. (5 IDK)
      9. Service sector industries concerned with the collection, processing, and manipulation of information and capital. Examples include finance, administration, insurance, and legal services. (7 CC)
      10. Physical characteristics of a location, including land, labor, capital (6, CC)
      11. The location of a place relative to another place (6, CC)
      12. Another name for squatter settlements that are residential developments that take place on land that is neither owned nor is rented by its occupants. (7 IDK)
      13. a large amount of land). (5 CC)

      36 Clues: a large amount of land). (5 CC)Forces that divide a country (3 CC)the name given to a place on Earth (1 IDK)Cities with more than 10 million people (6, IDK)nationalistic forces that bind a country together. (3 CC)The location of a place relative to another place (6, CC)Enclaves of ethnic groups settled outside of their homelands. (3 IDK)...

      Vocabulary Review 2022-05-17

      Vocabulary Review crossword puzzle
      Across
      1. The story had a ____ and an his arch-nemesis.
      2. He was ____ and never stopped talking.
      3. After the fight, we had to take time to ___ our intense emotions.
      4. The ____ left behind nothing but ashes.
      5. I cant tell the difference between the two. Could you ____ them for me?
      6. If I buy a horse, does that make ma an ____?
      7. The boy is known to ____ his parents in order to get what he wants.
      8. After a long day of work, I need to get some ___.
      9. I often ____ from my original thoughts.
      10. The magician knew how to ____ the crowd.
      11. She made the decision on her own ___.
      12. For our council meeting, we had to remember to invite the esteemed ____ to get her input.
      13. His face was ____ and emotionless after the quiz.
      14. I could not stand that ___ smell coming from the garage.
      15. The pilot who was afraid of heights felt like quite the ___ to me.
      16. Their ___ and rowdy behavior got them suspended.
      17. As a result of her knowledge and wisdom, people always referred to her as a ___.
      18. The dogs at the shelter were very ____ and unique.
      19. Despite his ____, he did not make much money.
      20. The cafeteria feels like a ____ before we all get our food.
      21. I wish we could _____ all diseases.
      22. The glass, which should have been ____, became foggy and opaque.
      23. When I get angry, all I want is to ___ my punching bag.
      24. Why do you always ____ the things that I say?
      25. Her reaction was surprisingly ___ despite the severity of the situation.
      26. The country was run by a _____ after they determined that a president wasn't enough.
      27. Swords can be seen as ____ and risky in battle.
      28. The ___ villain was cruel and evil.
      Down
      1. When baking, be sure to ___ all the ingredients into one bowl.
      2. You cannot ___ upon fundamental rights.
      3. I do not allow others to ____ information to me without my permission.
      4. Their ____ was solemn and sad which was shown by their drooping eyes and deep frown.
      5. The children showed ___ and curiosity towards the project.
      6. Weathermen always ____ the next day's weather.
      7. I was ____ to get on the bike for the first time, but once I got it down I had fun!
      8. It took me a long time to ____ to the new schedule.
      9. Part of working for the fire department is listening to the ___ center for your next assignment.
      10. The ____ on the street became so severe that the police were called in to help.
      11. The man could be describes as a ___ due to his pessimistic attitude.
      12. Her invention was ____ and appreciated by many people.
      13. She meant the phrase in a ____ way, rather than a literal way.
      14. The artists ____ use of color added another dimension to the piece.
      15. The boss has to ___ his employees to get their work done.
      16. Her spending habits were ___ and unnecessary.
      17. She was in a verbal ____ with her mom over whether or not she had to do chores.
      18. I had to ____ my brother to give me my toys back.
      19. I have a ____ for the teacher.
      20. The pain began to ____ after I took the medication.
      21. After a long day of work, I ____ to my bed to sleep.
      22. I wanted to ____ all memory of that awful event.
      23. Her blue hair and green boots made her very _____ to in the store.
      24. The Qur'an is seen as a ___ text in the Muslim religion.
      25. If we ___ our ideas together, maybe we will come up with something new!
      26. In order to ____ a response from the teacher, you must ask nicely.
      27. The ___ had many windows and drawbridges.

