types of computer Crossword Puzzles

Job occupations (20 pts) 2024-05-20

Job occupations (20 pts) crossword puzzle
Across
  1. paints houses
  2. attends passengers
  3. charges your bills
  4. takes away your waste
  5. takes photos
  6. fix computers
  7. puts out a fire
  8. cleans the office
  9. types letters
  10. cures patients
Down
  1. catches criminal people
  2. cooks food
  3. brings your restaurant order
  4. cuts the grass
  5. cares patients
  6. bakes breads
  7. catches fix
  8. fixes water pipes
  9. flies an airplane
  10. teaches any subject

20 Clues: cooks foodcatches fixbakes breadstakes photospaints housesfix computerstypes letterscuts the grasscares patientscures patientsputs out a firefixes water pipesflies an airplanecleans the officeattends passengerscharges your billsteaches any subjecttakes away your wastecatches criminal peoplebrings your restaurant order

Anatomy of a Computer 2021-09-16

Anatomy of a Computer crossword puzzle
Across
  1. Allows you to add devices like modems
  2. Holds the computer's graphic card
  3. Carries the computer's instructions
  4. Port You can attach old keyboards and mice in it
  5. Used to connect many types of peripherals
  6. many peripherals need this for connections
  7. Foundation of a computer
Down
  1. Port Old peripherals need this to connect
  2. Most peripherals require it
  3. It supplies power through multicolored cables
  4. Card Can be used if your motherboard does not have a sound chip
  5. Stores information in your computer
  6. Lets the processor communicate with the peripherals

13 Clues: Foundation of a computerMost peripherals require itHolds the computer's graphic cardCarries the computer's instructionsStores information in your computerAllows you to add devices like modemsPort Old peripherals need this to connectUsed to connect many types of peripheralsmany peripherals need this for connections...

Parts of a Computer 2024-02-06

Parts of a Computer crossword puzzle
Across
  1. Used for better sound quality
  2. The brain that carries out the computer's instructions
  3. Funnels power through multicolored cables
  4. Connects many different types of peripherals without rebooting the computer
  5. Transfers data from computer to peripherals
  6. Allows peripherals to communicate quickly with the processor
  7. Used to connect older printers/scanners
Down
  1. Holds most of the computer's components
  2. Holds the graphics card
  3. Used to connect the mouse and keyboard
  4. Also known as the communications port
  5. Performs system checks before starting your main OS
  6. Stores temporary information

13 Clues: Holds the graphics cardStores temporary informationUsed for better sound qualityAlso known as the communications portUsed to connect the mouse and keyboardHolds most of the computer's componentsUsed to connect older printers/scannersFunnels power through multicolored cablesTransfers data from computer to peripherals...

Anatomy Of A Computer 2020-02-04

Anatomy Of A Computer crossword puzzle
Across
  1. Attach to one of the motherboard's PCI slots
  2. Much slower than new USB and FireWire ports
  3. Used to connect many different types of peripherals
  4. Purple keyboard port and green mouse port
  5. Let peripherals communicate and able to add devices like modems and sound cards
  6. Able to draw power from the computer through the USB port and transfer data
  7. Redirects excess data to your hard drive
  8. Houses your graphics card
Down
  1. The brain that carries out the computer's instructions
  2. USB and FireWire connections are quickly replacing this
  3. Houses most computer components
  4. Activates when you turn on the computer and lets the processor communicate
  5. Funnels power through the multicoloured cables to each device

13 Clues: Houses your graphics cardHouses most computer componentsRedirects excess data to your hard drivePurple keyboard port and green mouse portMuch slower than new USB and FireWire portsAttach to one of the motherboard's PCI slotsUsed to connect many different types of peripheralsThe brain that carries out the computer's instructions...

anatomy of a computer - Emma 2015-07-28

anatomy of a computer - Emma crossword puzzle
Across
  1. The central command of your computer that gives instructions
  2. Connected to devices such as older printers or scanners.
  3. A chip located all motherboards which actives when turning on the computer and preforms system checks.
  4. The place where the CPU stores temporary information.
  5. It supplies the image to the monitor.
  6. to get a better sound quality
Down
  1. Attach some older keyboards,mice etc.
  2. it connects many different types of peripherals.
  3. It's slots leet peripherals communicate quickly with the processor.
  4. Directs data traffic to and from the appropriate devices. It is like the heart of your computer.
  5. Are often used in the old time but are still used by some as an older port.
  6. Funnels power through the multicolored cables to each device.
  7. To draw power from the computer in addition to data through the port

13 Clues: to get a better sound qualityAttach some older keyboards,mice etc.It supplies the image to the monitor.it connects many different types of peripherals.The place where the CPU stores temporary information.Connected to devices such as older printers or scanners.The central command of your computer that gives instructions...

Anatomy Of A Computer 2020-02-04

Anatomy Of A Computer crossword puzzle
Across
  1. attach to one of the motherboard's PCI slots
  2. Much slower than new USB and FireWire ports
  3. Used to connect many different types of peripherals
  4. Purple keyboard port and green mouse port
  5. let peripherals communicate and able to add devices like modems and sound cards
  6. Able to draw power from the computer through the USB port and transfer data
  7. Redirects excess data to your hard drive
  8. Houses your graphics card
Down
  1. The brain that carries out the computer's instructions
  2. USB and FireWire connections are quickly replacing this
  3. Houses most computer components
  4. Activates when you turn on the computer and lets the processor communicate
  5. Funnels power through the multicoloured cables to each device

13 Clues: Houses your graphics cardHouses most computer componentsRedirects excess data to your hard drivePurple keyboard port and green mouse portMuch slower than new USB and FireWire portsattach to one of the motherboard's PCI slotsUsed to connect many different types of peripheralsThe brain that carries out the computer's instructions...

Introduction to Computer Networks Chapter 2025-02-11

Introduction to Computer Networks Chapter crossword puzzle
Across
  1. A private internet
  2. The process of adding IP addresses and then MAC addresses to chunks of data is called
  3. represented by collections of 8 bits, called a ____
  4. is a computer program stored in nonvolatile memory, such as ROM or flash memory
  5. The _______ control data transfers between memory, expansion slots, I/O devices, and the CPU.
  6. A network that allows limited and controlled access to internal network resources by outside users.
  7. ther types of nontraditional computers include smartphones, smart watches, home assistants like Amazon Echo and Google Home,
  8. information added at the end of data is called a ______
Down
  1. the more well-known term, is often used generically to mean a chunk of data sent over the network.
  2. The most obvious are network _______ and workstations that run operating systems, such as Windows, Linux, UNIX, and Mac OS X.
  3. A bus is a collection of wires carrying data from one place to another on the computer.
  4. The brain of a computer
  5. The username and password for accessing a computer are called
  6. The function of this ____ is to tell the CPU to perform certain tasks when power is first applied to the computer
  7. A _____ is a packet with the source and destination MAC addresses added to it.
  8. It holds a 1 or 0 value
  9. Information added at the front of data is called a ____

17 Clues: A private internetThe brain of a computerIt holds a 1 or 0 valuerepresented by collections of 8 bits, called a ____Information added at the front of data is called a ____information added at the end of data is called a ______The username and password for accessing a computer are called...

Fifth part. Job occupations crossword (20 pts) 2024-05-22

Fifth part. Job occupations crossword (20 pts) crossword puzzle
Across
  1. paints houses
  2. teaches any subject
  3. fix computers
  4. cuts the grass
  5. bakes breads
  6. puts out a fire
  7. cares patients
Down
  1. fixes water pipes
  2. types letters
  3. take photos
  4. attends passengers
  5. cleans offices
  6. catches fix
  7. flies an airplane
  8. cures patients
  9. charges your bills
  10. catches criminal people
  11. takes away your waste
  12. brings your restaurant order
  13. cooks food

20 Clues: cooks foodtake photoscatches fixbakes breadstypes letterspaints housesfix computerscleans officescures patientscuts the grasscares patientsputs out a fireflies an airplaneattends passengerscharges your billsteaches any subjecttakes away your wastecatches criminal peoplebrings your restaurant orderfixes water pipes

Online Safety 2023-11-13

Online Safety crossword puzzle
Across
  1. – Malicious code embedded in a data or program file, spread from one device to another by opening an executable file. A virus is spread by human action.
  2. – Criminal acts using computers, networks and/or the Internet
  3. – Software that has advertisements embedded into the program
  4. – Software that detects and removes spyware from a computer
  5. – Malware that locks a computer system or encrypts computer files until a “ransom” fee is paid
  6. – Electronic junk mail
Down
  1. Forensics – Investigation and analysis techniques that gather and preserve data from a computing device
  2. Theft – All types of crime in which someone obtains and uses another person’s personal data in a way that involves fraud or deception, typically for economic gain
  3. – Hardware or software that blocks unauthorized communications to or from your computer; helps prevent hackers from accessing your computer
  4. – Person who uses the Internet to access personal or business computers without permission
  5. – A variation of phishing using SMS (short message service) to send misleading text messages
  6. – Short for “malicious software;” includes viruses and spyware that steal personal information, send spam and commit fraud
  7. – Email sent that misrepresents the sender as legitimate and with the intent of having the recipient reveal private information that can be used for identity theft
  8. – A subclass of virus that can travel without being attached to a program or data file and without human action; a worm can replicate itself thousands of times
  9. – Malware that appears to be a legitimate program, but when activated often causes loss or theft of computer data
  10. logger or keylogger – Software that can record every keystroke you make on your computer. Used to record and capture data input. (Keyloggers are often used by employers to ensure computer use is work-related)

16 Clues: – Electronic junk mail– Software that detects and removes spyware from a computer– Software that has advertisements embedded into the program– Criminal acts using computers, networks and/or the Internet– Person who uses the Internet to access personal or business computers without permission...

