query Crossword Puzzles
Made By Taylor 2024-01-03
Across
- A request for specific data from a database.
- Group of files waiting in the buffer to be printed.
- Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
- Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- An electrical disturbance that can degrade communications
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- Technology-related health condition that affects eyesight. See also CVS
- A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
- Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
Down
- Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
- Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
- Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
- A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
- The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
- A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
- A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
- A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
- The number of horizontal and vertical pixels in a display device
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
- Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
- A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
- The time it takes a signal to travel from one location to another on a network.
24 Clues: A request for specific data from a database. • Group of files waiting in the buffer to be printed. • An electrical disturbance that can degrade communications • The number of horizontal and vertical pixels in a display device • Technology-related health condition that affects eyesight. See also CVS • ...
made by tyler 2024-01-03
Across
- A request for specific data from a database.
- Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
- Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
- Group of files waiting in the buffer to be printed.
- Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- Technology-related health condition that affects eyesight. See also CVS
- A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
- Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
Down
- Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
- Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
- Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
- A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
- The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
- A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
- A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
- The number of horizontal and vertical pixels in a display device
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
- Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
- A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
- The time it takes a signal to travel from one location to another on a network.
24 Clues: A request for specific data from a database. • Group of files waiting in the buffer to be printed. • The number of horizontal and vertical pixels in a display device • Technology-related health condition that affects eyesight. See also CVS • The time it takes a signal to travel from one location to another on a network. • ...
GEO310 Intro 2025-09-03
Across
- The smallest individual unit of a raster image. Each _____ holds a value that represents a specific attribute of the area it covers.
- Data: A type of qualitative data that categorizes information without a natural order or rank. Examples include country names or land cover types.
- Unit: A spatial unit used for data collection, storage, and presentation. Common examples include census tracts, counties, or zip code areas.
- A data model that represents geographic data as a grid of cells or pixels. Each pixel has a value representing a specific attribute, such as elevation, temperature, or land cover. This type of data is well-suited for continuous phenomena like imagery and elevation models.
- Map: A map that focuses on a specific theme or subject, such as population density, climate, or income levels.
- Line: A line that encloses the map's content. It helps to define the overall map area and separate it from marginal information.
- The heading of the map, which provides a concise description of its content, purpose, and sometimes location.
- Additional text below the title that provides more specific information about the map's content (often the location but with smaller font that the heading of the map).
- A smaller map within a larger map that shows a specific area in greater detail or a remote location relative to the main map.
- Autocorrelation: The principle that objects or attributes closer to each other in space are more related than objects farther apart.
- A key that explains the symbols, colors, and patterns used on a map. It is essential for interpreting the map's features.
- Line: The outermost line that delineates the map's entire content, including the map body, legend, title, and other elements.
Down
- A data model that represents geographic features as points, lines, and polygons. This type of data is ideal for discrete features like roads, rivers, and property boundaries.
- Data: Data that describes qualities or characteristics that cannot be measured numerically, such as land use type or vegetation class. It is often represented by distinct different colors or patterns on a map.
- A cartographic element, usually a north arrow or graticules, that helps a user orient the map.
- Class: A homogeneous collection of common features, each having the same spatial representation (point, line, or polygon) and set of attributes. It is a fundamental data structure within a geodatabase.
- Data: A type of data that categorizes information with a specific, meaningful order or rank. Examples include levels of pollution (low, medium, high) or highway classifications (interstate, state route).
- A container used to store, manage, and query geographic datasets. It can hold a variety of data types, including feature classes, raster datasets, and tables.
- Resolution: The ground area represented by a single cell in a raster image.
- Mapping Unit: The smallest size of a feature that is important enough to be distinguished in a particular feature class. Any feature smaller than the ________ mapping unit may be excluded or merged with larger features.
- The ratio or relationship between a distance or area on a map and the corresponding distance or area on the ground. It can be expressed as a representative fraction (e.g., 1:24,000) or a graphic.
- A non-topological, vector-based data storage format for storing the location, shape, and attributes of geographic features. It is one of the most common file formats for geospatial data.
22 Clues: Resolution: The ground area represented by a single cell in a raster image. • A cartographic element, usually a north arrow or graticules, that helps a user orient the map. • The heading of the map, which provides a concise description of its content, purpose, and sometimes location. • ...
Maurice Book Five! 2025-11-17
Across
- The high-fashion charitable event where Maurice has to coordinate ensembles with the reality TV family.
- The opulent, recently installed fixture on the desk of a major political figure.
- The surprising location where the forgotten passkey was eventually recovered.
- The singing songwriter responsible for maintaining the freshness of Maurice’s chocolate supply.
- The persuasive tactic Maurice intends to use in lieu of actual qualifications.
- "Let’s go get some ice cream and watch _____," a common digital distraction.
- The language education application Maurice uses for his daily learning streak.
- Maurice’s highly offensive, racially charged video game invention.
- The famous song-and-dance man hired as the main entertainment for Maurice’s dinner parties.
- The transparently aggressive game currently being programmed by Maurice.
- The exaggerated duration Maurice reserves for his midday meal.
- The postal worker who drew his own firearm on the gun-toting beaver.
- The organizational software Tony suggests for credentials, which Maurice perpetually skips.
- The demeaning title Maurice embodies before receiving a sharp corrective from his butler, Jeeves.
- The crucial, misplaced item preventing Maurice from accessing his immense digital wealth.
- Maurice’s dismissive retort upon being told he needs to prepare a CV.
- The eccentric character who makes a brief appearance in the landmark Maurice #900.
- The name of the politician's female employee.
- The fleeting, seasonal sandwich that motivated Maurice to build an indoor McDonalds.
- The classic, subcompact automobile Maurice decides to park in his living room.
- The NBA star whose poster adorns the wall in strip #879.
- "People who talk on their phones in public are killing _____...," according to Maurice
- The location-based, monster-catching game that is definitely NOT a clone of a popular app.
- The fabled, colder northern nation often referred to as "The Promised Land".
- Randall P. Girdner's preferred characters from RealFunghi Comics.
Down
- Maurice's staggering net worth after cashing out his cryptocurrency haul.
- The heavily tattooed rap-rock artist who is the latest recruit to the X-Men.
- The unfortunate medical incident a certain politician suffers while using the aforementioned golden fixture.
- The delayed fun of a tech mogul after a call with a politician.
- The famous plumber Maurice was legally barred from using in his video game development plans!
- The ironic, aspirational acronym for Designated Organization Underwriting Charity and Helping Elevate a Better And Greater Society.
- The blockbuster superhero film Maurice intends to redo, with help from Randall P. Girdner.
- Maurice’s lavish real estate acquisition made possible by his new fortune.
- Maurice’s trouser-free homage to the famously temperamental Disney duck.
- A decentralized digital currency inspired by a certain financially savvy beaver.
- The caloric coping mechanism Maurice employs to handle election anxiety.
- The one academic milestone Maurice conspicuously failed to complete in high school.
- The single greatest reason to subscribe to the expensive Sunday Comix newsletter.
- The billionaire's eternal, existential query.
- The fast-food chain where Maurice claims, “...hit that kid…”
- The cursed, wish-granting artifact responsible for a certain figure's success.
- The necessary follow-up action after delivering a blow to a bigot.
- The Korean musical artist and member of Maurice’s ever-growing entourage.
43 Clues: The billionaire's eternal, existential query. • The name of the politician's female employee. • The NBA star whose poster adorns the wall in strip #879. • The fast-food chain where Maurice claims, “...hit that kid…” • The exaggerated duration Maurice reserves for his midday meal. • The delayed fun of a tech mogul after a call with a politician. • ...
Crossword - CompLec 2014-11-09
Across
- Device requests time from the processor using the interrupt request
- uses Information system (tactical decisions)
- the focus is on developing a small model, or prototype, of the overall system
- Helps the computer do useful things
- A small, high-speed memory area that is placed between the processor and the system memory
- The main circuit board in the computer where everything comes together
- allows designers to dramatically reduce the time they spend at the drafting board
- uses Information system (strategic decisions)
- integrate the entire company, or enterprise
- is the theory and development of computer systems able to perform tasks that normally require human intelligence
- systems development effort in which the user is primarily responsible for the development of the system
- An input device that allows you to move the cursor around the screen
- uses information system (decisions about short-term objectives)
- Identification of specific markets to target them with advertising messages
- phase in which hardware, software and other components are acquired
- A type of transaction Processing Systems
- It is sometimes called the Cathode Ray Tube
- uses information system (on-the-job decisions)
- make use of diagrams, tables and checklists
- a type of Transaction Processing Systems
- are combinations of hardware, software, and other resources used to facilitate communications and enhance productivity
Down
- A programmable electronic device that can store , retrieve, and process large amounts of data
- Collection of elements and procedures that interact to accomplish a goal
- The brain of the computer
- Sends information over the line one bit at a time
- Covers the collection of details stored in database.
- a type of Transaction Processing Systems
- The electrical channels through which various parts of the computer communicate
- The rows of such a table can be thought of as representing the records
- includes the use of computers to help manage manufacturing operations and to control machinery used in manufacturing processes
- Structured Query Language
- Improve the relationship among citizen and government
- Single Website that offers many products and services at one internet location
- A collection of people, hardware, software, data, and procedures that interact to generate information to support the users of an organization.
- They often approve broad plans for systems development within an organization
- gather information about how work is done in the applications area and to ascertain what information users need
- Are external devices that extends the functionality of the PC
- Picture Elements
- Is a list of information that is not necessarily related to any other lists or tables
- Ensures that only unique values can be assigned in each row for that field(s)
- plan, build, and implement systems that make use of computers that a company has or will acquire
- Has revolutionized the world of investment and finance
- Enterprise resource planning
- Is the term used for all the physical components on a PC
- Identifies the rows to be updated, selected and is composed of column names, expressions, constraints, sub-queries, and comparison operators
- Electronic Retailing
- Data values for every column are stored in row
- The main input device for most computers
- Random Access Memory
- Connection that allows you to attach everything from mice to printers
50 Clues: Picture Elements • Electronic Retailing • Random Access Memory • The brain of the computer • Structured Query Language • Enterprise resource planning • Helps the computer do useful things • a type of Transaction Processing Systems • A type of transaction Processing Systems • The main input device for most computers • a type of Transaction Processing Systems • ...
COMPUTER TERMS 2022-02-07
Across
- To move data or to transfer it to or from a computer along a line such as a telephone line, a radio link, or a computer network.
- An output hardware device that connects to a computer to generate sound. The signal used to produce the sound that comes from a computer speaker is created by the computer's sound card
- A unit of computer information consisting of 1,024 megabytes: GB can be a synonym e or can refer to 1,000,000,000 bytes
- A small hardware input device used by hand. It controls the movement of the cursor on the computer screen and allows users to move and select
- A set of characters (letters and/or numbers) that identifies a user (such as on a computer system, website, or social media platform
- A picture which usually stands for a computer program, computer file, folder, or an action for a program to do. Icons are usually small pictures
- A font is a graphical representation of text that may include a different typeface, point size, weight, color, or design.
- DRIVE The part of the computer that stores all your data. It houses the hard disk, where all your files and folders are physically located.
- Messages distributed by electronic means from one computer user to one or more recipients via a network.
- An application used to access and view websites. Common web browsers include Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, and Apple Safari.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user. It might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk
- To transfer (something, such as data or files) from a computer or other digital device to the memory of another device (such as a larger or remote computer) especially via the Internet.
Down
- A program with a set of instructions and documentation that tells a computer what to do or how to perform a task.
- A global computer network providing a variety of information and communication
- A string of characters that allows access to a computer system or service
- A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
- A computer display , the screen is the physical surface on which visual information is presented. This surface is usually made of glass.
- An electronic device or hardware that accepts text files or images from a computer and transfers them to a medium such as paper
- an electronic device with a screen used for display (as of television pictures or computer information)
- A panel of keys that operate a computer
- The virtual location for applications, documents, data or other sub-folders. Folders help in storing and organizing files and data in the computer.
- The common storage unit in a computer, and all programs and data are "written" into a file and "read" from a file.
- To move text or graphics up or down or across a display screen
- Websites such as Google are made for this, otherwise known as a query, is an entry into a search engine that provide the answers to a question or prompt
24 Clues: A panel of keys that operate a computer • To move text or graphics up or down or across a display screen • A string of characters that allows access to a computer system or service • A global computer network providing a variety of information and communication • ...
Wightman GIS Day 2022 2022-11-11
Across
- one of the two main data categories in GIS. This data is made up of individual items with discrete values.
- one of the two main data categories in GIS. This data is made up of a collage of “cells” to represent data.
- Wightman’s GIS Analyst, likely to be found in the garden during summer months.
- Type of view in ArcGIS Pro where you create deliverables for your project.
- Information associated with an individual feature. This information is stored in a spreadsheet and is connected to the associated feature class.
- One of Wightman’s GIS Technicians, ask this one about pigeons and thrifting.
- The biggest name in GIS, Wightman is a partner company with this organization responsible for the ArcGIS suite of products.
- Common storage file type that stores location, attribute, and shape of features for ONE layer.
- Each individual unit of data in GIS. Each above ground marker, pipe segment, or parcel would be examples of this.
- A map layer that operates in the background of your data like what you would see in Google maps. Updates automatically to your location as you pan around your screen.
- A logic statement used to display features based on specified attributes in GIS.
- The practice of creating representations of a map’s data using small pictures, colors, and shapes, among other things.
- One of the three types of vector data in GIS representing a single feature that doesn’t have length or area in GIS.
- Information pertaining to the origination and authoring of GIS data that contains information about it (such as how it was collected, formatting, use, etc).
Down
- Items that make up the contents or focus of a map.
- This is used to display features on the earth (a three-dimensional object) onto a two-dimensional plane (map). Each one has its benefits and its deficiencies in mapping.
- Type of view in ArcGIS Pro where you edit data in your project.
- A collection of geographic datasets of various types. Each dataset is compromised of feature classes, raster datasets, and tables to organize and display the data
- Operational data layer stored in ArcGIS Online. This data layer allows for the creation and editing of features in GIS. Allows for storing photos or file attachments.
- ArcGIS Online, abbreviated.
- Wightman’s GIS Practice Area Leader, likely to be found on the links if it’s nice enough.
- One of the three types of vector data in GIS representing a single feature that has length but does NOT have area.
- The real-world distance represented by distance on a map. This is displayed using a scale bar, a ratio, or even just verbally.
- The file extension for a project created and edited in ArcGIS Pro.
- Feature ____: Collection of related feature classes that share a common coordinate system. These are used to integrate related feature classes spatially or thematically.
- The “S” in GIS.
- One of the three types of vector data in GIS representing a single feature that contains a full area measurement.
- A box on a map used to show what the symbols on the map correspond to.
- Wightman’s coolest GIS Technician (I typed the clues), basketball and video games fill this one’s life.
29 Clues: The “S” in GIS. • ArcGIS Online, abbreviated. • Items that make up the contents or focus of a map. • Type of view in ArcGIS Pro where you edit data in your project. • The file extension for a project created and edited in ArcGIS Pro. • A box on a map used to show what the symbols on the map correspond to. • ...
Bizit-Synergynest 2021-03-31
Across
- ________is an open source software framework for fast batch data processing across parallel servers.
- Analytics 1.0 is the era of ____________. (Note: use the 5th letter to open the first password protected file).
- __________Analytics is one of the approach used to filter the outlying information and analyze only the required data.
- Analytics 2.0 is the era of _____.
- By employing the mobile phone data a good dataset would contain “ _______rates” and “recording periods” that can be used for estimating the origin-destination matrix. .( Note: use the 2nd letter to open the first password protected file).
- What type of problem does sports team encounter mostly?
- The demand for the travel can be estimated using ______________data.
- In this article which is the technology that is compared to make analytics accessible?
- What is the important use of this analytics in terms of reducing costs?(Note: use the 6th letter to open the first password protected file).
- Analytics 2.0 is the era of __________
- Analytics 3.0 is the era of _____________ offerings.
- ____________ Analysis combines the quantitative and qualitative matrix to aid the decision-making process.
- ____________ signal can serve as an early warning system for budding problems. However, they are indicative, not confirmatory.
- Intelligent Transportation Systems enables the connection among people, vehicles,______________, and services.
- The next-generation quantitative analysts were called __________, as they possessed both computational and analytical skills. (Note: use the 6th letter to open the first password protected file).
Down
- _________ Methods were used to rapidly generate models from the fast-moving data.(Note: use the 7th letter to open the first password protected file).
- Technology and -------------- are the important helps organizations to use data and analytics to the core.(Note: use the 6th letter to open the first password protected file).
- What is the most effective thing in making a common language?
- Who are exposed to the lab work to work along with bio mechanists to solve problem?
- ______________Data is the one that possess challenges in data collection and cleaning due to its vast information.
- If the source is a Surveillance video which is the analytical approach that is used to estimate the traffic count and violation.
- ___________Information are collected from the social signals that are generated by the public transportation systems. (Note: use the 14th letter to open the first password protected file).
- Apart from managers and sports scientists who is important in learning a common language?
- What was mainly monitored by the Kraft group to engage customers?( Note: use the 6th letter to open the first password protected file).
- Data management have expanded considerably, and almost every organization will end up with a _____________ environment .
- To deal with relatively unstructured data, companies turned to a new class of databases known as__________ . (Note: use the 1st letter to open the first password protected file).
- How many variety of questions are put forth by Gelman to drive decisions?(Note: use the 4th letter to open the first password protected file).
- _________Is an instance of crowd sourcing mechanism that eliminates the need for paid individuals for collecting the geographic information .
- _________ was the era of the enterprise data warehouse, used to capture information, and of business intelligence software, used to query and report it.
- ________________ Information are extracted from social networking sites using NLP . (Note: use the 6th letter to open the first password protected file).
- To improve the prediction accuracy _______________ approach is used to combine all the social transportation data.( Note: use the 10th letter to open the first password protected file).
31 Clues: Analytics 2.0 is the era of _____. • Analytics 2.0 is the era of __________ • Analytics 3.0 is the era of _____________ offerings. • What type of problem does sports team encounter mostly? • What is the most effective thing in making a common language? • The demand for the travel can be estimated using ______________data. • ...
Made By Brice 2024-01-02
Across
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
- A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
- A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
- Group of files waiting in the buffer to be printed.
- The number of horizontal and vertical pixels in a display device
- Scientist Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
- The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
- Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
- Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
Down
- Technology-related health condition that affects eyesight. See also CVS
- A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
- A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
- is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
- Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
- Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
- A request for specific data from a database.
- The time it takes a signal to travel from one location to another on a network.
- cache Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
- A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
24 Clues: A request for specific data from a database. • Group of files waiting in the buffer to be printed. • The number of horizontal and vertical pixels in a display device • Technology-related health condition that affects eyesight. See also CVS • The time it takes a signal to travel from one location to another on a network. • ...
Made by Madelyn 2024-01-02
Across
- - A collection of data organized in a manner that allows access, retrieval, and use of that data
- - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
- - An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- - A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
- - The time it takes a signal to travel from one location to another on a network
- - An electrical disturbance that can degrade communications
- - A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
- - Technology-related health condition that affects eyesight. See also CVS
- - A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
- - Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
- - Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
- - Group of files waiting in the buffer to be printed.
Down
- - The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
- - The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
- - is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
- - A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
- - Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- - Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing
- - Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
- - Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
- - The number of horizontal and vertical pixels in a display device
- - A request for specific data from a database
- - Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
- - A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
24 Clues: - A request for specific data from a database • - Group of files waiting in the buffer to be printed. • - An electrical disturbance that can degrade communications • - The number of horizontal and vertical pixels in a display device • - Technology-related health condition that affects eyesight. See also CVS • ...
Made by Madison 2024-01-02
Across
- A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- The time it takes a signal to travel from one location to another on a network.
- Technology-related health condition that affects eyesight. See also CVS
- Group of files waiting in the buffer to be printed.
- The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
- A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
- An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
- A request for specific data from a database.
Down
- Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
- A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
- the number of horizontal and vertical pixels in a display device
- Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
- Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
- A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
- Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
- someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
- Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
- Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
- A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
- Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
24 Clues: A request for specific data from a database. • Group of files waiting in the buffer to be printed. • the number of horizontal and vertical pixels in a display device • Technology-related health condition that affects eyesight. See also CVS • The time it takes a signal to travel from one location to another on a network. • ...
Made by Ethan 2024-01-02
Across
- Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
- Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
- Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- Technology-related health condition that affects eyesight. See also CVS
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- The time it takes a signal to travel from one location to another on a network.
- An electrical disturbance that can degrade communications
- Group of files waiting in the buffer to be printed.
- A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
- A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
- Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
- Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
- The number of horizontal and vertical pixels in a display device
- A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
- Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
Down
- The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
- A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
- A request for specific data from a database.
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
- A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
- is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
- A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
- Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
24 Clues: A request for specific data from a database. • Group of files waiting in the buffer to be printed. • An electrical disturbance that can degrade communications • The number of horizontal and vertical pixels in a display device • Technology-related health condition that affects eyesight. See also CVS • ...
made by gabe 2024-01-03
Across
- A request for specific data from a database.
- technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- Scientist Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
- The number of horizontal and vertical pixels in a display device
- engineer Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- Group of files waiting in the buffer to be printed.
- A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
- An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
- Device Convergence The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
Down
- cache Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
- A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money
- The time it takes a signal to travel from one location to another on a network
- A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
- computing Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
- Disc Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
- Vision Syndrome Technology-related health condition that affects eyesight. See also CVS
- Aggregation A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
- System is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
- Defragmenter Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
- A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
- processing unit The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
24 Clues: A request for specific data from a database. • Group of files waiting in the buffer to be printed. • The number of horizontal and vertical pixels in a display device • The time it takes a signal to travel from one location to another on a network • Vision Syndrome Technology-related health condition that affects eyesight. See also CVS • ...
Made By Riley 2024-01-03
Across
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- engineer Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
- cache Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
- Group of files waiting in the buffer to be printed.
- The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
- An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
- A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
- The number of horizontal and vertical pixels in a display device
Down
- Syndrome Technology-related health condition that affects eyesight. See also CVS
- processing unit The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
- The time it takes a signal to travel from one location to another on a network.
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- Scientist Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
- computing Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
- Aggregation A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
- A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
- A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
- Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
- Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
- Disc Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
- A request for specific data from a database.
- A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
- A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
24 Clues: A request for specific data from a database. • Group of files waiting in the buffer to be printed. • The number of horizontal and vertical pixels in a display device • The time it takes a signal to travel from one location to another on a network. • Syndrome Technology-related health condition that affects eyesight. See also CVS • ...
Shofiyah hafshoh / XI-BDP 1 2024-02-20
Across
- bagian dari customer review yang menggunakan bentuk simbol bintang dalam mengekspresikan pendapat dari pelanggan adalah istilah dari
- apa istilah untuk perjanjian dimana pelanggan menyetujui sebelum menggunakan layanannya
- istilah yang ditujukan untuk pemilik apa di marketplace atau e-commerce adalah
- Suatu ruang informasi yang dipakai oleh pengenal global yang disebut mengidentifikasi sumber program untuk mengatasi sumber daya alam adalah
- optimisasi mesin pencari yang bertujuan untuk meningkatkan volume dan kualitas grafik kunjungan melalui mesin pencari menuju situs web tertentu dengan memanfaatkan mekanisme kerja atau algoritma mesin pencari tersebut adalah istilah dari
- singkatan dari search engine result pages adalah
- Disebut apakah aktivitas yang melibatkan Dua pihak atau lebih untuk mempertukarkan sesuatu milik yang satu dengan sesuatu yang lain atau milik pihak lain
- istilah dalam dunia bisnis online yang biasanya akan muncul pada penjual online atau seller yang menjual barang bekas dengan minim kerusakan
- nama search engine pertama sebelum lahirnya google yang diciptakan oleh Larry Page dan Sergey Brin adalah
- Link yang berperan penting dalam meningkatkan ranking di mesin pencari dan mengarahkan traffic organik ke suatu website adalah istilah dari
- halaman informasi yang disediakan melalui jalur internet sehingga bisa diakses diseluruh dunia selama terkoneksi dengan jaringan internet, merupakan pengertian dari
- Disebut apakah proses tawar-menawar yang dilakukan oleh pembeli dan penjual untuk mendapat kesepakatan harga
- bisnis yang dilakukan melalui sistem komputer daring interaktif yang menghubungkan konsumen dan penjual secara elektronik.
- selisih antara harga jual dan harga beli produk disebut
- istilah apa yang digunakan untuk menjual barang yang sudah pernah dipakai
- apa istilah untuk jasa yang ditawarkan oleh produsen kepada konsumennya setelah transaksi penjualan dilakukan sebagai jaminan mutu untuk produk yang ditawarkannya.
Down
- media promosi yang dicetak dengan print digtal yang umumnya berbentul potrait atau vertikal adalah
- Apa istilah dari proses untuk mengakses komputer dengan memasukkan identifikasi dari akun pengguna dan kata sandi guna mendapatkan hak akses menggunakan sumber daya komputer tujuan
- istilah untuk proses penyampaian barang atau jasa dari produsen ke konsumen dan para pemakai adalah
- daftar yang terurut yang berisi informasi tertentu tentang benda atau barang yang didaftar adalah pengertian dari
- microblog adalah istilah untuk
- Apa istilah untuk proses mengirimkan dan memindahkan data dari perangkat lokal seperti komputer atau ponsel cerdas ke server atau platform media sosial yang akan menyimpan dan mengelola konten tersebut
- istilah untuk produk yang sudah tidak dijual lagi
- Disebut apakah seseorang yang memiliki kemampuan menggerakkan orang lain dalam jumlah banyak untuk melakukan suatu tindakan tertentu dan tidak terbatas dalam ruang dan waktu
- Disebut apakah pihak yang memiliki kepentingan dalam perusahaan dan dapat mempengaruhi atau dipengaruhi oleh bisnis
- proses yang biasa dilakukan pelanggan saat mendapat produk yang tidak sesuai sehingga ingin mengembalikan produk ke penjual disebut apa
- disebut apakah pertukaran atau jual beli mata uang
- istilah dari deretan angka biner angka 32 bit sampai 128 bit yang dipakai sebagai alamat identifikasi untuk tiap komputer host dalam jaringan internet adalah
- nama unik yang diberikan untuk mengidentifikasi nama server komputer seperti web server atau email server dijaringan komputer ataupun internet adalah
- biaya yang dikeluarkan oleh penjual saat mengirimkan paket kepada pembeli adalah
- perangkat lunak yang berfungsi menampilkan dan melakukan interaksi dengan dokumen-dokumen yang disediakan oleh server adalah
- istilah yang digunakan dalam konteks mesin pencari dan merujuk pada kata kunci atau frasa yang dimasukkan oleh pengguna untuk mencari informasi di internet adalah
- Disebut apakah bentuk usaha berjualan barang secara online tanpa perlu menyimpan stok barang tersebut
33 Clues: microblog adalah istilah untuk • singkatan dari search engine result pages adalah • istilah untuk produk yang sudah tidak dijual lagi • disebut apakah pertukaran atau jual beli mata uang • selisih antara harga jual dan harga beli produk disebut • istilah apa yang digunakan untuk menjual barang yang sudah pernah dipakai • ...
KROSSFIRE - MEGA HR KONCALVE 2020-08-21
Across
- Father won the Nobel Prize for the discovery of the mechanism of replication. Two sons also won the Nobel prize - one for transcription mechanism and one for discovering the enzymes related to his father’s discovery, name the family
- A database that gives you information about both the victim, suspect and the murderer
- What does your sick CSF, the famous sitcom ‘How I met your Mother’ and Coldplay have in common along with a physiological condition causing your brain to swell?
- I intercalate between the planar bases of the DNA and provide visibility beyond the visible light range only
- An antioxidant concoction of sugar, black tea and yeast
- An artificially designed injectable analogue that reduces the symptoms of polyuria and protects from retinopathy due to a particular disorder without giving you an allergic response
- I am a common lab equipment who helped Kary to come up with the idea of PCR
- This term is often associated with atomic bombs and could define the phenomena of collision between an electron and positron producing two photons
- I can protect you from shocks and also regulate the acidity
- Teenagers could be pretty perturbed about these bumps as they think that could make them look ugly
- It is home to microbes which gives them the ambience to propagate
- It uses hashing algorithms and helps us to find short common patterns in query and database sequences, joining them into an alignment
- Equipment that functions by using a force that pushes everything away from its centre
- A collective term for various symptoms of cognitive impairment
- I am the wallpaper of the pear but I do ensure you your progeny
- Localised area of necrosis due to blockage in vascular supply
- A medically certified product used to break down blockages and improve survival rates
- What metal will you eat if you love green leafy vegetables?
Down
- An academic term
- You could pop me as a pellet or I could course through your blood, but I surely shall provide you relief
- CRISPR Cas 13a associated diagnostic tool which is named after the famous British detective
- Self funding a business project is termed as
- These proteins or glycoproteinaceous structures act as the social hub of our cells
- FDA approved method for detecting COVID-19 virus in patients
- A passive form of this was legalized in India on 7th march, 2011, only for patients in a “permanent vegetative state”
- The solution to the pandemic might be this, as it has been to diseases like polio and smallpox
- I come from your plasma to enter your sarcomeres and curb your negativities and save you from the positive force
- I sweep across the nasopharynx and then by the oropharynx to make you positive in this pandemic
- I trigger you while you sip your wine as well as when you do pilates, how odd! Who could I be?
- It is a set of research ethics which was named after a very famous trial. This particular trial was held to investigate a state-sponsored persecution which has been documented multiple times in international televisions
- Military system of the liver
- This drug could be administered to treat SHOX deletions/ mutations
- When we play with numbers and identify their relations which branch of science are we studying?
- SARS-Cov-2 belongs to this genus
- I help you strain out all your toxicity using diffusion and convection as the principle behind my equipment
35 Clues: An academic term • Military system of the liver • SARS-Cov-2 belongs to this genus • Self funding a business project is termed as • An antioxidant concoction of sugar, black tea and yeast • I can protect you from shocks and also regulate the acidity • What metal will you eat if you love green leafy vegetables? • ...
AP COMPUTER PRINCIPLES 2018-09-06
Across
- provides information about a certain item's content.
- the virtual world of computers.
- a temporary network connection created for a specific purpose.
- consists of multiple devices that communicate with one another.
- a central file storage location.
- information stored using a series of ones and zeros.
- refers to the process of receiving data over the Internet.
- the location where data that is being used come from.
- a namespace that organizes a set of related classes and interfaces.
- information processed or stored by a computer.
- An acronym occasionally used to reflect an advancement in transmission or transfer speed.
- commonly used to describe the resolution of digital cameras.
- often used to measure the size of large files.
- reduces a file's size with no loss of quality.
- a set of instructions designed to perform a specific task.
- allow users to be part of a virtual community.
- the process of generating a final digital product from a specific type of input.
- refers to an electricalsignal that is converted into a pattern of bits.
- applications and services offered over the Internet.
- a small chip that resides in computers and other electronic devices.
- any letter, number, space, punctuation mark, or symbol that can be typed on a computer.
Down
- a data organization, management and storage format that enables efficient access.
- usernames or IP addresses, that are denied access to a certain system or protocol.
- another word for question.
- a type of data and information mining process where data is searched, gathered. datamining he process of analyzing large amounts of data in order to discover patterns.
- a unique address that identifies a device on the Internet or a local network.
- a system used to track objects, people, or animals using tags that respond to radio waves.
- a list of items that are granted access to a certain system or protocol.
- a technology that recognizes text within a digital image.
- a repository that houses computing facilities like servers, routers, switches and firewalls.
- refers to a central place where data is stored and maintained.
- digital telecommunications network which allows nodes to share resources.
- the science of protecting information by transforming it into a secure format.
- term used to describe unsightly debris that accrues as the result of the experience of digital living.
- a programming language designed for the visual arts community.
- the ownership of intangible and non-physical goods.
- is a dot matrix data structure that represents a generally rectangular grid of pixel
- The translation of data into a secret code.
- small little dots which make up up images on a display
- a device that reads and/or writes data to a disk.
- representations of economic, engineering, manufacturing, social, and other types of situations
- processor speeds, or overall processing power for computers will double every two years.
- continuous transmission of information
- provides a standard way to represent characters using numeric codes.
- a file containing detailed records on a particular person or subject.
- (short for binary digit) is the smallest unit of measurement used to quantify computer data.
- a small amount of data sent over a network, such as a LAN or the Internet.
47 Clues: another word for question. • the virtual world of computers. • a central file storage location. • continuous transmission of information • The translation of data into a secret code. • information processed or stored by a computer. • often used to measure the size of large files. • reduces a file's size with no loss of quality. • ...
APCSA 1 2023-05-12
Across
- A request for information from a database or search engine.
- A blueprint of methods that a class must implement, specifying the contract or behavior expected from the class.
- A keyword in Java used to define a variable or method that belongs to the class itself rather than an instance of the class.
- A keyword in Java used to declare classes or methods that cannot be instantiated and require subclasses to provide implementation.
- The core component of an operating system that manages system resources and provides essential services.
- A programming construct that allows executing a set of instructions repeatedly until a certain condition is met.
- A mechanism in Java that allows a class to inherit properties and behaviors from another class.
- Computing The delivery of computing services, such as storage, servers, and software, over the internet on a pay-as-you-go basis.
- Acronymn for artificial intelligence
- The process of converting information into a coded form to protect its confidentiality and integrity.
- Transmission Control Protocol/Internet Protocol, the foundational protocols of the internet that enable communication between devices.
- Learning A field of artificial intelligence that enables computer systems to learn and improve from experience without being explicitly programmed.
- The development of computer systems capable of performing tasks that typically require human intelligence
- HyperText Markup Language, the standard markup language used for creating web pages.
- Acronymn for a programming paradigm that organizes code into objects
- A named storage location in a program that holds a value or data.
- An event that occurs during the execution of a program, disrupting the normal flow of instructions. It can be handled using exception handling mechanisms.
- Large and complex data sets that require specialized processing techniques for analysis and insights.
- The point of interaction between a user and a computer system or between different components of a system.
Down
- The set of rules that dictate the structure and format of programming languages.
- A set of rules or guidelines that govern the exchange of data between devices in a network.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The coordination of multiple threads to ensure that they access shared resources in a controlled manner, preventing data inconsistency or conflicts.
- The ability of an object to take on different forms or exhibit different behaviors based on the context.
- A high-speed data storage mechanism that stores frequently accessed information for faster retrieval.
- A programming technique in which a function calls itself directly or indirectly to solve a problem.