      55 Clues: I have a ____ for the teacher.I wish we could _____ all diseases.The ___ villain was cruel and evil.She made the decision on her own ___.He was ____ and never stopped talking.You cannot ___ upon fundamental rights.The ____ left behind nothing but ashes.I often ____ from my original thoughts.The magician knew how to ____ the crowd....

      Noah Kretz - AP Human Crossword 2019-05-01

      Noah Kretz - AP Human Crossword crossword puzzle
      Across
      1. (CC, 7)the location of a place relative to other places.
      2. (CC, 7)The physical character of place; what is found at the location.
      3. (IDK,1)A thematic map using shading to show a pattern of a variable.
      4. (VIT,1)The study of the spatial characteristics of humans and human activities. It's important because it is the base for everything in the topic.
      5. (IDK, 4)the doctrine that territory should be controlled by the country to which they are ethnically or historically related.
      6. (IDK, 5)The land and its ownership and cultivation.
      7. (VIT, 3)A way of classifying languages at the global scale.It is important because every recognized language can be found in this.
      8. (IDK,1)The spread of an idea from persons or nodes of authority to other persons or places.
      9. (CC, 3)The process of people adopting the dominant culture.
      10. (VIT, 6)A period in the 18th and 19th century where great advances were made in agriculture, manufacturing, and transportation. It is important because it was the start of all technological advancements.
      11. (IDK, 3)The visible imprint of human activity on the landscape.
      12. (IDK,2)The seasonal migration of livestock between mountains and lowland pastures.
      13. (CC, 2)Permanent movement within one region of a country.
      14. (CC, 5)Farming that yields a large amount of output per acre through less intensive farming.
      15. (CC, 4)Tending to move away from a center.
      16. (IDK, 6)Areas communities have set aside for industrial uses.
      17. (VIT, 5)The deliberate effort to modify a portion of Earth's surface through the cultivation of crops and the raising of livestock. This is important because it is the main focus of the unit.
      18. (IDK,2)The portion of Earth's surface occupied by permanent human settlement.
      19. (CC, 6)The distance people are willing to travel for a service.
      20. (IDK, 6)Principles for mass production based on assembly-line techniques.
      21. (IDK, 7)A process by which banks draw lines on a map and refuse to lend money to purchase or improve property within boundaries.
      Down
      1. (IDK, 7)The county within which the city is located, and adjacent counties meeting one of several tests indicating a functional connection to the central city.
      2. (CC, 6)The amount of people needed for a company to be profitable.
      3. (CC, 3)The process of adopting fully the dominant culture and abandon their own culture.
      4. (CC,1)A computer system that can capture, store, query, analyze, and display geographic data.
      5. (CC, 4)Tending to move toward a center.
      6. (CC, 5)Farming that yields a large amount of output per acre through concentrated farming.
      7. (VIT,2)Was one of the first to argue that the worlds rate of population increase was far outrunning the development of food population. This is important because he brought up the point that we may be outrunning our supplies because of our exponentially growing population.
      8. (CC, 2)Permanent movement from one region of the country to another.
      9. (IDK, 3)A religion entered on the belief that inanimate objects, such as mts., trees, rivers, and boulders.
      10. (IDK, 5)The growing of fruits, vegetables, and flowers for human consumption.
      11. (VIT, 7)The area of a city where retail and office activities are clustered. It is important because the center of the city is usually the most important part.
      12. (CC,1)A system that accurately determines the precise position of something on Earth.
      13. (IDK, 4)The study of the effects of economic geography on the powers of the state.
      14. (VIT, 4)The formal act of acquiring territory by conquest. This is important because this is how much of the land owned today was claimed.

      35 Clues: (CC, 4)Tending to move toward a center.(CC, 4)Tending to move away from a center.(IDK, 5)The land and its ownership and cultivation.(CC, 7)the location of a place relative to other places.(CC, 2)Permanent movement within one region of a country.(CC, 3)The process of people adopting the dominant culture....

