types of computer Crossword Puzzles
Anatomy of a Computer_Lilly's 2022-02-16
Across
- This chip is activated when you turn on the computer and performs the system check before the OS starts.
- Is where data relating to an opened program is stored. It is also part of the storage function of a computer.
- A place to connect older keyboards and mice, but is usually left free.
- Is the input/output of audio and audio quality. Often integrated into the motherboard.
- Older printers or scanners connect to the device using this port.
- Used to connect peripherals to the computer to transfer data. (Peripherals like, modern printers, and PDAs)
Down
- Main circuit board that holds most of the computer's components and directs data to appropriate device
- Used to port transfer data really fast. Can be used to connect different types of peripherals.
- This is where the graphic card is held, which supplies the image for the monitor.
- It brings power to each device in the computer.
- The brain of the computer. (Carries out the instruction from the computer).
- This is where mice and keyboards plug-in to the computer.
- Are slots that let the peripherals communicate quickly with the processor.
13 Clues: It brings power to each device in the computer. • This is where mice and keyboards plug-in to the computer. • Older printers or scanners connect to the device using this port. • A place to connect older keyboards and mice, but is usually left free. • Are slots that let the peripherals communicate quickly with the processor. • ...
Unit 1 and 2 Vocab 2023-08-24
Across
- test your prototype solutions and refine until you come up with the final version
- Learn about your target audience
- It’s what the computer uses to process and transform information. Also known as the CPU (central processing unit)
Down
- construct rough drafts or sketches of your ideas
- (hard drive) - The computer’s long-term memory
- understand and identify your audience's problem and need
- brainstorm several possible creative solutions
- How a computer takes in information from the world
- How a computer displays or communicates information
- How the computer remembers things. There are two types of memory
- (random access memory) -The computer’s shortterm memory
11 Clues: Learn about your target audience • (hard drive) - The computer’s long-term memory • brainstorm several possible creative solutions • construct rough drafts or sketches of your ideas • How a computer takes in information from the world • How a computer displays or communicates information • understand and identify your audience's problem and need • ...
CE2017 - Chapter 7_Secondary Storage 2016-10-17
Across
- Bumpy areas on optical disk that represents binary digits
- enhances organizational security
- A particular amount to hold.
- A service for online storage
- Can be caused by particles on the disk
- The time it takes to store data
- Turn the computer off and it keeps working
- No moving parts
- Dedicated computer
- located inside the system unit
- Arranged tightly.
- Invisible circles
Down
- Flat are that represents binary digits
- uses reflected light representing binary digits
- Storage are for processing
- Call for plans of recovery, preparations, and prevention
- runs through stacks of platters
- Two types
- Can only be used once
- Links remotecomputer storage devices to computers
- Data and programs are held here.
- Temporary high-speed holding that utilizies storage device & CPU
- Divides tracks on disc
23 Clues: Two types • No moving parts • Arranged tightly. • Invisible circles • Dedicated computer • Can only be used once • Divides tracks on disc • Storage are for processing • A particular amount to hold. • A service for online storage • located inside the system unit • runs through stacks of platters • The time it takes to store data • enhances organizational security • ...
Caitlin Slonecker: Vocab Assignment 2014-01-30
Across
- an exceptional address for a file that is available on the Internet
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web
- denoting software for which the original source code is made freely available and may be redistributed and modified
- a data storage device that is very fast but causes the loss of information and data when the computer is turned off
- a message given to a web browser by a web server
- a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
- the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals
- a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted
- the working surface of a desk
- connection point on computers and many other types of consumer electronics
- the processor of your computer
- a standard technology for managing the names of Web sites and other Internet domains
- connect as or operate with a network
Down
- a computer or computer program that manages access to a centralized resource or service in a network
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit
- group of binary digits or bits (usually eight) operated on as a unit
- instructions to the hardware, tells it what, and how to do it
- peripheral device
- a CD that can be read by a computer with an optical drive
- parts of the computer you can touch
- a pre selected option adopted by a computer program or other mechanism when no alternative is specified by the user or programmer
- the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer
- a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network
- a bootstrapping process that starts operating systems when the user turns on a computer system
- a coding system using the binary digits 0 and 1 to represent a letter, digit, or other character in a computer or other electronic device
- a desktop computer or workstation that is capable of obtaining information and applications from a server
- a service (most of the time paid for) which allows you to connect to the Internet.
- a collection of items of the same type stored in a hidden or inaccessible place
- a set of computer instructions in firmware that control input and output operations
29 Clues: peripheral device • the working surface of a desk • the processor of your computer • parts of the computer you can touch • connect as or operate with a network • a message given to a web browser by a web server • a CD that can be read by a computer with an optical drive • instructions to the hardware, tells it what, and how to do it • ...
NETWORKING CONCEPT AND CYBER ETHICS 2025-05-28
Across
- _________ topology is connected in circular path .
- ______ refers to unwanted bulk email .
- A digital footprint is also known as .
- Each computer in a network is called a .
- ________ spam filtering / blocking software .
- A _____ is a network device that is used to connect all the computers in a network with each other .
- Hacking , which is done for a good ~cause , such as national security , is known as .
- A computer ___________ can be as a group of computers .
Down
- ___________ refers to criminal activities .
- _____________ refers to an illegal intrusion into a computer system or network .
- Use ____________ marks around the quoted words of another person to avoid plagiarism .
- A network maintained without using wires is called a ___________ network .
- What is the short form of Local Area Network ?
- A ________ is a device that connects two different types of networks with each other .
- To _________ plagiarism , one can rephrase the material .
- A __________ similar to a hub .
- _____ is a network created for an individual person .
- What is the short form of Information and communication technology ?
18 Clues: A __________ similar to a hub . • ______ refers to unwanted bulk email . • A digital footprint is also known as . • Each computer in a network is called a . • ___________ refers to criminal activities . • ________ spam filtering / blocking software . • What is the short form of Local Area Network ? • _________ topology is connected in circular path . • ...
NETWORKING CONCEPTS AND CYBER ETHICS . 2025-05-28
Across
- ________ spam filtering / blocking software .
- ___________ refers to criminal activities .
- A _____ is a network device that is used to connect all the computers in a network with each other .
- Use ____________ marks around the quoted words of another person to avoid plagiarism .
- A computer ___________ can be as a group of computers .
- _____________ refers to an illegal intrusion into a computer system or network .
- A network maintained without using wires is called a ___________ network .
- A digital footprint is also known as .
- What is the short form of Local Area Network ?
Down
- _________ topology is connected in circular path .
- Hacking , which is done for a good ~cause , such as national security , is known as .
- What is the short form of Information and communication technology ?
- _____ is a network created for an individual person .
- A ________ is a device that connects two different types of networks with each other .
- A __________ similar to a hub .
- To _________ plagiarism , one can rephrase the material .
- Each computer in a network is called a .
- ______ refers to unwanted bulk email .
18 Clues: A __________ similar to a hub . • A digital footprint is also known as . • ______ refers to unwanted bulk email . • Each computer in a network is called a . • ___________ refers to criminal activities . • ________ spam filtering / blocking software . • What is the short form of Local Area Network ? • _________ topology is connected in circular path . • ...
NETWORKING CONCEPT AND CYBER ETHICS 2025-05-28
Across
- _________ topology is connected in circular path .
- ______ refers to unwanted bulk email .
- A digital footprint is also known as .
- Each computer in a network is called a .
- ________ spam filtering / blocking software .
- A _____ is a network device that is used to connect all the computers in a network with each other .
- Hacking , which is done for a good ~cause , such as national security , is known as .
- A computer ___________ can be as a group of computers .
Down
- ___________ refers to criminal activities .
- _____________ refers to an illegal intrusion into a computer system or network .
- Use ____________ marks around the quoted words of another person to avoid plagiarism .
- A network maintained without using wires is called a ___________ network .
- What is the short form of Local Area Network ?
- A ________ is a device that connects two different types of networks with each other .
- To _________ plagiarism , one can rephrase the material .
- A __________ similar to a hub .
- _____ is a network created for an individual person .
- What is the short form of Information and communication technology ?
18 Clues: A __________ similar to a hub . • ______ refers to unwanted bulk email . • A digital footprint is also known as . • Each computer in a network is called a . • ___________ refers to criminal activities . • ________ spam filtering / blocking software . • What is the short form of Local Area Network ? • _________ topology is connected in circular path . • ...
Network requirements 2021-11-13
Across
- a local network is a tiny network that is limited to a certain location.
- ensures that your computer has enough room to read and write data so that the CPU can find it fast and easily
- a piece of software or hardware that prevents specific types of communication from passing through.
- basic portion of domain names such as howtogeek.com and google.com
- address on a network, a numerical address that relates to your computer.
- is a collection of data structured in such a way that a computer application may easily access specific data.
- a device's hardware address when linked to a shared network.
- various methods of communication over the Internet.
- how computers translate human-readable domain names and hostnames into IP addresses
Down
- a device that connects networks by routing traffic
- a gadget that sends and receives traffic
- an Internet-based way of sharing files between computers
- connected network technology that is nearly universally used today
- the quantity of data that may be communicated over a network at any one moment is measured in bytes.
- a standard that allows a LAN to utilize a single IP address for Internet connections and a group of IP addresses for internal traffic.
- a collection of data structured in such a way that a computer application may easily access specific data.
- part of an Internet address
- a programming language for building web pages
- is a protocol that allows a server on a local network to issue a computer or other network device a temporary IP address.
- the portion of a computer that controls and monitors all activities and calculations.
20 Clues: part of an Internet address • a gadget that sends and receives traffic • a programming language for building web pages • a device that connects networks by routing traffic • various methods of communication over the Internet. • an Internet-based way of sharing files between computers • a device's hardware address when linked to a shared network. • ...
Quiz #3 2023-11-14
Across
- Everything on the storage medium is encrypted
- Rights of individuals and companies to control how information about them is collected and used
- use of computers or other types of digital equipment to make illegal copies documents
- hardware is stolen from an individual or an organization
- complete malfunction of a computer system
- Provide continuous power to a computer system
- State of being concealed or free from unauthorized intrusion
- Dictates how supplied information may be used, but can be changed without notice
- Sellers install unlicensed copies on computers sold to consumers
Down
- Using electronic means to collect a variety of in-depth information about an individual
- Unauthorized copying of a computer program
- Collection of data about people, used for marketing purposes
- Used to monitor employees
- Unsolicited, bulk e-mail sent over the Internet
- Technology that causes the device to self-destruct
15 Clues: Used to monitor employees • complete malfunction of a computer system • Unauthorized copying of a computer program • Everything on the storage medium is encrypted • Provide continuous power to a computer system • Unsolicited, bulk e-mail sent over the Internet • Technology that causes the device to self-destruct • ...
Technology and society crossword by Castellani Davide 2020-10-23
Across
- Something really good that you have succeeded in doing
- A program used to create, debug, maintain, ...
- CS: computer ...
- Verbal, non-verbal, written and visual are types of ...
- A machine controlled by a computer
- An important change in what people do or think
- The application of some knowledge (eg. scientific) for practical purposes
- Something that can help you to make more and better
- Organised group of people
Down
- Get something better
- A term that refers to making more
- The "I" of ICT stands for ...
- Collaboration
- New idea or the use or a new idea
- A way to do something
15 Clues: Collaboration • CS: computer ... • Get something better • A way to do something • Organised group of people • The "I" of ICT stands for ... • A term that refers to making more • New idea or the use or a new idea • A machine controlled by a computer • A program used to create, debug, maintain, ... • An important change in what people do or think • ...
Andrew's crossword 2015-11-17
Across
- it is the high speed memory
- the speed at which instructions are executed
- a logical organization of how various parts are connected
- Northbridge and south bridge combined
- does simple operations
- thin layers of copper or aluminum foil
Down
- carries out the instructions of the computer program
- slots most common types of connections are IDE and SATA
- contains the cpu
- a interface between the cpu the main memory and other components
- contains the firmware or startup instructions for the computer system
- distributes power to components
- controls the input and output
- a slot for a video or graphic cards
- how a cpu represents numbers
15 Clues: contains the cpu • does simple operations • it is the high speed memory • how a cpu represents numbers • controls the input and output • distributes power to components • a slot for a video or graphic cards • Northbridge and south bridge combined • thin layers of copper or aluminum foil • the speed at which instructions are executed • ...
2015 Lab Week Crossword 2015-02-27
Across
- Very resistant Staph aureus
- Bacteria that live without oxygen
- Makes the blood red
- Deals with blood products
- An STD
- Laboratory information system
- Grave's disease and Rheumatiod arthritis are types
- HDL and LDL are types
- Reference laboratory
- White blood cells
- Used to standardize analyzers
- Dell is a type of
- Na
- German Measels
Down
- Worn by technologists
- Histology preservative
- Anticoagulant
- Clear portion of blood
- Device used to count blood cells
- Tick borne infection
- Lab that stains tissue sections
- Liquid that colors material on slides
- Device used in phlebotomy
- Venipunture tubes
- Self blood donation
- Dr. Oiseth is one
- Stain used in histology
- Immature red blood cells
- Medicine used to kill bacteria
- Gen Lab instrument
- Causes infection
- Antibody identified in blood bank
32 Clues: Na • An STD • Anticoagulant • German Measels • Causes infection • Venipunture tubes • Dr. Oiseth is one • White blood cells • Dell is a type of • Gen Lab instrument • Makes the blood red • Self blood donation • Tick borne infection • Reference laboratory • Worn by technologists • HDL and LDL are types • Histology preservative • Clear portion of blood • Stain used in histology • Immature red blood cells • ...
Computer Science and Coding Basics 2022-03-01
Across
- A series of memory locations or 'boxes' where each 'box' holds a single piece of data, but all share the same name
- A person who creates a set of instructions for a computer by writing and testing code
- An imaginary pen that can be given drawing commands such as 'move forward' or 'turn right'
- A large and important family of error-correcting codes that encode data in blocks
- A programmer-readable explanation or annotation in the code of a computer program
- The act of setting a certain key on the keyboard to perform a function when being pressed
- The result of bad code in a program
- a "chunk" of code that you can use over and over again, rather than writing it out multiple times
- A set of directions/instructions for your computer
- conditional statements that tell the computer what to do with certain information
Down
- Characters, strings, integers, and booleans are all types of what?