- A programming language commonly used for client-side web development.
- The process of identifying and fixing errors or bugs in a software program.
- A way to organize related classes and interfaces into a single namespace, providing a means of modularization and avoiding naming conflicts
- The process of converting an object of one type to another type, either implicitly or explicitly.
- The ability to define multiple methods with the same name but different parameter lists within a class.
- A number system that uses only two digits, 0 and 1, to represent values.
- A set of step-by-step instructions to solve a specific problem or perform a task.
- Extensible Markup Language, a markup language used for storing and transporting data.
- A collection of interconnected devices and communication pathways that allow sharing of resources and information.
- A software program that translates high-level programming code into a lower-level language (such as machine code) that can be executed by a computer.
36 Clues: Acronymn for artificial intelligence • A request for information from a database or search engine. • A named storage location in a program that holds a value or data. • Acronymn for a programming paradigm that organizes code into objects • A programming language commonly used for client-side web development. • ...
GEO310 Intro 2025-09-03
Across
- The smallest individual unit of a raster image. Each _____ holds a value that represents a specific attribute of the area it covers.
- Data: A type of qualitative data that categorizes information without a natural order or rank. Examples include country names or land cover types.
- Unit: A spatial unit used for data collection, storage, and presentation. Common examples include census tracts, counties, or zip code areas.
- A data model that represents geographic data as a grid of cells or pixels. Each pixel has a value representing a specific attribute, such as elevation, temperature, or land cover. This type of data is well-suited for continuous phenomena like imagery and elevation models.
- Map: A map that focuses on a specific theme or subject, such as population density, climate, or income levels.
- Line: A line that encloses the map's content. It helps to define the overall map area and separate it from marginal information.
- The heading of the map, which provides a concise description of its content, purpose, and sometimes location.
- Additional text below the title that provides more specific information about the map's content (often the location but with smaller font that the heading of the map).
- A smaller map within a larger map that shows a specific area in greater detail or a remote location relative to the main map.
- Autocorrelation: The principle that objects or attributes closer to each other in space are more related than objects farther apart.
- A key that explains the symbols, colors, and patterns used on a map. It is essential for interpreting the map's features.
- Line: The outermost line that delineates the map's entire content, including the map body, legend, title, and other elements.
Down
- A data model that represents geographic features as points, lines, and polygons. This type of data is ideal for discrete features like roads, rivers, and property boundaries.
- Data: Data that describes qualities or characteristics that cannot be measured numerically, such as land use type or vegetation class. It is often represented by distinct different colors or patterns on a map.
- A cartographic element, usually a north arrow or graticules, that helps a user orient the map.
- Class: A homogeneous collection of common features, each having the same spatial representation (point, line, or polygon) and set of attributes. It is a fundamental data structure within a geodatabase.
- Data: A type of data that categorizes information with a specific, meaningful order or rank. Examples include levels of pollution (low, medium, high) or highway classifications (interstate, state route).
- A container used to store, manage, and query geographic datasets. It can hold a variety of data types, including feature classes, raster datasets, and tables.
- Resolution: The ground area represented by a single cell in a raster image.
- Mapping Unit: The smallest size of a feature that is important enough to be distinguished in a particular feature class. Any feature smaller than the ________ mapping unit may be excluded or merged with larger features.
- The ratio or relationship between a distance or area on a map and the corresponding distance or area on the ground. It can be expressed as a representative fraction (e.g., 1:24,000) or a graphic.
- A non-topological, vector-based data storage format for storing the location, shape, and attributes of geographic features. It is one of the most common file formats for geospatial data.
22 Clues: Resolution: The ground area represented by a single cell in a raster image. • A cartographic element, usually a north arrow or graticules, that helps a user orient the map. • The heading of the map, which provides a concise description of its content, purpose, and sometimes location. • ...
GEO310 Intro 2025-09-03
Across
- The smallest individual unit of a raster image. Each _____ holds a value that represents a specific attribute of the area it covers.
- Data: A type of qualitative data that categorizes information without a natural order or rank. Examples include country names or land cover types.
- Unit: A spatial unit used for data collection, storage, and presentation. Common examples include census tracts, counties, or zip code areas.
- A data model that represents geographic data as a grid of cells or pixels. Each pixel has a value representing a specific attribute, such as elevation, temperature, or land cover. This type of data is well-suited for continuous phenomena like imagery and elevation models.
- Map: A map that focuses on a specific theme or subject, such as population density, climate, or income levels.
- Line: A line that encloses the map's content. It helps to define the overall map area and separate it from marginal information.
- The heading of the map, which provides a concise description of its content, purpose, and sometimes location.
- Additional text below the title that provides more specific information about the map's content (often the location but with smaller font that the heading of the map).
- A smaller map within a larger map that shows a specific area in greater detail or a remote location relative to the main map.
- Autocorrelation: The principle that objects or attributes closer to each other in space are more related than objects farther apart.
- A key that explains the symbols, colors, and patterns used on a map. It is essential for interpreting the map's features.
- Line: The outermost line that delineates the map's entire content, including the map body, legend, title, and other elements.
Down
- A data model that represents geographic features as points, lines, and polygons. This type of data is ideal for discrete features like roads, rivers, and property boundaries.
- Data: Data that describes qualities or characteristics that cannot be measured numerically, such as land use type or vegetation class. It is often represented by distinct different colors or patterns on a map.
- A cartographic element, usually a north arrow or graticules, that helps a user orient the map.
- Class: A homogeneous collection of common features, each having the same spatial representation (point, line, or polygon) and set of attributes. It is a fundamental data structure within a geodatabase.
- Data: A type of data that categorizes information with a specific, meaningful order or rank. Examples include levels of pollution (low, medium, high) or highway classifications (interstate, state route).
- A container used to store, manage, and query geographic datasets. It can hold a variety of data types, including feature classes, raster datasets, and tables.
- Resolution: The ground area represented by a single cell in a raster image.
- Mapping Unit: The smallest size of a feature that is important enough to be distinguished in a particular feature class. Any feature smaller than the ________ mapping unit may be excluded or merged with larger features.
- The ratio or relationship between a distance or area on a map and the corresponding distance or area on the ground. It can be expressed as a representative fraction (e.g., 1:24,000) or a graphic.
- A non-topological, vector-based data storage format for storing the location, shape, and attributes of geographic features. It is one of the most common file formats for geospatial data.
22 Clues: Resolution: The ground area represented by a single cell in a raster image. • A cartographic element, usually a north arrow or graticules, that helps a user orient the map. • The heading of the map, which provides a concise description of its content, purpose, and sometimes location. • ...
Krzyżówka zadanie 2025-12-10
Across
- Use of technology to perform tasks without human input.
- A sign that danger or problems may occur.
- Information stored or processed by computers.
- A request for information from a database.
- Accidental or unlawful release of information.
- A risk or danger.
- A specific area or internet address space.
- A user identity in a system.
- Related to money or cost.
- A tool that blocks unwanted network traffic.
- A document describing an event or findings.
- The current condition of a system.
- Related to investigating cyber incidents.
- To check a system for issues or threats.
- A computer that provides resources to others.
- Too much data or activity for a system to handle.
- Numerical information used for analysis.
- A saved copy of data in case of loss.
- Unauthorized entry into a system.
- A piece of hardware used in computing.
- A written record of actions or events.
- Someone who monitors or watches activity.
- A set of rules for communication.
- Measurements used to evaluate performance.
- A call for data or a service.
- Permission to use or enter a system.
- Proof of an event or action.
- Programs used by a computer.
- A person or system chosen for attack.
- The ability to manage or direct something.
- Long-term storage of old files.
- A prediction based on information.
- A formal review of systems or processes.
Down
- A direct instruction given to a computer.
- A formal rule or guideline.
- To watch or track activity.
- A part of a larger software system.
- Official rule made by authorities.
- Searching for threats inside a network.
- Something unusual that may signal a problem.
- Continuous flow of data.
- A system on which applications can run.
- Instructions written for computers.
- An event that disrupts normal operations.
- A weakness that can be exploited.
- Monitoring to make sure rules are followed.
- A secret code to access a system.
- To follow the path of an action or data flow.
- A mistake or problem in a system.
- Information sent from one place to another.
- A connection point in a network.
- A place where data is kept.
- Protection against threats or attacks.
- Records of system activities.
- To protect from harm or attacks.
- Delay in data communication.
- The way a system or user acts.
- The right to keep personal data protected.
- Belief that someone or something is reliable.
- A set of connected computer components.
- The path data takes to reach a destination.
- A simplified digital structure used to predict or analyze.
- An action taken after an incident.
- Connected computers that share data.
- The chance that something bad may happen.
- Converting information into a secure code.
- Following laws, rules, or standards.
- A break in security where data is exposed.
- A step taken to solve a problem.
- Rules about what is morally right or wrong.
- A tool used to explore or test a system.
- Studying information to understand it.
- Learning skills or knowledge.
73 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A formal rule or guideline. • To watch or track activity. • A place where data is kept. • A user identity in a system. • Delay in data communication. • Proof of an event or action. • Programs used by a computer. • Records of system activities. • A call for data or a service. • Learning skills or knowledge. • ...
PaulinaNatalia 2025-12-10
Across
- An action taken after an incident.
- A place where data is kept.
- To protect from harm or attacks.
- A tool that blocks unwanted network traffic.
- Converting information into a secure code.
- The right to keep personal data protected.
- A computer that provides resources to others.
- A tool used to explore or test a system.
- The path data takes to reach a destination.
- Programs used by a computer.
- A part of a larger software system.
- Information sent from one place to another.
- A step taken to solve a problem.
- A direct instruction given to a computer.
- Use of technology to perform tasks without human input.
- Learning skills or knowledge.
- Following laws, rules, or standards.
- A sign that danger or problems may occur.
- The way a system or user acts.
- Protection against threats or attacks.
- Rules about what is morally right or wrong.
- Connected computers that share data.
- Delay in data communication.
- A specific area or internet address space.
- A mistake or problem in a system.
- Instructions written for computers.
- A connection point in a network.
- Permission to use or enter a system.
- A risk or danger.
- Too much data or activity for a system to handle.
- Official rule made by authorities.
- A system on which applications can run.
- Belief that someone or something is reliable.
- Information stored or processed by computers.
- A prediction based on information.
- A document describing an event or findings.
- A formal review of systems or processes.
Down
- Unauthorized entry into a system.
- Related to money or cost.
- Continuous flow of data.
- Someone who monitors or watches activity.
- The ability to manage or direct something.
- Something unusual that may signal a problem.
- A call for data or a service.
- A break in security where data is exposed.
- A request for information from a database.
- Numerical information used for analysis.
- Records of system activities.
- A set of connected computer components.
- A set of rules for communication.
- A secret code to access a system.
- Monitoring to make sure rules are followed.
- To watch or track activity.
- To check a system for issues or threats.
- A formal rule or guideline.
- Related to investigating cyber incidents.
- Long-term storage of old files.
- Searching for threats inside a network.
- Proof of an event or action.
- Measurements used to evaluate performance.
- An event that disrupts normal operations.
- A weakness that can be exploited.
- A written record of actions or events.
- The chance that something bad may happen.
- A user identity in a system.
- A simplified digital structure used to predict or analyze.
- Studying information to understand it.
- To follow the path of an action or data flow.
- The current condition of a system.
- Accidental or unlawful release of information.
- A person or system chosen for attack.
- A saved copy of data in case of loss.
- A piece of hardware used in computing.
73 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A place where data is kept. • To watch or track activity. • A formal rule or guideline. • Programs used by a computer. • Proof of an event or action. • Delay in data communication. • A user identity in a system. • A call for data or a service. • Records of system activities. • Learning skills or knowledge. • ...
COMPUTER TERMS 2014-11-10
Across
- Ensures that only unique values can be assigned in each row for that field(s)
- Electronic Retailing
- plan, build, and implement systems that make use of computers that a company has or will acquire
- Improve the relationship among citizen and government
- Device requests time from the processor using the interrupt request
- A small, high-speed memory area that is placed between the processor and the system memory
- uses Information system (tactical decisions)
- It is sometimes called the Cathode Ray Tube
- Single Website that offers many products and services at one internet location
- are combinations of hardware, software, and other resources used to facilitate communications and enhance productivity
- Is the term used for all the physical components on a PC
- includes the use of computers to help manage manufacturing operations and to control machinery used in manufacturing processes
- Random Access Memory
- uses information system (on-the-job decisions)
- integrate the entire company, or enterprise
- The rows of such a table can be thought of as representing the records
- A collection of people, hardware, software, data, and procedures that interact to generate information to support the users of an organization.
- Structured Query Language
- Enterprise resource planning
- Helps the computer do useful things
- Picture Elements
- Data values for every column are stored in row
Down
- A type of transaction Processing Systems
- a type of Transaction Processing Systems
- Has revolutionized the world of investment and finance
- is the theory and development of computer systems able to perform tasks that normally require human intelligence
- phase in which hardware, software and other components are acquired
- Are external devices that extends the functionality of the PC
- Covers the collection of details stored in database.
- gather information about how work is done in the applications area and to ascertain what information users need
- The main input device for most computers
- The main circuit board in the computer where everything comes together
- uses information system (decisions about short-term objectives)
- the focus is on developing a small model, or prototype, of the overall system
- allows designers to dramatically reduce the time they spend at the drafting board
- The brain of the computer
- a type of Transaction Processing Systems
- Collection of elements and procedures that interact to accomplish a goal
- uses Information system (strategic decisions)
- systems development effort in which the user is primarily responsible for the development of the system
- make use of diagrams, tables and checklists
- They often approve broad plans for systems development within an organization
- Sends information over the line one bit at a time
- Identification of specific markets to target them with advertising messages
- Identifies the rows to be updated, selected and is composed of column names, expressions, constraints, sub-queries, and comparison operators
- A programmable electronic device that can store , retrieve, and process large amounts of data
- Connection that allows you to attach everything from mice to printers
- Is a list of information that is not necessarily related to any other lists or tables
- The electrical channels through which various parts of the computer communicate
- An input device that allows you to move the cursor around the screen
50 Clues: Picture Elements • Electronic Retailing • Random Access Memory • The brain of the computer • Structured Query Language • Enterprise resource planning • Helps the computer do useful things • A type of transaction Processing Systems • a type of Transaction Processing Systems • The main input device for most computers • a type of Transaction Processing Systems • ...
UNIX Crossword, The 2017-02-17
Across
- shows the different between two text files
- tells you what the current time is
- searches for files in a directory hierarchy
- tells computer about the capabilities of your terminal
- shows what processes are running on the system
- calls up the GNU C compiler
- creates a directory
- removes sections from each line of files
- prints out the last few lines of a file
- the original line editor that came with UNIX
- evaluates logical or integer arithmatic expressions
- strips last component from filename
- paginates a file
- determines file type
- this is used by cron to determine what needs to be run
- sorts lines of text based on criteria
- delays for a specified amount of time
- enables you to temporarily switch to a shell owned by another user
- files with names starting with a period are known as _____ files
- shows first few lines of files
- lists the contents of a directory
- compare two sorted files line by line
- used to send various signals to processes whose PIDs are known
- most commonly used text editor on UNIX/linux
- version of grep that allows the use of logical operators in specifying the search pattern
- this is the clock daemon that will run commands for you on a regularly scheduled basis
- print out calendar for the specified month or year
- tests for file types and compare values
- display or set your tty settings
- used to send output to a printer
- shows or omits repeated lines
- relays standard input to the standard output while capturing a copy in a file
Down
- shows how the directory tree is built by mounted filesystems
- program that reads input from the standard input and writes to the standard output
- it is a unix convention to store binaries in a ____ directory
- without any files specified, cat reads from the standard ______
- arbitrary precision infix calculator
- changes the timestamps of a file or creates file if it doesn't exist
- unix is a pun on ______ which was an operating system the early developers were working on
- merges lines of files
- removes an empty directory
- prints lines matching a pattern
- system process that is designed to run in the background
- ability to run more than one command at a time
- program that returns an exit status of non zero
- diverting the standard output to a file is known as a _____ion operation
- strips directory and suffix from filenames
- a link that can span file system boundaries is called a ______ link
- creates copy of file under a different name or path
- print out arguments to the command
- stream editor for filtering and transforming text using a regular expression syntax
- a pattern scanning and processing language with algorithmic syntax used in scripting
- what we usually call a command line interpreter
- renames a file
- the connection of the standard output of one process to the standard input of another is known as a _____
- the -n option to this command prints the hostname of the computer
- concatenates files
- program that returns an exit status of zero
- initializes a terminal or query terminfo database
- used to create a link to a file
- every process was a unique ___ number
- translates or deletes characters
- this is the line oriented portion of vi
63 Clues: renames a file • paginates a file • concatenates files • creates a directory • determines file type • merges lines of files • removes an empty directory • calls up the GNU C compiler • shows or omits repeated lines • shows first few lines of files • prints lines matching a pattern • used to create a link to a file • display or set your tty settings • used to send output to a printer • ...
Made by Kayla 2024-01-02
Across
- Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
- A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
- Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
- The number of horizontal and vertical pixels in a display device
- A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
- An electrical disturbance that can degrade communications
- Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
- A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
- A request for specific data from a database.
Down
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
- is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
- Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
- Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
- A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
- The time it takes a signal to travel from one location to another on a network.
- A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
- The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
- Technology-related health condition that affects eyesight. See also CVS
- Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
- Group of files waiting in the buffer to be printed.
24 Clues: A request for specific data from a database. • Group of files waiting in the buffer to be printed. • An electrical disturbance that can degrade communications • The number of horizontal and vertical pixels in a display device • Technology-related health condition that affects eyesight. See also CVS • ...
Ricky's 2024-01-02
Across
- A request for specific data from a database.
- Group of files waiting in the buffer to be printed.
- Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
- Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- An electrical disturbance that can degrade communications
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- Technology-related health condition that affects eyesight. See also CVS
- A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
- Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
Down
- Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
- Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
- Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
- A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
- The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
- A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
- A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
- A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
- The number of horizontal and vertical pixels in a display device
- A collection of data organized in a manner that allows access, retrieval, and use of that data
- is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
- Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
- A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
- The time it takes a signal to travel from one location to another on a network.
24 Clues: A request for specific data from a database. • Group of files waiting in the buffer to be printed. • An electrical disturbance that can degrade communications • The number of horizontal and vertical pixels in a display device • Technology-related health condition that affects eyesight. See also CVS • ...
made by aliya 2024-01-02
Across
- A request for specific data from a database
- Group of files waiting in the buffer to be printed.
- Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
- Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- An electrical disturbance that can degrade communications
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- Technology-related health condition that affects eyesight. See also CVS
- A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
- Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
Down
- Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
- Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
- Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
- A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
- The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
- A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
- A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
- Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
- The number of horizontal and vertical pixels in a display device
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
- Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
- A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
- The time it takes a signal to travel from one location to another on a network
24 Clues: A request for specific data from a database • Group of files waiting in the buffer to be printed. • An electrical disturbance that can degrade communications • The number of horizontal and vertical pixels in a display device • Technology-related health condition that affects eyesight. See also CVS • ...
Made By Jazz 2024-01-02
Across
- is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
- A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
- A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
- A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
- The number of horizontal and vertical pixels in a display device
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- Technology-related health condition that affects eyesight. See also CVS
- Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
Down
- Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
- Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
- The time it takes a signal to travel from one location to another on a network.
- Group of files waiting in the buffer to be printed.
- A request for specific data from a database.
- Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
- A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
- Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
- Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
- An electrical disturbance that can degrade communications
- Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
- Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
24 Clues: A request for specific data from a database. • Group of files waiting in the buffer to be printed. • An electrical disturbance that can degrade communications • The number of horizontal and vertical pixels in a display device • Technology-related health condition that affects eyesight. See also CVS • ...
made by NaHaven 2024-01-03
Across
- Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
- Cache that helps speed the processes of a computer by storing frequently used instructions and data.
- The time it takes a signal to travel from one location to another on a network
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer
- Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
- Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
- Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person
- Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster
- A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost
- Group of files waiting in the buffer to be printed
- Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes
- A request for specific data from a database.
Down
- The number of horizontal and vertical pixels in a display device
- An electrical disturbance that can degrade communications
- A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money
- A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme
- The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require
- Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
- Technology-related health condition that affects eyesight. See also CVS
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative
- A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices
- A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
24 Clues: A request for specific data from a database. • Group of files waiting in the buffer to be printed • An electrical disturbance that can degrade communications • The number of horizontal and vertical pixels in a display device • Technology-related health condition that affects eyesight. See also CVS • ...
Unit 9 Other Common Applications 2026-01-07
Across
- The abbreviation for “Database Management System”. This is the software used to manage and maintain a database.
- A database that’s represented by rows and columns. Data is structured and defined in order to create relationships.
- A structural representation of relational database objects. A table’s rows and columns make it easy to understand data relationships.
- A request used to get, modify, or delete information in a database.
- A column in a database table. Each field stores a single piece of information, like a name.
- A file or set of files sent with an email message. This can be images, music, text documents, spreadsheets, and more.
- A field that allows additional recipients to be included in your email message, but that are not visible to others.
- A setting that others see which indicates your availability. Options may include Free, Busy, or Away.
- The feature that sends your response to the person who sent the original message and no one else.
- A digital image that uses small, rectangular-shaped pixels arranged in a grid.
- The feature that sends your response to everyone on the original email message, including the TO, CC, and BCC fields.
- The feature that allows you to send your message to another recipient that you specify.
- Content that combines multiple forms of media, such as text, graphics, audio, and video.
- Information containing your name, phone numbers, or business details. It is saved in order to be easily added at the end of an email message.
- A meeting that happens regularly (daily, weekly, etc.). You can set up the meeting once and not have to create it for each individual instance.
Down
- A row in a database table. Each row is a collection of data related to a single record, like an individual student’s ID.
- Messages that are sent in bulk to many different recipients who did not request or want them.
- The link created between two tables with the primary and foreign keys.
- A field that’s used to list additional recipients you want included in your email message, but that aren’t required to respond. They are visible to everyone on the message.
- A line of text (like a header) that indicates what the message is about. Usually, it’s visible next to the sender’s name in the Inbox.
- The part of the email app that contains names and other information for members of your organization. It is searchable for recipients of the TO, CC, and BCC fields.
- Items The folder in the email application where messages you yourself sent are stored.
- A computerized storage container for data. The data is stored in an organized structure that allows it to be easily searched, sorted, and analyzed.
- The design of the database structure. This includes the tables, fields, keys, and relationships.
- An arrangement to meet someone at a particular place and time.
- An email message that was not sent and was saved for later use.
- Content such as videos, images, audio, or software that’s stored or transmitted as digital data.
- A digital image that’s created using points, lines, and shapes based on mathematical formulas.
- An activity that includes at least one other person or resource.
- The main folder in an email application where new messages are displayed.
- Using computers to digitally create and bring to life objects and characters.
- A visual or sound alert prior to a meeting or appointment. It can be minutes before, days before, or even earlier.
32 Clues: An arrangement to meet someone at a particular place and time. • An email message that was not sent and was saved for later use. • An activity that includes at least one other person or resource. • A request used to get, modify, or delete information in a database. • The link created between two tables with the primary and foreign keys. • ...
Vocab Test AP Lang 2024-12-02
Across
- An intense desire for wealth, often at the expense of morals.
- Polished and sophisticated, often with good manners.
- The vocabulary of a language, group, or subject.
- Done hastily with little attention to detail.
- A person with deep knowledge or exceptional skill in a particular area.
- To revoke or cancel something, often formally.
- Incapable of producing any useful result; pointless.
- To relieve or ease an intense feeling or situation.
- To avoid or neglect a duty or responsibility.
- Excessively talkative, often about trivial matters.
- To guess or infer something without conclusive evidence.
- To deliberately avoid or shun something.
- Lazy or unwilling to exert effort.
- In a way that is dangerously unstable or insecure.
- To stimulate into action, often through shock or excitement.
- An implied or suggested meaning, often emotional or cultural.
- A strong dislike or hatred, often directed at something morally wrong.
- To confirm or support a statement or theory with evidence.
- Quick and witty conversational exchange.
- An independent thinker who resists conformity.
- The combination of ideas or elements to form a whole.
- To correct or make right something that is wrong.
- To feel intense dislike or disgust for something.
- A lack or scarcity of something, especially something essential.
- Someone who flatters others to gain advantage.
- Childish or immature, often in a negative sense.
- Idealistic to an impractical or unrealistic degree.
- An insufficient quantity or scarcity of something.
- The quality of being open and honest, often bluntly so.
- To suppress or hold back, often forcibly.
- Empty and bleak, often evoking feelings of loneliness or abandonment.
Down
- The humorous misuse of a word by confusing it with a similar-sounding one.
- A question or inquiry, often seeking information or clarification.
- Cheerful and carefree, often to an excessive or inappropriate degree.
- Sullen or gloomy in temperament or mood.
- Overly sentimental, often to the point of being tearful.
- Rude or disrespectful, often inappropriately so.
- To prevent or hinder someone’s plans or efforts.
- To influence or change something, often subtly or indirectly.
- A principle or belief, often foundational to a philosophy or religion.
- Informal language or expressions typical of conversation.
- A driving force or motivation behind an action.
- Unnecessarily repetitive or superfluous.
- To suggest something without stating it directly.
- To deduce or conclude information from evidence and reasoning.
- Brief and to the point, often in a way that seems abrupt.
- The result or outcome of a particular action or cause.
- An excessive or overabundant amount of something.
- About to happen, often with a sense of urgency.
- Demanding great effort or endurance, often challenging.
- Wickedness or moral depravity.
- Brief and clear, without unnecessary words.
- To express an opinion, often formally.
- The ability to understand and share another person's feelings.
- Childishly irritable or bad-tempered.
- Fluent and persuasive in speech or writing.
- A firmly held belief or a sense of certainty about something.
- To read or examine something carefully or in detail.
- Lacking empathy or concern, often in a cold-hearted manner.
- Extremely thin and bony, often from hunger or illness.
60 Clues: Wickedness or moral depravity. • Lazy or unwilling to exert effort. • Childishly irritable or bad-tempered. • To express an opinion, often formally. • Sullen or gloomy in temperament or mood. • Unnecessarily repetitive or superfluous. • To deliberately avoid or shun something. • Quick and witty conversational exchange. • To suppress or hold back, often forcibly. • ...
GEO310 Intro 2025-09-03
Across
- The smallest individual unit of a raster image. Each _____ holds a value that represents a specific attribute of the area it covers.
- Data: A type of qualitative data that categorizes information without a natural order or rank. Examples include country names or land cover types.
- Unit: A spatial unit used for data collection, storage, and presentation. Common examples include census tracts, counties, or zip code areas.
- A data model that represents geographic data as a grid of cells or pixels. Each pixel has a value representing a specific attribute, such as elevation, temperature, or land cover. This type of data is well-suited for continuous phenomena like imagery and elevation models.
- Map: A map that focuses on a specific theme or subject, such as population density, climate, or income levels.
- Line: A line that encloses the map's content. It helps to define the overall map area and separate it from marginal information.
- The heading of the map, which provides a concise description of its content, purpose, and sometimes location.
- Additional text below the title that provides more specific information about the map's content (often the location but with smaller font that the heading of the map).
- A smaller map within a larger map that shows a specific area in greater detail or a remote location relative to the main map.
- Autocorrelation: The principle that objects or attributes closer to each other in space are more related than objects farther apart.
- A key that explains the symbols, colors, and patterns used on a map. It is essential for interpreting the map's features.
- Line: The outermost line that delineates the map's entire content, including the map body, legend, title, and other elements.
Down
- A data model that represents geographic features as points, lines, and polygons. This type of data is ideal for discrete features like roads, rivers, and property boundaries.
- Data: Data that describes qualities or characteristics that cannot be measured numerically, such as land use type or vegetation class. It is often represented by distinct different colors or patterns on a map.
- A cartographic element, usually a north arrow or graticules, that helps a user orient the map.
- Class: A homogeneous collection of common features, each having the same spatial representation (point, line, or polygon) and set of attributes. It is a fundamental data structure within a geodatabase.
- Data: A type of data that categorizes information with a specific, meaningful order or rank. Examples include levels of pollution (low, medium, high) or highway classifications (interstate, state route).
- A container used to store, manage, and query geographic datasets. It can hold a variety of data types, including feature classes, raster datasets, and tables.
- Resolution: The ground area represented by a single cell in a raster image.
- Mapping Unit: The smallest size of a feature that is important enough to be distinguished in a particular feature class. Any feature smaller than the ________ mapping unit may be excluded or merged with larger features.
- The ratio or relationship between a distance or area on a map and the corresponding distance or area on the ground. It can be expressed as a representative fraction (e.g., 1:24,000) or a graphic.
- A non-topological, vector-based data storage format for storing the location, shape, and attributes of geographic features. It is one of the most common file formats for geospatial data.
22 Clues: Resolution: The ground area represented by a single cell in a raster image. • A cartographic element, usually a north arrow or graticules, that helps a user orient the map. • The heading of the map, which provides a concise description of its content, purpose, and sometimes location. • ...
Zodiac baby 2025-09-26
Across
- Under the influence of this star, Syedna TUS encouraged Mumineen to teach their children how to struggle against their negative impulses, always overcoming their anger and other negative character traits. Doing so will ensure that all their undertakings are pure and solely for the sake of Allah.
- Under the influence of this star, Maula’s TUS urged parents to positively influence their children, ensuring that they are shielded from what harms, citing the use of Lisan al-Dawat as a potent tool to this end.
- Under the influence of this star, Syedna al-Dai al-Ajal TUS urged parents to refrain from quarrelling within the family. He reminded them that children are deeply sensitive to such conflicts, and what they witness leaves a lasting impact on their pure and impressionable hearts.
- In order to nurture our children so that they too may reach the heights of prosperity, Syedna TUS counseled Mumineen to ensure that their children always remember Imam Husain AS.
- Under the influence of this star, children should be encouraged by their parents to query and ask questions, so much so that children should feel as though their parents exist in order to help them solve their problems. In turn, they too will grow up to be patient and tolerant of others.
- Linking this star’s principle to daily life, Syedna al-Dai al-Ajal TUS cited the hadith shareef: “Planning is half of life.”
- Citing an example of this star’s trait, Maula TUS shared a story when Syedna Taher Saifuddin RA was asked to share a positive trait about himself, he responded by saying that his best feature was that he was a trustworthy confidant. Syedna TUS guided parents on fostering confidentiality in their children.
Down
- Under the influence of this star, parents should know when to be firm and when to be gentle with their children, depending on what each situation requires.
- Under the influence of this star, children should strive to undertake those acts of khidmat that most others are unwilling to take on, even if doing so requires them to exert effort and make sacrifices.
- Under the influence of this star, children should also be encouraged to work hard instead of spending time on their phones. Syedna al-Dai al-Ajal TUS directly asked all the children, “You have stopped using phones, haven’t you?”
- Syedna al-Dai al-Ajal TUS encouraged parents to cultivate this star’s quality of focus in their children—particularly through the practice of namaz, which demands physical and spiritual orientation toward the qibla.
- Syedna TUS emphasized this star’s principal virtue in the importance of nurturing gratitude within children so they appreciate the blessings Allah has granted them rather than envying others.
12 Clues: Linking this star’s principle to daily life, Syedna al-Dai al-Ajal TUS cited the hadith shareef: “Planning is half of life.” • Under the influence of this star, parents should know when to be firm and when to be gentle with their children, depending on what each situation requires. • ...
8 2025-01-12
PS 2023-09-23
ragno termini informatici 2022-01-17
Across
- dati
- rete di computer interna
- (line printer) è un tipo di porta utilizzata per connettere dispositivi di stampa
- disegni e immagini che si possono inserire nei documenti
- valore che non rappresenta un valore numerico
- computer rete intelligente che non ha memoria di massa
- elettronico programma di calcolo numerico
- programma del linguaggio
- (network etiquette) regole comportamentali per la comunicazione su internet
- computer piccoli che se li attacchi a una tastiera a un video possono essere compiuter da scrivania
- quantità di dati che può viaggiare su una connessione
- disk principale unità di memorizzazione
- (optical character recognition) tecnica di riconoscimento ottico di caratteri a stampa
- documento complesso che integra in modo interattivo testo, immagini video e suoni.