Programming Crossword 2017-03-06

Programming Crossword crossword puzzle
Across
  1. A general purpose programming language created by Larry Wall
  2. A dynamic, reflective, object-oriented, general-purpose programming language created by Yukihiro Matsumoto
  3. A graphical way of representing an algorithm
  4. An electronic experience using programming languages played on a console or computer
  5. Able to be used on different types of computers or with different software packages
  6. A programming language that supports scripts
  7. A concurrent, class-based, object-oriented programming language, first appearing in 1995
  8. A functional programming language designed by Guy L. Steele and Gerald Jay Sussman
Down
  1. A widely used programming language created by Guido van Rossum
  2. An imperative and procedural programming language created by Niklaus Wirth
  3. A computer programming language of binary or hexadecimal instructions which a computer can respond to directly
  4. a programming paradigm that uses statements that change a program's state
  5. A step by step process to be followed by the computer
  6. A verbose, business oriented programming language
  7. A visual programming language designed for students

15 Clues: A graphical way of representing an algorithmA programming language that supports scriptsA verbose, business oriented programming languageA visual programming language designed for studentsA step by step process to be followed by the computerA general purpose programming language created by Larry Wall...

Programming Crossword 2017-03-06

Programming Crossword crossword puzzle
Across
  1. A graphical way of representing an algorithm
  2. A computer programming language of binary or hexadecimal instructions which a computer can respond to directly
  3. An electronic experience using programming languages played on a console or computer
  4. A widely used programming language created by Guido van Rossum
  5. An imperative and procedural programming language created by Niklaus Wirth
  6. A functional programming language designed by Guy L. Steele and Gerald Jay Sussman
  7. A programming language that supports scripts
  8. A dynamic, reflective, object-oriented, general-purpose programming language created by Yukihiro Matsumoto
Down
  1. a programming paradigm that uses statements that change a program's state
  2. Able to be used on different types of computers or with different software packages
  3. A concurrent, class-based, object-oriented programming language, first appearing in 1995
  4. A step by step process to be followed by the computer
  5. A verbose, business oriented programming language
  6. A visual programming language designed for students
  7. A general purpose programming language created by Larry Wall

15 Clues: A graphical way of representing an algorithmA programming language that supports scriptsA verbose, business oriented programming languageA visual programming language designed for studentsA step by step process to be followed by the computerA general purpose programming language created by Larry Wall...

RU ITEC 411 - Crime and Security 2025-04-14

RU ITEC 411 - Crime and Security crossword puzzle
Across
  1. (3 words separated by '-') these types of threat actors perform malicious activities with intent to cause harm to their victims. Their motivations are most times aligned with financial gain or embarrassment of the victim.
  2. a software fix that mitigates a known vulnerability within a computer system
  3. (3 words separated by '-') a type of cyber-attack that sends a server an influx of traffic to bog down the server and cause the service to malfunction preventing users from accessing or using the service
  4. (2 words separated by '-') the act of manipulating people in order to obtain personal information, behavior patterns or interests of the victim that can then be used to laterally build an attack against the victim
  5. types of information that threat actors use in order to build profiles on their victims. This type of data can be collected using publicly available, mostly online, resources. Some versions of this information include social media posts, public database records and etc.
  6. this is a type of malware that is designed to monitor a victims actions online. Some types of this malware can log a victims keystrokes, and activate webcams on victims computers or mobile devices. Then the information is logged and then sent to a threat actors designated server space.
  7. any criminal activity that is conducted against a computer system, targeting a computer system or is being used to obtain data for use in crime via the internet.
  8. (2 words separated by '-') a type of malware that is introduced into a victims system by running an infected application. The malware performs and initiates other types of malware attacks like installing a virus or sending spam emails.
  9. a type of malware that attaches to and spreads from resource to resource by self-replication
Down
  1. this is a type of malware that encrypts files on a victim's computer and in order to decrypt them the victim would be prompted to pay by a deadline or run the risk of all the data being released or destroyed
  2. a weakness or flaw that threat actors exploit to execute their attacks on a system
  3. the intentional access of a system to which the user has not been authorized access by a designated party
  4. a tactic used by threat actors to gather information to build a dossier on a victim. They obtain information by sending mass emails or text that are disguised as being sent by legitimate organizations (i.e. Amazon, PayPal, the IRS etc.) messages to get a victim to either provide information or click a link and provide their information.
  5. the ideology of hacking for “the greater good”. These types of hackers are considered white-hat hackers who attack based on political motivations.
  6. (3 words separated by '-') these types of threat actors perform hacking activities designed to identify vulnerabilities and improve overall system security
  7. the manipulation of telephone communications to bypass the need to pay for phone calls or obtain access into other systems on the network
  8. a device installed into card swipers found on POS terminals and ATMS to collect users credit/debit card numbers and PIN numbers to conduct credit card/debit card fraud on the victim.
  9. a type of malware that has many similarities to a virus. The main difference is that this type does not need other resources to evolve and cause extensive harm
  10. a tactic of cybersecurity professionals and threat actors where they present as a trusted/reputable source to solicit information or gain an advantage within their attack or investigation.
  11. a type of software that allows for circumvented access to a system without having to abide by a system's security features. They are often installed to aid law enforcement investigations but most times they are installed in order to provide threat actors with an easy way back into the system while they perform reconnaissance or the actual attack.

20 Clues: a software fix that mitigates a known vulnerability within a computer systema weakness or flaw that threat actors exploit to execute their attacks on a systema type of malware that attaches to and spreads from resource to resource by self-replication...

computer 5 2012-12-08

computer 5 crossword puzzle
Across
  1. logger a program, sometimes part of a Trojan horse, that Records computer activity, such as a user's keystrokes, emails, sites visited, and chat session And then sends them to a system admin. or remote hacker.
  2. rules determining the format and transmission of data
  3. device A device that is attached to the computer and aids in input and/or output, or storage capabilities such as printer
  4. processor begins fetching a second instruction before it completes the machine cycle for the first instruction
  5. 1024 bytes or 1,000 bytes
  6. animation that shows 3D subjects moving in rapid, jerky ways that are impossible in the real world
  7. system A computer system that collects, stores and processes info. Usually within the content of an organization
  8. language A programming language that is designed to be easy for a computer to execute; also called "machine language" or "assembly language."
  9. . A way of organizing a collection of docum. By assigning an address to each and providing a way to link from one address to another
  10. framework A concept developed by James Wetherbe to help identify problems in an information system. Each letter of PIECES stands for a potential problem (Performance, Information, Economics, Control, Efficiency, and Service).
  11. in terms of spreadsheets: common text used to describe data
  12. an email based scam that’s designed to fool users into reveling confidential info.
  13. 802.11 x standards: standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands
  14. Local Area Network: interconnected gp. of computers & peripherals located within a relative limited area, such as a building or campus
  15. transfer data from one computer to another via a cable that links connecting ports
Down
  1. Stuffing An unpopular practice of including a huge variety of keywords in the header of an HTML document in the hopes that a search engine will display it even when the content of the page is not relevant to the search.
  2. type The structure of a record, including the names, length, and data types for each field. 615
  3. The process of superimposing a grid over a vector image and determing the color depth for each pixel.
  4. the illegal copying and selling of movies without permission of copyright holder
  5. Internet Service Provider. A company that provides internet access to a business, organization or individual
  6. an application that allows the user to create and save slides to use as a slide show
  7. packet Internet groper: command on TCP/IP network that sends a test pkt. to a specified Ip address and waits for a relpy
  8. a scratch pad area of the microprocessor which holds data or instructions and are moved so that they can be processed
  9. the core module of an OS that typically manages memory, processes, tasks and storage devices.
  10. exploit that automatically redirects the user to a fake web site
  11. data types a data type specifying that a field in a data file is used to store true/ false or yes/no data
  12. Info that is conveyed to computer
  13. Joint Photographic Experts Group: a format that uses lossy compression to store bitmap images
  14. error a run-time error in the logic or design of a computer program
  15. An operating system based on UNIX, maintained by volunteers, and distributed for free. Linux is used mostly in servers and embedded computers, but is growing in popularity as a PC operating system.
  16. chart program evaluation and review technique chart : a project management techniques that displays interconnected events and milestones on a time line
  17. liquid crystal display. Technology used for slat panel computer screens, typically notebooks
  18. Post Office Protocol .Or POP3. A standard for retrieving email message from an email server
  19. Random Access Memory: computer memory circuitry that holds data, program instructions and the operating system while the computer is on.