- An object in your program that can perform actions
- a set of coded instructions that tell a computer how to run a program or calculation
- A coding language that is beginner friendly
- The process of detecting and removing existing and potential errors
- A sequence of instructions that is continually repeated until a certain condition is reached
- This logic is a form of algebra where values can only be either true or false
- How we communicate with computers
- Where values and functions can be accessed
19 Clues: How we communicate with computers • The result of bad code in a program • Where values and functions can be accessed • A coding language that is beginner friendly • An object in your program that can perform actions • A set of directions/instructions for your computer • Characters, strings, integers, and booleans are all types of what? • ...
ITV 2019-09-05
Across
- PLACE WHERE THE ACTUAL FUNCTIONALITY IS IMPLEMENTED.
- ALLOWS TO USER WRITE LETTERS,CREATE OTHER TYPES OF DOCUMENTS.
- WHEN A PROGRAM DISPLAYS A MESSAGE AND PAUSES FOR THE USER TO TYPE SOME INPUT TO THE PROGRAM.
- YOUR SYSTEMS SHORT TERM MEMORY.
- READS SOURCE CODE OF THE PROGRAM AS WRITTEN BY THE PROGRAMMERS.
- PART OF THE CPU THAT HANDLES MATH OPERATIONS.
- A PROGRAM IN HIGH LEVEL LANGUAGE.
- A COMPUTER FILE THAT CONTAINS TEXT,AND HAS A NAME THAT IDENTIFIES IT.
Down
- PHYSICAL DEVICES WHICH MAKE UP THE COMPUTER AND ITS PERIPHERALS.
- PROPERTY OF A PROGRAM THAT CAN RUN ON MORE THAN ONE KIND OF COMPUTER.
- AN ERROR IN A PROGRAM THAT MAKES IT DO SOMETHING OTHER THAN WHAT THE PROGRAM INTENDED.
- ALLOWS USER TO INTERACT WITH AND PERFORM OPERATIONS ON A SYSTEM,PROGRAM OR OTHER DEVICES.
- HIGH LEVEL PROGRAMMING LANGUAGE DESIGNED BY GUIDO VAN ROSSUM,RELEASED IN 1991.
- ANY TYPE OF SOFTWARE THAT IS DESIGNED TO DAMAGE YOUR COMPUTER OR GAIN UNAUTHORIZED ACCESS.
- TRANSLATING A SOURCE CODE INTO MACHINE LANGUAGE.
15 Clues: YOUR SYSTEMS SHORT TERM MEMORY. • A PROGRAM IN HIGH LEVEL LANGUAGE. • PART OF THE CPU THAT HANDLES MATH OPERATIONS. • TRANSLATING A SOURCE CODE INTO MACHINE LANGUAGE. • PLACE WHERE THE ACTUAL FUNCTIONALITY IS IMPLEMENTED. • ALLOWS TO USER WRITE LETTERS,CREATE OTHER TYPES OF DOCUMENTS. • READS SOURCE CODE OF THE PROGRAM AS WRITTEN BY THE PROGRAMMERS. • ...
Computers and Coding 2025-04-17
Across
- Program large, frequently run program the virus is attached to
- malicious activity a computer virus or worm is designed to perform
- anything in quotes; a string can contain words, letters, sentences, or symbols
- act of a computer virus attaching itself to another computer program
- set of computer programs designed to enable computers to accomplish certain tasks; major types of software include programming software, system software and application software
- malicious computer program created by a user with objectives to harm or steal another’s property
- numbers that do not have decimal or fractional parts in them; integers appear blue and are not surrounded by quotes
Down
- notes written in the code that the computer will completely ignore
- physical parts of a computer, such as the hard drive, video card, monitor and other substantial computer parts
- a name that stores a value
- information given to a command that indicates how it should be done
11 Clues: a name that stores a value • Program large, frequently run program the virus is attached to • notes written in the code that the computer will completely ignore • malicious activity a computer virus or worm is designed to perform • information given to a command that indicates how it should be done • ...
Anatomy of A Computer 2020-02-18
Across
- used for connecting keyboards and mice to a PC compatible computer system
- interconnection system between a microprocessor and attached devices
- used to connect a computer to devices
- point-to-point channel for attaching a video card to a computer system
- can use it to connect many different types of peripherals
- funnels power through the multicolored cables
- form of computer memory that can be read and changed in any order CPI the brain of the computer
Down
- main printed circuit board found in general computers
- internal expansion card that provides input and output of audio signals to and from a computer
- connector for a device that sends or receives several bits of data by using more than one wire.
10 Clues: used to connect a computer to devices • funnels power through the multicolored cables • main printed circuit board found in general computers • can use it to connect many different types of peripherals • interconnection system between a microprocessor and attached devices • point-to-point channel for attaching a video card to a computer system • ...
Cloud Computing 2025-03-31
Across
- The main pro of cloud computing is what per use
- Structured data held in a computer
- Saved digital data
- The combination of both types of clouds mixed together
- The cloud that stores resources
Down
- Storage made for portable devices
- The on-demand availability of computer system resources is this type of computing
- A reliable group of computer services that does not share information openly
- One of the major cons in cloud computing is security what
- Hardware that helps other programs function
10 Clues: Saved digital data • The cloud that stores resources • Storage made for portable devices • Structured data held in a computer • Hardware that helps other programs function • The main pro of cloud computing is what per use • The combination of both types of clouds mixed together • One of the major cons in cloud computing is security what • ...
Cloud Computing 2025-03-31
Across
- The main pro of cloud computing is what per use
- Structured data held in a computer
- Saved digital data
- The combination of both types of clouds mixed together
- The cloud that stores resources
Down
- Storage made for portable devices
- The on-demand availability of computer system resources is this type of computing
- A reliable group of computer services that does not share information openly
- One of the major cons in cloud computing is security what
- Hardware that helps other programs function
10 Clues: Saved digital data • The cloud that stores resources • Storage made for portable devices • Structured data held in a computer • Hardware that helps other programs function • The main pro of cloud computing is what per use • The combination of both types of clouds mixed together • One of the major cons in cloud computing is security what • ...
NETWORKING CONCEPS PUZZLE 2025-06-07
Across
- Short form of" Local Area Network".
- Common example of WAN.
- Each computers in a network.
- Something similar to Hub.
- Topology where all nodes are connected in a circular manner.
- Short form of 'Wide Area Network".
- Topology that connects devices to central hub or switch.
- Topology that can handle large volume of data traffic.
Down
- Computer network enables two or more computers to share.
- It is the network larger than LAN.
- Topology that requires a single communication line or one main cable.
- Network card used most commonly.
- An address format for communication.
- A computer network created for an individual.
- Network Topologies are categorised into how many types ?
- It connects two different networks.
16 Clues: Common example of WAN. • Something similar to Hub. • Each computers in a network. • Network card used most commonly. • It is the network larger than LAN. • Short form of 'Wide Area Network". • Short form of" Local Area Network". • It connects two different networks. • An address format for communication. • A computer network created for an individual. • ...
FIT E: Technology Vocab 2013-05-16
Across
- is made up of 1000 gigabytes
- the wiring in your computer
- is made up of 1000 zetabytes
- a type of booklet that advertises a company's products
- a company's symbol or graphic design
- the location where you can put in a disc
- the location on your computer where you can plug in your peripherals
- any type of attachment you can plug in your computer
- a type of program that allows you to receive internet
- anything that is sent out of a computer
- a informational paper about you and your history, usually made for a job
- the privacy and security of yourself on the internet
- is made up of 1000 bits
- is made up of 1000 petabytes
- is made up of 1000 bytes
- a type of search engine that searches all types of other search engine
- the main center of your computer where all the data goes
Down
- a program that allows you to search the web
- anything that has to do with the internet
- the device you use to operate your desktop
- is made up of 1000 yottabytes
- the act of spreading public notice for your product
- the brain of your computer, where all the data is stored
- the term used for a picture or graphic image that is made up by numbers
- a zoomable presentation program
- is made up of 1000 exabytes
- the screen of your computer
- anything that you plug in your computer
- a company's words or phrase that is advertised
- is made up of 1000 terabytes
- a program where you can access any type of media or internet wirelessly
- is made up of 1000 kilobytes
- is made up of 1000 brontobytes
- a portable electronic device that is wireless
- the location on your cmputer where you can plug in your headphones or earbuds
- the place where you can save files off of any type of device
- is made up of 1000 megabytes
- the smallest amount of storage you can have
38 Clues: is made up of 1000 bits • is made up of 1000 bytes • the wiring in your computer • is made up of 1000 exabytes • the screen of your computer • is made up of 1000 gigabytes • is made up of 1000 zetabytes • is made up of 1000 terabytes • is made up of 1000 kilobytes • is made up of 1000 petabytes • is made up of 1000 megabytes • is made up of 1000 yottabytes • ...
The Anatomy of a Computer 2021-02-08
Across
- it connect a mouse and keyboard to the computer.
- you can connect printers and scanners to it.
- it temporally stores data.
- it is a basic input and output system.
- it channel the parts of the computer with power.
- a firewire can connect to lots of different types of peripherals like a digital camera
- the place that holds your graphics card that gives the image to your monitor.
- it gives you better sound quality and integrated into the motherboard
- it can transfer data and some can draw power from the computer.
Down
- it's an older version of a USB and you can connect older input devices to it.
- slots that connect to the processor.
- it directs the data and holds the most of the computer's components.
- the part of the computer that controls the instructions
13 Clues: it temporally stores data. • slots that connect to the processor. • it is a basic input and output system. • you can connect printers and scanners to it. • it connect a mouse and keyboard to the computer. • it channel the parts of the computer with power. • the part of the computer that controls the instructions • ...
Online Safety 2015-11-17
Across
- The name a user selects to be identified on a computer, on a network, or in an online gaming forum.
- Crime in which someone obtains the vital information(ie credit card, social security number, bank account info) of someone, usually to steal money.
- To upload information to the Web.
- Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
- A program that lets you find, see, and hear material on web pages.
- A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer.
- specific features or software that allow parents to manage the online activities of children.
- To send information from your computer to another computer.
- A scam that involves sending a fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
- A secret word or number that must be used to gain access to an online service or to modify software, such as a parental control.
Down
- Software products that allow parents to monitor or track the websites or e-mail messages that a child visits or reads.
- A tracking feature of Internet browsers that shows all the recent websites visited.
- Allows you to block certain types of content from being displayed.
- A form of malicious code that displays unsolicited advertising on your computer.
- An electronic mail message sent from one computer or mobile device to another computer or mobile device.
- A program, or set of instructions, that runs on a computer.
- malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—designed to damage the computer or collect information.
- To copy a file from one computer system to another via the internet (usually your computer or mobile device).
- Software that attempts to block malicious programs/code/software (called viruses or malware) from harming your computer.
- A piece of information about your visit to a website that some websites record automatically on your computer.
- A wide variety of software installed on people’s computers, collects info about you without your knowledge and sends it to whoever wrote the program.
- A self-replicating program that typically arrives through e-mail or downloads and multiplies on the hard drive, quickly exhausting the computer’s memory.
- Any unsolicited e-mail, or junk mail. Internet service Providers, e-mail software, and other software can help block some, but not all, spam.
23 Clues: To upload information to the Web. • A program, or set of instructions, that runs on a computer. • To send information from your computer to another computer. • Allows you to block certain types of content from being displayed. • A program that lets you find, see, and hear material on web pages. • ...
The Anatomy of a Computer 2021-02-08
Across
- it's an older version of a USB and you can connect older input devices to it.
- you can connect printers and scanners to it.
- it is a basic input and output system.
- the place that holds your graphics card that gives the image to your monitor.
- it temporally stores data.
- it gives you better sound quality and integrated into the motherboard
- it can transfer data and some can draw power from the computer.
Down
- a firewire can connect to lots of different types of peripherals like a digital camera
- it directs the data and holds the most of the computer's components.
- slots that connect to the processor.
- it channel the parts of the computer with power.
- it connect a mouse and keyboard to the computer.
- the part of the computer that controls the instructions
13 Clues: it temporally stores data. • slots that connect to the processor. • it is a basic input and output system. • you can connect printers and scanners to it. • it channel the parts of the computer with power. • it connect a mouse and keyboard to the computer. • the part of the computer that controls the instructions • ...
Technical Concepts Crossword 2020-09-04
Across
- a computer program that modifies another computer program and executes its own code
- a semiconductor device used to amplify or switch electronic signals and electrical power.
- Evil software
- the method by which information is converted into a secret code that hides the information
- a software application for accessing the information on the World Wide Web
- local area network
- a small amount of data sent over a network
- A connected set of networks
- A mutually agreed on the method of communication
Down
- a numeric system that only uses two digits — 0 and 1.
- software with malicious behavior that aims to gather information about a person or organization
- the programs and other operating information used by a computer.
- pretends to be one thing, usually legit software but hides malware inside
- transmission control protocol/Internet protocol used to govern the connection of computer systems to the Internet.
- a word, phrase, or image that you can click on to jump to a new document or a new section within the current document
- Crawler a script that explores the web
- types of malware; ads start popping up
- an interpreted, high-level and general-purpose programming language
- Smart Messaging Service(Can use satellites, emails) also known as message
- Internet service provider
20 Clues: Evil software • local area network • Internet service provider • A connected set of networks • Crawler a script that explores the web • types of malware; ads start popping up • a small amount of data sent over a network • A mutually agreed on the method of communication • a numeric system that only uses two digits — 0 and 1. • ...
Technology 2023-05-08
Across
- a set of computer programs and associated documentation and data
- the most important processor in a given computer
- an organized collection of structured information, or data, typically stored electronically in a computer system
- intelligence demonstrated by machines, as opposed to intelligence displayed by humans or by other animals
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- network a set of computers sharing resources located on or provided by network nodes
- every aspect of protecting an organization and its employees and assets against cyber threats
- an electronic link providing direct access from one distinctively marked place in a hypertext or hypermedia document to another in the same or a different document.
- a worldwide system of computer networks
Down
- the physical parts of a computer
- to transfer
- the transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems
- a type of malicious software, or malware, that spreads between computers and causes damage to data and software
- design, construction, and use of machines (robots) to perform tasks done traditionally by human beings
- a specific unit of data that's equal to about 1 billion bytes of data
15 Clues: to transfer • the physical parts of a computer • a worldwide system of computer networks • the most important processor in a given computer • a set of computer programs and associated documentation and data • a specific unit of data that's equal to about 1 billion bytes of data • network a set of computers sharing resources located on or provided by network nodes • ...