- indica le risorse internet per insegnanti alunni ecc
- (high speed serial bus) è un collegamento di tipo seriale
- collegamenti utilizzati per connettere periferiche
- disk disco dimensioni tre pollici e mezzo
- è la memoria in cui vengono collocati i dati in fase di elaborazione
- utilizzo di internet per la comunicazione tra aziende e clienti abituali
- dominio software disponibile gratuitamente non coperto da copyright
- dispositivo di stampa di grandi dimensioni adatto per il disegno tecnico
- (hyper text markup language) linguaggio utilizzato per costruire ipertesti
- memoria di sola lettura
- computer collegato in rete che scambia dati con server
- bug pericolo di blocco
- azienda che fornisce servizi di connessione a internet
- (megabyte) unità di misura dell'informazione che corrisponde a 1024 KB
- archivio di dati disposti in modo organizzato
- programma che può provocare danni
- (computer aided engineering) software per l'ingegneria
- vendita oggetti o servizi di via telematica
- processor pensati per sistemi server di fascia media
- cartella
- dispositivo dalle funzionalità analoghe a quelle del mouse
- mini computer tascabile
- indica testo collegato tramite link
- operazione che permette di creare una copia di sicurezza di un file
- espressione usata per indicare la trasmissione di dati inviati uno per volta
- computer collegato ad alcuni siti
- comandi per velocizzare le operazioni
- operativo è l'insieme dei programmi che gestiscono hardware
- sistema di protezione del computer
- (musical instrument digital interface) interfaccia musicale per strumenti digitali
- lock key tasto che blocca la scrittura in maiuscolo
- (disk operating system) sistema operativo che non ha interfaccia grafica
- logico permette la selezione di informazioni
- processo di estrazione dei dati
- insieme di dispositivi del computer parti logiche
- (file transfer protocol) protocollo per la trasmissione di dati su internet
- software rilasciato per dimostrazione
- (world wide web) rete globale
- (erasa programmable read only memory) memoria a solo lettura programmabile e cancellabile
- scheda madre
- map mappa di bit
- raggruppamento di 8 byte
- (computer aided instruction) software per l'istruzione assistita da processi di produzione
- cache memoria interna del processore ad altissima velocità di al secondo
- dispositivo per la scrittura e la lettura di CDROM
- software utilizzato dal sistema operativo per gestire dispositivi hardware
- (computer aided design) software per la progettazione
- sistema di cifratura dei dati
- rendere utilizzabile floppy
- è il modo in cui vengono organizzati testo e video al'interno di una pagina
- a barre
- (arithmetic-logic unit) esegue le istruzioni logiche e di calcolo
- esecuzione di più programmi simultaneamente
- file allegato con un messaggio di posta elettronica
- programma che permette l'accesso alla rete internet
- (integrated services of digital network) sistema pubblico di trasmissione dati
- tipo di sistema operativo a interfaccia grafica
- (domain name system) sistema che gestisce gli indirizzi dei domini internet
- spazio su internet dove si incontrano gruppi
- casella postale dove vengono accumulati messaggi di posta elettronica
- cura dei fattori che permettono di migliorare le condizioni del posto di lavoro
Down
- prospetto stampato che contiene i dati estratti da un database
- (structured query language) linguaggio di interrogazioni di database strutturati
- economy forma di economia caratterizzata da internet
- posta elettronica
- (small computer system interface) potente e flessibile interfaccia di connessione
- (asymmetric digital subscriber line) collegamento a internet
- elemento fondamentale di un tabella
- (wide area network) rete di medie grandi dimensioni
- sigla utilizzata per indicare i possibili problemi
- insieme di programmi che permettono un funzionamento di un computer
- caratteri
- (liquid crystal display) monitor di elevata qualità a cristalli liquidi
- dispositivo hardware collegare tra loro più reti o nodi di differenti reti
- compito rimediare un errore
- nome di un sito web
- parti di una pagina web
- (what you see is what you get) permette di vedere sullo schermo il risultato delle operazioni effettuate
- l'applicazione per risolvere un problema
- (local area network) rete locale di computer che utilizza appositi cavi di collegamento
- dispositivo che permette di collegare computer a una rete locale
- unità di misura dell'informazione corrispondente a 1024 byte
- è il singolo punto luminoso del monitor
- ricevere informazioni e trasferirle in un altro computer
- (bit per secondo) unità di misura della velocità dei dati
- (simple mail transfer protocol) standard per la trasmissione della posta in internet
- (metropolitan area network) area metropolitana
- un tipo di grafico utilizzato per rappresentare dati
- pagine che presentano una presentazione
- list servizio di internet che permette lo scambio di informazioni
- provvisoria modalità di avvio del computer
- valore numerico di una grandezza
- ingresso di un programma
- unità di misura
- (sistema) sistema di numerazione indicate con 0 e 1
- (joint photographic experts group) formato grafico elaborato da un comitato di esperti di fotografia
- page
- fisso
- autorità italiana che attribuisce gli indirizzi internet
- unità di misura della velocità cpu
- software coperto da copyright solo per un periodo di prova
- programma per la produzione e la gestione dei dati
- nome in cui è indicato il testo
- (basic input output system) è costituita dalla memoria rom
- (microsoft disk operating) un sistema con interfaccia grafica
- scherzo informatic non dannoso
- (global area network) rete a livello mondiale che collega computer situati a paesi diversi
- chiave
- software gratuito ma tutelato dalle leggi copyright
- (information and communication technology)
- area di lavoro visualizzata sullo schermo
- è un tipo di sistema operativo
- computer con potenti processori grande quantità di memoria ram
- software presente della memoria rom
- madre scheda principale dove sono collegati tutti i componenti hardware
- tastiera tipicamente italiana
- circuito integrato che elabora i dati
- tipo di tastiera diffuso in america ma anche in italia
- (transmission control protocol internet protocol) trasmissione sul web
- è l'unita di informazione strutturata un data base
- degli strumenti una barra dove sono raccolte delle icone
- disegno di dimensioni ridotte
- finestra progettata per visualizzare i dati di uno o di più record
- dei menu barra dove sono disponibili le principali funzioni di una applicazione
- scambio di dati in formato elettronico
- profilo utente
- informazione su diversi livelli organizzati gerarchicamente
- input output ingresso uscita
- riferito ai dati di uscita di un programma o informazione di uscita
- operazione che permette di caricare o scaricare dalla rete un file sul proprio computer
- di ricerca
- indirizzo di internet
- (gigabyte)
- è lo stato del computer in cui vengono disattivati i video e altri componenti dell'unità centrale
- (internet service provider) fornitore servizi internet
- disk unità di memorie di massa di dimensioni superiori
- (computer aided manufacturing) software per i processi di produzione
- (graphical user interface) immagini e icone invece di testo scritto
152 Clues: dati • page • fisso • chiave • a barre • cartella • caratteri • di ricerca • (gigabyte) • scheda madre • profilo utente • unità di misura • posta elettronica • map mappa di bit • nome di un sito web • indirizzo di internet • parti di una pagina web • memoria di sola lettura • mini computer tascabile • rete di computer interna • programma del linguaggio • ingresso di un programma • bug pericolo di blocco • ...
ELL Glossary 2023-08-25
Across
- Word attack is an aspect of reading instruction that includes intentional strategies for learning to decode, sight read, and recognize written words.
- A newcomer program addresses the needs of recent immigrant students, most often at the middle and high school level, especially those with limited or interrupted schooling in their home countries. Major goals of newcomer programs are to acquire beginning English language skills along with core academic skills and to acculturate to the U.S. school system. Some newcomer programs also include primary language development and an orientation to the student's new community (Genesee, et al, 1999).
- The ability to recognize words correctly when reading.
- The ability to translate a word from print to speech, usually by employing knowledge of sound-symbol correspondences. It is also the act of deciphering a new word by sounding it out.
- The first language a person acquires in life, or identifies with as a member of an ethnic group. This term variably means (a) the language learned from the mother, (b) the first language learned, (c) the native language of an area or country, (d) the stronger (or dominant) language at any time of life, (e) the language used most by a person, (f) the language toward which the person has the more positive attitude and affection (Baker, 2000).
- A measure of someone's intelligence as indicated by an intelligence test, where an average score is 100. An IQ score is the ratio of a person's mental age to his chronological age multiplied by 100.
- Language majority refers to a person or language community that is associated with the dominant language of the country.
- A cloze passage is a reading comprehension exercise in which words have been omitted in a systematic fashion. Students fill in the blanks, and their responses are counted correct if they are exact matches for the missing words. Cloze exercises assess comprehension and background knowledge, and they are also excellent indicators of whether the reading level and language level of the text are appropriate for a given student.
- Metacognition is the process of "thinking about thinking." For example, good readers use metacognition before reading when they clarify their purpose for reading and preview the text.
- A mode of expressing words and phrases by using pictures of objects whose names resemble those words.
- A query narrowly tailored to task, purpose, and audience, as in a research query that is sufficiently precise to allow a student to achieve adequate specificity and depth within the time and format constraints.
- A part of writing and preparing presentations concerned chiefly with improving the clarity, organization, concision, and correctness of expression relative to task, purpose, and audience; compared to revising, a smaller-scale activity often associated with surface aspects of a text
- Temporary guidance or assistance provided to a student by a teacher, another adult, or a more capable peer, enabling the student to perform a task he or she otherwise would not be able to do alone, with the goal of fostering the student's capacity to perform the task on his or her own later on.
- Basic knowledge about print and how it is typically organized on a page. For example, print conveys meaning, print is read left to right, and words are separated by spaces.
Down
- The smallest meaningful unit of language. A morpheme can be one syllable (book) or more than one syllable (seventeen). It can be a whole word or a part of a word such as a prefix or suffix. For example, the word ungrateful contains three morphemes: un, grate, and ful.
- Ability to detect differences in sounds; may be gross ability, such as detecting the differences between the noises made by a cat and dog, or fine ability, such as detecting the differences made by the sounds of letters "m" and "n."
- The inherent difficulty of reading and comprehending a text combined with consideration of reader and task variables; in the Standards, a three-part assessment of text difficulty that pairs qualitative and quantitative measures with reader-task considerations (CCSS, pp. 31, 57; Reading, pp. 416).
- Lau Remedies are policy guidelines for the education of English language learners, based on the ruling in the Lau vs. Nichols suit, mandating school districts' compliance with the civil rights requirements of Title VI (Lyons, 1992).
- Bilingualism is the ability to use two languages. However, defining bilingualism can be problematic since there may be variation in proficiency across the four language dimensions (listening, speaking, reading and writing) and differences in proficiency between the two languages. People may become bilingual either by acquiring two languages at the same time in childhood or by learning a second language sometime after acquiring their first language.
- The rate at which a child can recite "overlearned" stimuli such as letters and single-digit numbers.
- A student performance done without scaffolding from a teacher, other adult, or peer; in the Standards, often paired with proficient(ly) to suggest a successful student performance done without scaffolding; in the Reading standards, the act of reading a text without scaffolding, as in an assessment; see also proficient(ly), scaffolding.
- A language-based disability that affects both oral and written language. It may also be referred to as reading disability, reading difference, or reading disorder.
- Part of word that is "fixed to" either the beginnings of words (prefixes) or the endings of words (suffixes). The word disrespectful has two affixes, a prefix (dis-) and a suffix (-ful).
- Entry criteria are a set of guidelines that designate students as English language learners and help place them appropriately in bilingual education, ESL, or other language support services. Criteria usually include a home language survey and performance on an English language proficiency test.
- A multisensory approach to remediating dyslexia created by Dr. Samuel Orton, a neuropsychiatrist and pathologist, and Anna Gillingham, an educator and psychologist.
- Term used by the federal government, most states, and local school districts to identify those students who have insufficient English to succeed in English-only classrooms. Increasingly, English language learner (ELL) or English learner (EL) are used in place of LEP.
- A letter or letter combination that spells a single phoneme. In English, a grapheme may be one, two, three, or four letters, such as e, ei, igh, or eigh.
- The smallest unit of speech that serves to distinguish one utterance from another in a language.
- Onsets and rimes are parts of syllables or monosyllabic words in spoken language. These units are smaller than syllables but may be larger than phonemes. An onset is the initial consonant sound of a syllable (the onset of bag is b-; of swim is sw-). The rime is the part of a syllable that contains the vowel and all that follows it (the rime of bag is -ag; of swim is -im).
- Vocabulary refers to the words a reader or speaker knows the meaning of and can understand and use. Listening vocabulary refers to the words a person knows when hearing them in oral speech. Speaking vocabulary refers to the words a person is able to use in his or her own speech. Reading vocabulary refers to the words a person knows when seeing them in print. Writing vocabulary refers to the words a person is able to use in his or her own writing.
30 Clues: The ability to recognize words correctly when reading. • The smallest unit of speech that serves to distinguish one utterance from another in a language. • The rate at which a child can recite "overlearned" stimuli such as letters and single-digit numbers. • ...
TTS TLJ NUR KOMARIAH 2020-02-09
Across
- aplikasi web untuk mengelola konten sebuah (atau lebih) situs internet.
- memori yang hanya dapat dibaca dan data tetap tersimpan walaupun tanpa daya.
- sistem file yang banyak digunakan untuk format media penyimpan portabel
- Adalah sistem manajemen database relational (RDBMS, relational database management) yang open source yang menggunakan Structured Query Language (SQL, yang merupakan bahasa populer untuk menambahkan, mengkases dan memproses data dalam database).
- salah satu bentuk kesalahan yang ditemukan dalam aplikasi ataupun perangkat keras.
- Pemaparan spesifikasi perangkat keras dan sistem operasi yang sedang digunakan.
- Uniform Resource Locator.
- adalah sebuah aturan atau standar yang mengatur atau mengijinkan terjadinya hubungan, komunikasi, dan perpindahan data antara dua atau lebih titik komputer.
- Penghubung (jalur) utama sistem jaringan untuk menghubungkan antar LAN berjarak jauh, yaitu penghubung jaringan titik ke titik.
- Sistem jalur komunikasi data dua arah yang terpisah antara Tx dan Rx.
- usaha untuk mengembalikan data asli melalui data backup.
- Merupakan komputer user tunggal yang terkoneksi dengan server dalam satu sistem jaringan.
- Spesifikasi peralatan pendukung yang dibutuhkan oleh sebuah PC agar dapat bekerja secara optimal.
- merupakan perangkat jaringan yang memiliki fungsi memperluas suatu jaringan sekaligus membuat sebuah segmen jaringan
- Alat untuk memindahkan dan menyaring informasi
- protokol digunakan untuk mendukung proses transfer file dalam sistem jaringan menggunakan protokol TCP/IP (Internet/intranet).
- sistem penyimpan informasi nama domain, yaitu berupa basis data terdistribusi dalam sistem jaringan (Internet).
- metode untu kmengambil email dari server. Sebagian besar program email (disebut juga klien email) menggunakan protokol POP, walaupun ada juga yang mendukung penggunaan teknologi IMAP (Internet Message Access Protocol) yang lebih baru.
- kegiatan untuk membuat reka maya dari sesuatu, seperti komputer virtual, sistem operasi, media penyimpan ataupun perangkat jaringan.
- Penggabungan beberapa sinyal untuk dikirimkan secara bersamaan pada suatu kanal transmisi.Perangkat yang melakukan multiplexing disebut multiplexer (Mux) .
- kabel yang di gunakan pada topologi bus.
- perintah pada linux untuk akses komputer jarak jauh.
Down
- Commercial Client Terminal berupa komputer yang digunakan user dengan menggunakan layanan akses data atau prangkat keras dalam sistem jaringan.
- Istilah kesahan sistem yang perlu diperhatikan sebelum mengoperasikan sistem.
- perintah pada linux untuk engganti user ID.
- operasi untuk membuka akses terhadap suatu media penyimpan dari user.
- Bentuk dari komunikasi elektronik yang menggunakan gelombang elektromagnetik yang kontinu, seperti televisi dan radio.
- card berfungsi untuk menerjemahkan/mengubah sinyal digital dari komputer menjadi tampilan grafis pada layar monitor.
- alternatif lokasi repositori paket dari repositori paket utama yang sudah tersedia. Dengan adanya mirror yang posisi jaringannya terdapat dekat dengan pengguna maka permasalahan minimnya alokasi bandwidth yang tersedia diharapkan dapat tertangani dengan baik.
- bentuk bilangan biner yang diolah oleh komputer dalam bentuk sinyal digital.
- mengubah sinyal digital menjadi sinyal analog atau sebaliknya.
- usaha untuk mengembalikan kendali terhadap suatu sistem.
- standar interface serial untuk komunikasi data dimana dirancang satu port USB komputer dihubungkan ke beberapa peripheral atau devais secara bersama.
- kumpulan protokol komunikasi data yang digunakan sebagai kendali prosedur transfer data dan koneksi dengan internet.
- Tujuan pengiriman data
- Sebuah konsep sinyal pembawa yang mengalir dalam sistem jaringan yang bertugas membawa informasi paket data yang dikirimkan.
- merupakan pemroses data dalam sebuah perangkat komputer.
- Adalah sebuah program yang mudah digunakan untuk mengkonfigurasi dan mengelola situs internet anda (control panel), berfungsi sama seperti CPanel, digunakan sebagai panel kendali di RuangWeb.com.
- server yang merupakan sumber informasi utama terkait pendaftaran suatu domain.
- dasar pembentuk Sistem Elektronika Digital yang berfungsi untuk mengubah satu atau beberapa Input (masukan) menjadi sebuah sinyal Output (Keluaran) Logis.
- Monitor yang bekerja dengan cara memancarkan sinar katoda (elektron) berkecepatan tinggi di dalam tabung yang hampa udara.
- Port untuk menghubungkan PC dengan printer.
- Kumpulan dari fakta atau simbol
- kumpulan seluruh halaman yang disajikan oleh sebuah perusahaan, individu, organisasi atau entitas lainnya
- Servis dalam komputer yang berfungsi menerjemahkan alamat IP menjadi alamat URL atau sebaliknya.
- Operating system yang digunakan untuk komunikasi data suara/video.
46 Clues: Tujuan pengiriman data • Uniform Resource Locator. • Kumpulan dari fakta atau simbol • kabel yang di gunakan pada topologi bus. • perintah pada linux untuk engganti user ID. • Port untuk menghubungkan PC dengan printer. • Alat untuk memindahkan dan menyaring informasi • perintah pada linux untuk akses komputer jarak jauh. • ...
Common Computer Terms 2015-03-04
Across
- A spreadsheet file containing one or more worksheets
- A predefined formula that performs calculations by using specific values, called arguments
- All the characters in a particular typeface.
- The process of bringing (importing) data into an application which has been exported from another application
- A toolbar contain buttons with that can be clicked to provide a shortcut to tasks.
- Contains the Start button, the clock and currently running tasks.
- A facility in operating system to store items of text or graphics when they have been cut or copied, so they can be pasted to a different location.
- A facility, which allows the user to make columns with or without borders, can be used instead of tabulating.
- A cell or range reference in a formula whose location remains the same (absolute) when copied.
- A process where the words in a document are matched against a list of words in a dictionary. If a word in the document does not match one, it is signalled as a spelling error.
- To change the look of a document, text, graphics, characters.
- A document that can be used as a pattern for creating other similar documents.
- The orientation of the document when printed; wider than it is long.
- Files that are sent separately from, but attached to, an e-mail message.
- An equation that performs operations on worksheet data.
- Two or more computers connected together for the sharing of resources such as printers and drives.
- Software you can use free of charge for a trial period, usually 30 days, after which time you are expected to pay for the program.
- The act of copying information from a distant computer to your local computer.
- Programs: a series of instructions that tell the computer hardware what to do; can also be the interface between the user and the computer system.
- When your text reaches the right-hand margin in a document it automatically starts on the next line.
- Can be represented by a range of symbols, usually round dots, which are used to set apart points in paragraph style.
- engine A tool to help locate information on the Internet.
Down
- A software program that translates and allows you to view HTML files.
- The rectangles created at the intersection of columns and rows.
- Notation that you create to list sites you visit often or would like to quickly return to.
- The etiquette rules of the Internet.
- To locate the cause of trouble and removes, fixes or treats it.
- The process of taking (exporting) data from an application, i.e. a database, and placing it into another application, i.e. a spreadsheet
- Paragraph alignment: left, centre, right or fully justified.
- Text files that visited Web sites store on you computer’s hard disk.
- Computerized worksheet on which text, numbers and formulas can be entered for fast, accurate calculations.
- The main or introductory Web page for a site.
- The location where browsers keep a copy of recently visited pages.
- Hardware devices which are attached to the computer eg printer, speakers, scanner etc.
- A program that is loaded onto your computer without your knowledge and runs without your consent. Most viruses can also replicate themselves
- Software applications that expand a browser’s basic capabilities by becoming extensions of the browser itself.
- The process of merging a main document with a data source to produce form letters
- The process of asking a question of a database. Queries are used to view, change, and analyse data in different ways
- The physical components of the computer system eg keyboard, mouse, speakers etc.
- The location where new e-mail messages arrive.
- The orientation of the document when printed; longer than it is wide.
- An organised collection of related information.
- The name of a particular Internet site.
43 Clues: The etiquette rules of the Internet. • The name of a particular Internet site. • All the characters in a particular typeface. • The main or introductory Web page for a site. • The location where new e-mail messages arrive. • An organised collection of related information. • A spreadsheet file containing one or more worksheets • ...
Common Computer Terms 2015-03-04
Across
- To change the look of a document, text, graphics, characters.
- Text files that visited Web sites store on you computer’s hard disk.
- The act of copying information from a distant computer to your local computer.
- The location where new e-mail messages arrive.
- Can be represented by a range of symbols, usually round dots, which are used to set apart points in paragraph style.
- A spreadsheet file containing one or more worksheets
- An equation that performs operations on worksheet data.
- Hardware devices which are attached to the computer eg printer, speakers, scanner etc.
- The name of a particular Internet site.
- The process of merging a main document with a data source to produce form letters
- To locate the cause of trouble and removes, fixes or treats it.
- The orientation of the document when printed; longer than it is wide.
- A predefined formula that performs calculations by using specific values, called arguments
- Software applications that expand a browser’s basic capabilities by becoming extensions of the browser itself.
- A program that is loaded onto your computer without your knowledge and runs without your consent. Most viruses can also replicate themselves
- Files that are sent separately from, but attached to, an e-mail message.
- A toolbar contain buttons with that can be clicked to provide a shortcut to tasks.
- The main or introductory Web page for a site.
- The orientation of the document when printed; wider than it is long.
- The location where browsers keep a copy of recently visited pages.
- Notation that you create to list sites you visit often or would like to quickly return to.
Down
- A software program that translates and allows you to view HTML files.
- engine A tool to help locate information on the Internet.
- Programs: a series of instructions that tell the computer hardware what to do; can also be the interface between the user and the computer system.
- A facility in operating system to store items of text or graphics when they have been cut or copied, so they can be pasted to a different location.
- The process of bringing (importing) data into an application which has been exported from another application
- The process of asking a question of a database. Queries are used to view, change, and analyse data in different ways
- The physical components of the computer system eg keyboard, mouse, speakers etc.
- Computerized worksheet on which text, numbers and formulas can be entered for fast, accurate calculations.
- Paragraph alignment: left, centre, right or fully justified.
- The etiquette rules of the Internet.
- An organized collection of related information.
- The rectangles created at the intersection of columns and rows.
- Software you can use free of charge for a trial period, usually 30 days, after which time you are expected to pay for the program.
- Two or more computers connected together for the sharing of resources such as printers and drives.
- A process where the words in a document are matched against a list of words in a dictionary. If a word in the document does not match one, it is signalled as a spelling error.
- When your text reaches the right-hand margin in a document it automatically starts on the next line.
- The process of taking data from an application, i.e. a database, and placing it into another application, i.e. a spreadsheet
- A facility, which allows the user to make columns with or without borders, can be used instead of tabulating.
- Contains the Start button, the clock and currently running tasks.
40 Clues: The etiquette rules of the Internet. • The name of a particular Internet site. • The main or introductory Web page for a site. • The location where new e-mail messages arrive. • An organized collection of related information. • A spreadsheet file containing one or more worksheets • An equation that performs operations on worksheet data. • ...
UNIX Commands, AT&T Bell Laboratories 2022-08-02
Across
- concatenates files
- unix is a pun on ______ which was an operating system the early developers were working on
- print out arguments to the command
- enables you to temporarily switch to a shell owned by another user
- tells you what the current time is
- deletes files
- creates a directory
- shows or sets the file mode creation mask
- this is used by cron to determine what needs to be run
- compare two sorted files line by line
- prints lines matching a pattern
- lists the contents of a directory
- strips directory and suffix from filenames
- changes the timestamps of a file or creates file if it doesn't exist
- shows the different between two text files
- tests for file types and compare values
- most commonly used text editor on UNIX/linux
- without any files specified, cat reads from the standard ______
- used to create a link to a file
- print out calendar for the specified month or year
- the connection of the standard output of one process to the standard input of another is known as a _____
- shows how the directory tree is built by mounted filesystems
- shows first few lines of files
- creates copy of file under a different name or path
- saves a typescript of an interactive terminal session
- file perusal filter similar to more but with more features
- initializes a terminal or query terminfo database
- relays standard input to the standard output while capturing a copy in a file
- stream editor for filtering and transforming text using a regular expression syntax
- the original line editor that came with UNIX
- program that reads input from the standard input and writes to the standard output
- used to send output to a printer
- calls up the GNU C compiler
- the -n option to this command prints the hostname of the computer
- shows what processes are running on the system
- evaluates logical or integer arithmatic expressions
- shows or omits repeated lines
- files with names starting with a period are known as _____ files
- displays information about users on the system
- it is a unix convention to store binaries in a ____ directory
Down
- program that returns an exit status of non zero
- display or set your tty settings
- renames a file
- removes sections from each line of files
- this is the clock daemon that will run commands for you on a regularly scheduled basis
- a link that can span file system boundaries is called a ______ link
- a pattern scanning and processing language with algorithmic syntax used in scripting
- version of grep that allows the use of logical operators in specifying the search pattern
- used to send various signals to processes whose PIDs are known
- system process that is designed to run in the background
- paginates a file
- this is the line oriented portion of vi
- shows who is currently logged on
- diverting the standard output to a file is known as a _____ion operation
- arbitrary precision infix calculator
- what we usually call a command line interpreter
- program that returns an exit status of zero
- searches for files in a directory hierarchy
- changes file permission mode settings
- shows a listing of last logged in users
- determines file type
- delays for a specified amount of time
- every process was a unique ___ number
- sorts lines of text based on criteria
- prints out the last few lines of a file
- file perusal filter for viewing on terminal
- tells computer about the capabilities of your terminal
- strips last component from filename
- ability to run more than one command at a time
- translates or deletes characters
- merges lines of files
- removes an empty directory
72 Clues: deletes files • renames a file • paginates a file • concatenates files • creates a directory • determines file type • merges lines of files • removes an empty directory • calls up the GNU C compiler • shows or omits repeated lines • shows first few lines of files • prints lines matching a pattern • used to create a link to a file • display or set your tty settings • ...
Per 2 Chapter 11 - Chavez A 2023-02-27
Across
- provides very weak security and should not be relied upon for confidentiality
- releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
- clears the DNS resolver cache on the host
- displays the DNS resolver cache, which contains host and domain names that have been recently queried
- opens the System Information window, which shows a summary of system components, including hardware components and software information
- These are identified with a dollar sign ($) at the end of the share name.
- This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
- This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
- the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
- This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
- The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
- The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
- This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
Down
- Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).
- forces a DHCP client to renew its DHCP address lease from the DHCP server
- The Windows 10 profile allows the user to customize the sharing options. The PC is discoverable on the network.
- the command that tests basic connectivity between devices by using ICMP echo request and reply messages
- This is used to create customized system image files that will be installed on computers in the enterprise.
- a group of computers and electronic devices with a common set of rules and procedures administered as a unit
- displays the Group Policy settings that are in effect for a currently logged in user
- a command-line terminal emulation protocol and program that works over port 23
- opens the Remote Desktop utility
- a private network that connects remote sites or users together over a public network, like the internet
- This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
- a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
- Data is sent unencrypted and with no authentication.
- displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name
- opens Microsoft Management Console (MMC)
- This is used to update a local machine and verify that the machine is getting Group Policy updates.
- Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
- the command that is used to query the DNS server to discover IP addresses or host names
- uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
32 Clues: opens the Remote Desktop utility • opens Microsoft Management Console (MMC) • clears the DNS resolver cache on the host • Data is sent unencrypted and with no authentication. • forces a DHCP client to renew its DHCP address lease from the DHCP server • These are identified with a dollar sign ($) at the end of the share name. • ...
period 2 chapter 11- Eric Zavala 2023-02-27
Across
- This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
- a dynamic disk that has been moved to a computer from another computer running Windows
- a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
- monitors programs on the computer and warns users when an action might present a threat to the computer
- a private network that connects remote sites or users together over a public network, like the internet
- displays the Group Policy settings that are in effect for a currently logged in user
- the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network paththe command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
- opens Microsoft Management Console
- a group of computers and electronic devices with a common set of rules and procedures administered as a unit
- a dynamic disk that is corrupted, turned off, or disconnected
- a basic disk that is being converted into a dynamic disk
- These are identified with a dollar sign ($) at the end of the share name.
- a command-line terminal emulation protocol and program that works over port 23
- contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
Down
- This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
- Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
- This is used to create customized system image files that will be installed on computers in the enterprise.
- This is used to update a local machine and verify that the machine is getting Group Policy updates.
- the command that tests basic connectivity between devices by using ICMP echo request and reply messages
- provides very weak security and should not be relied upon for confidentiality
- a disk that does not contain a valid signature
- Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
- used by most application installation programs to install software. In 32-bit versions of Windows, all programs are 32-bit and are installed in the folder C:\Program Files. In 64-bit systems, 64-bit programs are installed in the folder C:\Program Files, while 32-bit programs are installed in the folder C:\Program Files (x86).
- It displays details for all DirectX components and drivers that are installed in a computer.
- This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
- This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
- This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
- opens the Remote Desktop utility
- a volume that is functioning properly
- the command that is used to query the DNS server to discover IP addresses or host names
30 Clues: opens the Remote Desktop utility • opens Microsoft Management Console • a volume that is functioning properly • a disk that does not contain a valid signature • a basic disk that is being converted into a dynamic disk • a dynamic disk that is corrupted, turned off, or disconnected • These are identified with a dollar sign ($) at the end of the share name. • ...
Per 2 Chapter 11- Thompson,E 2023-02-27
Across
- a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
- a group of computers and electronic devices with a common set of rules and procedures administered as a unit
- This process creates a file system on a partition to be stored
- The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
- the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
- uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
- The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
- These are addresses from a reserved range in the 169.254.x.y network space
- Data is sent unencrypted and with no authentication.
- Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
- Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).
- displays the DNS resolver cache, which contains host and domain names that have been recently queried
- This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
- the command that tests basic connectivity between devices by using ICMP echo request and reply messages
- Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
- used by most application installation programs to install software. In 32-bit versions of Windows, all programs are 32-bit and are installed in the folder C:\Program Files. In 64-bit systems, 64-bit programs are installed in the folder C:\Program Files, while 32-bit programs are installed in the folder C:\Program Files (x86).
- This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
- Provides features not supported by basic disks
Down
- clears the DNS resolver cache on the host
- clears the DNS resolver cache on the host
- these are identified with a dollar sign ($) at the end of the share name.
- The Windows 10 network profile disables file and printer sharing and network discovery on the link. The PC is hidden from the network.
- This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
- This is used to open or execute a file using elevated permission.
- monitors programs on the computer and warns users when an action might present a threat to the computer
- releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
- the command that is used to query the DNS server to discover IP addresses or host names
- a private network that connects remote sites or users together over a public network, like the internet
- provides very weak security and should not be relied upon for confidentiality
- displays the DNS resolver cache, which contains host and domain names that have been recently queried
- contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
- a command-line terminal emulation protocol and program that works over port 23
32 Clues: clears the DNS resolver cache on the host • clears the DNS resolver cache on the host • Provides features not supported by basic disks • Data is sent unencrypted and with no authentication. • This process creates a file system on a partition to be stored • This is used to open or execute a file using elevated permission. • ...
Per 3 Chapter 11 - Carmona J 2023-02-27
Across
- This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
- clears the DNS resolver cache on the host
- provides very weak security and should not be relied upon for confidentiality
- uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
- the command that is used to query the DNS server to discover IP addresses or host names
- The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
- This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
- contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
- used by most application installation programs to install software. In 32-bit versions of Windows, all programs are 32-bit and are installed in the folder C:\Program Files. In 64-bit systems, 64-bit programs are installed in the folder C:\Program Files, while 32-bit programs are installed in the folder C:\Program Files (x86).
- This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
- the command that tests basic connectivity between devices by using ICMP echo request and reply messages
- displays the DNS resolver cache, which contains host and domain names that have been recently queried
- This is used to open or execute a file using elevated permission.
- The Windows 10 network profile disables file and printer sharing and network discovery on the link. The PC is hidden from the network
- Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS)
- The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
Down
- releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
- This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
- displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name
- displays the Group Policy settings that are in effect for a currently logged in user
- Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
- Data is sent unencrypted and with no authentication.
- This is used to create customized system image files that will be installed on computers in the enterprise.
- a private network that connects remote sites or users together over a public network, like the internet
- this command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
- Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
- forces a DHCP client to renew its DHCP address lease from the DHCP server
- opens Microsoft Management Console (MMC)
- a command-line terminal emulation protocol and program that works over port 23
- the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
- This is used to update a local machine and verify that the machine is getting Group Policy updates.
31 Clues: opens Microsoft Management Console (MMC) • clears the DNS resolver cache on the host • Data is sent unencrypted and with no authentication. • This is used to open or execute a file using elevated permission. • forces a DHCP client to renew its DHCP address lease from the DHCP server • provides very weak security and should not be relied upon for confidentiality • ...
Per 2 Chapter 11- Calderon, D 2023-02-23
Across
- The applications and processes tabs have been combined
- command that prepares a disk with the appropriate file system
- the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
- easily share files and devices on a network
- To view a thumbnail image of a running program, hover the mouse over the program icon on the taskbar
- command to delete
- command to mount and configure a disk image that will be deployed to other computers
- command that moves something to a different folder
- the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
- command to manipulate the power state of a computer
- To add an application to the taskbar for easy access, right-click the icon of an application and select Pin to taskbar
- a private network that connects remote sites or users together over a public network, like the internet
- command to shutdown a process that is running on a computer
- allows files and applications that require higher privileges to be opened
- a group of computers and electronic devices with a common set of rules and procedures administered as a unit
- you have forgotten your password for a network application
- A user complains about receiving frequent notifications about applications that are making changes to the computer
- forces a DHCP client to renew its DHCP address lease from the DHCP server
- command to display the name of the computer that the prompt is open on and the user account
- The fastest way to get to these settings is to right-click an empty area of the desktop and select this
- command that deletes a file
- One of the two command line utilities of Windows
- Used by most applications installation programs
- command to find out which processes are running on a computer
- Resize a window by dragging it to one of the edges of the screen
Down
- To display a list of tasks that are unique to the application, right-click the application’s icon in the taskbar
- these users can only make configuration changes that affect their own profile
- a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
- these users can access files from other users
- Folders created for every user by default which provides storage location for common files and media
- Minimize all windows that are not being used by clicking and holding the title bar of one window and shaking it with the mouse
- command that displays contents of a text type file
- command that check a disk for errors
- When windows OS is installed, most files that are used to run the computer are stored here
- A user wants to work on network files while offline
- releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
- First version in which antivirus was integrated into the OS
- By default windows stores most of the files here
- Supports gadgets on the desktop
- Provides access to the various storage devices available on the computer
- command to repair or replace protected system files that may have been corrupted
- command to rename a folder or file
- This tab shows all running applications
- the command that is used to query the DNS server to discover IP addresses or host names
- View the desktop icons that are behind open windows by placing your cursor over the Show desktop button found at the right edge of the taskbar
45 Clues: command to delete • command that deletes a file • Supports gadgets on the desktop • command to rename a folder or file • command that check a disk for errors • This tab shows all running applications • easily share files and devices on a network • these users can access files from other users • Used by most applications installation programs • ...