      GCSE ICT Keywords (N-Z) 2016-04-21

      GCSE ICT Keywords (N-Z) crossword puzzle
      Across
      1. A web feed format used for content which is frequently updated e.g. news in a standard format so it can be added to a variety of websites.
      2. Based on truth or reason. It is important to judge whether information found online is valid because it could be biased or untruthful.
      3. Sharing files among groups of people who are logged on to a file-sharing network.
      4. Working from home but staying in touch with others with the help of technology.
      5. A set of rules used by computers to communicate with each other across a network.
      6. Software that can be installed on your computer without your knowledge which collects information about your logins and passwords and sends details to another computer on the internet.
      7. one type of flash memory card which store up to 2 GB of data. Secure Digital High Capacity (SDHC) cards are another type of flash memory card and they are ideal for video cameras because they can store up to 32 GB of data.
      8. An online system for education with areas for homework classes teacher and pupil space etc.
      9. Meeting the needs of the present without compromising the needs of future generations.
      10. Content is sent in compressed form over the Internet and displayed by the viewer in real time. When streaming video a web user does not have to wait to download a file to play it. Instead the media is sent in a continuous stream of data and is played as it arrives on a special player.
      11. A type of website that encourages collaboration by allowing users to add edit and remove content.
      12. A method of encrypting data to provide security for communications over networks such as the Internet. TLS (Transport Layer Security) is a later version of SSL.
      13. a form of internet fraud that aims to steal valuable information such as credit card details usernames and passwords.
      14. A program that appears legitimate but which performs some harmful activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk drive.
      15. To search usually when talking about a database.
      Down
      1. A marketing strategy that encourages people to pass on a marketing message to their friends. It uses interesting and entertaining content that people will want to share.
      2. The ongoing expenses of operating a business e.g. rent and salaries.
      3. External devices connected to a computer e.g. printer or mouse.
      4. Data which is gathered as part of a user’s online activity. When buying something online this could include information about the product bought but also personal details from the buyer such as address and payment details.
      5. Damage caused to the muscles tendons ligaments nerves or joints usually because of repeating the same action such as repetitively clicking a mouse or typing on a keyboard.
      6. Transfer a file from your computer to a central computer e.g. your ISP.
      7. Copying someone else’s work and presenting it as your own.
      8. A program designed to cause other programs on a computer to malfunction or stop working altogether.
      9. A phone offering advanced features e.g. the ability to send emails and surf the internet.
      10. Allows the wireless exchange of data between two devices by touching them together or holding them very close to each other.
      11. It is similar to Bluetooth in that it is used to exchange data wirelessly but the signals can travel greater distances.
      12. The protection of personal data.
      13. This technology is used to make telephone calls via the Internet usually at a cheaper cost.

      28 Clues: The protection of personal data.To search usually when talking about a database.Copying someone else’s work and presenting it as your own.External devices connected to a computer e.g. printer or mouse.The ongoing expenses of operating a business e.g. rent and salaries.Transfer a file from your computer to a central computer e.g. your ISP....