Ch.12 Computers and Technology in Health Care 2025-02-18
Across
- body-scanning method that uses nuclear magnetic resonance instead of X-ray radiation
- allows for rapid dispensing of medications
- computerized X-ray that permits physicians to see clear, cross-sectional views of both bone and body tissues
- programs that contain instructions to alter the operation of the computer programs, erase or scramble data on the computer, or allow access to information on the computer
- uses technology to direct ultrahigh-frequency sound waves through the chest wall and into the heart
- the ultimate networked system
- design using three-dimensional imaging models to make custom design individualized prosthetics
- a test the involves a small amount of radioactive substances in order to evaluate which parts of the heat are healthy and which are not
- a group of related records that are combined
- a surgery that involves a robot that is computer controlled
- an organized collection of information
- educational computer programming designed for individualized use
- types of information
- a computerized version of a patient’s medical information
- computer that can sit on a desktop
- a cancer treatment that uses high doses of radiation to control the growth of malignant cells
- e-mail, the process of sending messages from one computer to another
- a noninvasive scanning method that uses high-frequency sound waves that bounce back as an echo when they hit different tissues and organs inside the body
- uses special software to perform high-speed math calculations
- a surgical procedure in which a surgeon uses preoperative and intraoperative images to guide or direct the surgery
- protective programs that limit the ability of other computers to access a computer
- an online teaching and learning environment that uses computers and the internet
Down
- technology like a handheld tablet, smartphone, personal digital assistant, laptop, personal computer
- systems that can link computers together
- allows all health care agencies to readily transfer patient electronic health records
- secure online websites
- tests for patients who cannot exercise, given medication that stimulates the effect of exercise
- tests for patients who cannot exercise, given medication that stimulates the effect of exercise
- a slighty radioactive substance is injected and is detect by the PET scanner
- involves the use of video, audio, and computer systems to provide medical or health care services
- an applied science to promote an individual’s safety and well-being by adapting to the environment and using techniques to prevent injuries
- a very large computer that can control the launch of a rocket to outer space
- light beams that can be focused precisely
- each collection of related information within a database
- a computerized interpretation system that produces visual pictures on a computer monitor and a printout of the electrical activity of a patient's heart
- a basic understanding of how a computer works and the applications used in your field or profession
36 Clues: types of information • secure online websites • the ultimate networked system • computer that can sit on a desktop • an organized collection of information • systems that can link computers together • light beams that can be focused precisely • allows for rapid dispensing of medications • a group of related records that are combined • ...
Extra task 2023-04-12
Across
- Develops algorithms and computer programs that can perform tasks requiring human intelligence
- Coordinates the deployment and operation of software applications
- Develops applications that incorporate computer-generated perceptual information
- Designs and manages cloud-based systems and services
- Analyzes and optimizes digital marketing campaigns
- Analyzes and interprets complex digital data sets to extract insights
- Designs and builds new types of computers based on quantum mechanics
- Develops software for both client and server-side applications
- Designs and optimizes the experience users have when interacting with digital products
- Designs and manages networks of physical devices connected to the internet
Down
- Creates secure digital ledgers for recording transactions
- Designs the overall structure of information systems
- Creates applications for mobile devices
- Designs, builds, and operates robots for a variety of applications
- Protects computer systems and networks from theft or damage
15 Clues: Creates applications for mobile devices • Analyzes and optimizes digital marketing campaigns • Designs the overall structure of information systems • Designs and manages cloud-based systems and services • Creates secure digital ledgers for recording transactions • Protects computer systems and networks from theft or damage • ...
Networking Concepts and Cyber Ethics Crossword 2025-06-05
Across
- A kind of network that connects two or more computers located at distant places.
- An illegal intrusion into a computer system or network.
- The computers that communicate with each other called.
- A computer network created for an individual person.
- A wireless technology is used to interconnect mobile phones,computers and printers using short-range wireless connection.
- An act of harming or harassing a person through information technology in a deliberate manner.
- The unwanted bulk emails that from unknown sources called.
- Refers to the act of using or imitating the language and thoughts of another person as one's original work.
- Refers to a computer network that allows controlled access to an information source available on the internet.
Down
- Refers to a network restricted to an organisation.
- A security system that prevents unauthorised people from accessing your system and network.
- A single licenced copy of the software and load it onto several computers contrary to the licence's terms is called.
- In which topology,all the nodes in the network are connected in a circular manner.
- The process of transforming data into unreadable code.
- A network device that is used to connect all the computers in a network with each other.
- A router is a device that connects two different types of networks with each other.
- A legal right granted by law to the creator for his orginal work.
- A computer virus is a program or a set of programs that disrupts the normal functioning of a computer.
- In which topology,each node is connected to every other node in the network.
- Each computer in a network is called a.
- A larger network than LAN.
21 Clues: A larger network than LAN. • Each computer in a network is called a. • Refers to a network restricted to an organisation. • A computer network created for an individual person. • The computers that communicate with each other called. • The process of transforming data into unreadable code. • An illegal intrusion into a computer system or network. • ...
Computer 2025-06-16
Across
- - Each device is connected to a central computer using a point‑to‑point connection (Star Topology)
- Bombing - Spam attackers repeatedly sending bulk mail until the mail server gets full
- Hacking - Hacking done for good causes, such as national security
- - Installing a single licensed copy of software onto multiple computers against license terms
- - A single communication line or one main cable to which all the nodes are directly connected (Bus Topology)
- - Enables you to connect your computer to the internet over a telephone line
- - The process of transforming data into unreadable code
- - A network device used to connect all computers in a network with each other
- - Each node is connected to every other node in the network (Mesh Topology)
- - A group of computers and other peripheral devices linked together for the purpose of sharing data and hardware resources
- - Unwanted bulk email from unknown sources
Down
- Piracy - Copying and distributing software illegally
- - Using or imitating another person's work as one's own
- - The process of converting encrypted information back into readable form
- - Illegal intrusion into a computer system or network
- - All the nodes in the network are connected in a circular manner (Ring Topology)
- - A wireless technology used to interconnect mobile phones, computers, and printers using short‑range wireless connection
- - A device that connects two different types of networks with each other
- - Criminal activities using computer, network, or internet to cause harm to individuals or devices
- - Each computer in a network
20 Clues: - Each computer in a network • - Unwanted bulk email from unknown sources • Piracy - Copying and distributing software illegally • - Illegal intrusion into a computer system or network • - Using or imitating another person's work as one's own • - The process of transforming data into unreadable code • Hacking - Hacking done for good causes, such as national security • ...
TECH CROSSWORD 2024-05-30
Across
- : a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself
- : a hand-held pointing device that detects two-dimensional motion relative to a surface
- : a battery- or AC-powered personal computer (PC) smaller than a briefcase
- : tools, machinery, and other durable equipment
- : cord that runs from a router, modem, or network switch to your computer, giving your device access to the local area network
- : a complex set of electronic circuitry that runs the machine's operating system and apps
- : a storage device containing nonvolatile flash memory, used in place of a hard disk because of its much greater speed
- : It's a device that makes copies in paper
- : video conferencing, live streaming, online meetings, and recording videos
- : cause the lights in a place to be extinguished, typically as a result of a failure in the electricity supply
- : device that captures images from photographic prints, posters, magazine pages and similar sources
Down
- a handy device that allows you to create secure connections between wires and connectors
- : a panel of keys that operate a computer or typewriter.
- : a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted
- : the programs and other operating information used by a computer
- : an electronic output device used to display information being entered and processed on a computer
- : a container consisting of one or more cells, in which chemical energy is converted into electricity and used as a source of power
- that stores all of your digital content
- : is an industry standard that allows data exchange and delivery of power between many types of electronics
- : A software application used to access information on the World Wide Web
20 Clues: that stores all of your digital content • : It's a device that makes copies in paper • : tools, machinery, and other durable equipment • : a panel of keys that operate a computer or typewriter. • : the programs and other operating information used by a computer • : A software application used to access information on the World Wide Web • ...
ICT Crossword 2013-06-04
Across
- The internal memory which is not volatile
- Portable device which stores information
- Optical mark reader
- Something you cannot touch: programmes
- Magnetic ink character recognition
- A device that modulates an analogue carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information
- An integrated circuit that contains all the functions of a CPU of a computer
- A hardware device that can be used for input to a desktop computer
- A mobile device
- An input device that controls the curser
- The internal memory which is volatile
Down
- Popular with gamers but have slowly been replaced by other types of game controller
- A brand of a certain smart phone
- The main circuit board of a micro board, contains the connectors for attaching additional boards
- A touch sensitive visual display unit (VDU) or screen has a grid of light beams or fine wires criss-crossing the screen that are used to detect touch
- Used as an alternative to a mouse. To operate it the user rotates the ball which moves the pointer on screen
- The smallest size of memory (units)
- Can be used for output from a desktop computer, that produce hard digital documents
- Sends signals to control the other parts of the computer
19 Clues: A mobile device • Optical mark reader • A brand of a certain smart phone • Magnetic ink character recognition • The smallest size of memory (units) • The internal memory which is volatile • Something you cannot touch: programmes • Portable device which stores information • An input device that controls the curser • The internal memory which is not volatile • ...
Technology Crossword 2017-09-18
Across
- Activated when the computer is turned on. It checks your system before the main OS is started.
- Lets peripherals communicate with peripherals at rapid speeds.
- Stores permanent data.
- Slower than newer USB and FireWire ports. They can be attached to older keyboards, mouses and more.
- Carries out instructions and carries the motherboard.
- Sends data and information to the computer. they can be found in very miniature sizes.
- Stores temporary data.
Down
- Older printers and scanners have these, whereas newer versions do not have them.
- Ports transfer data. They connect several different types of peripherals.
- Conducts electricity.
- When a motherboard does not have an integrated sound chip or if it requires better sound quality, this is an option that can be taken.
- The abode of your graphics card which can supply the image to your monitor.
- Central circuit board in the computer. All components of the computer must connect to this in some way or another.
- Many peripherals require this. Some devices are capable of drawing power from the computer in addition to data through this.
- Funnels power through its multicoloured cables to each data.
15 Clues: Conducts electricity. • Stores permanent data. • Stores temporary data. • Carries out instructions and carries the motherboard. • Funnels power through its multicoloured cables to each data. • Lets peripherals communicate with peripherals at rapid speeds. • Ports transfer data. They connect several different types of peripherals. • ...
Parts Of A Computer 2021-10-14
Across
- an internal IT hardware component.
- device that is used to store data or programs
- the main printed circuit board within a computer
- one of the many types of adapter cards that add capabilities to your computer.
- A display screen that provides visual output from a computer
Down
- integrated circuit that generates the video signal sent to a computer display
- the hardware component that stores all of your digital content.
- an input device used to enter characters and functions into the computer system
- a digital circuit which performs operations on some external data source, usually memory or some other data stream
- a small, movable device that lets you control a range of things on a computer.
10 Clues: an internal IT hardware component. • device that is used to store data or programs • the main printed circuit board within a computer • A display screen that provides visual output from a computer • the hardware component that stores all of your digital content. • integrated circuit that generates the video signal sent to a computer display • ...
Technological gadgets 2021-05-04
Across
- you can play this on the computer for fun. (videojuego)
- An electronic machine. You use it for going on the internet, storing information and playing games (computador)
- An electronic letter. (correo electrónico)
- Your personal telephone (celular)
Down
- You use this to write on a computer. It has letters or characters on. (teclado)
- Google, YouTube and Wikipedia are types of … (sitio web)
- The part of your computer where you see the pictures or words (pantalla)
- you use this to move and click on a computer (ratón eléctrico)
- A computer that you can travel with. (computador portátil)
- Internet connection without wires or cables. (wi-fi)
10 Clues: Your personal telephone (celular) • An electronic letter. (correo electrónico) • Internet connection without wires or cables. (wi-fi) • you can play this on the computer for fun. (videojuego) • Google, YouTube and Wikipedia are types of … (sitio web) • A computer that you can travel with. (computador portátil) • ...
ICT Terms 2020-10-28
Across
- are malware programs that can target you when you're using the Internet
- A type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it until a ransom is paid
- (also known as a web spider or web robot) is a program or automated script which browses the World Wide Web in a methodical, automated manner.
- takes you to resources on essential techniques for carrying out convincing research
- A malicious program that transfers from one computer to another by any types of means
- Computer systems able to perform tasks that normally require human intelligence
- a program that runs in the background without you knowing it
- an unwanted email mostly from bots or advertisers
- an unwanted acquisition of sensitive personal information like password and credit card details
Down
- Defined as the information superhighway
- the world's most famous search engine
- covers the key issues in developing a successful research project
- A computer program that searches documents especially in the World Wide Web
- a process of systematic inquiry that entails collection of data; documentation of critical information
- The process of interactively searching for and retrieving requested information via a computer from databases that are online
- is a kind of software used to prevent, scan, detect and delete viruses from a computer
- A program designed to send you advertisements, mostly as pop-ups
- A malicious program that disguises as a useful program but once downloaded, it leaves your PC unprotected and allows hackers to get your information
- a search engine created and operated by Microsoft, replacing its former Live Search, Windows Live Search, and MSN Search offer
- A malicious program designed to replicate itself and transfer from one computer to another
20 Clues: the world's most famous search engine • Defined as the information superhighway • an unwanted email mostly from bots or advertisers • a program that runs in the background without you knowing it • A program designed to send you advertisements, mostly as pop-ups • covers the key issues in developing a successful research project • ...
UNIT TEST III 2023-02-06
Across
- is the large volume of data that is required to run a business.
- is a subset of machine learning that learns features and tasks directly from the data.
- of Big Data refers to different types of data.
- automatically detects the language you type and translates it to the language you want.
- was the first computer scientist to connect a camera to a computer.
- is the Father of Computer Vision.
Down
- technologies use NLP’s text classification abilities to scan emails of a language for threat.
- is the first image recognition app released by Google.
- of Big Data refers to the speed at which data is being generated.
- of Big Data refers to the amount of data being generated.
- is the best example of Computer Vision.
- is the branch of AI that enables machines to understand human language.
- is the time taken by a device to respond to a request
13 Clues: is the Father of Computer Vision. • is the best example of Computer Vision. • of Big Data refers to different types of data. • is the time taken by a device to respond to a request • is the first image recognition app released by Google. • of Big Data refers to the amount of data being generated. • is the large volume of data that is required to run a business. • ...