Linux Crossword 2023-02-16
Across
- used to send various signals to processes whose PIDs are known
- this is the line oriented portion of vi
- removes sections from each line of files
- the original line editor that came with UNIX
- shows the difference between two text files
- evaluates logical or integer arithmatic expressions
- changes file permission mode settings
- shows a listing of last logged in users
- without any files specified, cat reads from the standard ______
- every process was a unique ___ number
- paginates a file
- program that returns an exit status of zero
- tells computer about the capabilities of your terminal
- a link that can span file system boundaries is called a ______ link
- creates copy of file under a different name or path
- prints out the last few lines of a file
- relays standard input to the standard output while capturing a copy in a file
- files with names starting with a period are known as _____ files
- deletes files
- shows or omits repeated lines
- shows who is currently logged on
- used to send output to a printer
- shows first few lines of files
- used to create a link to a file
- this is used by cron to determine what needs to be run
- calls up the GNU C compiler
- a pattern scanning and processing language with algorithmic syntax used in scripting
- most commonly used text editor on UNIX/linux
- tests for file types and compare values
- file perusal filter similar to more but with more features
- file perusal filter for viewing on terminal
- shows what processes are running on the system
- shows or sets the file mode creation mask
- tells you what the current time is
- sorts lines of text based on criteria
- prints lines matching a pattern
- merges lines of files
- print out arguments to the command
Down
- determines file type
- program that reads input from the standard input and writes to the standard output
- stream editor for filtering and transforming text using a regular expression syntax
- shows how the directory tree is built by mounted filesystems
- compare two sorted files line by line
- diverting the standard output to a file is known as a _____ion operation
- the -n option to this command prints the hostname of the computer
- searches for files in a directory hierarchy
- arbitrary precision infix calculator
- the connection of the standard output of one process to the standard input of another is known as a _____
- display or set your tty settings
- initializes a terminal or query terminfo database
- this is the clock daemon that will run commands for you on a regularly scheduled basis
- program that returns an exit status of non zero
- removes an empty directory
- renames a file
- saves a typescript of an interactive terminal session
- delays for a specified amount of time
- displays information about users on the system
- what we usually call a command line interpreter
- strips last component from filename
- ability to run more than one command at a time
- unix is a pun on ______ which was an operating system the early developers were working on
- changes the timestamps of a file or creates file if it doesn't exist
- concatenates files
- it is a unix convention to store binaries in a ____ directory
- lists the contents of a directory
- enables you to temporarily switch to a shell owned by another user
- print out calendar for the specified month or year
- creates a directory
- strips directory and suffix from filenames
- old invocation of grep that allows the use of logical operators in specifying the search pattern
- translates or deletes characters
- system process that is designed to run in the background
72 Clues: deletes files • renames a file • paginates a file • concatenates files • creates a directory • determines file type • merges lines of files • removes an empty directory • calls up the GNU C compiler • shows or omits repeated lines • shows first few lines of files • used to create a link to a file • prints lines matching a pattern • display or set your tty settings • ...
CAT Linux Crossword 2023-02-16
Across
- the connection of the standard output of one process to the standard input of another is known as a _____
- display or set your tty settings
- print out arguments to the command
- what we usually call a command line interpreter
- saves a typescript of an interactive terminal session
- the -n option to this command prints the hostname of the computer
- print out calendar for the specified month or year
- every process was a unique ___ number
- used to send output to a printer
- most commonly used text editor on UNIX/linux
- shows who is currently logged on
- tells computer about the capabilities of your terminal
- searches for files in a directory hierarchy
- arbitrary precision infix calculator
- creates a directory
- shows how the directory tree is built by mounted filesystems
- used to create a link to a file
- without any files specified, cat reads from the standard ______
- displays information about users on the system
- determines file type
- shows or sets the file mode creation mask
- this is the line oriented portion of vi
- the original line editor that came with UNIX
- removes an empty directory
- program that returns an exit status of non zero
- shows a listing of last logged in users
- changes file permission mode settings
- program that returns an exit status of zero
- calls up the GNU C compiler
- this is used by cron to determine what needs to be run
- ability to run more than one command at a time
- merges lines of files
- evaluates logical or integer arithmatic expressions
- shows first few lines of files
- stream editor for filtering and transforming text using a regular expression syntax
- sorts lines of text based on criteria
- removes sections from each line of files
- unix is a pun on ______ which was an operating system the early developers were working on
Down
- diverting the standard output to a file is known as a _____ion operation
- prints out the last few lines of a file
- tests for file types and compare values
- compare two sorted files line by line
- old invocation of grep that allows the use of logical operators in specifying the search pattern
- shows what processes are running on the system
- used to send various signals to processes whose PIDs are known
- changes the timestamps of a file or creates file if it doesn't exist
- this is the clock daemon that will run commands for you on a regularly scheduled basis
- deletes files
- tells you what the current time is
- files with names starting with a period are known as _____ files
- translates or deletes characters
- strips directory and suffix from filenames
- renames a file
- program that reads input from the standard input and writes to the standard output
- shows the difference between two text files
- it is a unix convention to store binaries in a ____ directory
- file perusal filter for viewing on terminal
- file perusal filter similar to more but with more features
- prints lines matching a pattern
- a link that can span file system boundaries is called a ______ link
- strips last component from filename
- a pattern scanning and processing language with algorithmic syntax used in scripting
- concatenates files
- creates copy of file under a different name or path
- relays standard input to the standard output while capturing a copy in a file
- enables you to temporarily switch to a shell owned by another user
- delays for a specified amount of time
- paginates a file
- system process that is designed to run in the background
- initializes a terminal or query terminfo database
- shows or omits repeated lines
- lists the contents of a directory
72 Clues: deletes files • renames a file • paginates a file • concatenates files • creates a directory • determines file type • merges lines of files • removes an empty directory • calls up the GNU C compiler • shows or omits repeated lines • shows first few lines of files • used to create a link to a file • prints lines matching a pattern • display or set your tty settings • ...
WTRFG Vocabulary Test 2024-09-23
Across
- to make agitated and angry : UPSET
- in a casual way that shows a relaxed lack of concern or interest
- inclined to or exhibiting assertiveness, hostility, or combativeness
- a fabrication of poles interwoven with slender branches
- a question in the mind
- a stock of needed materials or supplies
- to scoop out with or as if with a gouge
- different from the usual or normal
- feeling or expressing great joy : EXULTANT
- ownership of land
- prevailing tendency, mood, or inclination
- adhesive substance for application to wounds or sores
- internal parts; intestines
- to shake or tremble in one's voice while speaking
- the state after death; immeasurable time
- to climb awkwardly or with effort especially by using both the hands and the feet
- cruel, violent, and harmful in nature
- a federal official who carries out court orders, captures criminals, and performs other duties similar to a sheriff.
- to come to an end
- to shrink back involuntarily (as from pain) : FLINCH
- to move in an erratic fluttering manner
- to think about deeply at length
- to gape or stare stupidly
- appointed or selected for a particular purpose or duty
- an animal unusually small of its kind
- prickly shrubs or vines that have thorns or spikes
- to jut out from the surrounding surface or context
- infected and inflamed, causing pus to form
- to be present in large numbers or in great quantity : to be prevalent
- to pour water or any other liquid over something to extinguish fire or put it out
- of or relating to the throat or neck
- distributed or assigned as per plan or schedule
- SOMBER, GLOOMY
- to move sideways in a sneaky or cautious manner
- a place at a train station for the reception and forwarding goods or freight
- a creek in a marsh or tide flat
- INCONSIDERATE, THOUGHTLESS
- an exclamation used to drive away animals or birds
- to cause to lose one's bearings; confuse
Down
- a person from a backwoods area
- weight, heaviness, bulk
- nonsense, balderdash
- to give or concede reluctantly or with displeasure
- BRINK, THRESHOLD
- the place where someone or something is going or headed towards
- wild in appearance
- to laugh in a covert or partly suppressed manner
- the need for immediate action or attention
- loss of hope and surrender to despair
- a liquid or lotion used for soothing pains and stiffness in muscles
- to make powerless or ineffective; stun
- to cry loudly : wail
- a rough sharp or jagged projecting part; unexpected difficulty or obstacle
- a container in which cream is stirred or shaken to make butter
- to observe or think about something with triumphant and often satisfaction, gratification, or delight
- to hesitate or stumble while speaking or doing something
- dense thickets of tall reeds or bamboo-like plants
- an emotion combining dread and wonder
- to confound with fear, amazement, or awe
- syrup from the juice of a sorgo that resembles cane syrup
- being in or facing the direction toward which the wind is blowing
- to put under water
- a sudden and brief storm with strong winds and heavy rain or snow
- having no give or slack : tightly drawn
- a part remote from the center : BORDER
- to satisfy one's thirst or desire completely
- marked by temperance, moderation, or seriousness
- in a state of extreme physical or nervous fatigue
- to prevent someone from being included or considered
69 Clues: SOMBER, GLOOMY • BRINK, THRESHOLD • ownership of land • to come to an end • wild in appearance • to put under water • nonsense, balderdash • to cry loudly : wail • a question in the mind • weight, heaviness, bulk • to gape or stare stupidly • internal parts; intestines • INCONSIDERATE, THOUGHTLESS • a person from a backwoods area • to think about deeply at length • ...
Techno word puzzle 2025-03-31
Across
- An AI-powered recommendation engine widely used by e-commerce platforms.
- The mechanism in React that allows components to render only what has changed.
- A cloud service that provides pre-trained AI models for speech and text recognition.
- A built-in React Hook used to manage side effects like fetching data.
- A state management tool that follows the “predictable state container” principle.
- A term for designing software that continues to function even if some parts fail.
- A CSS property that controls element visibility without removing it from layout flow.
- A CSS method that arranges elements dynamically within a container.
- The CSS property used to create a smooth scrolling effect.
- A distributed event streaming platform used for building real-time data pipelines.
- A container orchestration tool for managing microservices at scale.
- The feature in ES6 that allows object properties to be extracted into variables.
- A mechanism in JavaScript that runs asynchronous operations in a non-blocking manner.
- A lightweight alternative to services for managing global states in Angular applications.
- A technique where a function is delayed to avoid being called too frequently, useful in search inputs.
- A CI/CD service from GitHub that automates builds and deployments.
- A web-based visualization tool often used in React projects.
- A concept in React that optimizes re-rendering by memoizing values.
- A tool used in Webpack to convert modern JavaScript code into older syntax.
- The UX principle that ensures users don’t have to memorize information but instead recognize patterns.
- What does Angular use to handle asynchronous data and events?
- A database technology that allows you to store and query JSON-like documents efficiently.
- Angular’s mechanism for passing data from a parent to a child component.
- A key Webpack feature that eliminates unused JavaScript from the final bundle.
- A frontend optimization technique that renders pages at build time.
- A modern CSS layout system that defines grid-based structures.
- An Angular decorator that defines metadata for components.
Down
- A cloud-based logging service that provides real-time insights into application behavior.
- A JS data structure that maintains a key-value pair, but unlike objects, keys can be any type.
- The term for breaking down a large JS bundle into smaller, on-demand pieces for faster load time.
- A browser API that allows loading images only when they enter the viewport.
- A cloud service for real-time message-based communication between microservices.
- A cloud service for hosting static sites and frontend applications.
- A caching strategy where frequently accessed assets are stored closer to users.
- A core Angular module used to define routes.
- A JavaScript library commonly used for creating interactive charts and graphs.
- An AI model known for generating images based on text prompts.
- A Google-provided tool that audits web pages for performance, accessibility, and best practices.
- A browser API that schedules a function to run before the next repaint.
- A CSS preprocessor that adds features like nesting and variables.
- A term for designing interfaces that work seamlessly across multiple screen sizes.
- A performance metric that measures the time it takes for a webpage to become interactive.
- A change detection strategy in Angular that optimizes performance by checking only modified parts.
- A term for executing JavaScript code outside of the browser, often used for server-side development.
- A performance optimization technique that prevents unnecessary re-renders of a component.
- A Webpack concept where assets are loaded only when required.
- The process of running unit tests automatically on each code push in CI/CD.
- The JS method that transforms an array into a single value using a callback.
- The directive used to create structural changes in the DOM based on conditions.
- A technique that improves UI feedback by preventing layout shifts.
50 Clues: A core Angular module used to define routes. • The CSS property used to create a smooth scrolling effect. • An Angular decorator that defines metadata for components. • A web-based visualization tool often used in React projects. • A Webpack concept where assets are loaded only when required. • What does Angular use to handle asynchronous data and events? • ...
AP Human Geography - Noah Kretz 1aaa 2019-05-06
Across
- (IDK,1)A thematic map using shading to show a pattern of a variable.
- (CC,1)A computer system that can capture, store, query, analyze, and display geographic data.
- (VIT,2)Was one of the first to argue that the worlds rate of population increase was far outrunning the development of food population. This is important because he brought up the point that we may be outrunning our supplies because of our exponentially growing population.
- (VIT, 5)The deliberate effort to modify a portion of Earth's surface through the cultivation of crops and the raising of livestock. This is important because it is the main focus of the unit.
- (CC, 4)Tending to move toward a center.
- (VIT, 6)A period in the 18th and 19th century where great advances were made in agriculture, manufacturing, and transportation. It is important because it was the start of all technological advancements.
- (CC, 4)Tending to move away from a center.
- (CC, 2)Permanent movement from one region of the country to another.
- (CC,1)A system that accurately determines the precise position of something on Earth.
- (VIT, 4)The formal act of acquiring territory by conquest. This is important because this is how much of the land owned today was claimed.
- (CC, 5)Farming that yields a large amount of output per acre through less intensive farming.
- (IDK, 6)Principles for mass production based on assembly-line techniques.
- (VIT, 3)A way of classifying languages at the global scale.It is important because every recognized language can be found in this.
- (CC, 2)Permanent movement within one region of a country.
- (IDK, 3)The visible imprint of human activity on the landscape.
- (IDK, 3)A religion entered on the belief that inanimate objects, such as mts., trees, rivers, and boulders.
- (CC, 6)The distance people are willing to travel for a service.
- (CC, 6)The amount of people needed for a company to be profitable.
Down
- (CC, 7)The physical character of place; what is found at the location.
- (CC, 3)The process of people adopting the dominant culture.
- (CC, 7)the location of a place relative to other places.
- (IDK, 5)The land and its ownership and cultivation.
- (VIT,1)The study of the spatial characteristics of humans and human activities. It's important because it is the base for everything in the topic.
- (IDK,1)The spread of an idea from persons or nodes of authority to other persons or places.
- (VIT, 7)The area of a city where retail and office activities are clustered. It is important because the center of the city is usually the most important part.
- (CC, 5)Farming that yields a large amount of output per acre through concentrated farming.
- (IDK, 7)The county within which the city is located, and adjacent counties meeting one of several tests indicating a functional connection to the central city.
- (IDK, 7)A process by which banks draw lines on a map and refuse to lend money to purchase or improve property within boundaries.
- (IDK, 5)The growing of fruits, vegetables, and flowers for human consumption.
- (IDK, 4)the doctrine that territory should be controlled by the country to which they are ethnically or historically related.
- (IDK, 4)The study of the effects of economic geography on the powers of the state.
- (IDK,2)The portion of Earth's surface occupied by permanent human settlement.
- (CC, 3)The process of adopting fully the dominant culture and abandon their own culture.
- (IDK,2)The seasonal migration of livestock between mountains and lowland pastures.
- (IDK, 6)Areas communities have set aside for industrial uses.
35 Clues: (CC, 4)Tending to move toward a center. • (CC, 4)Tending to move away from a center. • (IDK, 5)The land and its ownership and cultivation. • (CC, 7)the location of a place relative to other places. • (CC, 2)Permanent movement within one region of a country. • (CC, 3)The process of people adopting the dominant culture. • ...
AP Human Geography - Noah Kretz 1aaa 2019-05-06
Across
- (IDK,2)The portion of Earth's surface occupied by permanent human settlement.
- (IDK, 7)A process by which banks draw lines on a map and refuse to lend money to purchase or improve property within boundaries.
- (VIT,1)The study of the spatial characteristics of humans and human activities. It's important because it is the base for everything in the topic.
- (CC, 4)Tending to move away from a center.
- (VIT, 7)The area of a city where retail and office activities are clustered. It is important because the center of the city is usually the most important part.
- (VIT, 5)The deliberate effort to modify a portion of Earth's surface through the cultivation of crops and the raising of livestock. This is important because it is the main focus of the unit.
- (CC,1)A computer system that can capture, store, query, analyze, and display geographic data.
- (VIT,2)Was one of the first to argue that the worlds rate of population increase was far outrunning the development of food population. This is important because he brought up the point that we may be outrunning our supplies because of our exponentially growing population.
- (CC, 7)the location of a place relative to other places.
- (IDK, 6)Principles for mass production based on assembly-line techniques.
- (CC, 5)Farming that yields a large amount of output per acre through less intensive farming.
- (IDK, 7)The county within which the city is located, and adjacent counties meeting one of several tests indicating a functional connection to the central city.
- (IDK, 4)the doctrine that territory should be controlled by the country to which they are ethnically or historically related.
- (IDK,2)The seasonal migration of livestock between mountains and lowland pastures.
- (IDK, 3)The visible imprint of human activity on the landscape.
- (CC, 2)Permanent movement from one region of the country to another.
- (VIT, 3)A way of classifying languages at the global scale.It is important because every recognized language can be found in this.
- (VIT, 6)A period in the 18th and 19th century where great advances were made in agriculture, manufacturing, and transportation. It is important because it was the start of all technological advancements.
- (IDK, 3)A religion entered on the belief that inanimate objects, such as mts., trees, rivers, and boulders.
- (IDK, 5)The land and its ownership and cultivation.
Down
- (CC, 4)Tending to move toward a center.
- (IDK, 4)The study of the effects of economic geography on the powers of the state.
- (IDK, 6)Areas communities have set aside for industrial uses.
- (CC, 3)The process of people adopting the dominant culture.
- (IDK,1)A thematic map using shading to show a pattern of a variable.
- (CC, 3)The process of adopting fully the dominant culture and abandon their own culture.
- (CC, 7)The physical character of place; what is found at the location.
- (CC, 5)Farming that yields a large amount of output per acre through concentrated farming.
- (IDK,1)The spread of an idea from persons or nodes of authority to other persons or places.
- (CC,1)A system that accurately determines the precise position of something on Earth.
- (CC, 6)The distance people are willing to travel for a service.
- (CC, 2)Permanent movement within one region of a country.
- (VIT, 4)The formal act of acquiring territory by conquest. This is important because this is how much of the land owned today was claimed.
- (CC, 6)The amount of people needed for a company to be profitable.
- (IDK, 5)The growing of fruits, vegetables, and flowers for human consumption.
35 Clues: (CC, 4)Tending to move toward a center. • (CC, 4)Tending to move away from a center. • (IDK, 5)The land and its ownership and cultivation. • (CC, 7)the location of a place relative to other places. • (CC, 2)Permanent movement within one region of a country. • (CC, 3)The process of people adopting the dominant culture. • ...
talkTerminology: S 2024-07-15
Across
- A software and hardware combination that delivers web content to users over the Internet or an intranet. The primary role is to store, process, and deliver web pages to web browsers upon request.
- ____ Stitching. A binding method where folded sheets are stapled through the fold line, commonly used for booklets and magazines.
- ____ mail. A class of mail used for bulk mailings that do not require immediate delivery, often used for advertising.
- Individuals or groups who have an interest in the activities and decisions of an organization, such as employees, customers, investors, and the community.
- In printing, a group of pages folded together to form a part of a book before binding. A signature begins as a flat sheet printed on both sides, containing multiple pages of the printed material. The sheet is folded in a specific way to create a booklet-like section.
- Official approval of a particular stage or component of a project, allowing it to move forward.
- Abbreviation for person who has a specific area of expertise and can speak to it from an authoritative and credible position.
- ____ Case. Only the first letter of the first word in a sentence and proper nouns are capitalized.
- Abbreviation for the list of results that a search engine returns in response to a specific word or keyword phrase query.
- The practice of writing for public figures, specifically for delivery at events, conferences, or public addresses.
- The process of sewing or stapling the pages of a book or booklet together.
Down
- ____ Stitching. A binding method where the pages are stapled or stitched together along one edge of the document.
- A critical pre-production document that is a visual narrative of video frames composed of drawings/images, audio, FX, and writing representing the shots planned for a video project.
- A large, eye-catching billboard, often featuring special effects like neon lighting or moving parts.
- ____ logo. A version of a logo that's arranged vertically instead of horizontally. Often used when space is limited, such as on mobile websites, clothing tags, business cards, and invoices. Alternate for vertical logo.
- The relative portion of total advertising exposures a brand receives in a specific market, compared to its competitors.
- A news service that takes a single story and places it on several media outlets websites nation/worldwide, example: The Associated Press.
- Social Media ____. The use of social media platforms to communicate with the public, manage the day-to-day organization's online presence, and engage with audiences.
- Dividing a mailing list into smaller groups based on specific criteria, such as demographics or purchase history.
- A direct mail piece that is mailed without an envelope, often folded and sealed.
- A set of standards for the writing, formatting, and design of documents. Alternate for brand guidelines.
- A short extract from a recorded interview, chosen for its pungency or appropriateness.
- A visual or textual representation of the basic structure/architecture of a website. It provides an overview of the website's organizational hierarchy and general page representation.
- ____ advertising. Ads displayed on platforms like Facebook, Instagram, TikTok, X, and LinkedIn.
- ____ TV. The delivery of television content over the internet, allowing viewers to watch shows, movies, live events, and other types of video programming on demand, without the need for traditional cable or satellite services. Streaming TV can occur on CTVs as well as other devices such as smartphones and tablets.
- Abbreviation for the practice of increasing the quantity and quality of traffic to a website through organic search results and ranking position.
- The edge of a book where the pages are bound together, often containing the book’s title and author.
27 Clues: The process of sewing or stapling the pages of a book or booklet together. • A direct mail piece that is mailed without an envelope, often folded and sealed. • A short extract from a recorded interview, chosen for its pungency or appropriateness. • Official approval of a particular stage or component of a project, allowing it to move forward. • ...
Per 1 Chapter 11 - Aragon, A 2023-02-27
Across
- Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
- The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
- opens the Remote Desktop utility
- This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
- displays the DNS resolver cache, which contains host and domain names that have been recently queried
- This is used to update a local machine and verify that the machine is getting Group Policy updates.
- This is used to create customized system image files that will be installed on computers in the enterprise.
- Provides storage locations for files and medias
- releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
- a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
- These are identified with a dollar sign ($) at the end of the share name.
- a dynamic disk that has been moved to a computer from another computer running Windows
- Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).
- the command that is used to query the DNS server to discover IP addresses or host names
- uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
- Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
Down
- the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
- displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name
- Access to files that require higher user privilege
- This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
- These are addresses from a reserved range in the 169.254.x.y network space
- forces a DHCP client to renew its DHCP address lease from the DHCP server
- contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
- displays the Group Policy settings that are in effect for a currently logged in user
- A feature that enables a user to encrypt all data on a disk drive or removable drive
- This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
- a basic disk that is being converted into a dynamic disk
- Cache - Allows remote computers to share access to a single cache of data from shared folders and files
- shows a menu in which you can access applications and power options
- provides very weak security and should not be relied upon for confidentiality
- the command that tests basic connectivity between devices by using ICMP echo request and reply messages
- a private network that connects remote sites or users together over a public network, like the internet
- a command-line terminal emulation protocol and program that works over port 23
- a group of computers and electronic devices with a common set of rules and procedures administered as a unit
- This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
35 Clues: opens the Remote Desktop utility • Provides storage locations for files and medias • Access to files that require higher user privilege • a basic disk that is being converted into a dynamic disk • shows a menu in which you can access applications and power options • forces a DHCP client to renew its DHCP address lease from the DHCP server • ...
CAP105-30 Midterm Review 2017-03-22
Across
- point The ____ is a blinking vertical bar that indicates where text, graphics, and other items will be inserted. from wd1 2 wds
- A(n) ____ address is a number that uniquely identifies each computer or device connected to the Internet. from dc2
- A(n) ____ is a Web site that offers a variety of Internet services from a single, convenient location. from dc2
- ____ is the process of transferring data in a continuous and even flow. from dc2
- ____ software is a type of application software that allows users to create and manipulate documents containing mostly text and sometimes graphics. from dc3 2 wds
- A(n) ____ is a private combination of characters associated with the user name that allows access to certain computer resources. from dc4
- ____ is a series of instructions that tells a computer what to do and how to do it. from DC1
- The purpose of __________ is to optimize the use of RAM. from dc4 2 wds
- ____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. from dc5
- The term ____ refers to online or Internet-based illegal acts. from dc5
- ____ are words or phrases that describe a document. from wd1
- A personal ____, is a utility that detects and protects a personal computer from unauthorized intrusions. from dc4
- A(n) ____ boot is the process of using the operating system to restart a computer. from dc4
- When users ____ a document, they change its appearance. from dc3
- A software ____ is a collection of individual application programs sold as a single package. from dc3
Down
- The _____, or typeface, defines the appearance and shape of letters, numbers, and special characters. from wd1
- The ____ is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals. from dc2
- With a ____, you interact with software using text, graphics, and visual images. from DC1 3 wds
- A(n) ____ device like the one in the accompanying figure authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. from dc5
- A(n) ____ is the destructive event or prank malware is intended to deliver. from dc5
- A content ____ is a business that gathers and organizes Web content and then distributes, or feeds, the content to subscribers for free or a fee. from dc2
- A _____ is a window that can remain open and visible while you work in the document. from wd1
- A(n) ______ is a request for specific data from a database from dc3
- A ____ computer is a computer that can perform all of its input, processing, output, and storage activities by itself. from DC1
- Each ____ on the Ribbon surrounds a collection of groups, and each group contains related commands. from wd1
- ____ consist(s) of a computer’s electronic components that store instructions waiting to be executed and data needed by those instructions. from DC1
- Computer ____ entails having knowledge and understanding of computers and their uses. from DC1
- A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. from dc5
- ____ software is application software that assists people in becoming more effective and efficient while performing their daily business activities. from dc3
- A(n) ____ interface controls how you enter data and instructions and how information is displayed on the screen. from dc4
30 Clues: ____ are words or phrases that describe a document. from wd1 • When users ____ a document, they change its appearance. from dc3 • A(n) ______ is a request for specific data from a database from dc3 • The purpose of __________ is to optimize the use of RAM. from dc4 2 wds • The term ____ refers to online or Internet-based illegal acts. from dc5 • ...
Potenza termini 2022-01-12
Across
- è un tipo di tastiera diffusa in america, ma anche in italia
- è il nome con cui è indicato il tasto che abilità la scrittura in maiuscolo
- operazione che permette di creare una copia di sicurezza in un file
- è ciascuna delle pagine che compongono una presentazione tipo PowerPoint
- regole comportamentali per la comunicazione su internet
- se il termine è riferito ad una risposta del sistema, significa che è attiva
- madre è la scheda principale dove sono collegati tutti i componenti hardware del computer
- archivio di dati disposti in modo organizzato e correlati tra di loro
- è un sistema di protezione del computer da accessi indesiderati
- è una sequenza di operazioni elementari che permettono di risolvere un problema in tempo finito
- economy: nuova forma di economia caratterizzata dall’utilizzo di internet per la vendita di prodotti e sevizi
- misura di un’unità di informazione, corrisponde a 1024 MB
- memoria a sola lettura programmabile e cancellabile
- dispositivo che permette di collegare computer a una rete locale
- casella postale dove vengono accumulati i messaggi di posta elettronica
- è il processo dei dati da un database secondo certi criteri
- di particolare abilità e ha per obbiettivo la divulgazione dell’informatica
- è la tastiera tipicamente italiana
- sequenza di comandi per velocizzare le operazioni svolte frequentemente
- interfaccia grafica dei software
- tecnica di riconoscimento ottico di caratteri di stampa
- codice segreto per accedere a risorse e informazioni private
- (sistema): è il sistema di numerazione in cui si utilizzano solo cifre indicate da 0-1
- è una grandezza che varia in continuo, non è rappresentata da un valore numerico
- è l’unità di informazione strutturata di un database
- insieme dei dispositivi elettronici e meccanici del computer
- è un programma in grado di riconoscere un virus presente in un file ed eliminarlo
Down
- software rilasciato per dimostrazione, ma non è abilitato in tutte le funzioni
- collegamento tra un documento e l’altro
- marchio che indica la protezione dei diritti dell’autore
- finestra progettata per visualizzare i dati di uno o più record di un database
- è un componente hardware esterno al computer
- procedura per la creazione e la copia sul disco fisso di archivi e programmi
- è la posta elettronica, ossia sono i messaggi inviati tramite computer collegati a internet
- utilizzo di internet per la comunicazione tra aziende
- contiene file e altre cartelle
- scherzo informatico non dannoso che fa pensare di essere contagiati da un virus
- è un area di lavoro visualizzata sullo schermo ed è dedicata a un’applicazione
- sistema operativo di dominio pubblico
- è il profilo di un utente che corrisponde a una casella e a un indirizzo di posta
- è un dispositivo che serve per smistare messaggi in una rete locale
- è il modo in cui vengono organizzati testo e video all’interno di una pagina, per il video o per la stampa
- è il dizionario dei sinonimi e contrari
- indica la velocità di rotazione del disco fisso
- è un documento che integra in modo interattivo testi, immagini e video
- ciascuna delle pagine che compongono una presentazione tipo Power Point
- è un operazione che permette di caricare o scaricare dalla rete un file sul proprio computer
- è l’insieme dei programmi che permettono il funzionamento di un computer
- disegno di dimensioni ridotte che richiama la funzione ad essa associata
- è il singolo punto luminoso del monitor
- singolo documento di lavoro individuato da un nome
- cache: memoria interna al processore, ad altissima velocità di accesso
- è un programma che permette l’accesso alla rete internet e alle pagine web
- li strumenti: è una barra dove sono raccolte delle icone che funzionano da pulsanti
54 Clues: contiene file e altre cartelle • interfaccia grafica dei software • è la tastiera tipicamente italiana • sistema operativo di dominio pubblico • collegamento tra un documento e l’altro • è il dizionario dei sinonimi e contrari • è il singolo punto luminoso del monitor • è un componente hardware esterno al computer • indica la velocità di rotazione del disco fisso • ...
COVID-19: Coding and General Knowledge 2020-08-14
Across
- New code effective April 1, 2020, off-cycle update.
- CDC’s Influenza SARS-CoV-2 (Flu SC2) Multiplex Assay is a single test used to detect the COVID-19 virus and two types of the _______ virus.
- Coders should ______ the provider if the provider documented the diagnosis COVID-19
- Worn to minimize exposure to COVID-19.
- “Corona” in Coronovirus refers to the appearance of a ____ surrounding the virus.
- Study and control of disease or injury patterns in populations.
- Condition in children who had or been exposed to COVID-19 causing inflammation of different body parts.
- There are ____ phases of human clinical trials that a potential vaccine must undergo to determine if it is safe and effective in preventing infection.
- A chemical used in a lab to test patient swab samples to determine a positive or negative COVID-19 result.
- Social distance is ____ feet.
- Rapid result mucous swab test used to identify an active infection.
- COVID-19 is an ___ virus, like the measles and unlike DNA viruses, like smallpox. RNA
- Body system most affected by COVID-19 infection.
- Name for nonautologous plasma obtained from patients recovered from COVID-19 and transfused into current, acute COVID-19 patients.
- The most at-risk COVID-19 patients have the underlying health condition(s) cardiovascular disease, ______, and chronic lung disease.
- the test results were back and the test results come back
- Contact ¬¬¬______ is the process of identifying, notifying, and monitoring anyone who came in close contact with an infectious, COVID-19 positive individual.
- Codes Z09 and _____ are reported when a patient who previously had COVID-19 is seen for a follow-up exam and the COVID-19 test is negative.
- Blood test that identifies past COVID-19 infection.
- Pneumonia confirmed as due to COVID-19 is coded ______.
Down
- Alternative to in-person medical appointments.
- Geographic origin of COVID-19.
- Veklury, GS-5734, and RDV are other names for _______.
- Epicenter City in May 2020.
- Ventilator patients may be placed in the _____ position in order to improve ventilation-perfusion, help keep alveolae open at end-expiration, and improve gas exchange.
- Approach for new PCS convalescent plasma transfusion code.
- Hospitals will send COVID-19 patient data to a federal contractor called, _______, or to their state health departments.
- Codes from PCS Tables ____ and XW1, New Technology Group 5, are reported for administration of a therapeutic substance to treat COVID-19 when a unique code does not exist.
- COVID-19 is thought to have a _____ origin, likely bats.
- The common _____ and LAMP tests look for genetic strands of a given virus in a sample collected from a patient.
- Class of surgeries cancelled to increase hospital capacity for COVID-19 patients.
- First word in “SARS.”
- Code 8E0ZXY6 may be reported for COVID-19 patients placed in _______.
- COVID-19 existing on the hands can be killed by washing for 20 seconds with common household ______, which bursts the virus’ protective bubble.
- Code ____ was reported for COVID-19 cases for discharges that occurred prior to April 1, 2020.
- A pregnant patient admitted because of COVID-19 should receive a principal diagnosis code from category _____.
- Code _____ is reported if a patient has a known or suspected exposure to COVID- 19, is exhibiting signs/symptoms associated with COVID-19, and the test results are negative, inconclusive, or unknown.
- Federal agency that licenses, evaluates and monitors vaccines.
- Recommended quarantine time, in weeks.
- Code ______ is reported as a secondary diagnosis for the sequelae, residual effect or complication of a previous COVID-19 infection.
40 Clues: First word in “SARS.” • Epicenter City in May 2020. • Social distance is ____ feet. • Geographic origin of COVID-19. • Worn to minimize exposure to COVID-19. • Recommended quarantine time, in weeks. • Alternative to in-person medical appointments. • Body system most affected by COVID-19 infection. • New code effective April 1, 2020, off-cycle update. • ...