      Chapters 1-5 & 7-14 & 16-19 & 21-26, 29, 6, 30 2018-11-28

      Chapters 1-5 & 7-14 & 16-19 & 21-26, 29, 6, 30 crossword puzzle
      Across
      1. Analysis of the theoretical underpinnings on which the studies are grounded.
      2. Careful appraisal of a study's strengths and weaknesses.
      3. Paradigm most often associated with Mixed Methods research.
      4. Involves exposing the same people to more than one condition.
      5. Characteristic or quality that takes on different values.
      6. A code that is not possible
      7. Distribution with two peaks.
      8. Overall conceptual underpinnings of a study.
      9. A daily record of events and conversations in the field.
      10. Focuses on story in studies in which purpose is to explore how people make sense of events in their lives.
      11. Rank evidence sources according to the strength of the evidence they provide.
      12. Method of integrating quantitative findings statistically.
      13. A listing of each variable together with information about placement in the file, codes associated with the values values of the variable, and other basic information.
      14. Used to predict outcomes.
      15. ANOVA context, the variance is referred to as...
      16. Seeks solutions to existing problems and tends to be of greater immediate utility of EBP.
      17. Achieved through accurate measuring tools, controls over confounding variables, and powerful statistical methods.
      18. The degree to which an instrument measures what it purports to measure.
      19. Route respondents through different sets of questions depending on the responses.
      20. Technique of asking participants to take photographs of themselves and then interpret them.
      21. Documents the extent to which the goals of the program are attained.
      22. The ratio between citations to a journal and recent citable items published.
      23. Focuses on the lived experiences of humans and is an approach to learning what the life experiences of people are like and what they mean.
      24. A system of classifying and organizing terms.
      Down
      1. Statement of predicted relationships between two or more variables.
      2. A design that emerges in the field as the study unfolds.
      3. Researchers view the text as a whole and try to capture its meanings.
      4. Participants have adequate information about the research.
      5. Specific query researchers want to answer in addressing the research problem.
      6. Evaluations are the cornerstone.
      7. Sampling to the point at which no new information is obtained and redundancy is achieved.
      8. The ability of a measure to detect change over time in a construct that has changed, commensurate with the amount of change that has occurred.
      9. The extent to which the sample is similar to the population and avoids bias.
      10. Tendency of observers to be influenced by one characteristic in judging other, unrelated, characteristics.
      11. Observed result could reflect chance fluctuations.
      12. Relationship or association between two variables.
      13. Risks no greater than those ordinarily encountered in daily life or during routine tests or procedures.
      14. Influence that distorts study results.
      15. Original description of a study prepared by the researcher who conducted it.
      16. Refers to the accuracy and consistency of information obtained in a study.
      17. Confidence in the truth of the data and interpretations of them.
      18. The peak is off center and one tail is longer than the other.
      19. Relationship where the participants in the qualitative strand are a subset of the participants in the quantitative strand.
      20. Stability of data over time and conditions.
      21. Enhances the base of knowledge or to formulate or refine a theory.
      22. The process of selecting a portion of the population for a study.
      23. Involves judgments about whether findings from an inquiry can be extrapolated to a different setting or group of people.
      24. Effects of Taking a pretest on people's performance on a post test.
      25. Reflect the ratio of two probabilities.

      49 Clues: Used to predict outcomes.A code that is not possibleDistribution with two peaks.Evaluations are the cornerstone.Influence that distorts study results.Reflect the ratio of two probabilities.Stability of data over time and conditions.Overall conceptual underpinnings of a study.A system of classifying and organizing terms....