34 Clues: 1024 bytes or 1,000 bytesInfo that is conveyed to computerrules determining the format and transmission of datain terms of spreadsheets: common text used to describe dataexploit that automatically redirects the user to a fake web siteerror a run-time error in the logic or design of a computer program...

Browsing safely 2025-05-19

Browsing safely crossword puzzle
Across
  1. It refers to an illegally en try into a Computer system
  2. grooming the process of 'befriend'children on social media
  3. Is a software that hells in preventing unauthorised access to a computer
  4. Fraud The use of illegal method to get money to get money
  5. Theft It refers go the act of stealing someone's personal information
  6. Is a collection of Technologies designed to protect Network ,Computers from unauthorised access
  7. an act of harming using information technology in a deliberate manner
  8. It is an act oc sending email to a user,misleading jim to believes that it is from trusted person
Down
  1. Criminal activity intended to harm anyone using a Computer
  2. Is designed to prevent and removed virus from a Computers
  3. extract confidential information from users and use this
  4. it is the program that disrupts the normal functioning of a Computer
  5. is fooled into believing that the message recieved by him is from A trusted source s
  6. What is Mcafee is a popular s software
  7. and password What are the Two types of Two step authentic atin for login

15 Clues: What is Mcafee is a popular s softwareIt refers to an illegally en try into a Computer systemextract confidential information from users and use thisIs designed to prevent and removed virus from a ComputersCriminal activity intended to harm anyone using a ComputerFraud The use of illegal method to get money to get money...

Unit 1 - Killer Crossword 2013-09-16

Unit 1 - Killer Crossword crossword puzzle
Across
  1. To work together
  2. Swipe and speech are examples of...
  3. Everything inside a system unit
  4. The brain of the computer
  5. Hardware that isn't inside the system unit
  6. Used to store components safely
  7. Functions or the uses of a computer
  8. Start-up code that enables the O/S to be loaded and allows the computer to start-up successfully
  9. Components of a computer that allows CDs or DVDs to play.
  10. RAM & ROM
  11. Grouping word for ROM and RAM
  12. another name for backing storage.
  13. A small tool/device
  14. Changing or doing something with the data
  15. A device used with a GUI to control cursor or a pointer
  16. The term used to describe a group of pages that are run on the internet
  17. The first component that the electricity goes to
  18. A kind of storage which stores more files than usual but it's not a component
  19. A system allowing computers to connect to networks using wireless communication
  20. Collections of data
  21. The programs, instructions and data that enables the computer to carry out task
  22. Non-volatile
  23. Another types of keyboard other than QWERTY
  24. Physical part of a computer
Down
  1. Performing or carrying out tasks
  2. The more ______ the device, the easier you can carry it with you
  3. A special kind of computer chip that can be used in both computers and other computerised devices.
  4. Like a pen for use with a touch screen
  5. An input device that allows the user to control a process or select icons by touching the screen
  6. Application software that allows the user to view or interact with pages from the internet
  7. All the components of the computer connect to this
  8. Operating system that is used in iphones, ipads and ipods
  9. Another name for a computer chip
  10. Magnetic or optical storage devices
  11. The place where you save your work
  12. Another name for "Main memory"
  13. ROM is...
  14. A problem that desktop computers rarely have
  15. Satellite navigation
  16. Devices that allow large amount of data to be stored outside of main memory
  17. New
  18. A complete set of instructions that can be used to carry out a task
  19. Connect computers together
  20. Volatile
  21. The most common type of keyboard

45 Clues: NewVolatileRAM & ROMROM is...Non-volatileTo work togetherA small tool/deviceCollections of dataSatellite navigationThe brain of the computerConnect computers togetherPhysical part of a computerGrouping word for ROM and RAMAnother name for "Main memory"Everything inside a system unitUsed to store components safelyPerforming or carrying out tasks...

ICT 2017-06-25

ICT crossword puzzle
Across
  1. A program that allows people to publicly share videos
  2. A type of application from Microsoft and allows people to use pages to write on
  3. A form of coding that can easily take someone somewhere with a click of a button
  4. A system inside of a device, that is not physical
  5. A type of global computer network
  6. A personal data base which is stored in computers or portable
  7. Software and Hardware
  8. A group or system of interconnected things
  9. A type of database program
  10. A piece of hardware used to type letters into a computer
  11. Type of hardware used with a monitor and a keyboard
  12. The abbreviation for Extensible Hyper Text Markup Language
Down
  1. A group of binary digits
  2. A person or company that generates applications for others
  3. A form of 1 billion bytes
  4. A type of hardware which allows a group of people to use internet
  5. A form of 1 sextillion bytes
  6. The action of using the code language
  7. A type of scripting language
  8. The most essential part of a computer. It contains the CPU, memory and connectors for input and output devices
  9. A Uniform resource locater
  10. A type of code that uses pixels and squares to link the user to something
  11. Different types of hardware
  12. A type of folder used in a computer
  13. A device that can produce something
  14. A recording of visual images

26 Clues: Software and HardwareA group of binary digitsA form of 1 billion bytesA Uniform resource locaterA type of database programDifferent types of hardwareA form of 1 sextillion bytesA type of scripting languageA recording of visual imagesA type of global computer networkA type of folder used in a computerA device that can produce something...

RU ITEC 411 - Crime and Security 2025-04-14

RU ITEC 411 - Crime and Security crossword puzzle
Across
  1. a type of malware that has many similarities to a virus. The main difference is that this type does not need other resources to evolve and cause extensive harm
  2. the intentional access of a system to which the user has not been authorized access by a designated party
  3. types of information that threat actors use in order to build profiles on their victims. This type of data can be collected using publicly available, mostly online, resources. Some versions of this information include social media posts, public database records and etc.
  4. (3 words separated by '-') a type of cyber-attack that sends a server an influx of traffic to bog down the server and cause the service to malfunction preventing users from accessing or using the service
  5. a type of software that allows for circumvented access to a system without having to abide by a system's security features. They are often installed to aid law enforcement investigations but most times they are installed in order to provide threat actors with an easy way back into the system while they perform reconnaissance or the actual attack.
  6. a type of malware that attaches to and spreads from resource to resource by self-replication
  7. the manipulation of telephone communications to bypass the need to pay for phone calls or obtain access into other systems on the network
  8. the ideology of hacking for “the greater good”. These types of hackers are considered white-hat hackers who attack based on political motivations.
  9. this is a type of malware that is designed to monitor a victims actions online. Some types of this malware can log a victims keystrokes, and activate webcams on victims computers or mobile devices. Then the information is logged and then sent to a threat actors designated server space.
  10. a device installed into card swipers found on POS terminals and ATMS to collect users credit/debit card numbers and PIN numbers to conduct credit card/debit card fraud on the victim.
Down
  1. a tactic of cybersecurity professionals and threat actors where they present as a trusted/reputable source to solicit information or gain an advantage within their attack or investigation.
  2. this is a type of malware that encrypts files on a victim's computer and in order to decrypt them the victim would be prompted to pay by a deadline or run the risk of all the data being released or destroyed
  3. (3 words separated by '-') these types of threat actors perform malicious activities with intent to cause harm to their victims. Their motivations are most times aligned with financial gain or embarrassment of the victim.
  4. (2 words separated by '-') a type of malware that is introduced into a victims system by running an infected application. The malware performs and initiates other types of malware attacks like installing a virus or sending spam emails.
  5. a tactic used by threat actors to gather information to build a dossier on a victim. They obtain information by sending mass emails or text that are disguised as being sent by legitimate organizations (i.e. Amazon, PayPal, the IRS etc.) messages to get a victim to either provide information or click a link and provide their information.
  6. any criminal activity that is conducted against a computer system, targeting a computer system or is being used to obtain data for use in crime via the internet.
  7. (3 words separated by '-') these types of threat actors perform hacking activities designed to identify vulnerabilities and improve overall system security
  8. a software fix that mitigates a known vulnerability within a computer system
  9. a weakness or flaw that threat actors exploit to execute their attacks on a system
  10. (2 words separated by '-') the act of manipulating people in order to obtain personal information, behavior patterns or interests of the victim that can then be used to laterally build an attack against the victim

20 Clues: a software fix that mitigates a known vulnerability within a computer systema weakness or flaw that threat actors exploit to execute their attacks on a systema type of malware that attaches to and spreads from resource to resource by self-replication...