Geografiya 2023-10-22
Across
- a measure of the maximum number of bits that can be transmitted over a network or cable in a specified amount of time
- a type of network that communicates over a small geographical area, such as a single building
- the physical parts of a computer that you can touch and see, e.g. the processor, storage devices, input devices, output devices
- software that detects and removes viruses from a computer
- carrying out an operation on data, e.g. querying a database or doing a calculation using data in a spreadsheet
- connected to the internet
- the programs or set of instructions that tell a computer what to do to complete a task; aspects of a device you cannot touch
- a popular type of copper cable used to transmit data between devices
- a collection of computing devices connected to each other, either wired or wirelessly
- the collective name for all types of attacks on a computer or computer network
- a network device that forwards data from one device to another
Down
- raw facts and figures
- software that detects and removes spyware from a computer
- the instructions that tell a computer system how to complete a task
- a simulation that superimposes digital images on the user's real- world environment and allows the user to interact with those images
- a type of network that communicates over a large geographical area, such as across a city or country.
- what happens when something interrupts the transmission of a signal; this could be a physical obstruction such as a wall, or other radio waves
- step-by-step instructions to solve a particular problem
- a computer that offers a service to other devices on a network, such as file-sharing services and printer-sharing services
- enables devices to connect to a network using Wi-Fi
- a wireless technology that allows data transmission using radio waves
- software or hardware that prevents unauthorised access to a network
22 Clues: raw facts and figures • connected to the internet • enables devices to connect to a network using Wi-Fi • step-by-step instructions to solve a particular problem • software that detects and removes spyware from a computer • software that detects and removes viruses from a computer • a network device that forwards data from one device to another • ...
Operating Systems Crossword Puzzle 2018-09-14
Across
- Which Interface presents the user with a list of options?
- Which User Interface uses a lot of processing power and main memory to run?
- Computer O/S can be broadly classified into how many types?
- Which User Interface requires an understanding of the user’s needs?
- Graphical User Interface is easier to use by what type of computer users?
- Which Operating System can be used by many people at one time?
- Multi-Tasking means that the O/S will assign small amounts of the process time to each what?
- Command Line Interface is suitable for what type of computer users?
- What is the term used where the operating system is having to constantly switch data between memory and virtual memory?
- What term is associated with data being stored so that it can be recovered?
- What term is associated with preventing your computer from being infected by malware?
- What software is designed to help manage and maintain your computer system?
- What does the W in WIMP stand for?
- What does the M in WIMP stand for?
- An example of a factor that can affect performance of the operating system.
- What does the I in WIMP stand for?
Down
- how many tasks can a single-user, single task operating system do at once?
- An example of where an easy to use Menu Based Interface will be used.
- Which User Interface makes it hard for beginner and inexperienced computer users due to the many commands?
- What term is used for your Operating System which connects you to the internet?
- What does the P in WIMP stand for?
- What interface term is commonly associated with graphical icons and images?
- Command Line Interface is suitable for weaker computer systems because it takes up less space on the hard disk, this is because of its __________.
- What is the Operating System that monitors external events and processes data as soon as it enters a computer system?
- Operating Systems protect your computer against viruses and malware, give an example of software that will protect your computer.
- Name an example of a Single-User, Multi-Tasking Operating System that can run multiple applications simultaneously.
- An example of a feature that can be adapted to suit a user.
27 Clues: What does the P in WIMP stand for? • What does the W in WIMP stand for? • What does the M in WIMP stand for? • What does the I in WIMP stand for? • Which Interface presents the user with a list of options? • Computer O/S can be broadly classified into how many types? • An example of a feature that can be adapted to suit a user. • ...
Cybersecurity Unit 1 Lesson 2 2022-12-02
Across
- Way for a computer to identify specific programs and manage their activity. In an IP address, the port appears after a colon at the end of the address.
- A small local area network of computers and devices.
- Software that can stop malware from entering a network, computer, or device.
- Stores data that is in use.
- Software that runs on your computer, looking for many different types of malware from many different sources.
- Small text-based bits of information about your browser that a web server saves.
- Network device that controls and filters data between networks, either wired or wireless. Acts as a gate between two networks.
- All data on a computer.
- The arrangement of the various elements of a network.
- Executable files that are run by users.
- The systematic way to find specific web addresses and web pages.
Down
- A representation of all running processes shown in a tree-like structure with parent and child processes forming the branches of the tree.
- A weakness in a system that allows an attacker to gain unauthorized access.
- A special kind of file that contains other files.
- A file that contains a collection of other files.
- Cybercriminals set up sites similar to those with heavy traffic to try to trick you into revealing sensitive information
- Computer shared by multiple users across a network.
- An application file that is currently executing (also called running) in the operating system.
- An agreed-upon method for communication.
19 Clues: All data on a computer. • Stores data that is in use. • Executable files that are run by users. • An agreed-upon method for communication. • A special kind of file that contains other files. • A file that contains a collection of other files. • Computer shared by multiple users across a network. • A small local area network of computers and devices. • ...
Operating Systems Crossword Puzzle 2018-09-14
Across
- Name an example of a Single-User, Multi-Tasking Operating System that can run multiple applications simultaneously.
- What does the P in WIMP stand for?
- Operating Systems protect your computer against viruses and malware, give an example of software that will protect your computer.
- What term is associated with preventing your computer from being infected by malware?
- What is the term used where the operating system is having to constantly switch data between memory and virtual memory?
- Which Operating System can be used by many people at one time?
- Which User Interface uses a lot of processing power and main memory to run?
- Command Line Interface is suitable for what type of computer users?
- An example of a factor that can affect performance of the operating system.
- What does the M in WIMP stand for?
- Multi-Tasking means that the O/S will assign small amounts of the process time to each what?
- What does the I in WIMP stand for?
- Command Line Interface is suitable for weaker computer systems because it takes up less space on the hard disk, this is because of its __________.
- What is the Operating System that monitors external events and processes data as soon as it enters a computer system?
- What term is associated with data being stored so that it can be recovered?
Down
- What does the W in WIMP stand for?
- how many tasks can a single-user, single task operating system do at once?
- Graphical User Interface is easier to use by what type of computer users?
- An example of where an easy to use Menu Based Interface will be used.
- Computer O/S can be broadly classified into how many types?
- What term is used for your Operating System which connects you to the internet?
- An example of a feature that can be adapted to suit a user.
- Which Interface presents the user with a list of options?
- Which User Interface makes it hard for beginner and inexperienced computer users due to the many commands?
- What software is designed to help manage and maintain your computer system?
- What interface term is commonly associated with graphical icons and images?
- Which User Interface requires an understanding of the user’s needs?
27 Clues: What does the W in WIMP stand for? • What does the P in WIMP stand for? • What does the M in WIMP stand for? • What does the I in WIMP stand for? • Which Interface presents the user with a list of options? • Computer O/S can be broadly classified into how many types? • An example of a feature that can be adapted to suit a user. • ...
ICT Terms 2020-10-28
Across
- is a kind of software used to prevent, scan, detect and delete viruses from a computer
- A program designed to send you advertisements, mostly as pop-ups
- A malicious program that disguises as a useful program but once downloaded, it leaves your PC unprotected and allows hackers to get your information
- an unwanted email mostly from bots or advertisers
- (also known as a web spider or web robot) is a program or automated script which browses the World Wide Web in a methodical, automated manner.
- an unwanted acquisition of sensitive personal information like password and credit card details
- are malware programs that can target you when you're using the Internet
- Defined as the information superhighway
- a process of systematic inquiry that entails collection of data; documentation of critical information
- the world's most famous search engine
- a program that runs in the background without you knowing it
Down
- Computer systems able to perform tasks that normally require human intelligence
- takes you to resources on essential techniques for carrying out convincing research
- A computer program that searches documents especially in the World Wide Web
- A malicious program that transfers from one computer to another by any types of means
- The process of interactively searching for and retrieving requested information via a computer from databases that are online
- A malicious program designed to replicate itself and transfer from one computer to another
- A type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it until a ransom is paid
- a search engine created and operated by Microsoft, replacing its former Live Search, Windows Live Search, and MSN Search offer
- covers the key issues in developing a successful research project
20 Clues: the world's most famous search engine • Defined as the information superhighway • an unwanted email mostly from bots or advertisers • a program that runs in the background without you knowing it • A program designed to send you advertisements, mostly as pop-ups • covers the key issues in developing a successful research project • ...
Crossword puzzle ES chapter 1 2025-10-21
Across
- Includes elevation, relief, and landforms
- The difference in elevation between highest and lowest points of an area
- Equal points of elevation
- divides northern and southern hemisphere
- flat land and low relief
- contour are heavier and darker than others
- contains information on color and brightness
- high elevation and high relief
Down
- A type of map that shows features and elevation on earth
- High elevation and more level surface
- divides eastern and western hemisphere
- height above sea level
- 3 main types are plains, mountains, and plateaus
- a computer system that uses computer software
- scale explains how map works
15 Clues: height above sea level • flat land and low relief • Equal points of elevation • scale explains how map works • high elevation and high relief • High elevation and more level surface • divides eastern and western hemisphere • divides northern and southern hemisphere • Includes elevation, relief, and landforms • contour are heavier and darker than others • ...
Network requirements 2021-11-13
Across
- a local network is a tiny network that is limited to a certain location.
- ensures that your computer has enough room to read and write data so that the CPU can find it fast and easily
- a piece of software or hardware that prevents specific types of communication from passing through.
- basic portion of domain names such as howtogeek.com and google.com
- address on a network, a numerical address that relates to your computer.
- a collection of data structured in such a way that a computer application may easily access specific data.
- a device's hardware address when linked to a shared network.
- various methods of communication over the Internet.
- how computers translate human-readable domain names and hostnames into IP addresses
Down
- a device that connects networks by routing traffic
- a gadget that sends and receives traffic
- an Internet-based way of sharing files between computers
- connected network technology that is nearly universally used today
- the quantity of data that may be communicated over a network at any one moment is measured in bytes.
- a standard that allows a LAN to utilize a single IP address for Internet connections and a group of IP addresses for internal traffic.
- a collection of data structured in such a way that a computer application may easily access specific data.
- part of an Internet address
- a programming language for building web pages
- a protocol that allows a server on a local network to issue a computer or other network device a temporary IP address.
- the portion of a computer that controls and monitors all activities and calculations.
20 Clues: part of an Internet address • a gadget that sends and receives traffic • a programming language for building web pages • a device that connects networks by routing traffic • various methods of communication over the Internet. • an Internet-based way of sharing files between computers • a device's hardware address when linked to a shared network. • ...
Computer Parts 2017-10-01
Across
- Activates when you turn on the computer
- Used to connect older printers or scanners to computers
- Houses your graphics card
- Older ports that are much slower than new USB and FireWire ports
Down
- Used by peripherals to draw power
- A type of sound chip
- Houses most of your computer's components
- Used to connect many different types of peripherals
- The brain the carries out computer instructions
- Lets peripherals communicate quickly
- Ports that are generally purple and green
- Where temporary information is stored
- Funnels power through the multicolored cables
13 Clues: A type of sound chip • Houses your graphics card • Used by peripherals to draw power • Lets peripherals communicate quickly • Where temporary information is stored • Activates when you turn on the computer • Houses most of your computer's components • Ports that are generally purple and green • Funnels power through the multicolored cables • ...
Anatomy of a computer 2017-03-20
Across
- used for better sound quality
- something that mice and keywords can require
- activates when you turn on the computer and performs system checks
- houses your graphics card
- can be used to connect many different types of peripherals
- funnels power through the multicolored cables
Down
- houses most of your computer's components
- lets peripherals communicate quickly with the processor
- the device is connected into this
- the brain of the computer that carries out your computers instructions
- also known as a COM (communications) port
- stores temporary information
- transfers data
13 Clues: transfers data • houses your graphics card • stores temporary information • used for better sound quality • the device is connected into this • houses most of your computer's components • also known as a COM (communications) port • something that mice and keywords can require • funnels power through the multicolored cables • ...
my crossword 2024-02-08
Across
- to connect things and can power things
- You can attach some older key boards, mice, and modems to the
- to connect many different types of peripherals
- to connection some old key boards and mice.
- houses your graphics card,
- The is the brains of your computer
- houses most of your computer’s components
Down
- if you want better sound quality you buy a
- If you have an older printer or scanner, you probably connect the device to the
- you turn on the computer and per forms system
- The CPU stores temporary information on it
- powers the computer
- You can add devices, such as modems and sound cards to the
13 Clues: powers the computer • houses your graphics card, • The is the brains of your computer • to connect things and can power things • houses most of your computer’s components • if you want better sound quality you buy a • The CPU stores temporary information on it • to connection some old key boards and mice. • you turn on the computer and per forms system • ...
Types and Components of Computer Systems 2013-09-15
Across
- magnetic or optical storage devices.
- another name for computer chip.
- a device used with a GUI to control a cursor or pointer.
- changing or doing something with the data.
- another name for backing up storage.
- a special kind of computer chip can be uses in both computers and other computerised devices.
Down
- functions or the uses of a computer.
- start-up code that enables the O/S to be loaded and allows the computer to start-up successfully.
- the memory chip(s) that are physically located very close to the processor, Which holds programs of data that the processor needs immediately.
- any pieces of hardware that are connected outside a computer.
- component of a computer that allows CDs or DVDs to be played.
- devices the allow large amounts of data to be store outside the main memory.
- to work together.
- an IC where the main components of the CPU, excluding main memory are combined as a single unit.
- a complete set of instructions that can be used to carry out a task.
- a satellite navigation.
16 Clues: to work together. • a satellite navigation. • another name for computer chip. • functions or the uses of a computer. • magnetic or optical storage devices. • another name for backing up storage. • changing or doing something with the data. • a device used with a GUI to control a cursor or pointer. • any pieces of hardware that are connected outside a computer. • ...
Coady 2013-03-06
Across
- a usually electronic device used to record, regulate, or control a process or system!
- Arthemetic Lodge Unit: the part of the computer that performs all arithmetic computations!
- organised information in the form of operating systems, utilities, programs, and applications that enable computers to work!
- refers to objects that you can actually touch like: disks, disk drives, display screens, keyboards, printers, boards and chips!
- computer science, to make back-up of a file or program!
- Liquid Crystal Display: a type of display used in digital watches and many portable computers!