      Noah Kretz - AP Human Crossword 2019-05-01

      Noah Kretz - AP Human Crossword crossword puzzle
      Across
      1. (CC, 4)Tending to move toward a center.
      2. (CC, 6)The amount of people needed for a company to be profitable.
      3. (IDK,1)A thematic map using shading to show a pattern of a variable.
      4. (CC, 2)Permanent movement within one region of a country.
      5. (IDK, 4)the doctrine that territory should be controlled by the country to which they are ethnically or historically related.
      6. (IDK, 3)A religion entered on the belief that inanimate objects, such as mts., trees, rivers, and boulders.
      7. (CC, 7)The physical character of place; what is found at the location.
      8. (IDK, 7)The county within which the city is located, and adjacent counties meeting one of several tests indicating a functional connection to the central city.
      9. (VIT,1)The study of the spatial characteristics of humans and human activities. It's important because it is the base for everything in the topic.
      10. (VIT, 3)A way of classifying languages at the global scale.It is important because every recognized language can be found in this.
      11. (CC, 5)Farming that yields a large amount of output per acre through less intensive farming.
      12. (VIT, 6)A period in the 18th and 19th century where great advances were made in agriculture, manufacturing, and transportation. It is important because it was the start of all technological advancements.
      13. (CC, 3)The process of people adopting the dominant culture.
      14. (IDK, 6)Areas communities have set aside for industrial uses.
      15. (IDK,2)The portion of Earth's surface occupied by permanent human settlement.
      Down
      1. (VIT, 4)The formal act of acquiring territory by conquest. This is important because this is how much of the land owned today was claimed.
      2. (CC, 3)The process of adopting fully the dominant culture and abandon their own culture.
      3. (CC, 6)The distance people are willing to travel for a service.
      4. (VIT, 7)The area of a city where retail and office activities are clustered. It is important because the center of the city is usually the most important part.
      5. (IDK, 5)The land and its ownership and cultivation.
      6. (CC, 5)Farming that yields a large amount of output per acre through concentrated farming.
      7. (IDK,1)The spread of an idea from persons or nodes of authority to other persons or places.
      8. (CC, 2)Permanent movement from one region of the country to another.
      9. (IDK, 6)Principles for mass production based on assembly-line techniques.
      10. (VIT, 5)The deliberate effort to modify a portion of Earth's surface through the cultivation of crops and the raising of livestock. This is important because it is the main focus of the unit.
      11. (IDK,2)The seasonal migration of livestock between mountains and lowland pastures.
      12. (CC,1)A system that accurately determines the precise position of something on Earth.
      13. (VIT,2)Was one of the first to argue that the worlds rate of population increase was far outrunning the development of food population. This is important because he brought up the point that we may be outrunning our supplies because of our exponentially growing population.
      14. (IDK, 3)The visible imprint of human activity on the landscape.
      15. (IDK, 4)The study of the effects of economic geography on the powers of the state.
      16. (CC,1)A computer system that can capture, store, query, analyze, and display geographic data.
      17. (IDK, 7)A process by which banks draw lines on a map and refuse to lend money to purchase or improve property within boundaries.
      18. (IDK, 5)The growing of fruits, vegetables, and flowers for human consumption.
      19. (CC, 4)Tending to move away from a center.
      20. (CC, 7)the location of a place relative to other places.

      35 Clues: (CC, 4)Tending to move toward a center.(CC, 4)Tending to move away from a center.(IDK, 5)The land and its ownership and cultivation.(CC, 7)the location of a place relative to other places.(CC, 2)Permanent movement within one region of a country.(CC, 3)The process of people adopting the dominant culture....

      Theory Keywords 2024-05-02

      Theory Keywords crossword puzzle
      Across
      1. memory used to ttemporarily store instructions of programs currently in use so they can be quickly accessed by the CPU
      2. a type of computer with a high level of performance as compared to a general-purpose computer
      3. is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular phone line
      4. an online place where people sharing the same interest can interact
      5. a networking device that forwards data packets to the correct network.
      6. the SQL keyword used to create a query
      7. a protocol used for automatically assigning IP addresses to clients
      8. the time it takes for a data packet to travel from a sender to a reciever
      9. a type of wired connection
      10. a type of low-cost and very easy to implement communication method, mostly used for IoT
      11. a type of software used by the user to perform specific tasks
      12. type of data thta can be organised in a database
      13. a networking device that connects end devices to a network
      14. a legal agreement between the software owner and the user that defines the terms and conditions for using the software
      15. system designed for a specific function within a larger system
      16. a type of diagram that depicts the steps in a process
      17. a type of software that are designed to manage system resources, hardware and other software
      18. a type of key in a database that uniquely identifies each record
      19. a quick-repair job for a piece of software designed to resolve functionality issues
      Down
      1. software that provides low-level control of computing device hardware
      2. Fetches, decodes and executes program instructions
      3. memory used to store computer start-up instructions
      4. an IP address that does not change
      5. a type of device that allows users to feed data into a computer system
      6. breaking down large problems into several smaller, simpler tasks. Often used for systems design.
      7. a type of secondary storage medium that uses laser beams to record and retrieve digital data
      8. a hardware device that connects to a computer and used to transfer information into and out of a computer
      9. a machine-readable code consisting of an array of black and white squares, typically used for storing URLs or other information for reading by the camera on a smartphone
      10. a type of encryption that uses two keys: a public key to encrypt and a private key to decrypt
      11. software with source code that anyone can inspect, modify, and enhance
      12. a diagram used to represent a flow of data through a process or a system
      13. a type of cable cables that carries digital audio and video signals over
      14. the tendency for separated technologies to become integrated into one device
      15. a measure of the maximum amount of data per second that can be transmitted over a network
      16. technology that uses a network of satellites and receiving devices used to determine the location of something on Earth
      17. a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network
      18. technology that consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter that allow for tracking or matching of an item or individual
      19. a type of secondary storage medium that stores data electronically and has no moving parts
      20. a type of website where the pages can be personalised for each user, and they can create accounts, post comments etc
      21. a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules

      40 Clues: a type of wired connectionan IP address that does not changethe SQL keyword used to create a querytype of data thta can be organised in a databaseFetches, decodes and executes program instructionsmemory used to store computer start-up instructionsa type of diagram that depicts the steps in a process...

      Reporting Verbs 2025-07-02

      Reporting Verbs crossword puzzle
      Across
      1. speculate claim urge imply convince emphasize inform highlight alert acknowledge remind blame venture inquire deny
      Down

        1 Clue: speculate claim urge imply convince emphasize inform highlight alert acknowledge remind blame venture inquire deny

        Per 1 Chapter 11 - Nieves, J 2023-02-28

        Per 1 Chapter 11 - Nieves, J crossword puzzle
        Across
        1. This is used to create customized system image files that will be installed on computers in the enterprise.
        2. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
        3. To display a list of tasks that are unique to the application, right-click the application's icon in the taskbar.
        4. Monitors programs on the computer and warns users when an action might present a threat to the computer.
        5. The command that tests basic connectivity between devices by using ICMP echo request and reply messages.
        6. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
        7. Configure basic internet settings, such as selecting the default home page, viewing and deleting browsing history, adjusting search settings, etc.
        8. A specific monitor can be configured if there is more than one monitor.
        9. This specifies the number of pixels horizontally and vertically. A higher number of pixels provides better resolution.
        10. This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
        11. These users can only make configuration changes that affect their own profile.
        12. This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
        13. The command that is used to query the DNS server to discover IP addresses or host names.
        14. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
        Down
        1. To add an application to the taskbar for easy access, right-click the icon of an application and select Pin to taskbar.
        2. Provides very weak security and should not be relied upon for confidentiality.
        3. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
        4. To view a thumbnail image of a running program, hover the mouse over the program icon on the taskbar.
        5. Displays the Group Policy settings that are in effect for a currently logged in user.
        6. These users can access files from other users. They also have elevated permission.
        7. View the desktop icons that are behind open windows by placing your cursor over the Show desktop button found at the right edge of the taskbar.
        8. A group of computers and electronic devices with a common set of rules and procedures administered as a unit.
        9. A private network that connects remote sites or users together over a public network, like the internet.
        10. The command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path.
        11. A feature that enables a user to encrypt all data on a disk drive or removable drive.
        12. A command-line terminal emulation protocol and program that works over port 23.
        13. This sets how often the image in the screen is redrawn.
        14. This determines whether the display appears in Landscape, Portrait, flipped Landscape, or flipped Portrait.
        15. Minimizes all windows that are not being used by clicking and holding the title bar of one window and shaking it with the mouse.
        16. A collection of LAN workstations and servers that are designed to communicate and exchange data with one another

        30 Clues: This sets how often the image in the screen is redrawn.A specific monitor can be configured if there is more than one monitor.Provides very weak security and should not be relied upon for confidentiality.These users can only make configuration changes that affect their own profile....