Generic Sample Of A Puzzle 2023-02-02

Generic Sample Of A Puzzle crossword puzzle
Across
  1. warm season
  2. favorite subject
  3. other types of living things
  4. a small furry animal
Down
  1. the color of the ocean
  2. a lemon type of drink
  3. survival game
  4. people you are born with
  5. my favorite candy
  6. shoes

10 Clues: shoeswarm seasonsurvival gamefavorite subjectmy favorite candya small furry animala lemon type of drinkthe color of the oceanpeople you are born withother types of living things

murder most horride keywords! 2012-03-21

murder most horride keywords! crossword puzzle
Across
  1. a sauce of information given on a computer.
  2. a collaborative website that can be directly edited using only web browser.
  3. key A Key Field or Primary Key is a field within a database which enables every record to be uniquely identified.
  4. when data is ordered in a spesific criteria.
  5. the title above the database name.
  6. view applications such as Access allow you to view the contents of a table.
  7. merge This is a technique for creating many letters or documents based on a template and a database of names and addresses.
  8. staying safe on the computer.
  9. read,write or edit a shared on-line.
  10. detachable compartments of a spacecraft.
Down
  1. types different types of data are usually classified as a certain.
  2. a form of data used to find out more about some one or some thing.
  3. learning envirment a virtrual classroom which lets teacher a students to communicate whith each other.
  4. when you ask a puestion.
  5. foot print data trace or tail left by someone's activity in a digital envirment.
  6. browser a software application that provides a way to view and interact with pages on the World Wide Web.
  7. a policy facility to meet for open discussion.
  8. view where you see the structure of the table rather than the contents.
  9. making a search asyer.

19 Clues: making a search asyer.when you ask a puestion.staying safe on the computer.the title above the database name.read,write or edit a shared on-line.detachable compartments of a spacecraft.a sauce of information given on a computer.when data is ordered in a spesific criteria.a policy facility to meet for open discussion....

Computer Acronyms 2024-09-06

Computer Acronyms crossword puzzle
Across
  1. A standard interface designed for IBM PC-compatible computers.
  2. An electron-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
  3. A type of non-volatile memory used in computers and other electronic devices.
  4. A type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
  5. A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
  6. A proprietary journaling file system developed by Microsoft in the 1990s.
  7. An electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed.
  8. A small economy car made by the British Motor Corporation.
  9. Used to interact with computer programs with text-based commands.
  10. The most important processor in a given computer.
  11. A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
  12. Firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process
  13. A component of Microsoft Windows that provides system administrators and advanced users an interface for configuring and monitoring the system.
Down
  1. A family of wired computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
  2. A flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals combined with polarizers.
  3. A video display interface developed by the Digital Display Working Group.
  4. A specialized electronic circuit initially designed for digital image processing and to accelerate computer graphics.
  5. A video display controller and accompanying de facto graphics standard.
  6. A form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.
  7. A solid-state storage device.
  8. A combination digital circuit that performs arithmetic and bitwise operations on integer binary numbers.
  9. A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
  10. A computer hardware component that connects a computer to a computer network.
  11. An industry standard that allows data exchange and delivery of power between many types of electronics.
  12. A small, relatively inexpensive computer having a central processing unit made out of a microprocessor.

25 Clues: A solid-state storage device.The most important processor in a given computer.A small economy car made by the British Motor Corporation.A standard interface designed for IBM PC-compatible computers.Used to interact with computer programs with text-based commands.A video display controller and accompanying de facto graphics standard....

Electronic devices 2021-12-13

Electronic devices crossword puzzle
Across
  1. drive A small piece of equipment that you connect to a computer or other piece of electronic equipment to copy and store information
  2. A small piece of equipment that you move across a desk etc. in order to move the cursor on your computer screen
  3. The set of keys on a computer or typewriter that you press in order to make it work
  4. USB cable assemblies are some of the most popular cable types available, used mostly to connect computers to peripheral devices such as cameras, camcorders, printers, scanners, and more.
  5. a flat vertical surface on which pictures or words are shown
  6. A things use to listen to the sound or music
Down
  1. The part of a radio, television, or computer, or of a piece of electrical equipment for playing recordedsound, through which the sound is played
  2. cable USB cable assemblies are some of the most popular cable types available, used mostly to connect computers to peripheral devices such as cameras, camcorders, printers, scanners, and more
  3. a place, usually in a wall, where you can connect electrical devices to the electricity supply.
  4. control Things to control everything at a distance

10 Clues: A things use to listen to the sound or musiccontrol Things to control everything at a distancea flat vertical surface on which pictures or words are shownThe set of keys on a computer or typewriter that you press in order to make it worka place, usually in a wall, where you can connect electrical devices to the electricity supply....

Information Technology- system computer(level 2) 2020-05-28

Information Technology- system computer(level 2) crossword puzzle
Across
  1. ... computer is the transmission of data in continuous wave form.
  2. What do an IT professional do? They are the people who test, build, install, repair, or maintain the hardware and ...
  3. ... computer is the transmission of data using distinct on and off electrical states.
  4. Electronic devices that can follow instructions to accept input, process that input and produce information.
  5. Set of instructions that directs the hardware to accomplish a task.
Down
  1. Physical component of the computer such as mouse and monitor.
  2. ... system is the most important software that runs on a computer such as Windows and Linux
  3. input, processing, output and storage are the ... of computer functions.
  4. ...software is a program or group of programs designed for end users such as Powerpoint and Word.
  5. ... and supercomputer is the types of computer.

10 Clues: ... and supercomputer is the types of computer.Physical component of the computer such as mouse and monitor.... computer is the transmission of data in continuous wave form.Set of instructions that directs the hardware to accomplish a task.input, processing, output and storage are the ... of computer functions....

Computer Acronyms 2024-09-06

Computer Acronyms crossword puzzle
Across
  1. A standard interface designed for IBM PC-compatible computers.
  2. An electron-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
  3. A type of non-volatile memory used in computers and other electronic devices.
  4. A type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
  5. A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
  6. A proprietary journaling file system developed by Microsoft in the 1990s.
  7. An electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed.
  8. A small economy car made by the British Motor Corporation.
  9. Used to interact with computer programs with text-based commands.
  10. The most important processor in a given computer.
  11. A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
  12. Firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process
  13. A component of Microsoft Windows that provides system administrators and advanced users an interface for configuring and monitoring the system.
Down
  1. A family of wired computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
  2. A flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals combined with polarizers.
  3. A video display interface developed by the Digital Display Working Group.
  4. A specialized electronic circuit initially designed for digital image processing and to accelerate computer graphics.
  5. A video display controller and accompanying de facto graphics standard.
  6. A form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.
  7. A solid-state storage device.
  8. A combination digital circuit that performs arithmetic and bitwise operations on integer binary numbers.
  9. A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
  10. A computer hardware component that connects a computer to a computer network.
  11. An industry standard that allows data exchange and delivery of power between many types of electronics.
  12. A small, relatively inexpensive computer having a central processing unit made out of a microprocessor.

25 Clues: A solid-state storage device.The most important processor in a given computer.A small economy car made by the British Motor Corporation.A standard interface designed for IBM PC-compatible computers.Used to interact with computer programs with text-based commands.A video display controller and accompanying de facto graphics standard....