APHumGeo Block 2 Review-Hunter Cook 2021-04-23
Across
- A system that accurately determines the precise location of something on Earth. (1 CC)
- A simplified form of speech developed from two or more languages. (3 IDK)
- a two dimensional or flat scale model of the Earth’s surface or portion of it. (1 VIT)
- The portion of Earth’s surface occupied by permanent human settlement. (2 IDK)
- the deliberate effort to modify a portion of Earth's surface through the cultivation of crops and the raising of livestock for subsistence or economic grain(5 VIT)
- The position that a state should be annexed because of ethnicity or prior historical possession. (4 IDK)
- A widespread occurrence of an infectious disease in a community at a particular time. (2 CC)
- The Brazilian equivalent of a shanty town, which are generally found on the edge of the city. (7 IDK)
- Enclaves of ethnic groups settled outside of their homelands. (3 IDK)
- Yields a large amount of output per acre through less intensive farming
- nationalistic forces that bind a country together. (3 CC)
- Beliefs, customs, and traditions of a specific group of people. (3 VIT)
- a model to explain the forces that control the prices of agricultural commodities and how those variable prices affect patterns of agricultural land utilization (5 IDK)
- Cities with more than 10 million people (6, IDK)
- Forces that divide a country (3 CC)
- is a country whose political boundaries correspond with its cultural boundaries. ex France (4, VIT)
- Service sector industries that require a high level of specialized knowledge or technical skill. Examples include scientific research and high level management. (7 CC)
- the policy or practice of acquiring full or partial political control over another country, occupying it with settlers, and exploiting it economically. (4 CC)
- A new term used to describe cities that have 20 million or more people (6, IDK)
- Disease that occurs over a wide geographic area and affects a very high proportion of the population. (2 CC)
- the name given to a place on Earth (1 IDK)
- A region caught between stronger colliding external cultural political forces, under persistent stress, and often fragmented by aggressive rivals. (4 IDK)
- Yields a large amount of output per acre through concentrated farming (uses a small amount of land). (5 CC)
Down
- Indicator of level of development for each country, constructed by United Nations, combining income, literacy, education, and life expectancy (7 VIT)
- A computer system that can capture, store, query, analyze, and display geographic data. (1 CC)
- A policy of extending a country's power and influence through diplomacy or military force. (4 CC)
- used to show a quantitative difference between mapped features by varying the size of symbols. Data is classified into ranges that are each then assigned a symbol size to represent the range. (1 IDK)
- The very sparsely habited, uninhabited, or uninhabitable area of the world. (2 IDK)
- business district The area of a city where retail and office activities are clustered. (6, VIT)
- The percentage growth of a population in a year, computed as the crude birth rate minus the crude death rate. (2 VIT)
- Farms that produce high consumer demand products and either trucks them to market or to processing plants. (5 IDK)
- Service sector industries concerned with the collection, processing, and manipulation of information and capital. Examples include finance, administration, insurance, and legal services. (7 CC)
- Physical characteristics of a location, including land, labor, capital (6, CC)
- The location of a place relative to another place (6, CC)
- Another name for squatter settlements that are residential developments that take place on land that is neither owned nor is rented by its occupants. (7 IDK)
- a large amount of land). (5 CC)
36 Clues: a large amount of land). (5 CC) • Forces that divide a country (3 CC) • the name given to a place on Earth (1 IDK) • Cities with more than 10 million people (6, IDK) • nationalistic forces that bind a country together. (3 CC) • The location of a place relative to another place (6, CC) • Enclaves of ethnic groups settled outside of their homelands. (3 IDK) • ...
Vocabulary Review 2022-05-17
Across
- The story had a ____ and an his arch-nemesis.
- He was ____ and never stopped talking.
- After the fight, we had to take time to ___ our intense emotions.
- The ____ left behind nothing but ashes.
- I cant tell the difference between the two. Could you ____ them for me?
- If I buy a horse, does that make ma an ____?
- The boy is known to ____ his parents in order to get what he wants.
- After a long day of work, I need to get some ___.
- I often ____ from my original thoughts.
- The magician knew how to ____ the crowd.
- She made the decision on her own ___.
- For our council meeting, we had to remember to invite the esteemed ____ to get her input.
- His face was ____ and emotionless after the quiz.
- I could not stand that ___ smell coming from the garage.
- The pilot who was afraid of heights felt like quite the ___ to me.
- Their ___ and rowdy behavior got them suspended.
- As a result of her knowledge and wisdom, people always referred to her as a ___.
- The dogs at the shelter were very ____ and unique.
- Despite his ____, he did not make much money.
- The cafeteria feels like a ____ before we all get our food.
- I wish we could _____ all diseases.
- The glass, which should have been ____, became foggy and opaque.
- When I get angry, all I want is to ___ my punching bag.
- Why do you always ____ the things that I say?
- Her reaction was surprisingly ___ despite the severity of the situation.
- The country was run by a _____ after they determined that a president wasn't enough.
- Swords can be seen as ____ and risky in battle.
- The ___ villain was cruel and evil.
Down
- When baking, be sure to ___ all the ingredients into one bowl.
- You cannot ___ upon fundamental rights.
- I do not allow others to ____ information to me without my permission.
- Their ____ was solemn and sad which was shown by their drooping eyes and deep frown.
- The children showed ___ and curiosity towards the project.
- Weathermen always ____ the next day's weather.
- I was ____ to get on the bike for the first time, but once I got it down I had fun!
- It took me a long time to ____ to the new schedule.
- Part of working for the fire department is listening to the ___ center for your next assignment.
- The ____ on the street became so severe that the police were called in to help.
- The man could be describes as a ___ due to his pessimistic attitude.
- Her invention was ____ and appreciated by many people.
- She meant the phrase in a ____ way, rather than a literal way.
- The artists ____ use of color added another dimension to the piece.
- The boss has to ___ his employees to get their work done.
- Her spending habits were ___ and unnecessary.
- She was in a verbal ____ with her mom over whether or not she had to do chores.
- I had to ____ my brother to give me my toys back.
- I have a ____ for the teacher.
- The pain began to ____ after I took the medication.
- After a long day of work, I ____ to my bed to sleep.
- I wanted to ____ all memory of that awful event.
- Her blue hair and green boots made her very _____ to in the store.
- The Qur'an is seen as a ___ text in the Muslim religion.
- If we ___ our ideas together, maybe we will come up with something new!
- In order to ____ a response from the teacher, you must ask nicely.
- The ___ had many windows and drawbridges.
55 Clues: I have a ____ for the teacher. • I wish we could _____ all diseases. • The ___ villain was cruel and evil. • She made the decision on her own ___. • He was ____ and never stopped talking. • You cannot ___ upon fundamental rights. • The ____ left behind nothing but ashes. • I often ____ from my original thoughts. • The magician knew how to ____ the crowd. • ...
Noah Kretz - AP Human Crossword 2019-05-01
Across
- (CC, 7)the location of a place relative to other places.
- (CC, 7)The physical character of place; what is found at the location.
- (IDK,1)A thematic map using shading to show a pattern of a variable.
- (VIT,1)The study of the spatial characteristics of humans and human activities. It's important because it is the base for everything in the topic.
- (IDK, 4)the doctrine that territory should be controlled by the country to which they are ethnically or historically related.
- (IDK, 5)The land and its ownership and cultivation.
- (VIT, 3)A way of classifying languages at the global scale.It is important because every recognized language can be found in this.
- (IDK,1)The spread of an idea from persons or nodes of authority to other persons or places.
- (CC, 3)The process of people adopting the dominant culture.
- (VIT, 6)A period in the 18th and 19th century where great advances were made in agriculture, manufacturing, and transportation. It is important because it was the start of all technological advancements.
- (IDK, 3)The visible imprint of human activity on the landscape.
- (IDK,2)The seasonal migration of livestock between mountains and lowland pastures.
- (CC, 2)Permanent movement within one region of a country.
- (CC, 5)Farming that yields a large amount of output per acre through less intensive farming.
- (CC, 4)Tending to move away from a center.
- (IDK, 6)Areas communities have set aside for industrial uses.
- (VIT, 5)The deliberate effort to modify a portion of Earth's surface through the cultivation of crops and the raising of livestock. This is important because it is the main focus of the unit.
- (IDK,2)The portion of Earth's surface occupied by permanent human settlement.
- (CC, 6)The distance people are willing to travel for a service.
- (IDK, 6)Principles for mass production based on assembly-line techniques.
- (IDK, 7)A process by which banks draw lines on a map and refuse to lend money to purchase or improve property within boundaries.
Down
- (IDK, 7)The county within which the city is located, and adjacent counties meeting one of several tests indicating a functional connection to the central city.
- (CC, 6)The amount of people needed for a company to be profitable.
- (CC, 3)The process of adopting fully the dominant culture and abandon their own culture.
- (CC,1)A computer system that can capture, store, query, analyze, and display geographic data.
- (CC, 4)Tending to move toward a center.
- (CC, 5)Farming that yields a large amount of output per acre through concentrated farming.
- (VIT,2)Was one of the first to argue that the worlds rate of population increase was far outrunning the development of food population. This is important because he brought up the point that we may be outrunning our supplies because of our exponentially growing population.
- (CC, 2)Permanent movement from one region of the country to another.
- (IDK, 3)A religion entered on the belief that inanimate objects, such as mts., trees, rivers, and boulders.
- (IDK, 5)The growing of fruits, vegetables, and flowers for human consumption.
- (VIT, 7)The area of a city where retail and office activities are clustered. It is important because the center of the city is usually the most important part.
- (CC,1)A system that accurately determines the precise position of something on Earth.
- (IDK, 4)The study of the effects of economic geography on the powers of the state.
- (VIT, 4)The formal act of acquiring territory by conquest. This is important because this is how much of the land owned today was claimed.
35 Clues: (CC, 4)Tending to move toward a center. • (CC, 4)Tending to move away from a center. • (IDK, 5)The land and its ownership and cultivation. • (CC, 7)the location of a place relative to other places. • (CC, 2)Permanent movement within one region of a country. • (CC, 3)The process of people adopting the dominant culture. • ...
GCSE ICT Keywords (N-Z) 2016-04-21
Across
- A web feed format used for content which is frequently updated e.g. news in a standard format so it can be added to a variety of websites.
- Based on truth or reason. It is important to judge whether information found online is valid because it could be biased or untruthful.
- Sharing files among groups of people who are logged on to a file-sharing network.
- Working from home but staying in touch with others with the help of technology.
- A set of rules used by computers to communicate with each other across a network.
- Software that can be installed on your computer without your knowledge which collects information about your logins and passwords and sends details to another computer on the internet.
- one type of flash memory card which store up to 2 GB of data. Secure Digital High Capacity (SDHC) cards are another type of flash memory card and they are ideal for video cameras because they can store up to 32 GB of data.
- An online system for education with areas for homework classes teacher and pupil space etc.
- Meeting the needs of the present without compromising the needs of future generations.
- Content is sent in compressed form over the Internet and displayed by the viewer in real time. When streaming video a web user does not have to wait to download a file to play it. Instead the media is sent in a continuous stream of data and is played as it arrives on a special player.
- A type of website that encourages collaboration by allowing users to add edit and remove content.
- A method of encrypting data to provide security for communications over networks such as the Internet. TLS (Transport Layer Security) is a later version of SSL.
- a form of internet fraud that aims to steal valuable information such as credit card details usernames and passwords.
- A program that appears legitimate but which performs some harmful activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk drive.
- To search usually when talking about a database.
Down
- A marketing strategy that encourages people to pass on a marketing message to their friends. It uses interesting and entertaining content that people will want to share.
- The ongoing expenses of operating a business e.g. rent and salaries.
- External devices connected to a computer e.g. printer or mouse.
- Data which is gathered as part of a user’s online activity. When buying something online this could include information about the product bought but also personal details from the buyer such as address and payment details.
- Damage caused to the muscles tendons ligaments nerves or joints usually because of repeating the same action such as repetitively clicking a mouse or typing on a keyboard.
- Transfer a file from your computer to a central computer e.g. your ISP.
- Copying someone else’s work and presenting it as your own.
- A program designed to cause other programs on a computer to malfunction or stop working altogether.
- A phone offering advanced features e.g. the ability to send emails and surf the internet.
- Allows the wireless exchange of data between two devices by touching them together or holding them very close to each other.
- It is similar to Bluetooth in that it is used to exchange data wirelessly but the signals can travel greater distances.
- The protection of personal data.
- This technology is used to make telephone calls via the Internet usually at a cheaper cost.
28 Clues: The protection of personal data. • To search usually when talking about a database. • Copying someone else’s work and presenting it as your own. • External devices connected to a computer e.g. printer or mouse. • The ongoing expenses of operating a business e.g. rent and salaries. • Transfer a file from your computer to a central computer e.g. your ISP. • ...
Chapters 1-5 & 7-14 & 16-19 & 21-26, 29, 6, 30 2018-11-28
Across
- Analysis of the theoretical underpinnings on which the studies are grounded.
- Careful appraisal of a study's strengths and weaknesses.
- Paradigm most often associated with Mixed Methods research.
- Involves exposing the same people to more than one condition.
- Characteristic or quality that takes on different values.
- A code that is not possible
- Distribution with two peaks.
- Overall conceptual underpinnings of a study.
- A daily record of events and conversations in the field.
- Focuses on story in studies in which purpose is to explore how people make sense of events in their lives.
- Rank evidence sources according to the strength of the evidence they provide.
- Method of integrating quantitative findings statistically.
- A listing of each variable together with information about placement in the file, codes associated with the values values of the variable, and other basic information.
- Used to predict outcomes.
- ANOVA context, the variance is referred to as...
- Seeks solutions to existing problems and tends to be of greater immediate utility of EBP.
- Achieved through accurate measuring tools, controls over confounding variables, and powerful statistical methods.
- The degree to which an instrument measures what it purports to measure.
- Route respondents through different sets of questions depending on the responses.
- Technique of asking participants to take photographs of themselves and then interpret them.
- Documents the extent to which the goals of the program are attained.
- The ratio between citations to a journal and recent citable items published.
- Focuses on the lived experiences of humans and is an approach to learning what the life experiences of people are like and what they mean.
- A system of classifying and organizing terms.
Down
- Statement of predicted relationships between two or more variables.
- A design that emerges in the field as the study unfolds.
- Researchers view the text as a whole and try to capture its meanings.
- Participants have adequate information about the research.
- Specific query researchers want to answer in addressing the research problem.
- Evaluations are the cornerstone.
- Sampling to the point at which no new information is obtained and redundancy is achieved.
- The ability of a measure to detect change over time in a construct that has changed, commensurate with the amount of change that has occurred.
- The extent to which the sample is similar to the population and avoids bias.
- Tendency of observers to be influenced by one characteristic in judging other, unrelated, characteristics.
- Observed result could reflect chance fluctuations.
- Relationship or association between two variables.
- Risks no greater than those ordinarily encountered in daily life or during routine tests or procedures.
- Influence that distorts study results.
- Original description of a study prepared by the researcher who conducted it.
- Refers to the accuracy and consistency of information obtained in a study.
- Confidence in the truth of the data and interpretations of them.
- The peak is off center and one tail is longer than the other.
- Relationship where the participants in the qualitative strand are a subset of the participants in the quantitative strand.
- Stability of data over time and conditions.
- Enhances the base of knowledge or to formulate or refine a theory.
- The process of selecting a portion of the population for a study.
- Involves judgments about whether findings from an inquiry can be extrapolated to a different setting or group of people.
- Effects of Taking a pretest on people's performance on a post test.
- Reflect the ratio of two probabilities.
49 Clues: Used to predict outcomes. • A code that is not possible • Distribution with two peaks. • Evaluations are the cornerstone. • Influence that distorts study results. • Reflect the ratio of two probabilities. • Stability of data over time and conditions. • Overall conceptual underpinnings of a study. • A system of classifying and organizing terms. • ...
Noah Kretz - AP Human Crossword 2019-05-01
Across
- (CC, 4)Tending to move toward a center.
- (CC, 6)The amount of people needed for a company to be profitable.
- (IDK,1)A thematic map using shading to show a pattern of a variable.
- (CC, 2)Permanent movement within one region of a country.
- (IDK, 4)the doctrine that territory should be controlled by the country to which they are ethnically or historically related.
- (IDK, 3)A religion entered on the belief that inanimate objects, such as mts., trees, rivers, and boulders.
- (CC, 7)The physical character of place; what is found at the location.
- (IDK, 7)The county within which the city is located, and adjacent counties meeting one of several tests indicating a functional connection to the central city.
- (VIT,1)The study of the spatial characteristics of humans and human activities. It's important because it is the base for everything in the topic.
- (VIT, 3)A way of classifying languages at the global scale.It is important because every recognized language can be found in this.
- (CC, 5)Farming that yields a large amount of output per acre through less intensive farming.
- (VIT, 6)A period in the 18th and 19th century where great advances were made in agriculture, manufacturing, and transportation. It is important because it was the start of all technological advancements.
- (CC, 3)The process of people adopting the dominant culture.
- (IDK, 6)Areas communities have set aside for industrial uses.
- (IDK,2)The portion of Earth's surface occupied by permanent human settlement.
Down
- (VIT, 4)The formal act of acquiring territory by conquest. This is important because this is how much of the land owned today was claimed.
- (CC, 3)The process of adopting fully the dominant culture and abandon their own culture.
- (CC, 6)The distance people are willing to travel for a service.
- (VIT, 7)The area of a city where retail and office activities are clustered. It is important because the center of the city is usually the most important part.
- (IDK, 5)The land and its ownership and cultivation.
- (CC, 5)Farming that yields a large amount of output per acre through concentrated farming.
- (IDK,1)The spread of an idea from persons or nodes of authority to other persons or places.
- (CC, 2)Permanent movement from one region of the country to another.
- (IDK, 6)Principles for mass production based on assembly-line techniques.
- (VIT, 5)The deliberate effort to modify a portion of Earth's surface through the cultivation of crops and the raising of livestock. This is important because it is the main focus of the unit.
- (IDK,2)The seasonal migration of livestock between mountains and lowland pastures.
- (CC,1)A system that accurately determines the precise position of something on Earth.
- (VIT,2)Was one of the first to argue that the worlds rate of population increase was far outrunning the development of food population. This is important because he brought up the point that we may be outrunning our supplies because of our exponentially growing population.
- (IDK, 3)The visible imprint of human activity on the landscape.
- (IDK, 4)The study of the effects of economic geography on the powers of the state.
- (CC,1)A computer system that can capture, store, query, analyze, and display geographic data.
- (IDK, 7)A process by which banks draw lines on a map and refuse to lend money to purchase or improve property within boundaries.
- (IDK, 5)The growing of fruits, vegetables, and flowers for human consumption.
- (CC, 4)Tending to move away from a center.
- (CC, 7)the location of a place relative to other places.
35 Clues: (CC, 4)Tending to move toward a center. • (CC, 4)Tending to move away from a center. • (IDK, 5)The land and its ownership and cultivation. • (CC, 7)the location of a place relative to other places. • (CC, 2)Permanent movement within one region of a country. • (CC, 3)The process of people adopting the dominant culture. • ...
Theory Keywords 2024-05-02
Across
- memory used to ttemporarily store instructions of programs currently in use so they can be quickly accessed by the CPU
- a type of computer with a high level of performance as compared to a general-purpose computer
- is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular phone line
- an online place where people sharing the same interest can interact
- a networking device that forwards data packets to the correct network.
- the SQL keyword used to create a query
- a protocol used for automatically assigning IP addresses to clients
- the time it takes for a data packet to travel from a sender to a reciever
- a type of wired connection
- a type of low-cost and very easy to implement communication method, mostly used for IoT
- a type of software used by the user to perform specific tasks
- type of data thta can be organised in a database
- a networking device that connects end devices to a network
- a legal agreement between the software owner and the user that defines the terms and conditions for using the software
- system designed for a specific function within a larger system
- a type of diagram that depicts the steps in a process
- a type of software that are designed to manage system resources, hardware and other software
- a type of key in a database that uniquely identifies each record
- a quick-repair job for a piece of software designed to resolve functionality issues
Down
- software that provides low-level control of computing device hardware
- Fetches, decodes and executes program instructions
- memory used to store computer start-up instructions
- an IP address that does not change
- a type of device that allows users to feed data into a computer system
- breaking down large problems into several smaller, simpler tasks. Often used for systems design.
- a type of secondary storage medium that uses laser beams to record and retrieve digital data
- a hardware device that connects to a computer and used to transfer information into and out of a computer
- a machine-readable code consisting of an array of black and white squares, typically used for storing URLs or other information for reading by the camera on a smartphone
- a type of encryption that uses two keys: a public key to encrypt and a private key to decrypt
- software with source code that anyone can inspect, modify, and enhance
- a diagram used to represent a flow of data through a process or a system
- a type of cable cables that carries digital audio and video signals over
- the tendency for separated technologies to become integrated into one device
- a measure of the maximum amount of data per second that can be transmitted over a network
- technology that uses a network of satellites and receiving devices used to determine the location of something on Earth
- a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network
- technology that consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter that allow for tracking or matching of an item or individual
- a type of secondary storage medium that stores data electronically and has no moving parts
- a type of website where the pages can be personalised for each user, and they can create accounts, post comments etc
- a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
40 Clues: a type of wired connection • an IP address that does not change • the SQL keyword used to create a query • type of data thta can be organised in a database • Fetches, decodes and executes program instructions • memory used to store computer start-up instructions • a type of diagram that depicts the steps in a process • ...
Per 1 Chapter 11 - Nieves, J 2023-02-28
Across
- This is used to create customized system image files that will be installed on computers in the enterprise.
- This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
- To display a list of tasks that are unique to the application, right-click the application's icon in the taskbar.
- Monitors programs on the computer and warns users when an action might present a threat to the computer.
- The command that tests basic connectivity between devices by using ICMP echo request and reply messages.
- This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
- Configure basic internet settings, such as selecting the default home page, viewing and deleting browsing history, adjusting search settings, etc.
- A specific monitor can be configured if there is more than one monitor.
- This specifies the number of pixels horizontally and vertically. A higher number of pixels provides better resolution.
- This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
- These users can only make configuration changes that affect their own profile.
- This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
- The command that is used to query the DNS server to discover IP addresses or host names.
- Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
Down
- To add an application to the taskbar for easy access, right-click the icon of an application and select Pin to taskbar.
- Provides very weak security and should not be relied upon for confidentiality.
- This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
- To view a thumbnail image of a running program, hover the mouse over the program icon on the taskbar.
- Displays the Group Policy settings that are in effect for a currently logged in user.
- These users can access files from other users. They also have elevated permission.
- View the desktop icons that are behind open windows by placing your cursor over the Show desktop button found at the right edge of the taskbar.
- A group of computers and electronic devices with a common set of rules and procedures administered as a unit.
- A private network that connects remote sites or users together over a public network, like the internet.
- The command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path.
- A feature that enables a user to encrypt all data on a disk drive or removable drive.
- A command-line terminal emulation protocol and program that works over port 23.
- This sets how often the image in the screen is redrawn.
- This determines whether the display appears in Landscape, Portrait, flipped Landscape, or flipped Portrait.
- Minimizes all windows that are not being used by clicking and holding the title bar of one window and shaking it with the mouse.
- A collection of LAN workstations and servers that are designed to communicate and exchange data with one another
30 Clues: This sets how often the image in the screen is redrawn. • A specific monitor can be configured if there is more than one monitor. • Provides very weak security and should not be relied upon for confidentiality. • These users can only make configuration changes that affect their own profile. • ...
UNIX Commands, AT&T Bell Laboratories 2017-02-19
Across
- concatenates files
- unix is a pun on ______ which was an operating system the early developers were working on
- print out arguments to the command
- enables you to temporarily switch to a shell owned by another user
- tells you what the current time is
- deletes files
- creates a directory
- shows or sets the file mode creation mask
- this is used by cron to determine what needs to be run
- compare two sorted files line by line
- prints lines matching a pattern
- lists the contents of a directory
- strips directory and suffix from filenames
- changes the timestamps of a file or creates file if it doesn't exist
- shows the different between two text files
- tests for file types and compare values
- most commonly used text editor on UNIX/linux
- without any files specified, cat reads from the standard ______
- used to create a link to a file
- print out calendar for the specified month or year
- the connection of the standard output of one process to the standard input of another is known as a _____
- shows how the directory tree is built by mounted filesystems
- shows first few lines of files
- creates copy of file under a different name or path
- saves a typescript of an interactive terminal session
- file perusal filter similar to more but with more features
- initializes a terminal or query terminfo database
- relays standard input to the standard output while capturing a copy in a file
- stream editor for filtering and transforming text using a regular expression syntax
- the original line editor that came with UNIX
- program that reads input from the standard input and writes to the standard output
- used to send output to a printer
- calls up the GNU C compiler
- the -n option to this command prints the hostname of the computer
- shows what processes are running on the system
- evaluates logical or integer arithmatic expressions
- shows or omits repeated lines
- files with names starting with a period are known as _____ files (synonym)
- displays information about users on the system
- it is a unix convention to store binaries in a ____ directory
Down
- program that returns an exit status of non zero
- display or set your tty settings
- renames a file
- removes sections from each line of files
- this is the clock daemon that will run commands for you on a regularly scheduled basis
- a link that can span file system boundaries is called a ______ link
- a pattern scanning and processing language with algorithmic syntax used in scripting
- version of grep that allows the use of logical operators in specifying the search pattern
- used to send various signals to processes whose PIDs are known
- system process that is designed to run in the background
- paginates a file
- this is the line oriented portion of vi
- shows who is currently logged on
- diverting the standard output to a file is known as a _____ion operation
- arbitrary precision infix calculator
- what we usually call a command line interpreter
- program that returns an exit status of zero
- searches for files in a directory hierarchy
- changes file permission mode settings
- shows a listing of last logged in users
- determines file type
- delays for a specified amount of time
- every process was a unique ___ number
- sorts lines of text based on criteria
- prints out the last few lines of a file
- file perusal filter for viewing on terminal
- tells computer about the capabilities of your terminal
- strips last component from filename
- ability to run more than one command at a time
- translates or deletes characters
- merges lines of files
- removes an empty directory
72 Clues: deletes files • renames a file • paginates a file • concatenates files • creates a directory • determines file type • merges lines of files • removes an empty directory • calls up the GNU C compiler • shows or omits repeated lines • shows first few lines of files • prints lines matching a pattern • used to create a link to a file • display or set your tty settings • ...
Negri termini 2022-01-14
Across
- sinonimo di scheda madre o motherboard, cioè la scheda in cui è installata la CPU
- indica un fotogramma molto importante per il sistema di compressione del filmato
- Memoria di sola lettura utilizzata per istruzioni che non debbono essere cambiate.
- dispositivo hardware per la memorizzazione delle informazioni
- è una tecnologia utilizzata per lo sviluppo di applicazioni
- protocollo Internet utilizzato per inviare posta elettronica
- programmi coperti dal copyright che possono essere provati gratuitamente per un certo periodo
- è una composizione di otto bit
- ha la capacità di 1024 terabyte
- telecamera collegabile al computer che consente di trasmettere immagini via Internet.
- Processo di estrazione dei dati da un database secondo certi criteri
- documento multimediale a disposizione del pubblico e leggibile da qualsiasi punto della rete
- è una unità di elaborazione e svolge i calcoli
- normalmente riferito alle impostazioni di stampa
- comando o termine utilizzato spesso nel software sinonimo di fine, uscita
- dispositivo per collegare un cavo a una porta hardware o a una presa
- esegue dei calcoli
- software realizzato per semplificare l'uso di procedure
- cifra binaria che costituisce un byte,
- unità di misura di memorie equivalente a 1021 exabyte
- È il singolo punto luminoso del monitor
- è il nome attribuito a un hard disk o a un floppy disk
- azienda produttrice di sistemi operativi, programmi applicativi
- delicata connessione realizzato tramite un cavo a essa riservato
- Insieme dei programmi che permettono il funzionamento di un computer.
- l'immissione dei dati da parte dell'utente in un programma
- indica una sequenza di istruzioni scritte nel linguaggio proprio del programma che si sta utilizzando
- è l'unità di misura della frequenza
- disk supporto magnetico rimovibile per la registrazione o lettura dei dati
- si usa per riavviare il computer
- in generale sono i messaggi che gli utenti di tutto il mondo si scambiano via Internet
- cosa simulata, ricostruita al computer, che appare come se fosse reale.
- motore di ricerca
- oggetto di scrittura
- indica uno pseudonimo che permette di ricevere messaggi indirizzati a un soprannome
- sistema numerico basato sulla potenza di 16
Down
- linguaggio di programmazione più semplice di Java
- un sistema informatico o telematico che fornisce informazioni esclusivamente su esplicita richiesta
- sistema di ricerca
- unità di misura di memorie equivalente a 1024 zettabyte
- Tastiera tipicamente italiana
- dispositivo di output che emette musica
- Codice segreto per accedere a risorse e informazioni riservate
- è l’insieme delle finestre, dei menu e dei comandi che caratterizzano un determinato programma
- caratteri tipografici in modo più marcato
- indica l'operazione di ricerca di informazioni su Internet spostandosi da sito a sito
- fuori linea
- source si riferisce ad una sorgente di dati, solitamente un database, a cui collegare un’applicazione
- è un deposito di informazioni,
- codice a barre
- rappresentano le specifiche per l'uso della memoria estesa
- scambiarsi interattivamente, tra due o più utenti, dei messaggi in tempo reale
- elemento o voce in un database
- dispositivo di input per scrivere
- si intende comunemente la scienza che studia la progettazione di calcolatori
- indica un file direttamente eseguibile
- dispositivo di output
- Detto anche CPU è il circuito integrato che elabora i dati
- può essere riferito a dati in uscita di un programma o informazioni in uscita da un computer
- è un programma caratterizzato da una memoria non volatile
- standard di comunicazione che consente la trasmissione di dati
- elenco di istruzioni che costituiscono un programma
- è l’insieme dei componenti fisici che costituiscono l’elaboratore
- pirata dell'informatica che cerca di penetrare nei sistemi informatici altrui
- società americana famosa per il suo sistema operativo di rete
65 Clues: fuori linea • codice a barre • motore di ricerca • sistema di ricerca • esegue dei calcoli • oggetto di scrittura • dispositivo di output • Tastiera tipicamente italiana • è una composizione di otto bit • è un deposito di informazioni, • elemento o voce in un database • ha la capacità di 1024 terabyte • si usa per riavviare il computer • dispositivo di input per scrivere • ...
PUZLE 2024-09-26
Across
- Operators ļauj WHERE klauzulā norādīt vairākas vērtības.
- Ierobežojums nodrošina, ka visas kolonnas vērtības ir atšķirīgas.
- Funkcija atgriež ciparu kolonnas vidējo vērtību.
- Peldošā komata skaitlis. Kopējais ciparu skaits ir norādīts izmērā. Ciparu skaits aiz komata ir norādīts parametrā d.
- Dzēš datus no datu bāzes
- Savstarpēji saistītu objektu kopums.
- (bināri lieli objekti). Satur līdz 65 535 baitiem datu
- Lieto situācijās kad nevar izmantot WHERE
- Vidējs vesels skaitlis. Parakstītais diapazons ir no -2147483648 līdz 2147483647. Neparakstītais diapazons ir no 0 līdz 4294967295. Izmēra parametrs norāda maksimālo displeja platumu (kas ir 255).
- Operatoru izmanto, lai pārbaudītu jebkura ieraksta esamību apakšvaicājumā.
- Ievada tabulā no augšas uz leju
- Atslēgvārds atlasa ierakstus, kuriem abās tabulās ir atbilstošas vērtības. (Divi vārdi kopā bet atstarpes vietā -)
- Funkcija atgriež ciparu kolonnas kopējo summu.
- Tiek izmantots, lai pievienotu, dzēstu vai mainītu esošās tabulas kolonnas.
- Funkcija atgriež mazāko atlasītās kolonnas vērtību
- Operators izvēlas vērtības noteiktā diapazonā. Vērtības var būt cipari, teksts vai datumi.
- Ievieto jaunus datus datu bāzē(Divi vārdi kopā bet atstarpes vietā -)
- Means that the condition will be true if the operation is true for any of the values in the range.
- Tiek izmantots, lai datu bāzē izveidotu jaunu tabulu.
- Lauks bez vērtības.
- Nozīmē, ka nosacījums būs patiess tikai tad, ja darbība ir patiesa visām vērtībām diapazonā.
- KEY Lauks vai lauku grupa, kas viennozīmīgi identificē katru datubāzes ierakstu.
- Tiek izmantots, lai ātrāk izgūtu datus no datu bāzes.
- Ierobežojumu izmanto, lai ierobežotu vērtību diapazonu, ko var ievietot kolonnā.
- Datubāzes struktūras elements
- Funkcija atgriež lielāko atlasītās kolonnas vērtību.
- Priekšraksts tiek izmantots, lai tabulās izveidotu indeksus. (Divi vārdi kopā bet atstarpes vietā -)
Down
- Precīzs fiksēta punkta skaitlis. Kopējais ciparu skaits ir norādīts izmērā. Ciparu skaits aiz komata ir norādīts parametrā d. Lieluma maksimālais skaits ir 65. Maksimālais d ir 30. Izmēra noklusējuma vērtība ir 10. Noklusējuma vērtība d ir 0.
- Parasta izmēra peldošā komata skaitlis. Kopējais ciparu skaits ir norādīts izmērā. Ciparu skaits aiz komata ir norādīts parametrā d
- Ierakstu daļa ar patstāvīgu nozīmi
- Atslēgvārds atgriež visus ierakstus no labās tabulas (tabula2) un atbilstošos ierakstus no kreisās tabulas (tabula1). Rezultāts ir 0 ieraksti no kreisās puses, ja nav sakritības. (Divi vārdi kopā bet atstarpes vietā -)
- Raksturo datu lauki un ieraksti
- Tiek izmantots, lai atlasītu datus no datu bāzes.
- Tiek izmantota, lai apvienotu rindas no divām vai vairākām tabulām, pamatojoties uz saistītu kolonnu starp tām.
- Formāts: GGGG-MM-DD. Atbalstītais diapazons ir no "1000-01-01" līdz "9999-12-31"
- Funkcija atgriež rindu skaitu, kas atbilst noteiktam kritērijam.
- Komanda/as kas ļauj veikt manipulācijas ar datubāzi
- KEY Ierobežojums ar datubāzēm, lai neiznīcinātu saikni starp tabulām.
- Formāts: hh:mm:ss. Atbalstītais diapazons ir no '-838:59:59' līdz '838:59:59'
- Regulārs savienojums, bet tabula ir savienota ar sevi. (Divi vārdi kopā bet atstarpes vietā -)
- Ievada tabulā no kreisās puses uz labo
- Tiek izmantots, lai mainītu esošos ierakstus tabulā.
- Operatoru izmanto, lai apvienotu divu vai vairāku SELECT priekšrakstu rezultātu kopu.
- Tiek izmantots, lai filtrētu ierakstus.
- Ierobežojums tiek izmantots, lai kolonnai iestatītu noklusējuma vērtību.
- Nulle tiek uzskatīta par nepatiesu, vērtības, kas nav nulles, tiek uzskatītas par patiesām.
- Tiek izmantots, lai datubāzē nomestu esošu tabulu.