- Cathode-Ray Tube: the technology used in most television and computer display screen!
- a computer or telecommunication system linked to permit exchange of information!
- Central Processing Unit: the brains of the computer where most of the calculations take place!
Down
- Visual Display Unit: it displays images generated by a computer or other electronic devices!
- re-start a computer or its operating system software. It is of two types: (1) Cold Booting: where the computer is started after having been switched off! (2) Warm Booting: where the operating system alone is re-started (without having been switched off)!
- to prepare a storage medium, usually a disk, for reading, and writing!
- resources such as people, raw materials, energy, information, or finance that are out into a system (such as an economy, manufacturing plant, computer system) to obtain a desired output. Inputs are classified under costs in accounting!
- it’s the main circuit point of a computer and is also known as the main board or the logic board!
- Drive: a disk that reads data stored on hard disk drives. Also known as a hard disk drive!
- Liquid Crystal Display: it is an advanced technology that improves viewing experience!
- a special symbol, usually a solid rectangle or a blinking underline character, that signifies where the next character will be displayed on the screen!
17 Clues: computer science, to make back-up of a file or program! • to prepare a storage medium, usually a disk, for reading, and writing! • a computer or telecommunication system linked to permit exchange of information! • a usually electronic device used to record, regulate, or control a process or system! • ...
Computer 2022-03-01
Across
- Allows sharing of files, data, and other types of information giving authorized users the ability to access information stored on other computers on the system
- It stores the information your computer is actively using so that it can be accessed quickly
- Interprets the program's instructions and creates the output that you interface with when you're using a computer
- Information that has been translated into a form that is efficient for movement or processing
- A model of computation in which input values proceed through a sequence of gates, each of which computes a function
- used to attach keyboards, mice, printers, external storage and mobile devices to the computer
- Virtual places within an operating system where network connections start and end. They help computers sort the network traffic they receive
- Connects/holds all the other components together
- Comprises the entire set of programs, procedures, and routines associated with the operation of a computer system
Down
- The physical components that a computer system requires to function
- An output device that displays information in pictorial or text form
- Manages all hardware and software on the computer
- A piece of hardware that enables your computer to interact with all of the applications and programs installed
- Houses your applications, operating system and files for an indefinite period
- Used to assist the user to run jobs or optimize system performance
15 Clues: Connects/holds all the other components together • Manages all hardware and software on the computer • Used to assist the user to run jobs or optimize system performance • The physical components that a computer system requires to function • An output device that displays information in pictorial or text form • ...
Computer Basics 2018-09-20
Across
- This operating system is used by 98% of people around the world.
- This type of software is the master controller of the computer.
- MS Office & Adobe products are what type of software?
- This type of scanner uses fingerprints or the iris to input data.
- This is considered the brains of the computer.
- Texting & Skyping are types of what kind of communication?
- Keyboard, microphone, & scanner are what type of hardware?
- This type of memory is volatile.
- Author, date, & domain are all ways to test this about a website.
Down
- Application software allows the user to do a specific _____.
- This can be added to the bottom of every email by setting it up in the settings.
- This application software allows you to send messages and files over the internet.
- This device is considered both an input AND output device.
- Monitor, speaker, & printer are what type of hardware?
- This type of storage used optical technology
- This type of hard drive is a peripheral device with a USB connection
- This type of memory is permanent.
- This operating system is free and used mostly by computer experts.
18 Clues: This type of memory is volatile. • This type of memory is permanent. • This type of storage used optical technology • This is considered the brains of the computer. • MS Office & Adobe products are what type of software? • Monitor, speaker, & printer are what type of hardware? • This device is considered both an input AND output device. • ...
Virtual Tech Terms 2016-12-01
Across
- special developed operating systems
- attached storage is usually disk storage that is connected to one or more computers
- servers are the interfaces between users and application server
- a virtual machine that is used as a mold for a commonly used configuration
- network adapter a single network adapter that support multiple network protocol types
- service bus is a industry standard for connecting external devices to a computer
- bus adapter a hardware device that connects a computer to either a network or storage network
- a storage technology that compresses data
- disk the use of second disk
- array of inexpensive disk is a data storage virtualization technology
Down
- shared volumes is a shared disk containing an NTFS
- a crucial part of the virtual machine
- contention
- attached storage the disk drives that are internal to a physical computer
- is a hardware or software component that stores data
- having more than one path from the host to the storage array
- is the guaranteed minimum that virtual machines will always have
- a process that allows a hyper visor to reclaim physical memory
- linking together two or more servers
- tolerance able to withstand the failure of a virtualization host
- appliances are prebuilt virtual machines
- access memory is a computer memory that is easy to upgrade
22 Clues: contention • disk the use of second disk • special developed operating systems • linking together two or more servers • a crucial part of the virtual machine • appliances are prebuilt virtual machines • a storage technology that compresses data • shared volumes is a shared disk containing an NTFS • is a hardware or software component that stores data • ...
CIS 1102N 2023-11-15
Across
- Essential pieces of software that allow hardware to communicate with the operating system
- Tools used for compressing and decompressing files
- Tools used for copying and restoring data
- It retrieves information from other parts of the web and displays it
- security device that monitors and filters incoming and outgoing network traffic
- A program that assists in locating and removing unnecessary files
- known as clients, over a network
- Programs designed to assist with system maintenance tasks
- A type of software that enables communication between the user and the computer
- A type of application used for managing and analyzing data
- A type of utility that rearranges fragmented data on a disk for improved performance
- A type of application used for creating and editing images
- Software that performs a specific task
- Types of these include system and application
Down
- program that allows communication and file sharing over a network
- software used to create/edit/view a spreadsheet
- establishes a digital connection between your computer and a remote server owned
- Software used for protecting a computer system from unauthorized access
- Applications designed to enhance and streamline the user's web browsing experience
- Ensures the computer's security against malicious software
- A set of instructions that tell a computer how to perform specific tasks
- primarily used for creating, editing, and formatting documents.
- computer program that can capture, display and manipulate data arranged in rows and columns
- Software that enables users to create, edit, and format documents
- A type of software that allows you to create and edit images
- Programs that control and manage hardware
- Software that allows users to create, edit, and manage visual presentations
- Programs designed to enhance the performance of a computer
- A type of system software that manages computer hardware and software resources
- used to convert sound waves into electrical waves or to input sound into computers
30 Clues: known as clients, over a network • Software that performs a specific task • Tools used for copying and restoring data • Programs that control and manage hardware • Types of these include system and application • software used to create/edit/view a spreadsheet • Tools used for compressing and decompressing files • ...
Virtual Tech Terms 2016-12-01
Across
- special developed operating systems
- attached storage is usually disk storage that is connected to one or more computers
- servers are the interfaces between users and application server
- a virtual machine that is used as a mold for a commonly used configuration
- network adapter a single network adapter that support multiple network protocol types
- service bus is a industry standard for connecting external devices to a computer
- bus adapter a hardware device that connects a computer to either a network or storage network
- a storage technology that compresses data
- disk the use of second disk
- array of inexpensive disk is a data storage virtualization technology
Down
- shared volumes is a shared disk containing an NTFS
- a crucial part of the virtual machine
- contention
- attached storage the disk drives that are internal to a physical computer
- is a hardware or software component that stores data
- having more than one path from the host to the storage array
- is the guaranteed minimum that virtual machines will always have
- a process that allows a hyper visor to reclaim physical memory
- linking together two or more servers
- tolerance able to withstand the failure of a virtualization host
- appliances are prebuilt virtual machines
- access memory is a computer memory that is easy to upgrade
22 Clues: contention • disk the use of second disk • special developed operating systems • linking together two or more servers • a crucial part of the virtual machine • appliances are prebuilt virtual machines • a storage technology that compresses data • shared volumes is a shared disk containing an NTFS • is a hardware or software component that stores data • ...
Technology 2024-11-10
Across
- A device that gives power to batteries in electronics, like phones or laptops.
- A small device used to move the cursor on a computer screen.
- A device used to connect two different types of plugs or cables.
- A small button that turns something on or off.
- (2 words) A device used to control a TV or other electronics from a distance.
- The part of a cable that connects into a socket to get power.
- (2 words) A cable used to connect devices to a computer or for charging.
- A machine that prints words and pictures from a computer onto paper.
Down
- A set of keys used for typing on a computer.
- (2 words) A small device for storing files that can be plugged into a computer.
- A place on the wall where you plug in electronics to get power.
- A device that plays sound loudly from a computer or phone.
- A device that connects devices to the internet wirelessly.
13 Clues: A set of keys used for typing on a computer. • A small button that turns something on or off. • A device that plays sound loudly from a computer or phone. • A device that connects devices to the internet wirelessly. • A small device used to move the cursor on a computer screen. • The part of a cable that connects into a socket to get power. • ...
Technology 2024-11-10
Across
- A device that gives power to batteries in electronics, like phones or laptops.
- A small device used to move the cursor on a computer screen.
- A device used to connect two different types of plugs or cables.
- A small button that turns something on or off.
- (2 words) A device used to control a TV or other electronics from a distance.
- The part of a cable that connects into a socket to get power.
- (2 words) A cable used to connect devices to a computer or for charging.
- A machine that prints words and pictures from a computer onto paper.
Down
- A set of keys used for typing on a computer.
- (2 words) A small device for storing files that can be plugged into a computer.
- A place on the wall where you plug in electronics to get power.
- A device that plays sound loudly from a computer or phone.
- A device that connects devices to the internet wirelessly.
13 Clues: A set of keys used for typing on a computer. • A small button that turns something on or off. • A device that plays sound loudly from a computer or phone. • A device that connects devices to the internet wirelessly. • A small device used to move the cursor on a computer screen. • The part of a cable that connects into a socket to get power. • ...
virtualization terms 2016-12-01
Across
- tolerance able to withstand the failure of a virtualization host
- attached storage is usually disk storage that is connected to one or more computers
- service bus is a industry standard for connecting external devices to a computer
- attached storage the disk drives that are internal to a physical computer
- access memory is a computer memory that is easy to upgrade
- servers are the interfaces between users and application server
- a storage technology that compresses data
- is the guaranteed minimum that virtual machines will always have
- linking together two or more servers
Down
- appliances are prebuilt virtual machines
- a process that allows a hyper visor to reclaim physical memory
- shared volumes is a shared disk containing an NTFS
- bus adapter a hardware device that connects a computer to either a network or storage network
- having more than one path from the host to the storage array
- a virtual machine that is used as a mold for a commonly used configuration
- disk the use of second disk
- array of inexpensive disk is a data storage virtualization technology
- contention
- a crucial part of the virtual machine
- network adapter a single network adapter that support multiple network protocol types
- special developed operating systems
- is a hardware or software component that stores data
22 Clues: contention • disk the use of second disk • special developed operating systems • linking together two or more servers • a crucial part of the virtual machine • appliances are prebuilt virtual machines • a storage technology that compresses data • shared volumes is a shared disk containing an NTFS • is a hardware or software component that stores data • ...
Anatomy of a computer 2023-02-09
Across
- for older printers or scanners
- purple and green
- The brain of the computer
- universal serial bus
- Random Access Memory
- connects everything together
- Peripheral component interconnect
- Power supply Unit
Down
- to transfer data quickly
- accelerated graphics port
- For better sound quality
- Basic input/output system
- for older types of keyboard
13 Clues: purple and green • Power supply Unit • universal serial bus • Random Access Memory • to transfer data quickly • For better sound quality • accelerated graphics port • The brain of the computer • Basic input/output system • for older types of keyboard • connects everything together • for older printers or scanners • Peripheral component interconnect
Anatomy of a computer- Owen Rymer 2023-02-09
Across
- for older printers or scanners
- purple and green
- The brain of the computer
- universal serial bus
- Random Access Memory
- connects everything together
- Peripheral component interconnect
- Power supply Unit
Down
- to transfer data quickly
- accelerated graphics port
- For better sound quality
- Basic input/output system
- for older types of keyboard
13 Clues: purple and green • Power supply Unit • universal serial bus • Random Access Memory • to transfer data quickly • For better sound quality • accelerated graphics port • The brain of the computer • Basic input/output system • for older types of keyboard • connects everything together • for older printers or scanners • Peripheral component interconnect
Artificial Intelligence 2024-03-11
Across
- It includes the conversion of raw data to machine-readable form, flow of data through the CPU and memory to output devices, and formatting or transformation of output.
- A graph is an abstract data type that can be used to represent complex, non-linear relationships between objects.
- The One Definition Rule (ODR) is an important rule of the C++ programming language that prescribes that classes/structs and non-inline functions cannot have more than one definition in the entire program and template and types cannot have more than one definition by translation unit.
- The internet is defined as a global network of linked computers, servers, phones, and smart appliances that communicate with each other using the transmission control protocol (TCP) standard to enable the fast exchange of information and files, along with other types of services.
- Put simply, big data is larger, more complex data sets, especially from new data sources. These data sets are so voluminous that traditional data processing software just can't manage them. But these massive volumes of data can be used to address business problems you wouldn't have been able to tackle before.
- Computer training refers to resources, companies and services dedicated to helping educate users on computer-related topics.
- Data cleaning is the process of fixing or removing incorrect, corrupted, incorrectly formatted, duplicate, or incomplete data within a dataset.
- Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. Specific applications of AI include expert systems, natural language processing, speech recognition and machine vision.
- Machine learning (ML) is a branch of artificial intelligence (AI) and computer science that focuses on the using data and algorithms to enable AI to imitate the way that humans learn, gradually improving its accuracy.
Down
- Analysis is defined as breaking something down into its inter-related components in order to understand it.
- An algorithm is a set of commands that must be followed for a computer to perform calculations or other problem-solving operations.According to its formal definition, an algorithm is a finite set of instructions carried out in a specific order to perform a particular task.
- Algorithmic bias refers to the systemic and repeatable errors in a computer system that create unfair outcomes, such as privileging one arbitrary group of users over others.
- Any information processed by and sent from a computer or electronic device is considered output. An example of output is anything viewed on your computer monitor screen, such as the words you type on your keyboard.
- Crowdsourcing involves obtaining work, information, or opinions from a large group of people who submit their data via the Internet, social media, and smartphone apps. People involved in crowdsourcing sometimes work as paid freelancers, while others perform small tasks voluntarily.
- In computer science, the general meaning of input is to provide or give something to the computer, in other words, when a computer or device is receiving a command or signal from outer sources, the event is referred to as input to the device. Fingerprint reader.