David Crossword 2023-12-08

David Crossword crossword puzzle
Across
  1. regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
  2. Installing into the device gets all its information
  3. or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
  4. Personal Identifiable Information
  5. physical computer
  6. protects computers and or websites
  7. central processing unit
  8. portable document format
  9. 0s and 1s up to 8 of them
  10. its used in the router for the wifi
  11. iCloud or save on your computer.
  12. to boot is to start up a computer to reboot is to, reboot is a restart
  13. Address internet protocol
  14. Read only memory
  15. turns domain names into IP addresses, which browsers use to load internet pages.
  16. text markup language the address of a web-page
  17. Google,bing
  18. software that is distributed with its source code, making it available for use, modification, and distribution with its original rights.
  19. For copy its control C for paste its control V
Down
  1. It's the circuit board that connects all of your hardware to your processor, distributes electricity from your power supply, and defines the types of storage devices, memory modules, and graphics cards among other expansion cards that can connect to your PC.
  2. connects devices to a network
  3. code
  4. data from a website that is stirred in your computer
  5. keyboard and mouse
  6. data storage device
  7. the gap between demographics and regions that have access to modern information and communications technology ICT and those that don't or have restricted access.
  8. internal parts pf computer
  9. computer-generated environment with scenes and objects that appear to be real, making the user feel they are immersed in their surroundings
  10. random-access memory
  11. protecting information or data by using mathematical models to scramble it
  12. malicious intent to cause harm or steal info on your computer
  13. nput ,output,memory and processing.
  14. data that is eight binary digits
  15. monitor or speaker
  16. connects u to the wifi
  17. Google Chrome,Opera GX
  18. Smallest unit of data
  19. working systems in a computer

38 Clues: codeGoogle,bingRead only memoryphysical computerkeyboard and mousemonitor or speakerdata storage devicerandom-access memorySmallest unit of dataconnects u to the wifiGoogle Chrome,Opera GXcentral processing unitportable document format0s and 1s up to 8 of themAddress internet protocolinternal parts pf computerconnects devices to a network...

Crossword thing. 2013-10-09

Crossword thing. crossword puzzle
Across
  1. Outputs audio.
  2. Holds everthing together
  3. Inputs audio.
  4. Saves if you loose power
  5. Read only memory.
  6. The brain on the CPU
Down
  1. Your memory.
  2. Takes space up from the hard drive
  3. The brains of the computer
  4. Scans stuff.
  5. Screen.
  6. Types.
  7. Does not save if you loose power
  8. Random acess memory.

14 Clues: Types.Screen.Your memory.Scans stuff.Inputs audio.Outputs audio.Read only memory.Random acess memory.The brain on the CPUHolds everthing togetherSaves if you loose powerThe brains of the computerDoes not save if you loose powerTakes space up from the hard drive

Deions crossword 2023-12-07

Deions crossword crossword puzzle
Across
  1. For copy its control C for paste its control V
  2. Address internet protocol
  3. Google Chrome,Opera GX
  4. or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
  5. data storage device
  6. physical computer
  7. data from a website that is stirred in your computer
  8. code
  9. turns domain names into IP addresses, which browsers use to load internet pages.
  10. random-access memory
  11. iCloud or save on your computer.
  12. It's the circuit board that connects all of your hardware to your processor, distributes electricity from your power supply, and defines the types of storage devices, memory modules, and graphics cards among other expansion cards that can connect to your PC.
  13. working systems in a computer
  14. regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
  15. Google,bing
  16. internal parts pf computer
  17. the gap between demographics and regions that have access to modern information and communications technology ICT and those that don't or have restricted access.
  18. monitor or speaker
Down
  1. computer-generated environment with scenes and objects that appear to be real, making the user feel they are immersed in their surroundings
  2. software that is distributed with its source code, making it available for use, modification, and distribution with its original rights.
  3. connects devices to a network
  4. keyboard and mouse
  5. malicious intent to cause harm or steal info on your computer
  6. text markup language the address of a web-page
  7. to boot is to start up a computer to reboot is to, reboot is a restart
  8. Read only memory
  9. protects computers and or websites
  10. data that is eight binary digits
  11. Installing into the device gets all its information
  12. nput ,output,memory and processing.
  13. 0s and 1s up to 8 of them
  14. central processing unit
  15. its used in the router for the wifi
  16. portable document format
  17. Personal Identifiable Information
  18. protecting information or data by using mathematical models to scramble it
  19. connects u to the wifi
  20. Smallest unit of data

38 Clues: codeGoogle,bingRead only memoryphysical computerkeyboard and mousemonitor or speakerdata storage devicerandom-access memorySmallest unit of dataGoogle Chrome,Opera GXconnects u to the wificentral processing unitportable document formatAddress internet protocol0s and 1s up to 8 of theminternal parts pf computerconnects devices to a network...

COMPUTER TERMS 2015-09-15

COMPUTER TERMS crossword puzzle
Across
  1. Approximately 1 billion byte.
  2. The set devices of the computer system that can be physically seen.
  3. A measurement of the clarity of an image based on the number of pixel used to create the image.
  4. The rules guiding the use of a command.
  5. A pictorial symbol on computer screen that represents a choice of activity.
  6. Output on paper from computer.
  7. Means Binary digits. Is the smallest unit of a computer memory.
  8. A dedicate device that incorporates all the parts of a processor on a single chip.
  9. A computer professional who writes programs, or sets of instruction for each application, debugs, and then documents them.
  10. A collection of web pages, normally on a single theme, on the Internet.
  11. A manual device connected as to a video game, with a control lever that can be tilted in various directions to move the cursor or part of the display.
  12. A device that; allows an image that already exists to be input to the computer so that it can be manipulated using special software.
  13. A set of instruction for processing data.
  14. disk A microcomputer storage device that can typically store between 10 and 100 or more million characters.
  15. Black and white bars that we see on most books and consumer goods. They can be read by a Bar Code Reader or Light pen.
Down
  1. A wireless local network that uses radio waves to connect to the Internet.
  2. A measurement of how much data can be sent along a communication channel at the same time.
  3. Anyone who uses the computer.
  4. A group of computers that are linked together so they can communicate with one another.
  5. A monitor screen that can detect and respond to something, such as a finger or stylus, pressing on it.
  6. A device that shows the output from a system in picture form; output is short –lived, unlike that from a printer
  7. A types of non-impact printer that uses laser.
  8. Device used to produced hard copy output from a computer, usually on paper.
  9. Software designed to allow the input of text to a computer.
  10. A printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
  11. A device that Resembles typewriter keyboard: is the most common unit for entering data and for coding or using program instructions.
  12. A code know only by the user that allows the computer to be sure of the identity of the person who is accessing information.
  13. The smallest part of a computer graphic image; the pixel is so small that it cannot be seen.
  14. One of the earliest known calculating devices on which rows of beads on wires are used to perform mathematical operations.
  15. Act of starting a computer by loading part of the operating system.

30 Clues: Approximately 1 billion byte.Anyone who uses the computer.Output on paper from computer.The rules guiding the use of a command.A set of instruction for processing data.A types of non-impact printer that uses laser.Software designed to allow the input of text to a computer.Means Binary digits. Is the smallest unit of a computer memory....

Information Technology (level 2) 2020-05-28

Information Technology (level 2) crossword puzzle
Across
  1. ... computer is the transmission of data in continuous wave form.
  2. What do an IT professional do? They are the people who test, build, install, repair, or maintain the hardware and ...
  3. ... computer is the transmission of data using distinct on and off electrical states.
  4. Electronic devices that can follow instructions to accept input, process that input and produce information.
  5. Set of instructions that directs the hardware to accomplish a task.
Down
  1. Physical component of the computer such as mouse and monitor.
  2. ... system is the most important software that runs on a computer such as Windows and Linux
  3. input, processing, output and storage are the ... of computer functions.
  4. ...software is a program or group of programs designed for end users such as Powerpoint and Word.
  5. ... and supercomputer is the types of computer.

10 Clues: ... and supercomputer is the types of computer.Physical component of the computer such as mouse and monitor.... computer is the transmission of data in continuous wave form.Set of instructions that directs the hardware to accomplish a task.input, processing, output and storage are the ... of computer functions....

COMPUTER TERMS 2015-09-15

COMPUTER TERMS crossword puzzle
Across
  1. A printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
  2. A group of computers that are linked together so they can communicate with one another.
  3. The smallest part of a computer graphic image; the pixel is so small that it cannot be seen.
  4. A types of non-impact printer that uses laser.
  5. The set devices of the computer system that can be physically seen.
  6. A pictorial symbol on computer screen that represents a choice of activity.
  7. Software designed to allow the input of text to a computer.
  8. A measurement of the clarity of an image based on the number of pixel used to create the image.
  9. A device that shows the output from a system in picture form; output is short –lived, unlike that from a printer
  10. Act of starting a computer by loading part of the operating system.
  11. Means Binary digits. Is the smallest unit of a computer memory.
  12. A manual device connected as to a video game, with a control lever that can be tilted in various directions to move the cursor or part of the display.
  13. A set of instruction for processing data.
  14. A device that; allows an image that already exists to be input to the computer so that it can be manipulated using special software.
Down
  1. Anyone who uses the computer.
  2. A monitor screen that can detect and respond to something, such as a finger or stylus, pressing on it.
  3. A device that Resembles typewriter keyboard: is the most common unit for entering data and for coding or using program instructions.
  4. A measurement of how much data can be sent along a communication channel at the same time.
  5. A code know only by the user that allows the computer to be sure of the identity of the person who is accessing information.
  6. A wireless local network that uses radio waves to connect to the Internet.
  7. A dedicate device that incorporates all the parts of a processor on a single chip.
  8. Approximately 1 billion byte.
  9. Black and white bars that we see on most books and consumer goods. They can be read by a Bar Code Reader or Light pen.
  10. disk A microcomputer storage device that can typically store between 10 and 100 or more million characters.
  11. Output on paper from computer.
  12. A computer professional who writes programs, or sets of instruction for each application, debugs, and then documents them.
  13. A collection of web pages, normally on a single theme, on the Internet.
  14. Device used to produced hard copy output from a computer, usually on paper.
  15. The rules guiding the use of a command.
  16. One of the earliest known calculating devices on which rows of beads on wires are used to perform mathematical operations.