- Atslēgvārds atgriež visus ierakstus no kreisās tabulas (tabula1) un atbilstošos ierakstus no labās tabulas (tabula2). Rezultāts ir 0 ieraksti no labās puses, ja nav sakritības. (Divi vārdi kopā bet atstarpes vietā -)
- MAINĪGA garuma virkne (var saturēt burtus, ciparus un speciālās rakstzīmes). Lieluma parametrs norāda maksimālo virknes garumu rakstzīmēs — var būt no 0 līdz 65535
- Operators tiek izmantots WHERE klauzulā, lai kolonnā meklētu noteiktu modeli.
- Formāts: hh:mm:ss. Atbalstītais diapazons ir no '-838:59:59' līdz '838:59:59'
51 Clues: Lauks bez vērtības. • Dzēš datus no datu bāzes • Datubāzes struktūras elements • Raksturo datu lauki un ieraksti • Ievada tabulā no augšas uz leju • Ierakstu daļa ar patstāvīgu nozīmi • Savstarpēji saistītu objektu kopums. • Ievada tabulā no kreisās puses uz labo • Tiek izmantots, lai filtrētu ierakstus. • Lieto situācijās kad nevar izmantot WHERE • ...
EFJ USING SOURCES 2024-04-24
Across
- A great way to improve your work before submission is to get a _________ friend to read your report aloud to you. Ask them to stop and query things as they go along.
- To avoid "getting stuck in the tramlines” of your source’s narrative, go back to your brainstorm of ____________.
- By searching for the specific topic "take-out food" within the website Codex Alimentarius, the student could have found a more ____________ source of information.
- Consider the ______________ of the person you are quoting. Celebrity-obsessed tabloids often ignore this rule, e.g. by quoting Hollywood actors instead of real experts. However, you're writing for a high-quality news channel.
- An educational exclusion from ___________ laws, enables students and teachers to use extracts from copyrighted material as part of their studies, but such work probably shouldn't be published or posted on the web.
- Removing the claim "food safety, nutrition and food security are inextricably linked" improves the ____________ of the paragraph.
- What reputable global organisation is the source of the claim "food safety, nutrition and food security are inextricably linked" in the extract?
- Consider doing your own _______________ to create high-quality visual content for your report.
- In some cases you don't need the same level of _________ that the source gives, so simplifying it will help you to put claim in your own words.
- If you report information from your sources ___________ it will leave more space for you to evaluate the information and build an argument.
Down
- Where possible, the photographer should be given ________ by name.
- This is the title of the section at the end of your report where you have to list the full MLA citations of all the sources you have used in the text.
- To avoid plagiarising a source, you must either quote or ___________ the claim you take from it.
- Words can be copied directly from a source without being plagiarised if they are put in ______________ marks (so long as the source is cited).
- This extract from a draft report uses an ______________ citation: "Take Meituan, the Chinese take-out delivery company for instance: according to its official data, the number of take-out delivery drivers from Meituan already reached 7 million."
- Your submissions are checked for _________ with published sources and previously submitted papers using Turnitin.com.
- According to our librarian, Noodle Tools is better than other available tools to help you construct your __________ citations.
- "Baidu" is a _______ not a publisher. This is why it is not a sufficient for attribution of a photograph.
- An in-text citation is put in brackets after the claim or quote. It is usually the author's surname, though it may be the name of a website. __________ Tools can help you to generate the citation from information you input.
- If a journalist uses an image without paying for it, they can be ______ for a lot of money!
- Google has a ________ image search function which can help you to find the photographer’s name or the stock photo publisher.
- Doing this means copying parts of the text of a source without using quotation marks. If it is submitted as your own work it can be considered plagiarism.
- Some websites offer _________ free images which you can use legally without paying.
- This is an example of a heading that is typical of academic writing but is not typically used in journalistic writing.
- Some claims might not be given citations in journalism because they are considered "__________ knowledge", but academic papers require all factual claims to be cited.
- To improve the paragraph "What is the policy?", the best solution is to ______ the claim that is off topic.
- This is a well-known website where you can source legal free images.
- Journalists often cite stock photography to ________ such as “Reuters”, instead of giving the photographer's name.
28 Clues: Where possible, the photographer should be given ________ by name. • This is a well-known website where you can source legal free images. • Some websites offer _________ free images which you can use legally without paying. • If a journalist uses an image without paying for it, they can be ______ for a lot of money! • ...
Reporting Verbs 2025-07-02
hcfgv 2024-06-14
Secret Santa 2020-12-23
Common Computer Terms 2015-03-04
Across
- The rectangles created at the intersection of columns and rows.
- The location where new e-mail messages arrive.
- Hardware devices which are attached to the computer eg printer, speakers, scanner etc.
- A spreadsheet file containing one or more worksheets
- An organised collection of related information.
- A software program that translates and allows you to view HTML files.
- Allows the user to reverse the last action performed.
- The name of a particular Internet site.
- A cell or range reference in a formula whose location remains the same (absolute) when copied.
- The etiquette rules of the Internet.
- Paragraph alignment: left, centre, right or fully justified.
- A process where the words in a document are matched against a list of words in a dictionary. If a word in the document does not match one, it is signalled as a spelling error.
- The orientation of the document when printed; wider than it is long.
- The main or introductory Web page for a site.
- Software you can use free of charge for a trial period, usually 30 days, after which time you are expected to pay for the program.
- A predefined formula that performs calculations by using specific values, called arguments
- The physical components of the computer system eg keyboard, mouse, speakers etc.
- Two or more computers connected together for the sharing of resources such as printers and drives.
- When your text reaches the right-hand margin in a document it automatically starts on the next line.
- A document that can be used as a pattern for creating other similar documents.
- Can be represented by a range of symbols, usually round dots, which are used to set apart points in paragraph style.
- All the characters in a particular typeface.
Down
- Programs: a series of instructions that tell the computer hardware what to do; can also be the interface between the user and the computer system.
- Contains the Start button, the clock and currently running tasks.
- Text files that visited Web sites store on you computer’s hard disk.
- Computerized worksheet on which text, numbers and formulas can be entered for fast, accurate calculations.
- The process of asking a question of a database. Queries are used to view, change, and analyse data in different ways
- Notation that you create to list sites you visit often or would like to quickly return to.
- The process of merging a main document with a data source to produce form letters
- engine A tool to help locate information on the Internet.
- The process of taking (exporting) data from an application, i.e. a database, and placing it into another application, i.e. a spreadsheet
- The act of copying information from a distant computer to your local computer.
- Files that are sent separately from, but attached to, an e-mail message.
- To locate the cause of trouble and removes, fixes or treats it.
- To change the look of a document, text, graphics, characters.
- The location where browsers keep a copy of recently visited pages.
- A facility in operating system to store items of text or graphics when they have been cut or copied, so they can be pasted to a different location.
- The orientation of the document when printed; longer than it is wide.
- A facility, which allows the user to make columns with or without borders, can be used instead of tabulating.
- An equation that performs operations on worksheet data.
- A program that is loaded onto your computer without your knowledge and runs without your consent. Most viruses can also replicate themselves
- The process of bringing (importing) data into an application which has been exported from another application
- Software applications that expand a browser’s basic capabilities by becoming extensions of the browser itself.
- With reference to printing is the physical port on PC the printing device is connected to.
- A toolbar contain buttons with that can be clicked to provide a shortcut to tasks.
45 Clues: The etiquette rules of the Internet. • The name of a particular Internet site. • All the characters in a particular typeface. • The main or introductory Web page for a site. • The location where new e-mail messages arrive. • An organised collection of related information. • A spreadsheet file containing one or more worksheets • ...
ISCC 2025-03-27
Across
- The specification and planning of system components including user interfaces, databases, and software architecture.
- AR technology that operates without predefined visual markers and instead uses location data and device sensors.
- The integration of multiple forms of content like text, audio, images, animation, and video to convey information.
- A structured collection of records or data that can be easily accessed, managed, and updated, commonly used in business and software systems.
- A software development approach where early versions of a system are built, tested, and iteratively improved.
- A group of related fields in a database that typically represents a single entity or item.
- A computer-generated simulation that enables users to interact with an artificial three-dimensional environment using special electronic equipment.
- The specific step in SDLC where software developers write the program code to implement the designed system.
- Extremely large data sets that are analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior.
- The process of delivering a completed software application to users including installation, configuration, and making it operational.
- A visual and often interactive format used in multimedia systems to convey information, often using slides or animations.
- Technology that overlays computer-generated content on the real world, enhancing user perception and interaction with surroundings.
- A secure and decentralized digital ledger used to record transactions across many computers ensuring data integrity.
- A collection of hardware and software designed to provide users with an immersive virtual environment experience.
- The process of assessing a system or training outcome to determine its effectiveness, usability, and performance.
- a software development methodology that emphasizes quick prototyping and iterative delivery.
- A phase in software development where the entire system is tested as a whole to ensure that all components work correctly.
- In database design, this represents a real-world object or concept that has data stored about it.
- Structured Query Language, used for querying and managing relational databases to insert, update, delete, and retrieve data.
- The phase in system development where the software is executed to detect errors, bugs, and defects.
Down
- A virtual reality setup that fully engages the user's senses, often using a headset and motion-tracking equipment.
- Virtual reality experience where interaction occurs through a desktop or standard display screen without full sensory immersion.
- The use of specialized software to create multimedia content including tutorials, presentations, and training materials.
- The science of analyzing raw data with the purpose of drawing conclusions about that information for decision-making.
- The smallest unit of data in a database, representing one piece of information within a record.
- Delivery of computing services over the Internet including storage, processing, and databases on-demand.
- An acronym for System Development Life Cycle, which is a process followed for software projects that outlines phases from planning to maintenance.
- Augmented reality system that uses specific visual symbols or QR codes to trigger the display of digital content.
- , an education format that delivers learning via computer programs and multimedia tools.
- User Acceptance Testing, the final phase of software testing where actual users test the software to ensure it meets requirements.
- A coordinated set of components and resources used to collect, store, manage, and disseminate information.
- A point where two systems or components meet and interact, such as user interfaces or software interfaces.
- The process of writing instructions in a programming language to create software applications.
- A database design process that reduces redundancy and ensures data dependencies make sense.
- The process of installing and configuring a new system into a working environment after design and testing are complete.
- A flexible and iterative software development method that promotes continuous delivery and collaboration.
- A finite set of step-by-step instructions used for solving a problem or performing a computation.
- A collection of related components that interact to achieve a goal, often used in the context of information systems.
- An advanced form of AR where digital and physical objects coexist and interact in real time.
- A framework within Agile methodology that uses time-boxed iterations and daily meetings to achieve software development goals.
40 Clues: , an education format that delivers learning via computer programs and multimedia tools. • A group of related fields in a database that typically represents a single entity or item. • A database design process that reduces redundancy and ensures data dependencies make sense. • ...
MATLAB Part 2 2026-03-03
Across
- Declares symbolic variables/functions for Symbolic Math Toolbox.
- Computes the vector cross product (3-D vectors; direction follows right-hand rule).
- Logical test that returns true only if every element is nonzero/true (watch the dimension behavior).
- Creates an identity matrix (1s on the main diagonal, 0s elsewhere).
- Attempts algebraic simplification of symbolic expressions.
- Keyword that closes a code block or means “last index” when used in indexing.
- Approximates an integral using the trapezoidal numerical rule (works on sampled data).
- Loop that repeats as long as its condition stays true (can run forever if you’re careless).
- Conjugate transpose with ' for complex data (use .' for nonconjugate transpose).
- Creates an array filled with 1s (common for initialization/preallocation).
- Expands products/powers and applies identities to rewrite expressions.
- Symbolic differentiation (derivative) of an expression with respect to a variable.
- Evaluates a polynomial at given x-values using coefficients (often from polyfit).
- Controls how numeric output is displayed (doesn’t change stored precision).
- Branch label inside switch that matches specific values/patterns.
- Matrix multiplication **AB** (linear algebra multiply, not element-wise).
- Converts text to numbers by evaluating it (powerful but can be risky/unexpected).
- Creates an array filled with 0s (classic preallocation tool).
- Solves symbolic equations/systems for specified variables.
- Computes symbolic integrals (indefinite or definite with limits).
- Loop that repeats over a specified set of values (often a fixed count or vector).
- Element-wise multiplication *A.B (each element multiplied by the corresponding element).
- Returns elapsed time since the most recent tic (or since a named timer).
- Reduced row echelon form (Gauss–Jordan elimination result).
- Data type representing points in time (date + time, with optional time zone).
- Element-wise power A.^B (each element raised to a power).
- Opens a GUI list dialog so a user can select one or more items (returns selected indices).
- Computes differences between adjacent elements (discrete “derivative-like” operation for vectors).
- Multi-branch control structure that compares an expression to different cases.
Down
- Substitutes symbolic variables with values/expressions (symbolic “find and replace”).
- Rewrites a symbolic expression by collecting like powers/terms of a variable.
- Creates data stored as category labels (useful for grouping, stats, plots).
- Displays the contents of a cell array in a readable, indexed format.
- Logical test that returns true if at least one element is nonzero/true (also operates by dimension).
- Matrix power A^n (repeated matrix multiplication; different from element-wise power).
- Returns the dimensions of an array (rows, columns, etc.).
- Stops execution by throwing an error with your message (not a warning—this one halts).
- Computes the dot product (inner product) of two vectors.
- Returns indices (and optionally values) of elements that aren’t zero/false (can also limit how many).
- Performs 1-D interpolation (table lookup) for data points at new query x-values.
- Computes the matrix inverse (works, but often not the best numerical approach).
- Plots a function/symbolic expression with automatic sampling of x-values.
- Symbolic factorization (rewrites expression as factors) or integer prime factors depending on input type.
- Cumulative sum along a dimension (running total).
- Returns the category names/levels from a categorical array.
- Creates a table with named variables (columns can be different types).
- Adds another condition branch when the prior if/elseif tests fail.
- Skips the rest of the current loop iteration and jumps to the next one.
- Conditional keyword that runs code only when a logical test is true.
- Converts numbers into a character array (string formatting, but simple).
- Default branch in a switch when no case matches.
- Computes the time difference between datetimes/durations in specified calendar units (months/years aren’t fixed-length).
- Starts a stopwatch timer for quick performance timing.
- Catch-all branch when none of the if/elseif conditions are true.
- Computes the determinant of a square matrix (scalar that hints at invertibility).
- Solves symbolic differential equations (returns symbolic solution forms).
- Fits polynomial coefficients to data (least-squares curve fit).
57 Clues: Default branch in a switch when no case matches. • Cumulative sum along a dimension (running total). • Starts a stopwatch timer for quick performance timing. • Computes the dot product (inner product) of two vectors. • Returns the dimensions of an array (rows, columns, etc.). • Element-wise power A.^B (each element raised to a power). • ...
Lockdown Cryptic Crossword 2020-07-09
Across
- Gate and shed holding head of Axe for key location
- Liam initially has most of butter, equal in value for office
- Early Notification finishes for protective measure
- Bad blue go randomly to contain samples
- Query morning with head of Sales finding the last ones to join
- german leach upset historic asbestos owner
- Sing well and request payment
- Steers horse to sports lesson, missing start of the action. Dutyholders should do this every year.
- Half of aussie rockband gives praise to a
- All Consultant Managers initially have our surveyors looking for these
- United Kingdom with heads of America and Switzerland form important body
- Head of Large snakes helps surveyor reach new heights
- Office holds vital organs next to Emergency Room
- Allow Clean Hands initially values office
- Secure boat backwards in a property
- name tv line Ron, confused? it's all part of the business
- Survey type: Show illuminated charged particle
- Tool hidden in thatch I sell
- Falling behind to cover pipework
- Tag back burner for office
- Victoria in youth lodging initially shows a type of tile
- Combine Thorium, Erbium, half portion of Magnesium and Aluminium to create insulation
- Part of our business muddles rain in me
- Peppa's not young in this office
- Head of Fine Upstanding Locals mix with rough to stay at home
- Limit Trick internet bully, you give chase in game of tag - try not to exceed it
- Tolkein creature behind some of graveyard, hard material
- Parasitic insects in all directions except west, grants permission to remove high risk asbestos
- gain insult confused type of board
- Cost hidden in feed
- Decorate me with tops of Northern Trees for survey
- Carla I believe is hiding high risk material
- small remit helps identify fibres
- Kier's party without you standing next to a conservative? Analysis here
- Bite end off you and men, it's sticky on the floor
- Man with net game randomly produces a survey
- Written words with you and communist covering a bobbly material
Down
- First of entrants tops you not on time, seal asbestos
- Hiding in Cypris knowing identifiable hazard
- Initially awake sore in Milton Keynes, required when sampling
- Heads of department concerning umbrellas will keep you clean on site
- Texas' Best Osprey hiding carcinogen
- Polly ro restart believing asbestos content without sampling
- Doc with IV randomly causes pandemic
- Know Scotland's famous monster, use it to to stay safe
- Confuse Destiny, tells you if it's cement or board
- Randomly atomise brown fibre
- Regarding where ships sail from, they tell you what you need to know
- Internal war with South for part of our business
- Confused cult sing on for part of business
- Regarding University first year? You'll need to tell me again
- Jumbled line found in type of scan, we work for them
- Hair cut and bolt to enclosure entrance
- Queen upset over tainted Edward intially, a cost for doing business
- Racoon amusingly hides virus
- Preparing yourself for the big event, undertaken in a classroom
- Divide and hide face protection
- Strange, I'd circle too for blue asbestos
- Most of Company has amused nice Al for legislative agreement
- Glow contains mixed gas for office
- Send a card if feelings hide an office
- Where we work Lucy loses tail and gains charged atom
- Office is a watertight body
- Cut end off rose, give to Personal Assistant for Charitable Organisation
- Give time to office support
- She randomly enforces rules on site
- Truth Speak it to power, it's our conference after all
- Undergraduate paperwork is always the same
- Not with former partner, start of generation software
- planned review check
- Compact Disc Music initially needed on construction projects
- Arrange style choir before its banned in 1999
- Anyone in a stom Al, you can access it online
- Asbestos conceals form required for removal
- Receive around question in pipe joints
- Mist on half of weed gives type of hazardous coating
- Starting Players Physical Education protects key workers
77 Clues: Cost hidden in feed • planned review check • Tag back burner for office • Office is a watertight body • Give time to office support • Randomly atomise brown fibre • Racoon amusingly hides virus • Tool hidden in thatch I sell • Sing well and request payment • Divide and hide face protection • Falling behind to cover pipework • Peppa's not young in this office • ...
Per 2 Chapter 11 - A, Hernandz 2023-02-28
Across
- Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
- as Administration This is used to open or execute a file using elevated permission.
- the command that tests basic connectivity between devices by using ICMP echo request and reply messages
- This is used to update a local machine and verify that the machine is getting Group Policy updates.
- Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).
- contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
- opens the System Information window, which shows a summary of system components, including hardware components and software information
- a private network that connects remote sites or users together over a public network, like the internet
- Shell (SSH) This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
- This command is extremely powerful with many options for the way that files are copied, the types of files to include in the copy action, and the file attributes to include for the destination files.
- a volume that is functioning properly
- This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
- uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
- This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
- It displays details for all DirectX components and drivers that are installed in a computer.
Down
- a dynamic disk that has been moved to a computer from another computer running Windows
- used by most application installation programs to install software. In 32-bit versions of Windows, all programs are 32-bit and are installed in the folder C:\Program Files. In 64-bit systems, 64-bit programs are installed in the folder C:\Program Files, while 32-bit programs are installed in the folder C:\Program Files (x86).
- displays the Group Policy settings that are in effect for a currently logged in user
- authentication This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
- provides very weak security and should not be relied upon for confidentiality
- The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
- This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
- Microsoft Management Console (MMC)
- This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
- a command-line terminal emulation protocol and program that works over port 23
- The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
- monitors programs on the computer and warns users when an action might present a threat to the computer
- This is used to create customized system image files that will be installed on computers in the enterprise.
- Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
- the command that is used to query the DNS server to discover IP addresses or host names
- opens the Remote Desktop utili
- authentication (Open) Data is sent unencrypted and with no authentication.
32 Clues: opens the Remote Desktop utili • Microsoft Management Console (MMC) • a volume that is functioning properly • authentication (Open) Data is sent unencrypted and with no authentication. • provides very weak security and should not be relied upon for confidentiality • a command-line terminal emulation protocol and program that works over port 23 • ...
Blake Rose 3rd Block Ap Human Geography 2021-04-22
Across
- Indicator of level of development for each country, constructed by United Nations, combining income, literacy, education, and life expectancy (7 VIT)
- Forces that divide a country (3, CC)
- The spread of an idea through the physical movement of people from one place to another. Ex: English coming to North America because of colonial migration. (3, IDK)
- An industry in which the final product weighs less or comprises a lower volume than the inputs.(7, CC)
- a two dimensional or flat scale model of the Earth’s surface or portion of it. (1, VIT)
- the policy or practice of acquiring full or partial political control over another country, occupying it with settlers, and exploiting it economically. (4, CC)
- A nation of people without a state that it considers home (e.g., Kurds, Basques, Palestinians, the Hmong). (4, IDK)
- A new term used to describe cities that have 20 million or more people (6, IDK)
- The very sparsely habited, uninhabited, or uninhabitable area of the world. (2, IDK)
- when a nation stretches across borders and across states. stateless nation ex-The Kurds (4, IDK)
- A computer system that can capture, store, query, analyze, and display geographic data. (1, CC)
- nationalistic forces that bind a country together. (3, CC)
- The percentage growth of a population in a year, computed as the crude birth rate minus the crude death rate. (2, VIT)
- A system that accurately determines the precise location of something on Earth. (1, CC)
Down
- a model to to explain the forces that control the prices of agricultural commodities and how those variable prices affect patterns of agricultural land utilization (5, VIT)
- The average number of years an individual can be expected to live, given current social, economic, and medical conditions. (5, IDK)
- The total number of deaths in a year for every 1,000 people alive in the society.(2, CC)
- Beliefs, customs, and traditions of a specific group of people. (3 VIT)
- An industry in which the final product weighs more or comprises a greater volume than the inputs. (7 CC)
- The process of spreading something from one place to another in an ever-expanding “snowballing” process (3, IDK)
- The location of a place relative to another place (6, CC)
- An energy source formed from the residue of plants and animals buried millions of years ago. (7, IDK)
- business district The area of a city where retail and office activities are clustered. (6, VIT)
- An increase in the percentage and in the number of people living in urban settlements. (5, IDK)
- A policy of extending a country's power and influence through diplomacy or military force. (4, CC)
- the number of live births occurring among the population of a given geographical area during a given year, per 1,000 mid-year total population of the given geographical area during the same year.(2, CC)
- is a country whose political boundaries correspond with its cultural boundaries. ex France (4, VIT)
- used to show a quantitative difference between mapped features by varying the size of symbols. Data is classified into ranges that are each then assigned a symbol size to represent the range. (1, CC)
- The portion of Earth’s surface occupied by permanent human settlement. (2, IDK)
- Concentration of waste added to air, water or land at a greater level than occurs in average air, water or land. (7, IDK)
- A country that has progressed relatively far along a continuum of development. a.k.a a richer country (5, CC)
- Cities with more than 10 million people (6, IDK)
- Physical characteristics of a location, including land, labor, capital (6, CC)
- Shows the values of one or more numeric data fields. Each dot on a dot-density map represents some amount of data.(1,CC)
- A country that is at a relatively early stage in the process of economic development; a.k.a. a poorer country (5, CC)
35 Clues: Forces that divide a country (3, CC) • Cities with more than 10 million people (6, IDK) • The location of a place relative to another place (6, CC) • nationalistic forces that bind a country together. (3, CC) • Beliefs, customs, and traditions of a specific group of people. (3 VIT) • Physical characteristics of a location, including land, labor, capital (6, CC) • ...
Astori Termini 2022-01-14
Across
- Pezza, cerotto, file che ha il compito di rimediare a un bug, un errore, in un software
- Dispositivo di input che consente di trascrivere parole nel computer
- Immissione, ingresso, indica i dati di ingresso in un programma
- Posta elettronica, ossia messaggi inviati tramite computer collegati a Internet
- Software presente nella memoria ROM che gestisce le funzioni di base del sistema
- Componentistiche fisiche di un computer
- Una realtà simulata, in pratica è un mondo digitale dove si viene immersi indossando un visore
- Computer particolarmente piccoli e leggeri e facilmente trasportabili
- Monitor di elevata qualità a cristalli liquidi
- Programma in grado di riconoscere un virus presente in un file e di eliminarlo
- Ciascuna delle pagine che compongono una presentazione tipo PowerPoint
- Computer portatili dalle prestazioni simili a quelle dei personal computer
- Software coperto da copyright distribuito gratuitamente solo per un periodo di prova
- E’ un tipo di sistema operativo
- Tipo di tastiera diffuso in America
- È la scelta preimpostata nel caso siano possibili più alternative
- Unità logico-aritmetica che esegue le istruzioni di calcolo
- Operazione che permette di creare una copia di sicurezza di un file
- Programma che permette l’accesso alla rete Internet e la visualizzazione delle pagine web
- Unità di misura della quantità di informazione (successione di otto bit)
- È un componente hardware esterno al computer
- Operazione che permette di caricare o scaricare dalla rete un file sul proprio computer
- Pagina iniziale di un sito Web, contiene i collegamenti alle altre pagine del sito.
- Unità di misura dell’informazione che corrisponde a 1024 KB
- All’interno di un link è una zona attiva che permette di passare a un documento collegato
- Marchio che indica la protezione dei diritti d’autore
- Regole comportamentali per la comunicazione su Internet
- Tipo di diagramma nel quale i dati o le informazioni sono espressi su diversi livelli organizzati
- Codice segreto per accedere a risorse e informazioni riservate
- Periferiche di uscita che dal computer trasmettono le informazioni all’utente
Down
- Applicativo di un sito internet che consente di cercare informazioni in Internet
- Disegno di dimensioni ridotte che richiama la funzione ad essa associata
- Nuova forma di economia caratterizzata dall’utilizzo di Internet per la vendita di prodotti e servizi
- Instradatore, dispositivo per smistare messaggi in una rete locale
- Con un solo comando si eseguono più operazioni contemporaneamente
- Identifica in modo univoco le informazioni presenti su Internet
- Indirizzo di internet che permette di identificare in modo univoco un utente e un computer collegato a Internet
- Scatola metallica che racchiude tutte le componenti fisiche del computer
- Tastiera tipicamente italiana
- Profilo di un utente che corrisponde ad una casella di posta e a un indirizzo di posta
- Unità di memorie di massa di dimensioni superiori a quelle del floppy disk
- Parte dello schermo in cui sono disposte le icone che rappresentano le applicazioni
- Parte logica di un computer
- Parti di una pagina web inserite in cornici e indipendenti l’una dall’altra
- Tecnica di riconoscimento ottico di caratteri a stampa
- Programma che può provocare danni temporanei o permanenti in un computer
- Servizio gratuito di posta elettronica supportato da pubblicità fornito da Google
- Memoria a sola lettura programmabile e cancellabile
- Singolo documento di lavoro individuato da un nome
- Sono i collegamenti utilizzati per connettere periferiche dotate di questo tipo di interfaccia
- Dispositivo che permette di collegare computer e periferiche a una rete locale
- Prospetto stampato che contiene i dati estratti da un database
- Macchina in grado di elaborare l'informazione ad esso pervenuta
- Misura di unità di informazione, corrisponde a 1024 MB
- Processo di estrazione dei dati da un database secondo certi criteri
- Grandezze introdotte convenzionalmente, per rappresentare e studiare il comportamento dei sistemi
- Interfaccia grafica di un software
- Nome con cui è indicato il tasto che abilita la scrittura in maiuscolo
- Dizionario dei sinonimi e contrari
- Protocollo, ovvero regole, per la trasmissione di informazioni sul Web
- Memoria di sola lettura utilizzata per istruzioni che non debbono essere cambiate
61 Clues: Parte logica di un computer • Tastiera tipicamente italiana • E’ un tipo di sistema operativo • Interfaccia grafica di un software • Dizionario dei sinonimi e contrari • Tipo di tastiera diffuso in America • Componentistiche fisiche di un computer • È un componente hardware esterno al computer • Monitor di elevata qualità a cristalli liquidi • ...
Natural Resources Unit 1 Vocab 2024-01-21
Across
- The zone on the surface of the Earth where all life exists.
- shift Changing patterns in the distribution of species within an ecosystem or biome.
- a way to minimize waste and maintain the resource in as good a condition as is practical.
- A plant association predominantly of trees and other woody vegetation that occupies an extensive area of land.
- making A determination arrived at after consideration.
- The aggregate of plants that grow without cultivation in a given area within a stated period of time.
- A book for notes or memoranda.
- forest Group of ecosystems in which broadleaf trees are abundant and annual precipitation exceeds 30 inches.
- An environment in which a plant or animal lives.
- The elements of supply existing in an area that can be used to satisfy needs of people, including air, soil, water, native vegetation, minerals, wildlife, etc.
- living elements of the environment
- A group of similar organisms that are found in the same area; a coexisting and interbreeding group of individuals of the same species in a particular locality.
- Records of observations or interpretations made during fieldwork or direct engagement with a resource.
- The study of the relationships among living things.
- A group of plants or animals in an area
- A view, judgment, or appraisal formed in the mind about a particular matter.
- In naming of plants and animals, Latin is used. Each kind of plant or animal can be identified by genus (plural, genera) and species (both singular and plural).
- Terrestrial environment located in the middle of the continent and lacking tree cover; sometimes called a prairie. Dominant plants are grass and broadleaved herbs.
- major life in an area, such as tundra biome, tropical rainforest biome, and grassland biome.
- Group of ecosystems located in the frozen northern regions of the northern hemisphere where evaporation rates are low, precipitation is minimal, and swamp like conditions exist during summer because water cannot percolate.
Down
- Terrestrial environment with less than 10 inches annual precipitation inhabited by drought-tolerant species of plants and animals.
- The act of using without replacing.
- An attempt to prevent the use of some natural resource or the modification of an environment, keeping it intact.
- Pertaining to a woody plant whose leaves fall at the end of the growing season.
- A system of interrelated organisms and their physical and chemical environment.
- Point of view; the idea of what one thinks about an issue.
- The total wildlife of an area in the broadest sense, including wild mammals, birds, fish, reptiles, insects, and small animals.
- The management of natural resources such as land, water, soil, plants, and animals, with a particular focus on how management affects the quality of life for both present and future generations.
- A substance that cannot be decomposed into other substances.
- A daily record of news and events of a personal nature.
- All of the plant and animal populations occupying a given area, usually named after the dominate plants or animals in the area.
- Subarctic coniferous forests of northern United States, southern Canada, northern Europe, and northern Asia, interspersed with muskeg bogs. 2. An area of land lying between the North Temperate Zone and the Arctic zone.
- rainforest A low altitude, closed, evergreen (usually broadleaf) forest in equatorial regions where annual rainfall exceeds 80 inches with no or very short dry seasons and where the temperature is high and constant and does not approach freezing at any time.
- The ability to see, to hear, or become aware of something through the senses.
- The nonliving elements of the environment
- keeping To maintain diligent notes over a period of time.
- Factors of a biological nature, such as availability of food and water, competition among species, or predator-prey relationships.
- Of, relating to, or being a method of harvesting or using a resource so that the resource is not depleted or permanently damaged.
- To watch carefully paying attention to details.
- Material that provides official information or evidence or that serves as a record
- To query someone in order to collect data for the analysis of some aspect of a group or area.
41 Clues: A book for notes or memoranda. • living elements of the environment • The act of using without replacing. • A group of plants or animals in an area • The nonliving elements of the environment • To watch carefully paying attention to details. • An environment in which a plant or animal lives. • The study of the relationships among living things. • ...
Comp Apps Vocab 2017-02-28
Across
- roll the cursor over a menu button or link on a Web page
- any software program that automatically plays, displays, or downloads advertisements to a computer in a manner that is unexpected and unwanted by the computer user
- program you use to browse (look at someone or something casually) files
- brain of your computer
- link from one point to another
- control hub on the computer, from here you can search for programs, run programs or do essentials like logging off
- unauthorized person makes a message (typically an email) appear to come from a genuine sender by using either the genuine or a very similar address
- irrelevant or inappropriate, unwanted messages sent on the Internet to a large number of recipients
- humorous image, video, piece of text, etc. that is copied (often with slight variations) and spread rapidly by Internet users
- name of the specific web page you would visit if you clicked on that link in Google or another search engine
- appears if you are NOT browsing the Internet, reading a file, or playing a game
- shows you exactly what this web page looked like when Google last visited it
- gives you a sense of what you will find on the page, and what it has to do with the search you entered
- acceptable way of communicating on the Internet appropriately
- screen that displays the images, files, documents
- Lure (someone) into a relationship by means of a fictional online persona
- graphic images or symbols that represent applications, files, disk drives, documents, embedded objects, or linked objects in an operating system
- involves clicking the left mouse button
- portion of the Web that is readily available to the general public and searchable with standard web search engines
- list of options or commands presented in a computer
- thousands of websites that use anonymity tools like Tor and I2P to hide their IP address
Down
- Software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems
- word or phrase you search for in Google
- press a computer mouse button twice in a row quickly to select a file, program, or function
- list of steps that you can follow to finish a task
- person who violates computer security for malicious reasons or for personal gain
- small projection from a card, paper, or folder, used as an aid in filing or locating a file
- collection of Web pages
- list of the sources used for a report or other research project, including books, article, videos and websites
- used to open pop-up menus that change depending where you click
- set of documents residing on the Internet that are formatted in hypertext
- attempt at identity theft in which criminals lead users to a counterfeit website in the hope that they will disclose private information such as user names or passwords
- Advertisements trying to sell something
- where your mouse pointer is
- address for the unique location that webpage occupies on the Internet
- make a deliberately offensive or provocative online posting with the aim of upsetting someone or eliciting an angry response from them
- part of the Web that is not able to be searched by search engines
- program to help you find webpages on the Internet
- beside the Start button that shows what programs are open
- website that allows collaborative editing of its content & structure by its users
- individual HTML document
- specific typeface (lettering design) of a certain size and style
- Key information about a source used for a report or other research project, including its author, title, publisher, and date of publication
- Having letters, Numbers, etc., That slant upward to the right
- place, person, or thing from which something originates or can be obtained
- algorithm that has been coded into something that can be run by a machine
- element in the form of a set of toolbars placed on several tabs
- global system of interconnected computer networks
48 Clues: brain of your computer • collection of Web pages • individual HTML document • where your mouse pointer is • link from one point to another • word or phrase you search for in Google • Advertisements trying to sell something • involves clicking the left mouse button • program to help you find webpages on the Internet • screen that displays the images, files, documents • ...