- These courses typically cover such topics as. SELECT statements, data definition, manipulation, control languages, records, and tables. In these courses, ..
- Computer Science has enabled the development of sophisticated tools that can help tackle environmental problems. Issues like pollution, waste management and disposal, disease identification and containment, and others can be easily tackled using computers..
- Accuracy refers to the degree of exactness with which computations are made and operations are performed. One might spend years in detecting errors in computer calculations or updating a wrong record. Errors attributable to hardware are normally detected and corrected by the computer system itself.
- Filters are commonly used within web-based applications to narrow the user's list of choices to a more manageable and usable number.
- Data is information that can be interpreted and used by computers. It is a collection of facts, such as numbers, words, measurements, observations or even just descriptions of things. In computing, data is typically stored electronically in the form of files or databases.
- Machine learning (ML) is a branch of artificial intelligence (AI) and computer science that focuses on the using data and algorithms to enable AI to imitate the way that humans learn, gradually improving its accuracy.
21 Clues: Analysis is defined as breaking something down into its inter-related components in order to understand it. • A graph is an abstract data type that can be used to represent complex, non-linear relationships between objects. • Computer training refers to resources, companies and services dedicated to helping educate users on computer-related topics. • ...
ICT Crossword 2014-09-24
Across
- A form must look like a ----- form.
- Menus can ---- or pull down.
- Operating Systems can preform ----- tasks
- A program for carrying out a routine function.
- To use a command based interface you have to have a ------ knowledge of computers.
- ----- contain a limited area of the screen with boxes to fill in.
- Using the Command Based Interface allows the OS to be ---------- -------.
Down
- Menus are---------, cascading and context sensitive.
- A computer program that allows the user to run other programs.
- How the user communicates with the computer.
- ---- Processor, a type of utility software
- A series of related items that can be selected.
- LanguAGE Allows the user to use their own language to communicate with the computer
- An interface where the user types in commands.
- ------------- ask questions and require a response before continuing.
15 Clues: Menus can ---- or pull down. • A form must look like a ----- form. • Operating Systems can preform ----- tasks • ---- Processor, a type of utility software • How the user communicates with the computer. • A program for carrying out a routine function. • An interface where the user types in commands. • A series of related items that can be selected. • ...
Identifying Keywords 2018-07-25
Across
- Why is a keyboard arranged the way it is?
- What is zoology?
- How many eyes does a grasshopper have?
- Where do tigers live in the wild?
- How many strings does a violin have?
- When was the first professional baseball game played?
Down
- What kind of atmosphere is on the planet, Venus?
- How many different types of animals live in Antarctica?
- When was the first computer built?
- What is another name for Orion?
- What countries play rugby?
- What kind of an instrument is a flute?
12 Clues: What is zoology? • What countries play rugby? • What is another name for Orion? • Where do tigers live in the wild? • When was the first computer built? • How many strings does a violin have? • How many eyes does a grasshopper have? • What kind of an instrument is a flute? • Why is a keyboard arranged the way it is? • What kind of atmosphere is on the planet, Venus? • ...
Koutt Crossword 2018-09-14
13 Clues: sound • power supply • not a usb cord • transfers data • slower than usb • activates the OS • brain of the computer • stores temporary data • houses the graphic cards • carries out the instructions • old printer or scanner uses this • lets the peripherals communicate quickly • use to connect many types of peripherals
Operating Systems Crossword 2018-09-14
Across
- The programs and other operating information used by a computer
- the portion of your hard drive that is used when the main memory of the computer is full
- user operating system can only be used by one person at a time with one application
- Will block off any suspicious data coming in and out of the computer system to prevent harm being caused
- Short had for Computer-Aided Design and used to produce precise technical illustrations
- A vector format that works on the web so that vector images can be displayed on web pages
- This type of software licence gives users both permission to use the software and access to view & modify the source code
- Type of operating system, short for real-time operating system
- Shorthand for Command Line Interface
- When getting rid of unnecessary data on a hard disk you use a disk …
- When files are split in different locations across your hard disk it is called …
- Email, Web browsing and instant messaging are this type of software.
- the machines, wiring, and other physical components of a computer or other electronic system.
- small software program that controls the devices you connect to your computer
- Type of malware that infects a computer and you can download programs or applications to get rid of them
- Word processing, spreadsheet, database and presentation are this type of software
- Short hand for Central Processing Unit
- malicious software that hinder the performance of your operating system
Down
- A type of compression used for GIF and PNG file types
- User operating system that can be used by multiple people with multiple applications
- A newer version of a software or application that is better or of higher standard than the last
- short for Random Access Memory
- the low-level software that supports a computer's basic functions, such as scheduling tasks and controlling peripherals
- A type of compression where data removed during the compression process cannot be restores, used in JPG images
- a program used to organise fragmented data on a hard drive
- interface that contains a list of options, seen at self-service kiosk
- This type of software licence gives the end user permission to use the software but retains intellectual property right
- operating system can be used by one person at a time with multiple application
- Default file type for Microsoft Word 2007 onward and replaced the old DOC file type
- the type of memory that is used when the main memory on your computer is full
- an interface that will alter its presentation, layout and options to better support the user or technology it is running on.
- type of compatibility issue that is about whether the software can work with and communicate with other software applications that you use
- secondary software or applications used in case the hard disk in a computer is damaged.
- AVI, MP4, MOV and MKV are types of format for this type of file
- Shorthand for Graphical User Interface
- Software that is used to hold real-time voice and video conversations over the internet.
- All software applications have this and it define how that software can be redistributed and used
- A minute area of illumination on a display screen, one of many from which an image is composed
- The type of interface that is designed around graphical icons and images or a cowardly person
- Also known as BMP
40 Clues: Also known as BMP • short for Random Access Memory • Shorthand for Command Line Interface • Shorthand for Graphical User Interface • Short hand for Central Processing Unit • A type of compression used for GIF and PNG file types • a program used to organise fragmented data on a hard drive • Type of operating system, short for real-time operating system • ...
PC MAINTENANCE AWARENESS 2023-05-08
Across
- What is used to identify POST (power on self test) problems
- types computer or software maintenance
- Which of these is part of a software maintenance program
Down
- What is NOT kind of computer system health check
- Which type of maintenance ensures that equipment is ready and available at the time of need?
- Signs of power supply failure
- Types of malware
7 Clues: Types of malware • Signs of power supply failure • types computer or software maintenance • What is NOT kind of computer system health check • Which of these is part of a software maintenance program • What is used to identify POST (power on self test) problems • Which type of maintenance ensures that equipment is ready and available at the time of need?
ICT 2022-02-10
Across
- was one of the first operating systems to be written, in 1971
- means getting data into the computer to be processed
- the language that the computer can understand and execute is called
- refers to how the computer is constructed or its physical building blocks
- example of hardware in a computer
- the transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems
- the process of writing computer instructions in a programming language
Down
- was used in the fourth generation of computers, also known as a CPU
- the ability to run several tasks at once on behalf of a user
- a place to keep data that has been processed so that it can be retrieved at a later time to be used again
- provide the user with all resources necessary to solve computational tasks
- type of program that allows communication between a peripheral device, such as a mouse or printer, and the rest of the computer system
12 Clues: example of hardware in a computer • means getting data into the computer to be processed • the ability to run several tasks at once on behalf of a user • was one of the first operating systems to be written, in 1971 • was used in the fourth generation of computers, also known as a CPU • the language that the computer can understand and execute is called • ...
Networking Concept 2025-05-22
Across
- It means duplication of data at multiple places.
- It is an overall design of a computer that describes how the computer network is configured and what strategies are being used.
- Is a device that is used to connect all the computers.
- It enables two or more computer to share data and resources.
- In this Two or more computer are connected within a small area .
- Used to connect a computer to the available internet connection over the existing telephone lines.
Down
- Can be defined as a group of computers that is linked to share data.
- It means to protect data from unauthorised access.
- Is a means of communication that uses low powered radio waves to transmit the data between device.
- It refers to the layout in which the various components of a network are connected with each other.
- Is a computer network that is mainly created for an individual person and cover a area of less than 10 meter.
- Is used to physically attach a computer to a network so that it can participate in network communication.
- It can handle a large volume of data traffic.
- Is a device that connect two different types of networks with each other.
- Is a larger network and is spread accross a city.
15 Clues: It can handle a large volume of data traffic. • It means duplication of data at multiple places. • Is a larger network and is spread accross a city. • It means to protect data from unauthorised access. • Is a device that is used to connect all the computers. • It enables two or more computer to share data and resources. • ...
Anatomy of a computer 2020-09-28
Across
- stores temporary information
- universal serial bus
- let's peripherals communicate with the processor quickly
- houses most of the computer components
- you can buy this to upgrade your sound quality
- you van attach older keyboards and mice to this
Down
- houses your graphic card
- performs system checks before starting your main os
- you can connect an older printer or scanner to this
- used to connect many different types of peripherals
- funnels power through the multicolored cables
- the heart of the computer
12 Clues: universal serial bus • houses your graphic card • the heart of the computer • stores temporary information • houses most of the computer components • funnels power through the multicolored cables • you can buy this to upgrade your sound quality • you van attach older keyboards and mice to this • performs system checks before starting your main os • ...
Unit 1 Cells 2017-09-29
Across
- the active site of an enzyme has this for the substrate
- lowers the activation energy
- the way the DNA strands are arranged
- the whole hereditary information of an organism that is encoded in the DNA
- the types of bonds between DNA strands
- where a section of a chromosome breaks off and attaches to another chromosome
- cells that produce gametes
- the base that pairs with adenine in RNA
- stem cells derived from an embryo
- a type of bond that holds proteins together
Down
- substitution where one amino acid is changed to another
- the use of computer technology to identify DNA sequences
- change to the genome
- type of cell that forms different types of body tissue
- the study of a group of living things
- where a nucleotide is deleted from the DNA sequence
- where an extra nucleotide is inserted into the DNA sequence
- an unspecialised cell
- the purpose of PCR is to do what to the DNA
- the number of strands in RNA
20 Clues: change to the genome • an unspecialised cell • cells that produce gametes • lowers the activation energy • the number of strands in RNA • stem cells derived from an embryo • the way the DNA strands are arranged • the study of a group of living things • the types of bonds between DNA strands • the base that pairs with adenine in RNA • the purpose of PCR is to do what to the DNA • ...
ANATOMY OF THE COMPUTER 2019-02-28
Across
- Central Processing Unit
- PORT A type of connection that ports information from a device to the computer (a mouse) one bit at a time
- Printed circuit board containing all computer components
- A standard for connecting computers and their peripherals
- Basic input/output system
- PORT A type of connection that ports information from a device to the compute through numerous wires and multiple bits at a time
Down
- Accelerated Graphics Port-Point to point channel that is used for high speed video output
- 1394 Types of cables and connectors for external devices
- Universal Serial Bus-Standardized Technology for attaching peripheral devices to a computer
- Random Access Memory- the hardware in a computing device
- Device that goes into a computer to allow audio
- An older version of a port
- Power Supply Unit
13 Clues: Power Supply Unit • Central Processing Unit • Basic input/output system • An older version of a port • Device that goes into a computer to allow audio • 1394 Types of cables and connectors for external devices • Random Access Memory- the hardware in a computing device • Printed circuit board containing all computer components • ...
Fundamental of Multimedia 2017-12-27
Across
- Full name of *.cdr
- *.wma is a standard file format for .........
- Computer used to simulate a real or imagined environment that appears as a 3D space
- Used for advertising, but also can serve public service purposes
- Provide for the development of self-running applications
- Full name of *.dxf
- A technique in which a series of progressively different elements are used on each frame
- communication process that takes place between humans and computer software
- WavePad is an examples software for ............
- Consists of layers which span several frames
Down
- A software package which developers use to create and package multimedia content deliverable to end users
- Educational software that delivers course material and instruction via computer
- A family of graphic characters that usually includes many types sizes and styles
- The analog video signals are recorded onto ............
- 2D animations are vey simple and static, not changing their ......... on the screen
- Has a resolution measured in the number of horizontal scan lines
- Amount of space between lines of text
- A series of graphical images displayed one after another to simulate movement
- A tools that connects to different media elements such as audio and video
- Amount of space between characters
20 Clues: Full name of *.cdr • Full name of *.dxf • Amount of space between characters • Amount of space between lines of text • Consists of layers which span several frames • *.wma is a standard file format for ......... • WavePad is an examples software for ............ • The analog video signals are recorded onto ............ • ...
Computer Holiday Homework 2025-06-01
Across
- - a kind of network which connects two or more computer located as distant places.
- - a topology in which all the notes are connected in a circular manner.
- - an impression or information about the person that exist on the internet because of his online activity.
- - device that enables you to connect your computer to the available internet connection over the existing telephone
- - computer network in which two or more computer and peripheral devices are connected within a small area.
- - hacking which is done for a good cause.
- - a topology in which each node is connected to every other node in the network.
- - a means of communication that uses low powered radio waves to transmit the data between devices.
- - a computer network that is mainly created for an individual person.
Down
- - it refers to an illegal intrusion into computer system of network.
- - it refers to criminal activities that involve the use of computers, networks, and the internet connection with the intent to cause harm to individuals or the digital devices.
- - when software is copied and distributed illegally.
- - a device that connects two different types of networks with each other.
- - a term is a combination of two terms, 'net' and 'etiquette'.
- - network device that is used to connect all computers in a network with each other.
- - it refers to the act of using or imitating the language and thoughts of another person as one's original work.
- - it refers to unwanted bulk emails that come from unknown sourcess.
17 Clues: - hacking which is done for a good cause. • - when software is copied and distributed illegally. • - a term is a combination of two terms, 'net' and 'etiquette'. • - it refers to an illegal intrusion into computer system of network. • - it refers to unwanted bulk emails that come from unknown sourcess. • ...
Crossword puzzle 2025-06-01
Across
- - a kind of network which connects two or more computer located as distant places.
- - a topology in which all the notes are connected in a circular manner.
- - an impression or information about the person that exist on the internet because of his online activity.
- - device that enables you to connect your computer to the available internet connection over the existing telephone
- - computer network in which two or more computer and peripheral devices are connected within a small area.
- - hacking which is done for a good cause.
- - a topology in which each node is connected to every other node in the network.
- - a means of communication that uses low powered radio waves to transmit the data between devices.