30 Clues: Anyone who uses the computer.Approximately 1 billion byte.Output on paper from computer.The rules guiding the use of a command.A set of instruction for processing data.A types of non-impact printer that uses laser.Software designed to allow the input of text to a computer.Means Binary digits. Is the smallest unit of a computer memory....

Chapter - 5: THE SYSTEM UNIT 2017-03-06

Chapter - 5: THE SYSTEM UNIT crossword puzzle
Across
  1. Five are common.
  2. Add this later.
  3. Eight or needed.
  4. Maintains the Network.
  5. Away to the network.
  6. Works while the enduser sleeps.
  7. Works with memory and eletronic signals
  8. Memory combo.
  9. A number of these.
  10. Can be found on the system board.
  11. Supplies information to ram when needed
Down
  1. Checks the computer at start-up.
  2. A sequence of bits.
  3. Has one part that is always comparing.
  4. Comes in unique types.
  5. Operates in two ways.
  6. Has controll of communication
  7. Works fast to supply information.
  8. Enhances fun in a virtual environment.
  9. One of three.

20 Clues: Memory combo.One of three.Add this later.Five are common.Eight or needed.A number of these.A sequence of bits.Away to the network.Operates in two ways.Comes in unique types.Maintains the Network.Has controll of communicationWorks while the enduser sleeps.Checks the computer at start-up.Works fast to supply information....

TRICKY PUZZEL 2025-06-13

TRICKY PUZZEL crossword puzzle
Across
  1. Topology which uses a single communication line or one main cable to which all the nodes are directly connected is known as
  2. Used to physically attach a computer to a network communication
  3. --------- is a device that connects two different types of networks with each other
  4. Duplication of data at multiple places is known as
  5. ------- is a computer network that is mainly created for an individual person
  6. Network that connects two or more computers located at distant places is known as
  7. When multiple mismatched copies of a file are stored o different computers ,it is called
  8. ------- enables you to connect your computer to the available internet connection over the existing telephone lines
  9. Each computer in a network is called a
  10. ------ is a larger network than LAN and is spread across the city. Since it covers a entire city, it is called metropolitan
Down
  1. -------- is a network device that is used to connect all the computers in a network with each other
  2. Layout in which the various components of a network , like nodes, links, peripherals ,etc. are connected and communicate with each other is known as
  3. Computer network that allows controlled access to an information source available on the internet
  4. Topology in which each device is connected to a central computer using a point-to-point connection
  5. Means of communication that uses low powered radio waves to transmit the data between devices is known as
  6. Computer network restricted to an organisation

16 Clues: Each computer in a network is called aComputer network restricted to an organisationDuplication of data at multiple places is known asUsed to physically attach a computer to a network communication------- is a computer network that is mainly created for an individual person...

Chapter - 5: THE SYSTEM UNIT 2017-03-06

Chapter - 5: THE SYSTEM UNIT crossword puzzle
Across
  1. A number of these.
  2. Enhances fun in a virtual environment.
  3. Memory combo.
  4. Checks the computer at start-up.
  5. Works with memory and eletronic signals
  6. Can be found on the system board.
  7. Works while the enduser sleeps.
  8. A sequence of bits.
  9. Away to the network.
  10. Supplies information to ram when needed
  11. Comes in unique types.
Down
  1. Maintains the Network.
  2. Works fast to supply information.
  3. Add this later.
  4. Has controll of communication
  5. Has one part that is always comparing.
  6. Five are common.
  7. One of three.
  8. Operates in two ways.
  9. Eight or needed.

20 Clues: Memory combo.One of three.Add this later.Five are common.Eight or needed.A number of these.A sequence of bits.Away to the network.Operates in two ways.Maintains the Network.Comes in unique types.Has controll of communicationWorks while the enduser sleeps.Checks the computer at start-up.Works fast to supply information....

jobINjob 2013-09-10

jobINjob crossword puzzle
Across
  1. older or elders
  2. partner, friend
  3. thought about, evaluated
  4. The only thing life gives you
  5. a person traveling on a mission
  6. thief, robber
  7. sanitation employee
  8. groups of people organizing or supporting a cause
  9. The way Mr. White teaches
  10. pastor, preacher
  11. head of a committee or department
  12. companions
Down
  1. meanings of words can be found here
  2. A gunfight is a dangerous one
  3. statement made to clarify
  4. people who resist traditions or laws
  5. Mr. White's football throws
  6. schedules appointments, types, organizes
  7. electronic machine, changed the world
  8. the crowd, group of people observing

20 Clues: companionsthief, robberolder or elderspartner, friendpastor, preachersanitation employeethought about, evaluatedstatement made to clarifyThe way Mr. White teachesMr. White's football throwsA gunfight is a dangerous oneThe only thing life gives youa person traveling on a missionhead of a committee or departmentmeanings of words can be found here...

chapter 5 Unit 5 2023-05-15

chapter 5 Unit 5 crossword puzzle
Across
  1. set of coordinated networkof components
  2. internal network accessible only by authorized personnel
  3. handling information,especially facts.
  4. the process of transferringdata between storge types,formats,or computer system.
Down
  1. computerized storge for information and facts
  2. programs that instruct computers to perform specific operations
  3. the physical components of a computer system
  4. mechanisms used by websites to track users'browsing history
  5. storge online storge
  6. facts and figures

10 Clues: facts and figuresstorge online storgehandling information,especially facts.set of coordinated networkof componentsthe physical components of a computer systemcomputerized storge for information and factsinternal network accessible only by authorized personnelmechanisms used by websites to track users'browsing history...

Computer hardware 2025-09-18

Computer hardware crossword puzzle
Across
  1. The brain that performs calculations
  2. Stores data without moving any mechanical parts
  3. Provides services to other devices
  4. A network that contains different types of network that connects locally and globally p_Address
  5. The physical parts of a computer
  6. Stores the operating system, applications, and user files
Down
  1. The software that manages a computer's hardware and software resources
  2. Anything that connects to a computer externally
  3. A set of numbers assigned to every device connected to the internet
  4. Connects peripheral devices to computers
  5. Connects all parts together
  6. A network of physical objects with sensors, software, and more
  7. Temporarily stores data being used

13 Clues: Connects all parts togetherThe physical parts of a computerProvides services to other devicesTemporarily stores data being usedThe brain that performs calculationsConnects peripheral devices to computersAnything that connects to a computer externallyStores data without moving any mechanical parts...

Elizabeth - Anatomy of A Computer 2022-02-09

Elizabeth - Anatomy of A Computer crossword puzzle
Across
  1. Performs system checks before starting your main operating system
  2. Most newer computers and mice require these types of ports
  3. Carries out your computers instructions
  4. Carries image to your monitor
  5. USB and FireWire connections are quickly replacing...
  6. data to and from the appropriate devices
Down
  1. Port that transfers data from one location to another
  2. This contains most computer components and
  3. Also known as a communications port
  4. If your motherboard does not have a sound chip, you buy a ...
  5. Used to connect many different types of peripherals
  6. Funnels power through multicoloured cables
  7. Lets peripherals communicate quickly with the processor
  8. Where the CPU stores temporary information

14 Clues: Carries image to your monitorAlso known as a communications portCarries out your computers instructionsdata to and from the appropriate devicesThis contains most computer components andFunnels power through multicoloured cablesWhere the CPU stores temporary informationUsed to connect many different types of peripherals...