Exam 2022-03-29
Across
- a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages
- any interaction you make with a button on your keyboard
- short for electronic mail
- computer program that represents information in a two-dimensional grid of data, along with formulas that relate the data
- a printed circuit board containing the principal components of a computer or other device
- allow web developers to arrange data into rows and columns
- the electronic circuitry that executes instructions comprising a computer program
- a software package designed to create electronic presentations
- the programs and other operating information used by a computer
- the best-known and most-used open source operating system
- sequences of events that can be played back to help with repetitive tasks
- it is a computer program designed to carry out a specific task
- a specific procedure for solving a well-defined computational problem
- a building communications networks for a company, safeguarding data and information, creating and administering databases
- it is essentially short term memory where data is stored as the processor needs it
- a core component of an operating system and serves as the main interface between the computer's physical hardware and the processes running on it
- an object on a computer that stores data, information, settings, or commands used with a computer program
- an output device that displays information in pictorial or text form. A monitor usually comprises a visual display
- any device or system that allows the transmission of information by coded signal over distance
- a handheld hardware input device that controls a cursor in a GUI
- a binary digit, the smallest increment of data on a computer
- the basic unit of information in computer storage and processing
- temporary memory officially termed “CPU cache memory
- an error, flaw or fault in computer software that causes it to produce an incorrect or unexpected result
- a person who writes computer programs.
- a software bug that seems to disappear or alter its behavior when one attempts to study it
Down
- tools, machinery, and other durable equipment
- it is a widely used commercial word processor designed by Microsoft
- the process of indentifying yourself
- a form of technology that is mostly used in cellular communication and other related aspects
- in full structured query language, computer language designed for eliciting information from databases
- it is a device or system that is used to store information for immediate use in a computer
- a measurement of how often something happens
- is an electrical or electromagnetic current that is used for carrying data from one device or network to another
- it is a computer language for laying out and structuring web pages
- it is high-level, class-based, object-oriented programming language that is designed by James Gosling
- a copyrighted software that is available at no cost for unlimited usage
- as the first personal computer, was one of the fastest desktop computers of its time
- it is a non-volatile memory type
- a field of computer science that investigates how computers should represent numbers and perform operations on them
- it is the process by which a running computer system is restarted
- a device used for precisely punching holes in specific locations on a stiff card
- a group of several proprietary graphical operating system families
- digital electronic machine that carry out sequence of arithmetic and logical operation
- it a collection of files accessed through a web address, covering a particular theme or subject, and managed by a particular person or organization
- a software program created by Microsoft that uses spreadsheets to organize numbers and data with formulas and functions
- a wireless communication technology that can be used for close-range data transmission from one digital device to another
- it is a scripting language that enables you to create dynamically updating content
- a proprietary graphical operating system developed and marketed by Apple Inc
- one of the primary input devices used with a computer
50 Clues: short for electronic mail • it is a non-volatile memory type • the process of indentifying yourself • a person who writes computer programs. • a measurement of how often something happens • tools, machinery, and other durable equipment • temporary memory officially termed “CPU cache memory • one of the primary input devices used with a computer • ...
Heather's 4/3 Crossword 2019-04-03
Across
- The magnitude of the relationship between the research variable.
- Theory concerned with a critique of society and with envisioning new possibilities.
- Description of the study by a person unconnected with it.
- Type of question that asks respondents to rank concepts along a continuum, such as most to lest important.
- The ratio of one odds to another odds, for example, the ration of the odds of an event in one group to the odds of an event in another group; a 1.0 indicates no difference in the groups.
- A type of unstructured self-report in which individual interviews directed at documenting a person’s life story, or an aspect of it that has developed over the life course.
- Usually continuous variables but can sometimes be dichotomous variables.
- Used when multiple measures are obtained from the same subjects; tests for analysis of variance by ranks can be used.
- Study published in professional journal that is not preappraised for quality or use in practice.
- One in which the researcher identifies population strata and determines how many participants are needed from each stratum.
- Nominal, ordinal, interval and ratio are the four levels of this.
- Standards from a large and representative sample.
- Evidence collected through the human senses.
- Involves using information about people’s characteristics to create comparable groups.
- Rigor of a study.
- Analyst codes for context; locating and linking action-interaction within a framework of subconcepts that give it meaning and enable it to explain what interactions are occurring.
- Imposes a duty on researchers to minimize harm and maximize benefits.
- Branch of psychology concerned with the theory and methods of psychological measurement.
- A process that involves two types of checks: Check for outliers and wild code.
- Encompasses biases from preexisting differences between groups.
Down
- Used by researches to estimate sample size.
- A richly thorough depiction of research settings and the sample of study participants (or events).
- Type of journal that provides research articles free of charge online.
- Research with roots in sociology that seeks to describe and understand the key social psychological processes that occur in social settings.
- The vast majority of RCTs, in which the researchers hypothesize that the intervention is superior to the control condition.
- A listing of each variable together with information about placement in the file, codes associated with the values of the variable, and other basic information.
- Sampling in which researchers select time periods during which observations will occur.
- Error terms in Simple Linear Regression.
- A matrix that plots time on one dimension and events or activities on the other (usually a horizontal line).
- Specific query researchers want to answer in addressing the research problem.
- A relationship or association between two variables.
- Observation from a fixed location.
- A process in which researchers provide feedback to participants about emerging interpretations and obtain participant’s reactions.
- A symbolic comparison, using figurative language to evoke a visual analogy.
- Type of hypothesis that has a theory as a starting point: Researches deduce that if the theory is true, then certain outcomes can be expected.
- Also referred to as cognitive anthropology; and focuses on the cognitive world of a culture.
- Sampling to the point at which no new information is obtained and redundancy is achieved.
- Assigning numbers to represent the amount of an attribute present in a person or object.
- When qualitative data are sometimes converted into numeric codes that can be analyzed quantitatively.
- A brief description of the study placed at the beginning of the article.
- Assesses a programs net impact—impacts that can be attributed to the program, over and above the effects of a counterfactual.
- Systematic inquiry that uses disciplined methods to answer questions or solve problems.
- The 3rd broad principle described in the Belmont Report that includes participants’ right to fair treatment and their right to privacy.
- Group of participants used in a study whose performance on an outcome is used to evaluate the performance of the treatment group on the same outcome.
44 Clues: Rigor of a study. • Observation from a fixed location. • Error terms in Simple Linear Regression. • Used by researches to estimate sample size. • Evidence collected through the human senses. • Standards from a large and representative sample. • A relationship or association between two variables. • Description of the study by a person unconnected with it. • ...
601934 2019-01-20
Across
- Again in the relational model, a foreign key is an attribute or collection of attributes from one relational table whose values must match another relational table's primary key.
- Used by SQL Server Agent for scheduling jobs and alerts and recording operators. (Operators are individuals who are assigned responsibility for jobs and alerts.)
- Records the system level information, SQL Server initialization information, and configuration settings for SQL Server. This database also records all login accounts, the existence of all other databases, and the location of the primary file for all user databases. Always keep a recent backup of the master database.
- In the relational model, a primary key is a single attribute, or combination of attributes, which can be used to uniquely identify a row of data in a give table.
- A debugging process by which the source code is executed one line at a time to en- able you to inspect the value of variables,find infinite loops or remove other types of bugs.
- A data type used to contain textual material, such as alphabetic characters and punctuation symbols.
- An acronym, pronounced either as "seguel" or "seekel", for Structured Query Language a language developed by IBM Corp. for processing data contained in mainframe computer databases. SQL has now been institutionalized by the creation of an ANSI standard for the language.
Down
- Contains the primary data file and all other files not put into another filegroup. System tables-which define the users, objects, and permissions for a database-are allocated to the primary filegroup for that database. The system tables are created automatically by SQL Server when you create a database.
- As mentioned a SQL database is made up of a set of operating system files these files are the basis for the database.
- A template for all other databases created on the system, including tempdb. When database is created, the first part of it is created as copy of the contents of the model database. The rest of the database is filled with empty pages. The model database must exist on the system because it is used to re-create tempdb every time SQL Server is started. You can alter the model database to include user-defined data types tables, and so on so that each new database you create will also have those attributes. Check the Books Online index for the topic "model database" for more information.
- a technique for partitioning data. A database shard is a horizontal (think rows, not columns) partition of data within a database, with each partition being referred to as a shard.
- Two or more keywords that are used together to create an instruction, which is usu- ally conditional in nature. (See Compound.) In C and C++ programming, a user- defined data type.
- Used to hold temporary tables and temporary stored procedures. This database is also used for other temporary storage needs of SQL Server, such as for sorting data. A clean copy of the tempdb data- base is re-created at its default size every time SQL Server is started. It then grows automatically as necessary. If you need a large amount of tempdb space, you can set its default to a larger size by using the ALTER DATABASE command. Check the Books Online index for the topic tempdb database" for more information.
- This is the data about the data. Metadata describes data relationships and characteristics, and is often referred to as a data dictionary, though that seems to be a term more prevalent in the relational world (though not exclusive to it by any means).
- is an umbrella term, one which encompasses a number of different technologies. These different technologies aren't even necessarily related in any way beyond the single defining characteristic of NoSQL: they are not relational in nature.
15 Clues: A data type used to contain textual material, such as alphabetic characters and punctuation symbols. • As mentioned a SQL database is made up of a set of operating system files these files are the basis for the database. • ...
601934 2019-01-20
Across
- Used by SQL Server Agent for scheduling jobs and alerts and recording operators. (Operators are individuals who are assigned responsibility for jobs and alerts.)
- Contains the primary data file and all other files not put into another filegroup. System tables-which define the users, objects, and permissions for a database-are allocated to the primary filegroup for that database. The system tables are created automatically by SQL Server when you create a database.
- A data type used to contain textual material, such as alphabetic characters and punctuation symbols.
- As mentioned a SQL database is made up of a set of operating system files these files are the basis for the database.
- Two or more keywords that are used together to create an instruction, which is usu- ally conditional in nature. (See Compound.) In C and C++ programming, a user- defined data type.
- Any filegroups defined by the user during the process of creating the database. A table or an index can be created in a specific user-defined filegroup.
- A template for all other databases created on the system, including tempdb. When database is created, the first part of it is created as copy of the contents of the model database. The rest of the database is filled with empty pages. The model database must exist on the system because it is used to re-create tempdb every time SQL Server is started. You can alter the model database to include user-defined data types tables, and so on so that each new database you create will also have those attributes. Check the Books Online index for the topic "model database" for more information.
- An acronym, pronounced either as "seguel" or "seekel", for Structured Query Language a language developed by IBM Corp. for processing data contained in mainframe computer databases. SQL has now been institutionalized by the creation of an ANSI standard for the language.
Down
- Holds all pages for tables and indexes that do not have a specified filegroup when they are created. Default status can be switched from one filegroup to another by members of the db owner database role.
- A debugging process by which the source code is executed one line at a time to en- able you to inspect the value of variables,find infinite loops or remove other types of bugs.
- A primary data file contains all of the startup information for the database and system tables and objects. It can also be used to store user tables and objects, but it is not required to do so. Each database has exactly one primary file. The recommended file extension is MDE.
- Secondary data files are optional. They can hold Secondary data files data and objects that are not in the primary file.
- A transaction log file holds all of the transaction Transaction log files log information used to recover the database. Every database must have at least one log file and can have multiple log files. The recommended file extension is LDF.
- Used to hold temporary tables and temporary stored procedures. This database is also used for other temporary storage needs of SQL Server, such as for sorting data. A clean copy of the tempdb data- base is re-created at its default size every time SQL Server is started. It then grows automatically as necessary. If you need a large amount of tempdb space, you can set its default to a larger size by using the ALTER DATABASE command. Check the Books Online index for the topic tempdb database" for more information.
- Records the system level information, SQL Server initialization information, and configuration settings for SQL Server. This database also records all login accounts, the existence of all other databases, and the location of the primary file for all user databases. Always keep a recent backup of the master database.
15 Clues: A data type used to contain textual material, such as alphabetic characters and punctuation symbols. • As mentioned a SQL database is made up of a set of operating system files these files are the basis for the database. • Secondary data files are optional. They can hold Secondary data files data and objects that are not in the primary file. • ...
601934 2019-01-20
Across
- A template for all other databases created on the system, including tempdb. When database is created, the first part of it is created as copy of the contents of the model database. The rest of the database is filled with empty pages. The model database must exist on the system because it is used to re-create tempdb every time SQL Server is started. You can alter the model database to include user-defined data types tables, and so on so that each new database you create will also have those attributes. Check the Books Online index for the topic "model database" for more information.
- Two or more keywords that are used together to create an instruction, which is usu- ally conditional in nature. (See Compound.) In C and C++ programming, a user- defined data type.
- a technique for partitioning data. A database shard is a horizontal (think rows, not columns) partition of data within a database, with each partition being referred to as a shard.
- Contains the primary data file and all other files not put into another filegroup. System tables-which define the users, objects, and permissions for a database-are allocated to the primary filegroup for that database. The system tables are created automatically by SQL Server when you create a database.
- Records the system level information, SQL Server initialization information, and configuration settings for SQL Server. This database also records all login accounts, the existence of all other databases, and the location of the primary file for all user databases. Always keep a recent backup of the master database.
- As mentioned a SQL database is made up of a set of operating system files these files are the basis for the database.
- A data type used to contain textual material, such as alphabetic characters and punctuation symbols.
- An acronym, pronounced either as "seguel" or "seekel", for Structured Query Language a language developed by IBM Corp. for processing data contained in mainframe computer databases. SQL has now been institutionalized by the creation of an ANSI standard for the language.
Down
- Used to hold temporary tables and temporary stored procedures. This database is also used for other temporary storage needs of SQL Server, such as for sorting data. A clean copy of the tempdb data- base is re-created at its default size every time SQL Server is started. It then grows automatically as necessary. If you need a large amount of tempdb space, you can set its default to a larger size by using the ALTER DATABASE command. Check the Books Online index for the topic tempdb database" for more information.
- This is the data about the data. Metadata describes data relationships and characteristics, and is often referred to as a data dictionary, though that seems to be a term more prevalent in the relational world (though not exclusive to it by any means).
- In the relational model, a primary key is a single attribute, or combination of attributes, which can be used to uniquely identify a row of data in a give table.
- A debugging process by which the source code is executed one line at a time to en- able you to inspect the value of variables,find infinite loops or remove other types of bugs.
- Again in the relational model, a foreign key is an attribute or collection of attributes from one relational table whose values must match another relational table's primary key.
- Used by SQL Server Agent for scheduling jobs and alerts and recording operators. (Operators are individuals who are assigned responsibility for jobs and alerts.)
- is an umbrella term, one which encompasses a number of different technologies. These different technologies aren't even necessarily related in any way beyond the single defining characteristic of NoSQL: they are not relational in nature.
15 Clues: A data type used to contain textual material, such as alphabetic characters and punctuation symbols. • As mentioned a SQL database is made up of a set of operating system files these files are the basis for the database. • ...
Lockdown Cryptic Crossword 2020-06-12
Across
- Initially awake sore in Milton Keynes, required when sampling
- Midday hidden in nano one
- Compact Disc Music initially needed on construction projects
- Starting Players Physical Education protects key workers
- Part of our business muddles rain in me
- RAF in reverse next to head of Airfield, distant
- Survey type: Show illuminated charged particle
- United Kingdom with head of America and Switzerland form important body
- A good laugh going up? it's drooping
- Combine Thorium, Erbium, half portion of Magnesium and Aluminium to create insulation
- Oscar has a bit of a temperature keeping time
- Anyone in a stom Al, you can access it online
- Try exam again in rare situations
- Steers horse to sports lesson, missing start of the action. Dutyholders should do this every year.
- name tv line Ron, confused? it's all part of the business
- Baby Joey found next to end of Fence, raise this in jubilation
- Swindle locomotive
- Half beat, exist
- Comfortable with guns mix up
- Arranged stomach exercise swaps equipment for intensity,
- Banquet hidden in life as Teacher
- Kier's party without you standing next to a conservative? Analysis here
- Early Notification finishes for protective measure
- Head of Fine Upstanding Locals mix with rough to stay at home
- Query morning abbreviation with head of Sales finding the last ones to join
- Tim in soap is a ladies man
- Internal war with South for part of our business
- Decor on amusingly hides virus
- Hidden in Fairground, it's all around us!
- Converted helibus is the approximate colour of Crocidolite
- Mark, Mary and Sally initially communicate electronically
- Queen upset over tainted Edward intially, a cost for doing business
- Receive around question in pipe joints
- One absorbs characters to start a fairy tale
- Post Office Teller initially calls kettle black
- Head of Large snakes helps surveyor reach new heights
- White house: Missed start of dance with toilet
- Randomly atomise brown fibre
- Tolkein creature behind some of graveyard, hard material
- Falling behind to cover pipework
- Morning in the North East, it's how we know you
- ABBA loses member in middle of hit dancing move
Down
- Man with net game randomly produces a survey
- Suns goes down opposite the front, frustrating event
- Regarding where ships sail from, they tell you what you need to know
- and Out Two events in cricket completes radio transmission
- Island nation mixing in a herb
- Make wheel smaller, brings your dog closer
- Bite end off you and men, it's sticky on the floor
- Texas' Best Osprey hiding carcinogen
- Gate and shed holding head of Axe for key location
- Level golf score played backwards provides musical style
- Coating Written words with you and communist covering a bobbly material
- Where we work Lucy loses tail and gains charged atom
- HIJKLMNO
- Not with former partner, start of generation software
- Move ticks not the carrot
- Victoria in youth lodging initially shows a type of tile
- Greeting amongst the northerners, slim
- gain insult confused type of board
- Let nun muddle under ground
- Hikers lose Hannah, led by Beatrix they ride
- Donor in bag I've restored
- Truth Speak it to power, it's our conference after all
- Holds water backwards? Crazy!
- It could go off, it went down badly
- Corrosive liquid confused CIA and head of Department
- Peppa's not young in this office
- Decorate me with tops of Northern Trees for survey
- Where the beast lurks, former PM Tony loses Brown
- Half of aussie rockband gives praise to a
- Billy hiding in messy store, flashing lights
- Heads of Department concerning umbrellas will keep you clean on site
- End of Mash is all that's left after fire
- small remit helps identify fibres
- Confused cult sing on for part of business
- Dismiss Christmas Eve present carrier
- Waster loses second half, it's in the past
- Preparing yourself for the big event, undertaken in a classroom
- Man with you after start of cycling, what the Welsh call Wales
- I'm in Los Angeles, it's a capital!
- Doc with IV randomly causes pandemic
82 Clues: HIJKLMNO • Half beat, exist • Swindle locomotive • Midday hidden in nano one • Move ticks not the carrot • Donor in bag I've restored • Let nun muddle under ground • Tim in soap is a ladies man • Comfortable with guns mix up • Randomly atomise brown fibre • Holds water backwards? Crazy! • Island nation mixing in a herb • Decor on amusingly hides virus • Peppa's not young in this office • ...
AP Human Geo - Bijou Nsele - 1st period 2019-04-21
Across
- A collection of languages related through a common ancestor that existed thousands of years ago (3, CC)
- The system of writing used in China and other East Asian countries in which each symbol represents an idea or concept rather than a specific sound (3, IDK)
- Divided much of the country into a system of townships and ranges to facilitate the sale of land settlers in the West (1, VIT); it is one of most important mathematical indicators of locations in the U.S.
- A collection of languages within a branch that share a common origin in the relatively recent past and display a few differences in grammar and vocabulary (3, CC)
- The ability of an individual or group to carry out a particular economic activity (such as making a specific product) more efficiently than another activity (6, IDK)
- The minimum people needed to support a service (7, CC)
- A repetitive act of a group, performed to the extent where it becomes a characteristic of a group (3, VIT); this contributes to the creation of a culture, which is what this main topic of the unit; sets the base for the unit
- A computer system that can capture, store, query, analyze, and display geographical data (1, CC)
- A large group of people that inhabit a specific territory and are connected by history, culture or another commonality (4, VIT); understanding the concept of this is very important because many students use this word and similar words to it interchangeably, even though there is a difference
- Economic system aimed at self-reliance and strengthening the national economy by accumulating bullion, gaining colonies, and establishing a favorable balance of trade (5, IDK)
- Occurs in stage 4 of the DTM, when the CBR declines to the point where it equals to CDR, and the NIR approaches zero (2, IDK)
- Economy that requires little or no trade with the outside world (6, IDK)
- A farm on which no one lives; planting and harvesting is done by hired migratory crews (5, IDK)
- A force that divides people and countries (4, CC)
- A model which shows the location of agriculture in regard to a commercial economy (5, VIT); visually explains proximity to markets in the choice of crops on commercial farms and is separated by rings; helps student by giving a clear visual, instead of having to memorize a statement theory
- The maximum distance people are willing to travel to use a service (7, CC)
- A system that relies on descriptions of land ownership and natural features such as streams or trees (5, CC)
Down
- An ethnic/national minority that does not possess its own state and is not the majority population in any nation state (4, IDK)
- The country's nth-largest settlement is 1/n the population of the largest settlement (7, IDK)
- An area within which everyone shares in common one or more distinctive characteristics (1,IDK)
- A rectangular land division scheme designed to disperse settlers evenly across farmlands of the U.S. interior (5, CC)
- Determines accurately the precise position of something Earth (1, CC)
- The process of consolidating small landholdings into a smaller number of large farms in England during the 18th century (7, IDK)
- Movement from one region of a country to another (2, CC)
- LATIN A form of Latin used in daily conversation by ancient Romans, as opposed to the standard dialect, which was used for official documents (3, IDK)
- Change in a society’s population from a condition of high CBRs and CDRs and low NIRs, to a condition of low CBRs, CDRs, and NIRs (2, VIT); this term is the base for this unit and is fundamental to understand the term to comprehend the unit
- Movement within one region (2, CC)
- An attitude that tends to unify people and enhance support for a state (4, CC)
- The process by which the population of urban settlements grows (7, VIT); helps create more businesses and profit for the local economy and contributed to the world’s largest cities today
- The location of a place relative to other places (6, CC)
- The scientific method of transferring locations on Earth's surface to a flat map (1, IDK)
- Actions or processes that involve the entire world and result in making something worldwide in scope (6, VIT); industry became ubiquitous because of this and helped spark development among countries
- Process of redrawing legislative boundaries for the purpose of benefiting the party in power (4, IDK)
- The portion of Earth’s settlement occupied by permanent human settlement (2, IDK)
- The physical character of a place (6, CC)
35 Clues: Movement within one region (2, CC) • The physical character of a place (6, CC) • A force that divides people and countries (4, CC) • The minimum people needed to support a service (7, CC) • Movement from one region of a country to another (2, CC) • The location of a place relative to other places (6, CC) • ...
Common Computer Terms 2015-03-04
Across
- Contains the Start button, the clock and currently running tasks.
- Can be represented by a range of symbols, usually round dots, which are used to set apart points in paragraph style.
- An organised collection of related information.
- The physical components of the computer system eg keyboard, mouse, speakers etc.
- The orientation of the document when printed; wider than it is long.
- A toolbar contain buttons with that can be clicked to provide a shortcut to tasks.
- The orientation of the document when printed; longer than it is wide.
- To change the look of a document, text, graphics, characters.
- Hardware devices which are attached to the computer eg printer, speakers, scanner etc.
- A facility, which allows the user to make columns with or without borders, can be used instead of tabulating.
- Text files that visited Web sites store on you computer’s hard disk.
- The process of taking (exporting) data from an application, i.e. a database, and placing it into another application, i.e. a spreadsheet
- Paragraph alignment: left, centre, right or fully justified.
- A cell or range reference in a formula whose location remains the same (absolute) when copied.
- Software applications that expand a browser’s basic capabilities by becoming extensions of the browser itself.
- Notation that you create to list sites you visit often or would like to quickly return to.
- A spreadsheet file containing one or more worksheets
- The process of bringing (importing) data into an application which has been exported from another application
- engine A tool to help locate information on the Internet.
- With reference to printing is the physical port on PC the printing device is connected to.
- The process of asking a question of a database. Queries are used to view, change, and analyse data in different ways
- When your text reaches the right-hand margin in a document it automatically starts on the next line.
- The etiquette rules of the Internet.
- page The main or introductory Web page for a site.
- All the characters in a particular typeface.
- The act of copying information from a distant computer to your local computer.
Down
- A rude or inflammatory e-mail message.
- The location where new e-mail messages arrive.
- An equation that performs operations on worksheet data.
- Two or more computers connected together for the sharing of resources such as printers and drives.
- Allows the user to reverse the last action performed.
- Software you can use free of charge for a trial period, usually 30 days, after which time you are expected to pay for the program.
- A process where the words in a document are matched against a list of words in a dictionary. If a word in the document does not match one, it is signalled as a spelling error.
- The name of a particular Internet site.
- Computerized worksheet on which text, numbers and formulas can be entered for fast, accurate calculations.
- A software program that translates and allows you to view HTML files.
- Operating systems and applications use a general system call to operate hardware devices. The driver is a software routine that translates it into the specific instructions needed to control the hardware device.
- A document that can be used as a pattern for creating other similar documents.
- The rectangles created at the intersection of columns and rows.
- To locate the cause of trouble and removes, fixes or treats it.
- Files that are sent separately from, but attached to, an e-mail message.
- A facility in operating system to store items of text or graphics when they have been cut or copied, so they can be pasted to a different location.
- Programs: a series of instructions that tell the computer hardware what to do; can also be the interface between the user and the computer system.
- To copy files to another media as a precautionary measure, in case the first media fails
- A program that is loaded onto your computer without your knowledge and runs without your consent. Most viruses can also replicate themselves
- The process of merging a main document with a data source to produce form letters
- The location where browsers keep a copy of recently visited pages.
- A predefined formula that performs calculations by using specific values, called arguments
48 Clues: The etiquette rules of the Internet. • A rude or inflammatory e-mail message. • The name of a particular Internet site. • All the characters in a particular typeface. • The location where new e-mail messages arrive. • An organised collection of related information. • page The main or introductory Web page for a site. • ...
IT Final Exam Crossword Puzzle 2024-05-02
Across
- The most important part of any modern computer system that controls the other parts of the computer.
- An operating system interface that allows a user to interact with the computer by displaying pictures, icons, and other images on a screen to represent files, folders, and system controls and by accepting input from a mouse or a touch screen.
- A computer program that makes it so people, hardware, and software can interface with each other in a meaningful way.
- A method of asking questions about the data stored in a database.
- The most common type of long-term storage that uses thick magnetic disks encased in a protective housing to store data.
- Software designed to infiltrate or damage a computer system without the owner's consent or knowledge.
- The worldwide system of interconnected computers and public networks.
- A structured set of data held in a computer, usually in a way that is accessible by multiple concurrent users.
- Information that a user physically enters into a computer by pressing a key on a keyboard, clicking a mouse, tapping a touch screen, pushing a button on a game controller, speaking into a microphone, etc.
- When parts of a single file, program, or application are stored in different areas of a physical disk.
- A numbering system that uses two digits, 0 and 1.
- A markup language interpreted by web browsers. Makes up the structure of a web page.
- A characteristic that demonstrates high moral character whether or not a person is being watched.
- The ability to do everything in one's own power to find ways to solve problems using whatever resources are available.
- A company that provides individuals and businesses access to the internet and other related services.
- A system for making digital resources publicly available over the internet using a web browser that paved the way for email, chatrooms, and social media sites.
- A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.
- The use of deception to gain personal and/or private information for unlawful purposes.
Down
- A way of giving computers precise, line-by-line instructions to follow using programming languages.
- The process of converting information so it cannot be understood without decrypting it using a key, especially to prevent unauthorized access.
- A technology that allows computers, smartphones, and other devices to communicate on a wireless network.
- The main memory of a computer that can be quickly accessed by the CPU and where the computer stores data and instructions that it is actively using.
- A discipline that is dedicated to meeting the computer needs of businesses, schools, governments, and other organizations.
- An attribute attached to a value that tells the compiler or interpreter how the data should be used in a programming language.
- An assessment program that provides evidence of the technical skills and aptitude necessary to perform a job in information technology. Common ones include entry-level, networking, databases, cybersecurity, and project management.
- A programming language commonly used to create interactive effects within a web browser.
- The principal communications protocol in the internet protocol suite that is used to route information over the internet.
- A file associated with a web page that describes how HTML elements are to be displayed (How they look).
- A brief written summary of the education, work experience, skills, and qualifications of a potential employee.
- A program used by Windows to provide information about how a computer is performing and which processes and services are running at any given time.
- A numerical label that is assigned to devices so they can connect and communicate on a network.
- The way a file is organized. They are indicated by an extension such as .jpg, .gif, .png., .mp3, .wav, .wma, .mp4, .avi, and .wmv.
- Software that allows an operating system to communicate with hardware devices, such as printers, video cards, scanners, and cameras.
- The ability to have good interpersonal skills, ask good questions, listen well, cultivate trust, and work well in groups.
- The smallest container within a computer's storage system that is used to store information such as data, settings, and commands used in a computer program. The smallest container that can be copied, deleted, or moved within a file system.
35 Clues: A numbering system that uses two digits, 0 and 1. • A method of asking questions about the data stored in a database. • The worldwide system of interconnected computers and public networks. • A markup language interpreted by web browsers. Makes up the structure of a web page. • ...
People in Business 2021-12-20
Across
- as the workers may demand for higher salaries and company is unable to keep up with their demands
- paid to salesperson, based on a percentage of sales they’ve made. The higher the sales, the more the pay. Although this will encourage salespersons to sell more products and increase profits, it can be very stressful for them because no sales made means no pay at all.
- is when messages are sent through established channels using professional language. Eg: reports, emails, memos, official meetings.
- This can take the form of recording (eg: meters fitted to TV screens to see what channels are being watched), watching (eg: counting how many people enter a shop), auditing (e.g.: counting of stock in shops to see which products sold well).
- messages from managers to subordinates i.e. from top to bottom of an organization structure.
- a democratic style would use two-way communication methods such as verbal mediums. An autocratic one would use notices and announcements.
- the physical and mental efforts put in by the workers in the production process. The reward for labour is wage/salary
- a scheme whereby a proportion of the company’s profits is distributed to workers. Workers will be motivated to work better so that a higher profit is made.
- this can be defined as the proportion of total market sales achieved by one business. Increased market share can bring about many benefits to the business such as increased customer loyalty, setting up of brand image, etc.
- if the message is very detailed, then written and visual methods will be used.
- between people on the same level of an organization structure
- a good or service essential for living. Examples include water and food and shelter.
- they are a very important part of every business. They purchase and consume the goods and services that the business produces/ provides. Successful businesses use market research to find out customer preferences before producing their goods.
- although these businesses do not aim to maximize profits, they will have to meet the profit target set by the government. This is so that it can be reinvested into the business for meeting the needs of the society
- Different people will have different needs and wants from people in other countries, and so the product may not be successful in all countries
- messages/feedback from subordinates to managers i.e. from bottom to top of an organization structure
- additional amount paid to workers for good work
- A group of people representative of the target market (a focus group) agree to provide information about a particular product or general spending patterns over time. They can also test the company’s products and give opinions on them.
Down
- occurs between people on the same level of an organization structure.
- if feedback is important, like for a quick query, then a direct verbal or written method will have to be used.
- the risk taking ability of the person who brings the other factors of production together to produce a good or service. The reward for enterprise is profit from the business.
- involves a message which does not require a feedback. Example: signs saying ‘no smoking’ or an instruction saying ‘deliver these goods to a customer’
- The cost and prices may be lower or higher in different countries so businesses may not be able to sell the product at the price which will give them a profit
- if worker(s) responsible for a particular task is absent, the entire production process may halt since nobody else may be able to do the task.
- interviewer will have ready-made questions for the interviewee.
- paid monthly or annually.
- shares in the firm are given to employees so that they can become part owners of the company. This will increase employees’ loyalty to the company, as they feel a sense of belonging.
- once a business has passed its survival stage it will aim for growth and expansion. This is usually measured by value of sales or output. Aiming for business growth can be very beneficial. A larger business can ensure greater job security and salaries for employees. The business can also benefit from higher market share and economies of scale.
- this is the income of a business from its activities after deducting total costs. Private sector firms usually have profit making as a primary objective. This is because profits are required
- is the process of collecting, analysing and interpreting information about a product.
30 Clues: paid monthly or annually. • additional amount paid to workers for good work • between people on the same level of an organization structure • interviewer will have ready-made questions for the interviewee. • occurs between people on the same level of an organization structure. • if the message is very detailed, then written and visual methods will be used. • ...
splendore termini 2022-01-14
Across
- È la memoria dove vengono collocati i dati in fase di elaborazione; è detta volatile perché non trattiene le informazioni quando si spegne il computer.
- Unità di memorie di massa di dimensioni superiori a quelle del floppy disk
- Dispositivo dalle funzionalità analoghe a quelle del mouse, il sistema di puntamento si ottiene facendo scorrere il polpastrello di un dito su una superficie sensibile della tastiera. Usato principalmente sui computer portatili.
- Procedura per la creazione e la copia sul disco fisso di archivi e programmi relativi a un’applicazione.
- Insieme dei dispositivi elettronici e meccanici del computer.
- Marchio che indica la protezione dei diritti d’autore.
- Immissione, ingresso, indica i dati di ingresso in un programma. Dispositivi di input sono quelli che permettono di inserire dati nel computer.
- Tradotto letteralmente significa biscotto. E’ un file memorizzato sul proprio computer che identifica il computer quando è collegato ad alcuni siti Internet.
- Operazione che permette di creare una copia di sicurezza di un file.
- Area di lavoro visualizzata sullo schermo e dedicata a un’applicazione.
- Sono supporti di memoria, apparentemente identici ai CDROM, che hanno capacità 26 volte superiore ai CDROM.
- È l’unità di informazione strutturata di un database. E’ l’equivalente di una scheda di carta nella quale si scrivono le notizie relative a un’informazione, nel foglio di lavoro corrisponde a una riga della tabella.
- Dispositivo per trasformare un segnale da digitale ad analogico e viceversa, utilizzato per la connessione a Internet tramite il telefono. Motherboard è la scheda principale dove sono collegati tutti i componenti hardware del computer.
- È un mini computer tascabile.