        UNIX Commands, AT&T Bell Laboratories 2017-02-19

        UNIX Commands, AT&T Bell Laboratories crossword puzzle
        Across
        1. concatenates files
        2. unix is a pun on ______ which was an operating system the early developers were working on
        3. print out arguments to the command
        4. enables you to temporarily switch to a shell owned by another user
        5. tells you what the current time is
        6. deletes files
        7. creates a directory
        8. shows or sets the file mode creation mask
        9. this is used by cron to determine what needs to be run
        10. compare two sorted files line by line
        11. prints lines matching a pattern
        12. lists the contents of a directory
        13. strips directory and suffix from filenames
        14. changes the timestamps of a file or creates file if it doesn't exist
        15. shows the different between two text files
        16. tests for file types and compare values
        17. most commonly used text editor on UNIX/linux
        18. without any files specified, cat reads from the standard ______
        19. used to create a link to a file
        20. print out calendar for the specified month or year
        21. the connection of the standard output of one process to the standard input of another is known as a _____
        22. shows how the directory tree is built by mounted filesystems
        23. shows first few lines of files
        24. creates copy of file under a different name or path
        25. saves a typescript of an interactive terminal session
        26. file perusal filter similar to more but with more features
        27. initializes a terminal or query terminfo database
        28. relays standard input to the standard output while capturing a copy in a file
        29. stream editor for filtering and transforming text using a regular expression syntax
        30. the original line editor that came with UNIX
        31. program that reads input from the standard input and writes to the standard output
        32. used to send output to a printer
        33. calls up the GNU C compiler
        34. the -n option to this command prints the hostname of the computer
        35. shows what processes are running on the system
        36. evaluates logical or integer arithmatic expressions
        37. shows or omits repeated lines
        38. files with names starting with a period are known as _____ files (synonym)
        39. displays information about users on the system
        40. it is a unix convention to store binaries in a ____ directory
        Down
        1. program that returns an exit status of non zero
        2. display or set your tty settings
        3. renames a file
        4. removes sections from each line of files
        5. this is the clock daemon that will run commands for you on a regularly scheduled basis
        6. a link that can span file system boundaries is called a ______ link
        7. a pattern scanning and processing language with algorithmic syntax used in scripting
        8. version of grep that allows the use of logical operators in specifying the search pattern
        9. used to send various signals to processes whose PIDs are known
        10. system process that is designed to run in the background
        11. paginates a file
        12. this is the line oriented portion of vi
        13. shows who is currently logged on
        14. diverting the standard output to a file is known as a _____ion operation
        15. arbitrary precision infix calculator
        16. what we usually call a command line interpreter
        17. program that returns an exit status of zero
        18. searches for files in a directory hierarchy
        19. changes file permission mode settings
        20. shows a listing of last logged in users
        21. determines file type
        22. delays for a specified amount of time
        23. every process was a unique ___ number
        24. sorts lines of text based on criteria
        25. prints out the last few lines of a file
        26. file perusal filter for viewing on terminal
        27. tells computer about the capabilities of your terminal
        28. strips last component from filename
        29. ability to run more than one command at a time
        30. translates or deletes characters
        31. merges lines of files
        32. removes an empty directory

        72 Clues: deletes filesrenames a filepaginates a fileconcatenates filescreates a directorydetermines file typemerges lines of filesremoves an empty directorycalls up the GNU C compilershows or omits repeated linesshows first few lines of filesprints lines matching a patternused to create a link to a filedisplay or set your tty settings...