Networking Concepts and Cyber Ethics 2025-06-04

Networking Concepts and Cyber Ethics crossword puzzle
Across
  1. A network device that is used to connect all the computers in a network with each other
  2. Refers to criminal activities that involve the use of computers,networks etc
  3. A program or set of programs that disrupts the normal functioning of the computer
  4. A process of transforming data into unreadable code
  5. Refers to an illegal intrusion into a computer system or network
  6. Refers to unwanted bulk emails that come from unknown sources
  7. Two or more computers and peripheral devices are connected within a small area,such as room etc
  8. Refers to a computer network that allows controlled access to an information source available on the internet
Down
  1. A legal right granted by the law to the creator for his original work
  2. A process that converts the encrypted information into a readable form
  3. A wireless technology used to interconnect mobile phones,computers etc using short range wireless connection
  4. A device that connects two different types of networks with each other
  5. A security system that prevents unauthorised people from accessing your system or network
  6. A computer network that is mainly created for an individual person
  7. A kind of network connects two or more computers located at distant places
  8. Refers to a computer network restricted to an organisation

16 Clues: A process of transforming data into unreadable codeRefers to a computer network restricted to an organisationRefers to unwanted bulk emails that come from unknown sourcesRefers to an illegal intrusion into a computer system or networkA computer network that is mainly created for an individual person...

Theory Exam Puzzle 2025-11-05

Theory Exam Puzzle crossword puzzle
Across
  1. The smallest chunk of memory, can only store one piece of data or one memory address
  2. Gives all English characters a number up to 255.
  3. Piece of quartz that sends signals to the CPU
  4. Made up of 1s and 0s.
  5. Two types of registers, data and ____.
  6. Performs math related tasks for the computer.
  7. GHz mean ____ of cycles per second
Down
  1. The green thing that everything is connected to.
  2. Memory that has average speed, capacity and price.
  3. Abbreviation of Random Access Memory.
  4. HDD is the type of hard drive with spinning ___
  5. Fetches instructions and tells the CPU what to do
  6. Memory component with fastest access speed.
  7. Zero One One Zero equals ____.
  8. The name of the wiring that connects parts of the computer

15 Clues: Made up of 1s and 0s.Zero One One Zero equals ____.GHz mean ____ of cycles per secondAbbreviation of Random Access Memory.Two types of registers, data and ____.Memory component with fastest access speed.Piece of quartz that sends signals to the CPUPerforms math related tasks for the computer.HDD is the type of hard drive with spinning ___...

Malware-Q 2018-01-16

Malware-Q crossword puzzle
Across
  1. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  2. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  3. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  4. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  5. Malicious program that secretly records every keystroke typed by a computer’s owner.
  6. What the second "D" in "DDoS" stands for.
  7. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  8. A program that prevents, detects, and removes viruses or other malware from a computer system.
  9. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  10. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  11. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  12. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
Down
  1. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  2. Someone who knows a lot about computers and loves to fool around with them.
  3. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  4. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  5. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  6. Term for a computer added to a botnet.
  7. Not dangerous. Possibly beneficial.
  8. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-S 2018-01-16

Malware-S crossword puzzle
Across
  1. Term for a computer added to a botnet.
  2. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  3. Someone who knows a lot about computers and loves to fool around with them.
  4. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  5. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  6. Malicious program that secretly records every keystroke typed by a computer’s owner.
  7. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  8. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  9. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  10. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  11. What the second "D" in "DDoS" stands for.
Down
  1. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  2. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  3. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  4. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  5. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  6. Not dangerous. Possibly beneficial.
  7. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  8. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  9. A program that prevents, detects, and removes viruses or other malware from a computer system.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-T 2018-01-16

Malware-T crossword puzzle
Across
  1. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  2. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  3. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  4. Not dangerous. Possibly beneficial.
  5. What the second "D" in "DDoS" stands for.
  6. A program that prevents, detects, and removes viruses or other malware from a computer system.
  7. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  8. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  9. Someone who knows a lot about computers and loves to fool around with them.
  10. Malicious program that secretly records every keystroke typed by a computer’s owner.
Down
  1. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  2. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  3. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  4. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  5. Term for a computer added to a botnet.
  6. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  7. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  8. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  9. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  10. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-F 2018-01-16

Malware-F crossword puzzle
Across
  1. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  2. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  3. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  4. Not dangerous. Possibly beneficial.
  5. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  6. Malicious program that secretly records every keystroke typed by a computer’s owner.
  7. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  8. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  9. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  10. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  11. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  12. Someone who knows a lot about computers and loves to fool around with them.
Down
  1. What the second "D" in "DDoS" stands for.
  2. Term for a computer added to a botnet.
  3. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  4. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  5. A program that prevents, detects, and removes viruses or other malware from a computer system.
  6. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  7. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  8. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-L 2018-01-16

Malware-L crossword puzzle
Across
  1. Someone who knows a lot about computers and loves to fool around with them.
  2. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  3. Term for a computer added to a botnet.
  4. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  5. Malicious program that secretly records every keystroke typed by a computer’s owner.
  6. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  7. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  8. Not dangerous. Possibly beneficial.
  9. A program that prevents, detects, and removes viruses or other malware from a computer system.
  10. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  11. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
Down
  1. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  2. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  3. What the second "D" in "DDoS" stands for.
  4. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  5. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  6. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  7. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  8. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  9. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-M 2018-01-16

Malware-M crossword puzzle
Across
  1. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  2. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  3. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  4. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  5. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  6. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  7. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  8. Malicious program that secretly records every keystroke typed by a computer’s owner.
  9. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  10. A program that prevents, detects, and removes viruses or other malware from a computer system.
  11. What the second "D" in "DDoS" stands for.
Down
  1. Someone who knows a lot about computers and loves to fool around with them.
  2. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  3. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  4. Term for a computer added to a botnet.
  5. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  6. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  7. Not dangerous. Possibly beneficial.
  8. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  9. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-R 2018-01-16

Malware-R crossword puzzle
Across
  1. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  2. Malicious program that secretly records every keystroke typed by a computer’s owner.
  3. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  4. What the second "D" in "DDoS" stands for.
  5. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  6. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  7. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  8. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  9. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
Down
  1. Someone who knows a lot about computers and loves to fool around with them.
  2. Term for a computer added to a botnet.
  3. A program that prevents, detects, and removes viruses or other malware from a computer system.
  4. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  5. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  6. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  7. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  8. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  9. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  10. Not dangerous. Possibly beneficial.
  11. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-C 2018-01-16

Malware-C crossword puzzle
Across
  1. Term for a computer added to a botnet.
  2. Not dangerous. Possibly beneficial.
  3. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  4. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  5. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  6. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  7. What the second "D" in "DDoS" stands for.
  8. Someone who knows a lot about computers and loves to fool around with them.
  9. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  10. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
Down
  1. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  2. Malicious program that secretly records every keystroke typed by a computer’s owner.
  3. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  4. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  5. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  6. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  7. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  8. A program that prevents, detects, and removes viruses or other malware from a computer system.
  9. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  10. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-D 2018-01-16

Malware-D crossword puzzle
Across
  1. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  2. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  3. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  4. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  5. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  6. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  7. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  8. What the second "D" in "DDoS" stands for.
  9. Malicious program that secretly records every keystroke typed by a computer’s owner.
Down
  1. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  2. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  3. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  4. Someone who knows a lot about computers and loves to fool around with them.
  5. Not dangerous. Possibly beneficial.
  6. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  7. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  8. Term for a computer added to a botnet.
  9. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  10. A program that prevents, detects, and removes viruses or other malware from a computer system.
  11. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-E 2018-01-16

Malware-E crossword puzzle
Across
  1. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  2. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  3. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  4. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  5. Malicious program that secretly records every keystroke typed by a computer’s owner.
  6. What the second "D" in "DDoS" stands for.
  7. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  8. Someone who knows a lot about computers and loves to fool around with them.
  9. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  10. Term for a computer added to a botnet.
  11. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
Down
  1. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  2. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  3. Not dangerous. Possibly beneficial.
  4. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  5. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  6. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  7. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  8. A program that prevents, detects, and removes viruses or other malware from a computer system.
  9. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-H 2018-01-16

Malware-H crossword puzzle
Across
  1. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  2. A program that prevents, detects, and removes viruses or other malware from a computer system.
  3. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  4. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  5. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  6. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  7. Someone who knows a lot about computers and loves to fool around with them.
  8. Malicious program that secretly records every keystroke typed by a computer’s owner.
  9. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  10. Not dangerous. Possibly beneficial.
  11. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  12. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
Down
  1. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  2. What the second "D" in "DDoS" stands for.
  3. Term for a computer added to a botnet.
  4. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  5. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  6. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  7. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  8. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Crossword Puzzle: Cyber Ethics & Networking Concepts 2025-05-23

Crossword Puzzle: Cyber Ethics & Networking Concepts crossword puzzle
Across
  1. Each computer in a network.
  2. Wireless technology used to interconnect mobile phones, computers and printers using short-range wireless connection.
  3. Criminal practice of using social influence over the telephone system to gain access to sensitive information.
  4. Malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on.
  5. Being aware of the ethical practices, and behaving responsibly and appropriately while using the internet.
  6. Illegal intrusion into a computer system or network.
  7. Device that connects two different types of networks with each other.
  8. Enables to connect the computer to the available internet connection over the existing telephone lines.
Down
  1. Purchasing a single licensed copy of the software and loading it on several computers contrary to the licenses terms.
  2. Certain sets or rules determining how data should be transferred, compressed, and so on.
  3. Computer network allowing controlled access to an information source.
  4. Computer network restricted to an organization.
  5. Unwanted bulk emails coming from unknown sources.
  6. Criminal activities involving computers, internet connections, networks with intent to cause harm.
  7. Network device used to connect all the computers in a network with each other.