- - a computer network that is mainly created for an individual person.
Down
- - it refers to an illegal intrusion into computer system of network.
- - it refers to criminal activities that involve the use of computers, networks, and the internet connection with the intent to cause harm to individuals or the digital devices.
- - when software is copied and distributed illegally.
- - a device that connects two different types of networks with each other.
- - a term is a combination of two terms, 'net' and 'etiquette'.
- - network device that is used to connect all computers in a network with each other.
- - it refers to the act of using or imitating the language and thoughts of another person as one's original work.
- - it refers to unwanted bulk emails that come from unknown sourcess.
17 Clues: - hacking which is done for a good cause. • - when software is copied and distributed illegally. • - a term is a combination of two terms, 'net' and 'etiquette'. • - it refers to an illegal intrusion into computer system of network. • - it refers to unwanted bulk emails that come from unknown sourcess. • ...
Computer Holiday Homework 2025-06-01
Across
- - a kind of network which connects two or more computer located as distant places.
- - a topology in which all the notes are connected in a circular manner.
- - an impression or information about the person that exist on the internet because of his online activity.
- - device that enables you to connect your computer to the available internet connection over the existing telephone
- - computer network in which two or more computer and peripheral devices are connected within a small area.
- - hacking which is done for a good cause.
- - a topology in which each node is connected to every other node in the network.
- - a means of communication that uses low powered radio waves to transmit the data between devices.
- - a computer network that is mainly created for an individual person.
Down
- - it refers to an illegal intrusion into computer system of network.
- - it refers to criminal activities that involve the use of computers, networks, and the internet connection with the intent to cause harm to individuals or the digital devices.
- - when software is copied and distributed illegally.
- - a device that connects two different types of networks with each other.
- - a term is a combination of two terms, 'net' and 'etiquette'.
- - network device that is used to connect all computers in a network with each other.
- - it refers to the act of using or imitating the language and thoughts of another person as one's original work.
- - it refers to unwanted bulk emails that come from unknown sourcess.
17 Clues: - hacking which is done for a good cause. • - when software is copied and distributed illegally. • - a term is a combination of two terms, 'net' and 'etiquette'. • - it refers to an illegal intrusion into computer system of network. • - it refers to unwanted bulk emails that come from unknown sourcess. • ...
Crossword puzzle 2025-06-01
Across
- - a kind of network which connects two or more computer located as distant places.
- - a topology in which all the notes are connected in a circular manner.
- - an impression or information about the person that exist on the internet because of his online activity.
- - device that enables you to connect your computer to the available internet connection over the existing telephone
- - computer network in which two or more computer and peripheral devices are connected within a small area.
- - hacking which is done for a good cause.
- - a topology in which each node is connected to every other node in the network.
- - a means of communication that uses low powered radio waves to transmit the data between devices.
- - a computer network that is mainly created for an individual person.
Down
- - it refers to an illegal intrusion into computer system of network.
- - it refers to criminal activities that involve the use of computers, networks, and the internet connection with the intent to cause harm to individuals or the digital devices.
- - when software is copied and distributed illegally.
- - a device that connects two different types of networks with each other.
- - a term is a combination of two terms, 'net' and 'etiquette'.
- - network device that is used to connect all computers in a network with each other.
- - it refers to the act of using or imitating the language and thoughts of another person as one's original work.
- - it refers to unwanted bulk emails that come from unknown sourcess.
17 Clues: - hacking which is done for a good cause. • - when software is copied and distributed illegally. • - a term is a combination of two terms, 'net' and 'etiquette'. • - it refers to an illegal intrusion into computer system of network. • - it refers to unwanted bulk emails that come from unknown sourcess. • ...
Crossword puzzle 2025-06-01
Across
- - a kind of network which connects two or more computer located as distant places.
- - a topology in which all the notes are connected in a circular manner.
- - an impression or information about the person that exist on the internet because of his online activity.
- - device that enables you to connect your computer to the available internet connection over the existing telephone
- - computer network in which two or more computer and peripheral devices are connected within a small area.
- - hacking which is done for a good cause.
- - a topology in which each node is connected to every other node in the network.
- - a means of communication that uses low powered radio waves to transmit the data between devices.
- - a computer network that is mainly created for an individual person.
Down
- - it refers to an illegal intrusion into computer system of network.
- - it refers to criminal activities that involve the use of computers, networks, and the internet connection with the intent to cause harm to individuals or the digital devices.
- - when software is copied and distributed illegally.
- - a device that connects two different types of networks with each other.
- - a term is a combination of two terms, 'net' and 'etiquette'.
- - network device that is used to connect all computers in a network with each other.
- - it refers to the act of using or imitating the language and thoughts of another person as one's original work.
- - it refers to unwanted bulk emails that come from unknown sourcess.
17 Clues: - hacking which is done for a good cause. • - when software is copied and distributed illegally. • - a term is a combination of two terms, 'net' and 'etiquette'. • - it refers to an illegal intrusion into computer system of network. • - it refers to unwanted bulk emails that come from unknown sourcess. • ...
Year 5 - Introduction to computers 2024-03-11
Across
- This person is known as the 'farther of computers'
- These devices are used to enter data and instructions to the computer
- They are also known as personal computers
- These are raw facts and meaningless on their own
- Hundreds of users can work with this type of computers at a time
- This known to be the first calculating device
- This was named the general purpose computer
- This mathematician invented the Leibniz calculator
Down
- When data arranged in a meaningful way, it is called
- This was named the first automatic digital computer
- These computers are extremely fast
- When numbers are arranged in big to small order called
- These types of computers are used in banking, airlines and railways
- This is considered to be the first mechanical calculator
14 Clues: These computers are extremely fast • They are also known as personal computers • This was named the general purpose computer • This known to be the first calculating device • These are raw facts and meaningless on their own • This person is known as the 'farther of computers' • This mathematician invented the Leibniz calculator • ...
The anatomy of a computer 2021-02-08
Across
- Houses your graphics card which in turn supplies images to your monitor.
- A lot of older devices use this port.
- Temporary information stored by the cpu.
- A component that sends power through cables to each device in a computer.
- Used to connect different types of peripherals.
- Many peripherals require this type of connection.
- The brain of the computer.
- A large circuitboard that houses most of your computer's components.
Down
- Most mice and keyboards require this connection.
- Printers and scanners use this port.
- slots that let peripherals communicate with the processor quickly.
- If you don't have an integrated sound chip you buy this.
- A basic operating system that performs system checks when you turn on your computer before the main OS starts.
13 Clues: The brain of the computer. • Printers and scanners use this port. • A lot of older devices use this port. • Temporary information stored by the cpu. • Used to connect different types of peripherals. • Most mice and keyboards require this connection. • Many peripherals require this type of connection. • If you don't have an integrated sound chip you buy this. • ...
Rozhnov's Bread 2021-03-13
Across
- especially facts or numbers, collected to be examined and considered and used to help decision-making, or information in an electronic form that can be stored and used by a computer
- a disease in a part of your body that is caused by bacteria or a virus.
- a computer program that makes it possible for you to read information on the internet
- a piece of electronic equipment that connects computer networks to each other, and sends information between networks
- a series of instructions that can be put into a computer in order to make it perform an operation
- likely to change often
- the large system of connected computers around the world that allows people to share information and communicate with each other
- a device that uses either a system of wires along which electrical signals are sent or a system of radio signals to make it possible for you to speak to someone in another place who has a similar device
- a camera that records moving pictures and sound and allows these to be broadcast on the internet as they
- a piece of equipment that you speak into to make your voice louder, or to record your voice or other sounds
- to change electronic information or signals into a secret code that people cannot understand or use on normal equipment
Down
- a system of writing that prevents most people from understanding the message
- the physical and electronic parts of a computer, rather than the instructions it follows
- a piece of thin metal thread that can be bent, used for fastening things and for making particular types of objects that are strong but can bend
- facts about a situation, person, event, etc.
- the part of a computer that controls all the other parts
- a system of words, letters, or signs used to represent a message in secret form, or a system of numbers, letters, or signals used to represent something in a shorter or more convenient form
- a computer that is small enough to be carried around easily and is flat when closed
- a special area on a laptop or other computer that you touch in order to move the cursor or give an instruction
- the set of keys on a computer or typewriter that you press in order to make it work
- a central computer from which other computers get information
- an electronic machine that is used for storing, organizing, and finding words, numbers, and pictures, for doing calculations, and for controlling other machines
22 Clues: likely to change often • facts about a situation, person, event, etc. • the part of a computer that controls all the other parts • a central computer from which other computers get information • a disease in a part of your body that is caused by bacteria or a virus. • a system of writing that prevents most people from understanding the message • ...
Technology in material development 2021-07-22
Across
- Several development of hardware and
- Seeks to integrate different skills
- Sounds,photographic quality still
- applications which took
- hipermedia capabilities of
- and video recordiings.
- highlighted in the
- be designed from an interactive and coherent holistic
- and
Down
- Learner -centred explorative
- Is the standard form of personal
- in education.
- of the theoricalhypertext
- Is a term tending to makeuse of
- by Warschaver and Healey(1998)
- Was among the 1970s and 1980s
- technologhy more fully into the
- previously called behavioristic
- of language learning.
- which examined the computer
- A material authoring programs was one
- types of media including
22 Clues: and • in education. • highlighted in the • of language learning. • and video recordiings. • types of media including • of the theoricalhypertext • applications which took • hipermedia capabilities of • which examined the computer • Learner -centred explorative • Was among the 1970s and 1980s • by Warschaver and Healey(1998) • Is a term tending to makeuse of • ...
Hardware and Software 2020-12-01
Across
- The number of main types of software
- A type of softcopy output device
- There are 4 different categories
- Application and system
- A memory device
- One of the four categories of hardware
Down
- a printed circuit board containing the principal components of a computer or other device, with connectors for other circuit boards to be slotted into.
- Fill in the missing word (....... Processing Unit)
- Input device invented in 1964
- Hardware is the ........ components of a computer
- Another way of saying 'storage device'(type of hardware)
- CD, DVD, Bluray etc
12 Clues: A memory device • CD, DVD, Bluray etc • Application and system • Input device invented in 1964 • A type of softcopy output device • There are 4 different categories • The number of main types of software • One of the four categories of hardware • Hardware is the ........ components of a computer • Fill in the missing word (....... Processing Unit) • ...
Malware-N 2018-01-16
Across
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- What the second "D" in "DDoS" stands for.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
Down
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- Term for a computer added to a botnet.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- Someone who knows a lot about computers and loves to fool around with them.
- Not dangerous. Possibly beneficial.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
19 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Technology Thing 8 2022-03-04
Across
- program or piece of code that is loaded onto your computer without your knowledge
- software that is intended to damage or disable computers and computer systems.
- is identifying and fixing problems with software or hardware.
- to cleanse of harmful organisms.
- software that aids in gathering information about a person or organization without their knowledge.
Down
- software is software used to detect and eliminate computer viruses and other types of malware.
- software that is intended to damage or disable computers and computer systems.
- a computer has a virus.
- Software that displays ads on your computer, collects marketing data about you, and can redirect your search results.
- diagram that shows how you progress step-by-step using connecting lines
- is to find the answer.
11 Clues: is to find the answer. • a computer has a virus. • to cleanse of harmful organisms. • is identifying and fixing problems with software or hardware. • diagram that shows how you progress step-by-step using connecting lines • software that is intended to damage or disable computers and computer systems. • ...
Hardware/Software 2024-02-29
Across
- it’s a series of instructions that tells the hardwarewhat to do
- a computer program that makes it possible for you to read information on the internet
- There are two main types of software:systems software
- It’s the real, physical stuff that we can see and touch
- one of the examples of hardware
- Input...are things that take in information from the outside world.
Down
- Hardware can be categorized into input and...
- the set of keys on a computer or typewriter that you press in order to make it work
- what stands for a word "app"
- the part of a computer that controls all the other parts
- The biggest part of systems software is the ....system.
- a small device that you move across a surface in order to move a cursor on your computer screen
- Hardware is like the body,and software is like the...
13 Clues: what stands for a word "app" • one of the examples of hardware • Hardware can be categorized into input and... • There are two main types of software:systems software • Hardware is like the body,and software is like the... • The biggest part of systems software is the ....system. • the part of a computer that controls all the other parts • ...
Exploring Computer Memory 2021-07-26
Across
- Data in secondary storage is safe because of high physical stability of secondary storage device.
- storage is one of the most valuable assets of the computer.
- is the smallest unit of data in a computer and can either store a 0 or 1.
- A group of 4 bits is called ______ and 8 bits form a byte.
Down
- memory is a memory that loses its contents when the computer or hardware device loses power.
- memory is the area in which data is stored by CPU for processing.
- is the major part of computers that can be categorized into several types.
- is much faster to read from and write to than the other kinds of storage or memory in a computer.
- the chip wakes up the computer when you turn it on, reminds it what parts it has and what they do.
- memory uses the property of magnet for storing data.
- chip is not only used in the computer but also in other electronic items like washing machine and microwave oven.
- are typically a sequence of eight bits put together to create a single computer character alphabetic or numeric.
12 Clues: memory uses the property of magnet for storing data. • A group of 4 bits is called ______ and 8 bits form a byte. • storage is one of the most valuable assets of the computer. • memory is the area in which data is stored by CPU for processing. • is the smallest unit of data in a computer and can either store a 0 or 1. • ...
NETWORKING CONCEPTS 2025-06-12
Across
- Enables you to connect your computer to the available internet connection over the existing telephone lines.
- also known as Local Area Network.
- a device that connects two different types of networks with each other.
- a type of topology in which each node is connected to every other node in the network.
- a computer network created for an individual.
- short form of Wide Area Network.
- a type of topology uses a single communication line to which all nodes are directly connected.
- a type of topology in which all the nodes in the network are connected in a circular manner.
Down
- certain sets of rules that determine how data should be transferred.
- refers to a computer network restricted to an organisation.
- Each computer in a network.
- refers to the layout in which the various components of a network are connected and communicated with each other.
- also known as Metropolitan Area Network.
- a network device that is used to connect all the computers in a network with each other.
- a type of topology in which each device is connected to a central computer using a poin to point connection.
15 Clues: Each computer in a network. • short form of Wide Area Network. • also known as Local Area Network. • also known as Metropolitan Area Network. • a computer network created for an individual. • refers to a computer network restricted to an organisation. • certain sets of rules that determine how data should be transferred. • ...