- Uscita, può essere riferito a dati in uscita di un programma o informazioni in uscita da un computer o alle periferiche che consentono la visualizzazione dei risultati.
- Unità logico-aritmetica, è un componente dell’unità centrale che esegue le istruzioni logiche e di calcolo.
- Singolo documento di lavoro individuato da un nome.
- Programma che può provocare danni temporanei o permanenti in un computer, ha la caratteristica di propagarsi da un computer a un altro per mezzo della posta elettronica.
- Sistema operativo di dominio pubblico.
- computer Indica un terminale di rete intelligente che non ha memoria di massa. Consente di elaborare in maniera autonoma i dati ma di condividere con altri computer risorse, applicazioni e dati. Neweconomy Nuova forma di economia caratterizzata dall’utilizzo di Internet per la vendita di prodotti e servizi.
Down
- Tipo di diagramma nel quale i dati o le informazioni sono espressi su diversi livelli organizzati gerarchicamente.
- Interfaccia grafica di un software, permette una fruizione più immediata perché utilizza immagini e icone invece di testo scritto.
- Identifica in modo univoco le informazioni presenti su Internet, un indirizzo dal quale si richiamano le informazioni.
- Misura di unità di informazione, corrisponde a 1024 MB.
- Posta elettronica, ossia messaggi inviati tramite computer collegati a Internet.
- Raggruppamento di 8 bit che il computer considera come una singola unità di informazione. Corrisponde a un carattere di scrittura. Viene indicato con la B maiuscola, mentre la b minuscola indica il bit.
- Dizionario dei sinonimi e contrari.
- Dispositivo che consente di acquisire e trasformare in formato digitale immagini a stampa, come foto, e pagine di testo.
- Memoria a sola lettura programmabile e cancellabile.
- E’ un tipo di sistema operativo.
- È la scheda principale dove sono collegati tutti i componenti hardware del computer.
- Software utilizzato dal sistema operativo per gestire un dispositivo hardware. Stampanti, modem, mouse, ecc. devono essere corredati dei driver di installazione per essere riconosciuti e quindi utilizzati dal computer.
- Profilo di un utente che corrisponde ad una casella di posta e a un indirizzo di posta.
- Processo di estrazione dei dati da un database secondo certi criteri. Qwerty Tipo di tastiera diffuso in America, ma anche in Italia; prende il nome dalle prime lettere in alto a sinistra della tastiera.
- È la principale unità di memorizzazione dei dati, in esso vengono memorizzati il sistema operativo, i programmi applicativi, i dati di configurazione del computer e quasi sempre i documenti creati dall’utente. Fisicamente si presenta come un disco metallico, ricoperto di materiale magnetico.
- Collegamento tra un documento e un altro. All’interno di un documento è una zona attiva che permette di passare a un documento collegato.
- Codice segreto per accedere a risorse e informazioni riservate.
37 Clues: È un mini computer tascabile. • E’ un tipo di sistema operativo. • Dizionario dei sinonimi e contrari. • Sistema operativo di dominio pubblico. • Singolo documento di lavoro individuato da un nome. • Memoria a sola lettura programmabile e cancellabile. • Marchio che indica la protezione dei diritti d’autore. • Misura di unità di informazione, corrisponde a 1024 MB. • ...
Top IT trends and risks for 2026 2025-12-29
Across
- The disciplined approach of automating everything that can—and should—be automated.
- A dedicated non-production environment used to stress-test applications before they go live.
- The practice of linking an AI model to a verifiable "source of truth" (like a document library) to prevent errors.
- The ability to see exactly why and when an AI made a specific decision within a workflow for audit purposes.
- The phase where 90% of AI costs now live; the "shock" to the Opex budget.
- Models trained within a company's secure boundary to prevent IP leakage to public LLMs. (2 words)
- A 2026 security posture that uses AI to block threats before they reach the network.
- The old "on-prem" systems that are the hardest to orchestrate.
- Teams where business and IT experts work together on a single project.
- The programmatic "limit" set within a process to ensure an AI agent doesn't exceed its authority.
- The "contract" that allows two software programs to talk to each other.
- The degradation of an AI model's performance over time as real-world data changes.
- The risk of business units deploying unauthorized models, bypassing IT governance. (2 words)
- What a Data Lake becomes when it lacks the governance and connectivity of a Fabric.(2 words)
- The basic unit of text that an LLM processes.
- AI that moves beyond "chat" to independently use tools and execute multi-step business processes.
- The "management" style suited for complex, unpredictable work where AI acts as a co-pilot.
- What AI must be able to redact automatically from documents to ensure privacy (abbr.).
- The consistent data transfer speed you get when you aren't competing for bandwidth with "noisy neighbors."
- The SaaS architecture where each customer has their own dedicated server instance and database, used by Appian. (2 words)
- The "G" in ESG that keeps AI and data within ethical and legal rails.
- An ecosystem of autonomous entities collaborating to solve complex goals.
- The traditional, isolated department that BOAT aims to break down.
- The ability to scale your dedicated resources up or down based on your specific enterprise demand.
- The architectural layer that unifies silos without moving data; the "fuel" for accurate enterprise AI. (2 words)
- When an AI confidently provides a false or nonsensical answer;
- The "deep see" into AI-driven processes to understand why a decision was made.
- The ease of moving workloads because your data and configurations are neatly contained in a single instance.
Down
- The term for generating code via AI without rigorous architectural oversight. (2 words)
- The "O" in BOAT, Gartner’s latest category introduced in late 2025 to unify fragmented automation tools (like RPA, iPaaS, Low-Code, AI Agents) under a single platform for coordinating complex business processes; the coordination of complex systems and workflows.
- The common industry term for AI pilots that never reach production (e.g., "Pilot ____").
- One of Gartner’s 2026 themes focusing on the protection of digital and brand value.
- Logic-based execution required for BOAT workflows where "probabilistic" AI outcomes are too risky.
- The "interest" paid on sub-optimal technology chosen for the sake of speed. (2 words)
- The safety path in a workflow where an AI agent hands off a complex or high-risk case to a human expert.
- The full set of technologies used to build or run an application.
- The primary security benefit of single-tenancy; preventing "noisy neighbors" from impacting your performance.
- The result of "insufficient guardrails," with Gartner predicting 2,000+ AI-related claims by 2026.
- Moving from "Is it working?" to "Is it profitable?" (The 2026 shift).
- The technical "memory" of an AI session; expanding this reduces the need for risky permanent data storage. (2 words)
- The experimental phase that Gartner says 40% of organizations fail to move beyond.
- The high-level security certification often required for government-grade single-tenant clouds.
- The instruction that, if poorly engineered, leads to data leakage or "injection" attacks.
- A type of "Smart Search" that understands user intent and context, not just matching keywords in a database.
- The next wave of AI that doesn't just chat, but takes action autonomously.
- the architecture used to ground LLMs in private company data (abbr.).
- An architecture made of modular, interchangeable "building blocks."
- The ability to move an IT solution from one department to the entire global enterprise.
- A vast pool of raw data that often becomes a "swamp" without governance. (2 words)
- The core entity in a process platform that can now include "Documents," allowing AI to query them like data.
50 Clues: The basic unit of text that an LLM processes. • The old "on-prem" systems that are the hardest to orchestrate. • When an AI confidently provides a false or nonsensical answer; • The full set of technologies used to build or run an application. • The traditional, isolated department that BOAT aims to break down. • ...
Crossword Review 2022-04-27
Across
- the position that a state should be annexed because of ethnicity of prior historical possession. (cc) Unit 4
- the exclusive right to complete control over an area of governance, people, or oneself. (idk) Unit 4
- the process by which a characteristic spreads across space from one place to another over time (vit) Unit 1
- a crop whose genetic structure has been altered to make it more useful and efficient for human purposes. (cc) Unit 5
- a system that accurately determines the precise position of something on Earth (cc) Unit 1
- The diminishing in importance and eventual disappearance of a phenomenon with increasing distance from its origin. (idk) Unit 2
- The subfield of human geography that looks at how cultures vary over space. (idk) Unit 3
- legally adding land area to a country in the world. (cc) unit 4
- the social process of absorbing one cultural group into harmony with another (cc) Unit 3
- crops that are grown without fertilizers and pesticides (cc) Unit 5
- a place that people believe exists as part of their cultural identity (idk) Unit 1
- granting of powers from the central government of a state to government at national, regional, or local level. (vit) Unit 4
- A decision by a corporation to turn over much of the responsibility for production to independent suppliers (vit) Unit 7
- a recognized metropolitan area with a total population in excess of 10 million people (idk) Unit 7
- people who are forced to move--by organized persecution or government pressure. (cc) Unit 2
- the practice of judging a culture by its own standards (idk) Unit 3
- net migration from urban to rural areas in more developed countries (idk) Unit 7
- a computer system that can capture, store, query, analyze, and display geographic data (cc) Unit 1
- a geographical theory that refers to how the price and demand on land changes as the distance towards the CBD (vit) Unit 6
- the system of agriculture found in developed countries (idk) Unit 5
- Moving or directed away from a center or axis. (idk) Unit 4
Down
- the view that the natural environment has a controlling influence over various aspects of human life including cultural development (vit) Unit 3
- has four stages. This is important because this is the way our country and others countries around the world are transformed from a less developed country to a more developed country. (vit) Unit 2
- a method of harvesting or using a resource so that the resource is not depleted or permanently damaged (vit) Unit 5
- Permanent movement compelled usually by cultural factors. (cc) Unit 2
- the reduction in time it takes for something to reach another place (idk) Unit 1
- the process whereby the character of a poor urban area is changed by wealthier people moving in, improving housing, and attracting new businesses, typically displacing current inhabitants in the process. (cc) Unit 6
- The number of people per unit of area of arable land, which is land suitable for agriculture. (idk) Unit 2
- seasonal migration of livestock between mountains and lowland pastures (idk) Unit 5
- The adoption of cultural traits, such as language, by one group under the influence of another. (cc) Unit 3
- the process by which one generation passes culture to the next (idk) Unit 3
- This is the population level that can be supported, given the quantity of food, habitat, water and other life infrastructure present. (idk) Unit 2
- movement which promotes environmentally friendly habits by creating walkable neighborhoods containing a wide range of housing and job types. (cc) Unit 6
- An attitude that tends to unify people and enhance support from a state. (idk) Unit 4
- theory that the physical environment may limit some human actions, but people have the ability to adjust to their environment (idk) unit 1
- A collective term that refers to public works such as a system of highways, railroads, and airports. (idk) Unit 6
- Transfer of business components to a third party for reasons such as cheaper labor and easier access to labor. (idk) Unit 6
- a plot of land on which livestock are fattened for market (idk) Unit 5
- Economic activity that is neither tased nor monitored by a government; and is not included in that governments Gross NAtional Product; as opposed to a formal economy (idk) Unit 7
- dividing an area into zones or sections reserved for different purposes such as residence and business and manufacturing etc (idk) Unit 6
- the cost per unit of production decreases as volume of product increases (cc) Unit 7
- the action or process of regions or areas collecting in mass usually for certain advantages (cc) Unit 7
42 Clues: Moving or directed away from a center or axis. (idk) Unit 4 • legally adding land area to a country in the world. (cc) unit 4 • crops that are grown without fertilizers and pesticides (cc) Unit 5 • the practice of judging a culture by its own standards (idk) Unit 3 • the system of agriculture found in developed countries (idk) Unit 5 • ...
Security 2026-01-12
Across
- A type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- An individual who uses computers, networking, or other skills to overcome a technical problem, often used in the context of someone who gains unauthorized access to systems.
- The act of disguising communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, websites, etc.
- A list of entities approved for authorized access or privileged membership in cyberspace often contrasted with blacklist which identifies entities denied access privileges
- A number of Internet-connected devices, each running one or more bots. Botnets can be used to perform distributed denial-of-service attacks (DDoS), steal data, send spam, and allow the attacker to access the device and its connection.
- An incident where data is unintentionally exposed in a vulnerable system or stolen outright.
- A piece of software, chunk of data, or sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
- In cybersecurity context, this refers to any physical device used for security purposes like authentication tokens which store digital credentials for logging into systems securely.
- A type of malware that misleads users of its true intent, often disguised as legitimate software.
- A type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
- A function that converts an input (or 'message') into a fixed-length string of bytes. Hash functions are used in various applications including digital signatures and password storage.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Virtual Private Network; extends a private network across public networks like the Internet enabling users to send and receive data as if their devices were directly connected to the private network while benefiting from its functionality and security policies.
- A collection of software tools that enable an unauthorized user to gain control over a computer system without being detected.
- The process of converting information or data into a code to prevent unauthorized access.
- The process of verifying the identity of a user or device, often as a prerequisite to allowing access to resources in an information system.
Down
- The act of intercepting and monitoring traffic passing through a digital network.
- A type of attack where the attacker supplies untrusted input into a program. This input is then processed by an interpreter as part of a command or query thereby altering the course of execution of the program.
- The isolation of data files suspected of being infected with malware so they cannot harm your system while you decide whether they should be deleted.
- Distributed Denial of Service; an attack meant to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of Internet traffic from multiple sources.
- A method by which authorized and unauthorized users are able to get around normal security measures and gain high-level user access (root access) on a computer system, network, or software application.
- Secure Sockets Layer / Transport Layer Security; cryptographic protocols designed to provide communications security over a computer network.
- An algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
- Malicious software designed to block access to a computer system until a sum of money is paid.
- An intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy depending on your needs.
- A piece of software designed to update or fix problems with a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs.
- The fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communications.
- A security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- Criminal activities carried out by means of computers or the Internet.
- A standalone malware computer program that replicates itself in order to spread to other computers.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- Multi-Factor Authentication; an authentication method that requires two or more independent credentials for more secure verification.
33 Clues: Criminal activities carried out by means of computers or the Internet. • The act of intercepting and monitoring traffic passing through a digital network. • The process of converting information or data into a code to prevent unauthorized access. • An incident where data is unintentionally exposed in a vulnerable system or stolen outright. • ...
Lexicon 1 - Audriana Griffiths 2019-10-08
Across
- / a refutation or contradiction
- / involving or relating to serious academic study
- / brief evocative description, account, or episode.
- / a word governing, and usually preceding, a noun or pronoun and expressing a relation to another word or element in the clause
- / requiring or involving detailed and specific knowledge or training
- / causing mild amusement because of its oddness or strangeness
- / a previous statement or proposition from which another is inferred or follows as a conclusion
- / having no parallel or equal; exceptional
- / with a feeling of vague or regretful longing.
- / form a theory or conjecture about a subject without firm evidence
- / not claiming attention for oneself
- / a person who writes plays
- / not attempting to impress others with an appearance of greater importance, talent, or culture than is actually possess
- / a medicine or treatment for a disease or injury
- / reformed or reborn, especially in a spiritual or moral sense
- / likely to be the case or to happen
- / very concerned to avoid doing wrong
- / capable of working successfully; feasible.
- / dark or dull in color or tone; gloomy.
- / the official procedure or system of rules governing affairs of state or diplomatic occasions
- / modest about or critical of oneself, especially humorously so
- / the enjoyable recollection of past events
- / deserving censure or condemnation
- / the state of being calm, peaceful, and untroubled
- / with impurities or unwanted elements having been removed by processing
- / a feeling not returned or rewarded
- / person or company that prepares and issues books, journals, music, or other works for sale
- / having or showing high moral standards
- / providing a reflection; capable of reflecting light or other radiation
- / of, resembling, or fit for a monarch, especially in being magnificent or dignified
- / he state or condition of being preoccupied or engrossed with something
- / spreading widely throughout an area or a group of people
- / presented or expressed in a subtle and effective way.
- / not justified or authorized
- / not safe or robust; in poor condition
- / not easily convinced; having doubts or reservation
- / cancel or postpone the punishment
- / done or existing alone
Down
- / extent of the area or subject matter that something deals with or to which it is relevant
- / showing or characterized by quick and inventive verbal humor
- / give or ascribe value or validity to
- / an approach that assesses the truth of meaning of theories or beliefs in terms of the success of their practical application
- / the state or quality of being serious and dignified.
- / skill or expertise in a particular activity or field
- / prove a statement or theory to be wrong or false; disprove
- / the use of humor, irony, exaggeration, or ridicule to expose and criticize people's stupidity or vices, particularly in the context of contemporary politics and other topical issues
- / not intimidated or discouraged by difficulty, danger, or disappointment
- / apparently kind or helpful but betraying a feeling of superiority; condescending
- / attempt to explain or justify (one's own or another's behavior or attitude) with logical, plausible reasons, even if these are not true or appropriate
- / excessive or unrestrained gratification of one's own appetites, desires, or whims
- / take a position of power or importance illegally or by force
- / a trace of something that is disappearing or no longer exists.
- / a reply, especially a sharp or witty one
- / a question, especially one addressed to an official or organization
- / strongly influencing later developments
- / sing or expressing dry, especially mocking, humor
- / that impresses favorably; engaging or attractive
- / the condition of being considered more important than someone or something else; priority in importance, order, or rank
- / relating to or concerned with the interaction of social and economic factors
- / a postulated sequence or development of events.
- / grant or payment made to support a student's education, awarded on the basis of academic or other achievement.
- / childishly sulky or bad-tempered
- / having or showing a lack of proper respect for a sacred person, place, or object
- / sincere but unlikely to be fulfilled
- / vary or extend between specified limits
- / prompted by feelings of tenderness, sadness, or nostalgia
- / a person who is unduly anxious about their health
- / to determine the amount of a certain object
- / feeling or showing deep and solemn respect
- / justify or necessitat
- / make into or regard as a problem requiring a solution
- / offer goods or services at a lower price than a competitor
72 Clues: / justify or necessitat • / done or existing alone • / a person who writes plays • / not justified or authorized • / a refutation or contradiction • / childishly sulky or bad-tempered • / deserving censure or condemnation • / cancel or postpone the punishment • / not claiming attention for oneself • / likely to be the case or to happen • ...
Kendall Coverson P7 2022-05-13
Across
- CC a computer system that can capture, store, query, analyze, and display geographic data
- IDK The temporary and usually repetitive movement of a migrant worker between home and host areas, typically for the purpose of employment.
- VIT the branch of geography that deals with the boundaries, divisions, and possessions of states. This can show the different issues and benefits that come with politics and can help you understand how different boundaries are made.
- VIT the purposeful tending of crops and livestock in order to produce food and fiber. This baseline is able to branch out into different concepts that make up the entire unit.
- CC cities with 10 million or more residents
- VIT A group of belief systems, norms, and values practiced by a people. This is important because it explains the way different groups of people act and allows for a different viewpoint of certain situations.
- IDK The separation of people that occurs “by fact,” rather than by legally imposed requirements.
- CC country with several national groups within their borders, often one group is dominant and controls political, economic, and social power
- VIT A theory that explains the distribution of services, based on the fact that settlements serve as centers of market areas for services. This theory helps explain how cities are planned and even plays into many of the urban models.
- CC national group's homeland has a state of its own and also spreads across its borders into other countries, national group controls political, economic, and social power in its own country and influences other
- IDK a manufacturing technology that serves as the basis of modern economic and social systems in industrialized, standardized mass production and mass consumption.
- CC expenditure of much labor and capital on a piece of land to increase its productivity
- CC the total value of goods produced and services provided in a country during one year.
- IDK minorities are the majority voters in a district; race is often a major factor in determining which party you will vote for.
- IDK attachment or commitment to a person, cause, or belief.
- CC Where small amounts of capital and labor are used in relation to the amount of land being farmed
- CC Average number of children a woman will have during her 'birthing' years
Down
- VIT a model used to represent the movement of high birth and death rates to low birth and death rates as a country develops from a pre-industrial to an industrialized economic system. The model shows the CBR CDR and is able to show what stage a certain country is in and predict where it will go.
- CC the total value of goods produced and services provided by a country during one year, equal to the gross domestic product plus the net income from foreign investments.
- IDK municipal and county planning ordinances that require a given share of new construction to be affordable by people with low to moderate incomes.
- IDK Cost advantages associated with large-scale production.
- CC when people speaking 2 or more languages are in contact, and they combine parts of their languages in a simplified structure and vocabulary
- VIT the branch of geography dealing with how human activity affects or is influenced by the earth's surface. It is the purpose for all the terms in unit 1 and links to the following units.
- CC cities with 20 million or more residents
- CC a language used among speakers of different languages for the purposes of trade and commerce. Can be one language or a mixture.
- IDK an advocate or supporter of free-market capitalism, deregulation, and reduction in government spending.
- VIT the process by which an economy is transformed from a primarily agricultural one to one based on the manufacturing of goods. This is the baseline for unit 7 and shows off how an economy develops.
- IDK relationships between or among two or more people. These links are usually determined by blood relationships
- IDK A cultural viewpoint that is characterized by emphasis on cohesiveness among individuals and prioritization of the group over the individual.
- CC the acquisition of data about Earth's surface from a satellite orbiting Earth or other long-distance methods
- CC Total number of live births in a year for every 1,000 people in the society
- IDK the location of a place relative to other places
- IDK a seasonal periodic movement of pastoralists and their livestock between highland and lowland pastures
- IDK settlements stretched out along a road or river.
- IDK the physical character of a place
35 Clues: IDK the physical character of a place • CC cities with 10 million or more residents • CC cities with 20 million or more residents • IDK the location of a place relative to other places • IDK settlements stretched out along a road or river. • IDK Cost advantages associated with large-scale production. • IDK attachment or commitment to a person, cause, or belief. • ...
Glossary A 2023-10-16
Across
- The one to whom something is addressed; the person, company, or the like to whom a piece of mail is addressed.
- The attributes tab adds flexibility by giving the ability to store specialized information about constituents. Attributes help track the qualities, characteristics, and preferences associated with a constituent.
- Ladder The range that people are asked to donate in appeals - An Ask Ladder is a set of fixed or calculated ask amounts based on a constituent's giving history and included on a response device. A marketing effort can be associated with multiple ask ladders. Example: If a constituent's last gift was $25, the ask ladder could supply prompts in an attempt to increase the value of the next gift by a multiple of 1.5, 2 and 2.5. The ask ladder prompts would be configured to reflect the following amounts: $38, $50 and $63.
- An alias is a secondary identification or acronym used to identify a constituent. For example, an alias for Business Information Systems may be BIS and an alias for a constituent may be a stage name or a birth name. Aliases can be used to search for and access a record.
- Categories Provide a neat package in which the organization can store related information. For example, you may want to track seating preferences for an event. By creating a "Seating Preference" attribute category, you know exactly where to look for this information on the Constituent Record.
- Mailing These are non-segmented, one-off, basic mail solicitations. Appeal can mean one of 3 things: 1. Appeal Mailings - these are non-segmented, basic mail solicitations. 2. Appeals - are a high level way to categorize and group together solicitations (marketing efforts such as mailings, phone calls, etc.) within Blackbaud CRM. 3. Planned Appeals - a required level in the Marketing Planner hierarchy (note: - these are different to the 'Appeals' you set up in the system and are unique to that particular Marketing Plan).
- Analytics and Client Solutions
- Define what a user is allowed to do on a selected section or page. The program supports two action types: section-level actions and page-level actions.
- Fundraisers Assigned Fundraisers can be utilized and added to plans as Team Members for the ask. Examples include but are not limited to Development Officer and/or Planned Giving Officer.
- Status-Opportunity When the opportunity status is accepted, this signifies that the donor has agreed to fund the opportunity. The ask amount should also be updated at this stage to signify the amount accepted.
Down
- List Acquisition lists are files with names and addresses of potential donors (who are not currently constituents) that you (normally) rent or purchase from external vendors. Blackbaud CRM provides the ability to import lists an organization obtains, select and segment these prospect lists, execute marketing efforts via direct mail or email, and track and report responses accordingly. The list is imported for mailing purposes. When a gift is made, the constituent information is brought into Blackbaud CRM. Acquisition lists are cold lists that are managed in house (meaning the organization creates/segments the cold list). Finder File lists are 'cold lists' of potential donors that are vendor managed (meaning, the vendor has segmented the marketing effort and the org simply receives the .csv list to upload as a pre-segmented cold list). See also Finder File.
- Within the revenue record, indicates how the revenue is being distributed across one or many appeals, commitments and designations. For example, if you had a check that was paying off an event registration and also a personal donation, there would be two application lines within the payment record.
- The person who will receive an acknowledgement for a donation.
- A method of solicitation tracked in Blackbaud CRM.
- Advancement Services Management Team
- The best guess at the goal for a particular measure. An allocation is the sum of that measure on the lower items in the hierarchy. The variance is the difference between the two. Icons indicate whether there is a direct match between the assumed and allocated amounts, or whether a variance is positive or negative. As an example, say a Budget Amount is being established for a campaign/appeal hierarchy. For the campaign, set the Budget Amount assumption at $10,000. Then add three appeals, each with its own Budget Amount; $5,000, $3,000 and $1,000. You are allocating portions of the $10,000 assumed campaign budget to the appeals. For this campaign, the Budget Amount Assumption is $10,000, the Budget Amount Allocation is $9,000 ($5,000+$3,000+$1,000); therefore, the Budget Amount Variance is $1000 ($10,000-$9,000).
- A correction to the constituent, coding, amount, or type (e.g. hard credit to recognition credit) of a donation. Adjustments can be presented by donors or internal staff.
- Query The ability to obtain a precise request for information (upon request). By creating queries you can select, group, and list records that meet a set of conditions you define. Ad-hoc queries serve two main purposes. They are a quick way to see data filtered to your needs and they enable you to produce selections for use in other processes throughout the program. Selections are a named set of IDs for the same record type.
18 Clues: Analytics and Client Solutions • Advancement Services Management Team • A method of solicitation tracked in Blackbaud CRM. • The person who will receive an acknowledgement for a donation. • The one to whom something is addressed; the person, company, or the like to whom a piece of mail is addressed. • ...
More CSS 2023-11-06
Across
- A CSS property that defines the gap between each grid row and column.
- A CSS rule that contains a keyframe list.
- A CSS property that sets the initial length of a flex item.
- A CSS function that creates an ellipse-shaped gradient that beigns with color1 in the center and ends with color2 on the perimeter.
- An HTML element that has the CSS property display set to grid to create a block-level grid container or inline-gird to create an inline grid container.
- A CSS property used to control a widget's appearance based on the operating system's theme.
- A CSS position property value that positions an HTML element relative to the viewport in a fixed location.
- A CSS property controls the speed of a transition.
- An element that has the CSS property display set to 'flex' to create a block-level flex container or inline-flex to create an inline flex container.
- A web browser designed for mobile devices that can display web pages using HTML, CSS, and JavaScript.
- A set of extensions to CSS that allow properties to use variables, arithmetic, and functions.
- A CSS property that defines the height of each row.
- A combination of media type and optionally one or more media feature expressions that evaluate to true or false.
- A popular CSS preprocessor that uses CSS-like syntax to build complex CSS stylesheets.
- A CSS layout mode that provides an efficient way to lay out elements in a container so the elements behave predictably when the container is resized for viewed on different screen sizes.
- A CSS property that gives developers more control over where HTML elements should appear in the browser.
- A CSS property that defines the direction of flex items within the container.
- A CSS property that renders an HTML element's border using sections of an image.
- When web developers design the desktop website first and modify the design to fit smaller screens.
Down
- A website that is designed for mobile devices with smaller screen sizes and touch interfaces.
- Transforms an HTML element's styles over a set time period, producing an animation.
- A prefix added to an experimental or nonstandard CSS property that only works on a specific browser type.
- A CSS property used to round the corners of an HTML element.
- A CSS position property value that positions the element relative to the element's default position.
- A shorthand CSS property that specifies flex-grow, flex-shrink, and flex-basis values together.
- A CSS property that applies a 2D or 3D transformation to an element.
- A website that adapts to the width of the browser at specific widths.
- An HTML elements default positioning.
- A CSS property used to specify a relative distance that orders the appearance of elements.
- A "mobile first" design methodology that begins with designing the website for the smallest device and then adapts the design for larger screens.
- A CSS property that adds a shadow to the box around an HTML element.
- A CSS property that horizontally aligns the grid items inside the grid container using different values.
- A CSS property that adds a shadow to text. It accepts four values: offset-x, offset-y, blur-radius, and color.
- The visible area of a web page.
- A CSS position property value that positions an HTML element relative to the nearest positioned ancestor.
- A layout that allows page contents to fill the browser, sometimes by using percentages for widths.
- A CSS property that defines the grid container's number of columns and optionally the width of each column.
- A CSS function that creates a linear gradient that transitions from color1 to color2 when moving from the top edge to the bottom edge.
- One of the most popular free, open-source frameworks (used by Quizzets :). It uses HTML, CSS, and JavaScript to help a developer create responsive websites.
- A CSS layout mode that divides a web page into a rectangular grid in which to position page elements.
- The web server sends back the same HTML to both desktop and mobile browsers, but the browsers alter the appearance of the web page to match the device size.
- The screen width that activates a media query.
- A CSS property that sets a proportion that determines the item's minimum size.
- A web server that sends back a desktop version to desktop browsers and a mobile version to mobile browsers.
- A CSS property that sets a proportion that determines how much of the available container space should be assigned to the item.
- The use of a fixed-width container to envelop web page contents.
- A named list that contains the keyframes or the properties and values that will be animated.
- Animates an HTML element's transition from one state to another when an element's CSS property changes value.
48 Clues: The visible area of a web page. • An HTML elements default positioning. • A CSS rule that contains a keyframe list. • The screen width that activates a media query. • A CSS property controls the speed of a transition. • A CSS property that defines the height of each row. • A CSS property that sets the initial length of a flex item. • ...
кроссворд 2023-03-14
Across
- - a technology that allows multiple operating systems or applications to run on a single physical computer. (виртуализация - технология, позволяющая нескольким операционным системам или приложениям работать на одном физическом компьютере)
- - File, document that was attached to the message, post ( Аттач - Файл, документ, который был прикреплен к сообщению, публикация)
- (Graphical User Interface) - a visual interface that allows users to interact with software applications using graphical elements such as icons, menus, and buttons. (графический интерфейс пользователя - визуальный интерфейс, который позволяет пользователям взаимодействовать с программными приложениями, используя графические элементы, такие как иконки, меню и кнопки)
- – a collection of professional words and stable expressions in a separate field. (Глоссарий - Набор профессиональных слов и устойчивых выражений в отдельной области)
- - a group of interconnected devices and computers that are able to communicate and share resources. (сеть - группа взаимосвязанных устройств и компьютеров, которые могут обмениваться информацией и ресурсами)
- - a specific word or phrase that is used to search for information on a search engine or within code to define functionality. (ключевое слово - определенное слово или фраза, которые используются для поиска информации в поисковике или внутри кода для определения функциональности)
- - a set of instructions that a computer program follows to solve a problem. (алгоритм - набор инструкций, которые следует компьютерная программа для решения задачи)
- - A rebus during registration or authorization, which helps to distinguish a person from a robot (Капча - Ребус при регистрации или авторизации, который помогает отличить человека от робота)
- (Application Programming Interface) - a set of protocols, routines, and tools used for building software applications and enabling them to communicate with each other. (API - набор протоколов, процедур и инструментов, используемых для создания программных приложений и обеспечения их взаимодействия друг с другом)
- - a file format used for data compression and archiving. (ZIP - формат файлов, используемый для сжатия данных и архивирования)
- - a networking device that forwards data packets between computer networks. (роутер - сетевое устройство, которое пересылает пакеты данных между компьютерными сетями)
- - A small fragment, a temporary addition to the code (Патч - Небольшой фрагмент, временное дополнение к коду)
- (Hypertext Markup Language) - a standard markup language used to create and structure content on the web, including text, images, and multimedia. (HTML - язык разметки гипертекста, используемый для создания и структурирования содержимого в Интернете, включая текст, изображения и мультимедиа)
Down
- (YAML Ain't Markup Language) - a human-readable data serialization language that is often used for configuration files in software applications. (YAML - язык сериализации данных, читаемый человеком, который часто используется для файлов конфигурации в программных приложениях)
- - Adaptive website design, in which the interface automatically adjusts to the screen of a computer, laptop or smartphone ( Адабтив - Адаптивный дизайн сайта, при котором интерфейс автоматически подстраивается под экран компьютера, ноутбука или смартфона)
- - A graphic image describing the feelings, character traits, and emotions of a user on web forums (Бигбар - Графическое изображение, описывающее чувства, черты характера, эмоции пользователя на веб-форумах)
- - the part of a software application or website that runs on the server and is responsible for managing data and responding to requests from the front-end. (бэкэнд - часть программного приложения или веб-сайта, которая работает на сервере и отвечает за управление данными и обработку запросов от фронт-энда)
- (Extensible Markup Language) - a markup language that is used to encode documents in a format that can be read by both humans and machines. (XML - расширяемый язык разметки, который используется для кодирования документов в формате, который может быть прочитан как людьми, так и машинами)
- (Uniform Resource Locator) - a unique address used to locate a resource on the internet, such as a website or file. (URL - уникальный адрес, используемый для нахождения ресурса в Интернете)
- - data transfer rate: bits per second. (Битрейт-Скорость передачи данных: биты в секунду.)
- - a request for information from a database or search engine using specific search criteria. (запрос - запрос на получение информации из базы данных или поисковика с использованием конкретных критериев поиска)
- (Secure Sockets Layer) - a protocol used to establish secure connections between web browsers and servers. (SSL - протокол, используемый для установления безопасных соединений между веб-браузерами и серверами)
- - acceleration, performance improvement. (Буст - ускорение, повышение производительности.)
- - the process of converting plain text into a coded format to ensure the security and confidentiality of information. (шифрование - процесс преобразования обычного текста в зашифрованный формат для обеспечения безопасности и конфиденциальности информации)
- - a structured collection of data stored on a computer system, organized in a way that allows for efficient retrieval and manipulation of that data. (база данных - структурированная коллекция данных, хранящихся в компьютерной системе, организованная таким образом, чтобы обеспечить эффективный доступ и управление этими данными)
- - a network security system that monitors and controls incoming and outgoing network traffic based on predefined security rules. (брандмауэр - средство защиты сети, которое контролирует входящий и исходящий сетевой трафик на основе заранее определенных правил безопасности)
26 Clues: - data transfer rate: bits per second. (Битрейт-Скорость передачи данных: биты в секунду.) • - acceleration, performance improvement. (Буст - ускорение, повышение производительности.) • - A small fragment, a temporary addition to the code (Патч - Небольшой фрагмент, временное дополнение к коду) • ...