        Negri termini 2022-01-14

        Negri termini crossword puzzle
        Across
        1. sinonimo di scheda madre o motherboard, cioè la scheda in cui è installata la CPU
        2. indica un fotogramma molto importante per il sistema di compressione del filmato
        3. Memoria di sola lettura utilizzata per istruzioni che non debbono essere cambiate.
        4. dispositivo hardware per la memorizzazione delle informazioni
        5. è una tecnologia utilizzata per lo sviluppo di applicazioni
        6. protocollo Internet utilizzato per inviare posta elettronica
        7. programmi coperti dal copyright che possono essere provati gratuitamente per un certo periodo
        8. è una composizione di otto bit
        9. ha la capacità di 1024 terabyte
        10. telecamera collegabile al computer che consente di trasmettere immagini via Internet.
        11. Processo di estrazione dei dati da un database secondo certi criteri
        12. documento multimediale a disposizione del pubblico e leggibile da qualsiasi punto della rete
        13. è una unità di elaborazione e svolge i calcoli
        14. normalmente riferito alle impostazioni di stampa
        15. comando o termine utilizzato spesso nel software sinonimo di fine, uscita
        16. dispositivo per collegare un cavo a una porta hardware o a una presa
        17. esegue dei calcoli
        18. software realizzato per semplificare l'uso di procedure
        19. cifra binaria che costituisce un byte,
        20. unità di misura di memorie equivalente a 1021 exabyte
        21. È il singolo punto luminoso del monitor
        22. è il nome attribuito a un hard disk o a un floppy disk
        23. azienda produttrice di sistemi operativi, programmi applicativi
        24. delicata connessione realizzato tramite un cavo a essa riservato
        25. Insieme dei programmi che permettono il funzionamento di un computer.
        26. l'immissione dei dati da parte dell'utente in un programma
        27. indica una sequenza di istruzioni scritte nel linguaggio proprio del programma che si sta utilizzando
        28. è l'unità di misura della frequenza
        29. disk supporto magnetico rimovibile per la registrazione o lettura dei dati
        30. si usa per riavviare il computer
        31. in generale sono i messaggi che gli utenti di tutto il mondo si scambiano via Internet
        32. cosa simulata, ricostruita al computer, che appare come se fosse reale.
        33. motore di ricerca
        34. oggetto di scrittura
        35. indica uno pseudonimo che permette di ricevere messaggi indirizzati a un soprannome
        36. sistema numerico basato sulla potenza di 16
        Down
        1. linguaggio di programmazione più semplice di Java
        2. un sistema informatico o telematico che fornisce informazioni esclusivamente su esplicita richiesta
        3. sistema di ricerca
        4. unità di misura di memorie equivalente a 1024 zettabyte
        5. Tastiera tipicamente italiana
        6. dispositivo di output che emette musica
        7. Codice segreto per accedere a risorse e informazioni riservate
        8. è l’insieme delle finestre, dei menu e dei comandi che caratterizzano un determinato programma
        9. caratteri tipografici in modo più marcato
        10. indica l'operazione di ricerca di informazioni su Internet spostandosi da sito a sito
        11. fuori linea
        12. source si riferisce ad una sorgente di dati, solitamente un database, a cui collegare un’applicazione
        13. è un deposito di informazioni,
        14. codice a barre
        15. rappresentano le specifiche per l'uso della memoria estesa
        16. scambiarsi interattivamente, tra due o più utenti, dei messaggi in tempo reale
        17. elemento o voce in un database
        18. dispositivo di input per scrivere
        19. si intende comunemente la scienza che studia la progettazione di calcolatori
        20. indica un file direttamente eseguibile
        21. dispositivo di output
        22. Detto anche CPU è il circuito integrato che elabora i dati
        23. può essere riferito a dati in uscita di un programma o informazioni in uscita da un computer
        24. è un programma caratterizzato da una memoria non volatile
        25. standard di comunicazione che consente la trasmissione di dati
        26. elenco di istruzioni che costituiscono un programma
        27. è l’insieme dei componenti fisici che costituiscono l’elaboratore
        28. pirata dell'informatica che cerca di penetrare nei sistemi informatici altrui
        29. società americana famosa per il suo sistema operativo di rete

        65 Clues: fuori lineacodice a barremotore di ricercasistema di ricercaesegue dei calcolioggetto di scritturadispositivo di outputTastiera tipicamente italianaè una composizione di otto bitè un deposito di informazioni,elemento o voce in un databaseha la capacità di 1024 terabytesi usa per riavviare il computerdispositivo di input per scrivere...