Exploring Computer Memory 2021-07-26
Across
- Data in secondary storage is safe because of high physical stability of secondary storage device.
- _____ storage is one of the most valuable assets of the computer.
- _____ is the smallest unit of data in a computer and can either store a 0 or 1.
- _____ A group of 4 bits is called ______ and 8 bits form a byte.
Down
- ____ memory is a memory that loses its contents when the computer or hardware device loses power.
- ____ memory is the area in which data is stored by CPU for processing.
- _____ is the major part of computers that can be categorized into several types.
- _____ is much faster to read from and write to than the other kinds of storage or memory in a computer.
- _____ the chip wakes up the computer when you turn it on, reminds it what parts it has and what they do.
- _____ memory uses the property of magnet for storing data.
- _____ chip is not only used in the computer but also in other electronic items like washing machine and microwave oven.
- _____ are typically a sequence of eight bits put together to create a single computer character alphabetic or numeric.
12 Clues: _____ memory uses the property of magnet for storing data. • _____ A group of 4 bits is called ______ and 8 bits form a byte. • _____ storage is one of the most valuable assets of the computer. • ____ memory is the area in which data is stored by CPU for processing. • _____ is the smallest unit of data in a computer and can either store a 0 or 1. • ...
Computer Parts and Terms 2014-11-11
Across
- A computer which may be used to provide services to clients.
- A collection of computers and devices connected by communications channels.
- A pointing device that functions by detecting two-dimensional motion relative to its supporting surface.
- ___________ is a digital display interface developed by the Video Electronics Standards Association (VESA). The interface is primarily used to connect a video source to a display device such as a computer monitor, though it can also be used to transmit audio, USB, and other forms of data.
- A hardware device or software to protect a computer from viruses, malware, trojans etc.
- An electronic or electromechanical hardware device that is used for entering data into, and displaying data from, a computer or a computing system.
- _________ case (or computer chassis, cabinet, box, tower, enclosure, housing, system unit or simply case) - the enclosure that contains most of the components of a computer (usually excluding the display, keyboard and mouse).
- Computer programs and other kinds of information read and written by computers
- Devices that are used to store data or programs on a temporary or permanent basis for use in an electronic digital computer.
- The physical components of a computer.
- (or chip set) - a group of integrated circuits, or chips, that are designed to work together. They are usually marketed as a single product.
- (Digital Video Disc or Digital Versatile Disc) - an optical compact disc - of the same dimensions as compact discs (CDs), but store more than six times as much data.
- (Dynamic random-access memory) - a type of random-access memory that stores each bit of data in a separate capacitor within an integrated circuit and which must be periodically refreshed to retain the stored data.
Down
- A computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
- A peripheral which produces a text or graphics of documents stored in electronic form, usually on physical print media such as paper or transparencies.
- (Synchronous dynamic random access memory) - dynamic random access memory that is synchronized with the system bus.
- An electronic visual display for computers.
- The central printed circuit board (PCB) in many modern computers which holds many of the crucial components of the system, while providing connectors for other peripherals.
- A device attached to a computer but not part of it.
- Any form of computer data storage that allow stored data to be accessed in any order (i.e., at random).
- An input device, partially modeled after the typewriter keyboard, which uses an arrangement of buttons or keys, to act as mechanical levers or electronic switches.
- A pointing device consisting of specialized surface that can translate the motion and position of a user's fingers or a stylus to a relative position on a screen.
- A webcam is a video camera that feeds its images in real time to a computer or computer network, often via USB, Ethernet, or Wi-Fi.
23 Clues: The physical components of a computer. • An electronic visual display for computers. • A device attached to a computer but not part of it. • A computer which may be used to provide services to clients. • A collection of computers and devices connected by communications channels. • Computer programs and other kinds of information read and written by computers • ...
The Journey Inside a Computer Crossword! 2017-02-10
Across
- Another word for 'Binary Digit'
- 2 types: ROM and RAM.
- Houses graphics card
- Can only use 1's and 0's
- Abbreviation for 'Basic Input Output System'.
- Switches inside a microprocessor.
- Example of input device.
- An example of this is a printer
- Retrieves program instruction and passes it on to decode.
- Uses binary calculators to do math.
- Houses most computer components.
Down
- A picture element
- Example of output device.
- ______ ______ are much slower than the new USB and FireWire ports
- Computers cannot work without the ________.
- Anything that can be recognized by humans or machines.
- An example of this is a microphone
- Supplies the image to the monitor
- The data entered into a computer.
- Funnels power to each device
- Receives program instruction from fetch and sends it to a specific place
- Temporary (short-term) storage/memory.
- Long-term or permanent storage/memory.
23 Clues: A picture element • Houses graphics card • 2 types: ROM and RAM. • Can only use 1's and 0's • Example of input device. • Example of output device. • Funnels power to each device • Another word for 'Binary Digit' • An example of this is a printer • Houses most computer components. • Supplies the image to the monitor • The data entered into a computer. • ...
Chapter 1 - Wood: Technology and Processes 2024-08-26
Across
- dense and durable wood types
- Manufacturing using computers to control machinery
- usually a dark round or oval spot at the point where a branch had formed on the tree.
- lengthwise separation of wood.
- any variation from a straight, true planed surface
- decorative trim for edges
- Cutting removing specific trees
- someone who starts a business
Down
- layers of wood glued together
- Cutting removing all trees in an area
- less dense wood types
- slanting edge on a board created when lumber is cut
- rotting of the wood
- a curve across the grain so the board is no longer flat
- Drafting designing with computer software
- Stock large flat wood sheets
- a turning of the edges so that the four corners of any face are no longer on the same plane.
- Wood man-made wood products
- separation of the wood, usually length wise across the growth rings. Often appears at the end of a board.
19 Clues: rotting of the wood • less dense wood types • decorative trim for edges • Wood man-made wood products • dense and durable wood types • Stock large flat wood sheets • layers of wood glued together • someone who starts a business • lengthwise separation of wood. • Cutting removing specific trees • Cutting removing all trees in an area • Drafting designing with computer software • ...
AWL #3 Project 2018-07-21
Across
- to increase
- an event
- a believe
- to put information into a computer
- firmly fixed
- to discover the position of yourself
- To change something
Down
- an organization such as business
- different types of people
- to cause something to exist
- to develop gradually
- to change the words of a text
- to follow someone or something
13 Clues: an event • a believe • to increase • firmly fixed • To change something • to develop gradually • different types of people • to cause something to exist • to change the words of a text • to follow someone or something • an organization such as business • to put information into a computer • to discover the position of yourself
TechWord 2013-01-09
Across
- A type of computing delivered as a service over a network (typically the Internet).
- A physical computer dedicated to run one or more services as a host.
- CA Technologies headquarters is based in.
- A software delivery model, in which software and associated data; are centrally hosted on the cloud.
- A computer used primarily by corporate and governmental organizations for critical applications, bulk data processing such as census, industry and consumer statistics, enterprise resource planning, and transaction processing.
- A secret word, or string of characters, that is used for user authentication to prove identity.
- A device that forwards data packets between computer networks.
Down
- There are three different types of data ______ produced while progressing from requirements to the actual database to be used for the information system
- A collection of physical elements, that comprise a computer system.
- Computer programs and related data, that provides the instructions for telling a computer what to do and how to do it.
- A collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information.
- Chief and _____
- The US state that CA World 2013 is being held in.
- The Internet can be considered a ___
14 Clues: Chief and _____ • The Internet can be considered a ___ • CA Technologies headquarters is based in. • The US state that CA World 2013 is being held in. • A device that forwards data packets between computer networks. • A collection of physical elements, that comprise a computer system. • A physical computer dedicated to run one or more services as a host. • ...
Unit 7.1 - ICT Applications 2013-04-29
Across
- The combination of various types of media e.g. text, videos, sound etc.
- A _____ sensor can detect if someone is standing on it
- Input devices called _____ feed data into the computer
Down
- A device, controlled by a computer, that can affect the real-world
- This is an article on the internet, which anyone can change
- A computer program that attempts to simulate a real-life system
- A type of computer program which stores a lot of data on a particular topic
- This is a command to make something do the same thing lots of times
- A computer model of a weather system can be used to _____ storms
- Controlling things on a screen - drop the 'pen' down onto the 'paper'
10 Clues: A _____ sensor can detect if someone is standing on it • Input devices called _____ feed data into the computer • This is an article on the internet, which anyone can change • A computer program that attempts to simulate a real-life system • A computer model of a weather system can be used to _____ storms • ...
peripherals 2015-11-04
Across
- used to control a pointer on the screen of a computer
- wireless connection
- use a combination of buttons and mini thumb-controlled joysticks
- hard drive
- used to copy physical printed materials into the computer
- screen, printer, speakers, headphones
Down
- This was the first games console to make a motion sensor the principal controller
- mouse, keyboard, webcam, games controller
- used in many systems including security, temperature control, motion and eye tracking
- barcodes are scanned by a reader and the numbers in the code correspond to records in a database
- similar to a mouse, this is used where extreme accuracy is needed
- used to enter characters and data into computers
- different types of cards use magnetic bands to store information
- motion sensor that plugs into a computer through a USB connection
- used to capture and create images
15 Clues: hard drive • wireless connection • used to capture and create images • screen, printer, speakers, headphones • mouse, keyboard, webcam, games controller • used to enter characters and data into computers • used to control a pointer on the screen of a computer • used to copy physical printed materials into the computer • ...
AWL #3 Project 2018-07-21
Across
- an organization such as business
- to develop gradually
- To change something
- to cause something to exist
- to discover the position of yourself
- to change the words of a text
Down
- a believe
- an event
- different types of people
- to follow someone or something
- firmly fixed
- to increase
- to put information into a computer
13 Clues: an event • a believe • to increase • firmly fixed • To change something • to develop gradually • different types of people • to cause something to exist • to change the words of a text • to follow someone or something • an organization such as business • to put information into a computer • to discover the position of yourself
Chapter 1 - Digital Devices 2020-06-24
Across
- the least user friendly interface
- detects black dots on a piece of paper
- devices that can be connected to a computer
- blurs the distinction between different types of devices
- a type of touch screen
- raw facts
- a pointing device used on a laptop
- this device can collect information which humans cannot detect
- a type of monitor
Down
- used to print high quality graphics
- computers which can handle one user at a time
- a type of security feature on digital devices
- a device that can be used to listen to play audio or video files
- converts hard copy into soft copy
- a storage device used on credit cards
- computer used to carry out specific tasks
16 Clues: raw facts • a type of monitor • a type of touch screen • the least user friendly interface • converts hard copy into soft copy • a pointing device used on a laptop • used to print high quality graphics • a storage device used on credit cards • detects black dots on a piece of paper • computer used to carry out specific tasks • devices that can be connected to a computer • ...
Crossword: Cybersecurity 2023-11-09
Across
- the current era characterized by widespread use of digital technology
- a person who uses computers to gain unauthorized access to data.
- a computer program that records every keystroke made by a computer user,
- concept of protecting computer systems, networks, and data from theft, damage, or unauthorized access
Down
- a type of disk storage composed of a thin and flexible disk of a magnetic storage medium
- Malicious software designed to spread from one computer to another
- a type of crime involving a computer or a computer network
- various types of malicious software, including viruses, worms, and spyware.
- process of converting information into a code to prevent unauthorized access
9 Clues: a type of crime involving a computer or a computer network • a person who uses computers to gain unauthorized access to data. • Malicious software designed to spread from one computer to another • the current era characterized by widespread use of digital technology • a computer program that records every keystroke made by a computer user, • ...
cybersecurity 2024-11-20
Across
- protocol for securing internet communications
- malware that watch your online activities without you knowing
- type of attack that involves trying all possibilities to find a password or codes
- design flaw in a computer program
- encrypt messages with keys
Down
- weakness in a computer system allowing an attacker to harm the integrity of that system
- check the data flows and what types of communications are allowed on a computer network.
- computer attack that aims to obtain personal data by relying on identity theft
- block access to the computer or files and demand payment
9 Clues: encrypt messages with keys • design flaw in a computer program • protocol for securing internet communications • block access to the computer or files and demand payment • malware that watch your online activities without you knowing • computer attack that aims to obtain personal data by relying on identity theft • ...
Networking 2025-06-10
Across
- device that is used to connect all computers in a network with each other
- protecting data and resources from unauthorised access
- each node is connected to every other node
- all nodes in a network are connected in circular manner
- works similar to a hub
- computer network that is mainly created for an individual person
Down
- a device that connect two different types of network with each other
- the main cable act as a backbone
- connect a computer to the available internet connection
- A card used to physically attach a computer to a network
- Computer network restricted to an organisation
11 Clues: works similar to a hub • the main cable act as a backbone • each node is connected to every other node • Computer network restricted to an organisation • protecting data and resources from unauthorised access • connect a computer to the available internet connection • all nodes in a network are connected in circular manner • ...
DigiTech Crossword 2021-05-07
Across
- Data stored on user's computer by web while browsing sites.
- K12HSN stands for: K-12__________.
- VPN stands for...
- A common use of cache is to store ______ in a web browser.
Down
- Directories are also known as...
- Measurement of printer speed.
- Restarting a computer without turning it off.
- One of the connectivity types is...
- Blocks or permits access attempts.
- a set of rules for transmitting data/communicating.
10 Clues: VPN stands for... • Measurement of printer speed. • Directories are also known as... • K12HSN stands for: K-12__________. • Blocks or permits access attempts. • One of the connectivity types is... • Restarting a computer without turning it off. • a set of rules for transmitting data/communicating. • A common use of cache is to store ______ in a web browser. • ...
Vignesh 1st AT 2022-02-03
Across
- where we can see many types of book
- search meaning
- which is used to make a presentation
- which electrical material gives the air
- black and white animal
- which is used to transport the goods
- opposite word for lucky
- used for head
- it is used to finger
- fill water and keep in it
Down
- king of jungle
- it flies at night
- round shaped fruit
- wild animal
- furniture material used to sleep
- pet animal
- open the lock
- heart of vehicles
- reflection of image
- national flower of India
20 Clues: pet animal • wild animal • open the lock • used for head • king of jungle • search meaning • it flies at night • heart of vehicles • round shaped fruit • reflection of image • it is used to finger • black and white animal • opposite word for lucky • national flower of India • fill water and keep in it • furniture material used to sleep • where we can see many types of book • ...