15 Clues: Each computer in a network.Computer network restricted to an organization.Unwanted bulk emails coming from unknown sources.Illegal intrusion into a computer system or network.Computer network allowing controlled access to an information source.Device that connects two different types of networks with each other....

Malware-I 2018-01-16

Malware-I crossword puzzle
Across
  1. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  2. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  3. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  4. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  5. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  6. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  7. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  8. Malicious program that secretly records every keystroke typed by a computer’s owner.
  9. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  10. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  11. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
Down
  1. Not dangerous. Possibly beneficial.
  2. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  3. Term for a computer added to a botnet.
  4. Someone who knows a lot about computers and loves to fool around with them.
  5. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  6. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  7. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  8. What the second "D" in "DDoS" stands for.
  9. A program that prevents, detects, and removes viruses or other malware from a computer system.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-L 2018-01-16

Malware-L crossword puzzle
Across
  1. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  2. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  3. Term for a computer added to a botnet.
  4. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  5. A program that prevents, detects, and removes viruses or other malware from a computer system.
  6. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  7. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  8. Someone who knows a lot about computers and loves to fool around with them.
Down
  1. Malicious program that secretly records every keystroke typed by a computer’s owner.
  2. Not dangerous. Possibly beneficial.
  3. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  4. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  5. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  6. What the second "D" in "DDoS" stands for.
  7. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  8. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  9. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  10. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  11. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  12. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-K 2018-01-16

Malware-K crossword puzzle
Across
  1. A program that prevents, detects, and removes viruses or other malware from a computer system.
  2. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  3. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  4. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  5. Term for a computer added to a botnet.
  6. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  7. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  8. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  9. Not dangerous. Possibly beneficial.
  10. Someone who knows a lot about computers and loves to fool around with them.
  11. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  12. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
Down
  1. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  2. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  3. Malicious program that secretly records every keystroke typed by a computer’s owner.
  4. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  5. What the second "D" in "DDoS" stands for.
  6. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  7. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  8. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-P 2018-01-16

Malware-P crossword puzzle
Across
  1. Someone who knows a lot about computers and loves to fool around with them.
  2. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  3. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  4. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  5. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  6. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  7. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
Down
  1. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  2. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  3. Malicious program that secretly records every keystroke typed by a computer’s owner.
  4. Term for a computer added to a botnet.
  5. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  6. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  7. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  8. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  9. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  10. Not dangerous. Possibly beneficial.
  11. A program that prevents, detects, and removes viruses or other malware from a computer system.
  12. What the second "D" in "DDoS" stands for.
  13. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-J 2018-01-16

Malware-J crossword puzzle
Across
  1. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  2. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  3. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  4. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  5. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  6. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  7. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  8. Term for a computer added to a botnet.
  9. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  10. A program that prevents, detects, and removes viruses or other malware from a computer system.
Down
  1. Malicious program that secretly records every keystroke typed by a computer’s owner.
  2. What the second "D" in "DDoS" stands for.
  3. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  4. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  5. Someone who knows a lot about computers and loves to fool around with them.
  6. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  7. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  8. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  9. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  10. Not dangerous. Possibly beneficial.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Parts of a computer Maha 2017-06-30

Parts of a computer  Maha crossword puzzle
Across
  1. An electronic device for storing and processing information
  2. A device that is used for a fast way of connecting devices to a computer that provides fast access (9,6,3)
  3. It is an input device which records sounds
  4. Permanent storage that is used to start up your computer
  5. A computer that controls access to a network
  6. A device that records and stores digital images (7,6)
  7. A device that uses light to convert a paper based document into a digital format
Down
  1. Is an electronic device that controls another device
  2. They are particularly easy to use for those with limited movement in their hands and are an alternative for a mouse (7,4,5)
  3. used to be popular with gamers but have slowly been replaced by other types of game controller
  4. The physical parts of a computer system
  5. The main circuit board of your computer that everything else plugs into
  6. You control it with your hand where you want it to go and when it moves the cursor moves inside the mouse to then click on what you want it to

13 Clues: The physical parts of a computer systemIt is an input device which records soundsA computer that controls access to a networkIs an electronic device that controls another deviceA device that records and stores digital images (7,6)Permanent storage that is used to start up your computerAn electronic device for storing and processing information...

Malware-A 2018-01-16

Malware-A crossword puzzle
Across
  1. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  2. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  3. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  4. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  5. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  6. Not dangerous. Possibly beneficial.
  7. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  8. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  9. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  10. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  11. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
Down
  1. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  2. Someone who knows a lot about computers and loves to fool around with them.
  3. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  4. Malicious program that secretly records every keystroke typed by a computer’s owner.
  5. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  6. Term for a computer added to a botnet.
  7. What the second "D" in "DDoS" stands for.
  8. A program that prevents, detects, and removes viruses or other malware from a computer system.
  9. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-B 2018-01-16

Malware-B crossword puzzle
Across
  1. Malicious program that secretly records every keystroke typed by a computer’s owner.
  2. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  3. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  4. Not dangerous. Possibly beneficial.
  5. Term for a computer added to a botnet.
  6. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  7. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  8. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
Down
  1. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  2. Someone who knows a lot about computers and loves to fool around with them.
  3. What the second "D" in "DDoS" stands for.
  4. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  5. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  6. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  7. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  8. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  9. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  10. A program that prevents, detects, and removes viruses or other malware from a computer system.
  11. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  12. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-G 2018-01-16

Malware-G crossword puzzle
Across
  1. Not dangerous. Possibly beneficial.
  2. Malicious program that secretly records every keystroke typed by a computer’s owner.
  3. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  4. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  5. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  6. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  7. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  8. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  9. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  10. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
Down
  1. What the second "D" in "DDoS" stands for.
  2. Someone who knows a lot about computers and loves to fool around with them.
  3. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  4. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  5. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  6. A program that prevents, detects, and removes viruses or other malware from a computer system.
  7. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  8. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  9. Term for a computer added to a botnet.
  10. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Malware-O 2018-01-16

Malware-O crossword puzzle
Across
  1. A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
  2. Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
  3. This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
  4. A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
  5. A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
  6. An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
  7. What the second "D" in "DDoS" stands for.
  8. In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
  9. Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
  10. Malicious program that secretly records every keystroke typed by a computer’s owner.
Down
  1. Term for a computer added to a botnet.
  2. A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
  3. Someone who knows a lot about computers and loves to fool around with them.
  4. The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
  5. The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
  6. An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
  7. A group of devices infected by malware given command and control to someone located elsewhere on the net.
  8. A program that prevents, detects, and removes viruses or other malware from a computer system.
  9. An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
  10. Not dangerous. Possibly beneficial.

20 Clues: Not dangerous. Possibly beneficial.Term for a computer added to a botnet.What the second "D" in "DDoS" stands for.Someone who knows a lot about computers and loves to fool around with them.Malicious program that secretly records every keystroke typed by a computer’s owner....

Computers 2024-01-11

Computers crossword puzzle
Across
  1. sometimes referred to as the display, is the part of the computer that displays output for users to view, like graphics and text.
  2. includes all of the physical parts that make up a computer such as the monitor and the central processing unit, that keeps data moving
  3. is an important device used to interact with items displayed on the screen. When you move it, a pointer on the screen also moves, allowing you to operate the computer.
  4. is an input device used to interact with a computer. You can type letters, numbers, and characters that will be processed by the computer.
  5. is a common type of portable personal computing device, that is small enough to be handheld. The primary use is to make phone calls using mobile networks.
Down
  1. is an electronic machine that can process, store, and retrieve different types of data and information.
  2. the intangible parts of a computer, the parts that can't be touched.
  3. allow you to listen to sound that comes from the computer.
  4. holds the brains of the computer, the physical parts that process information and make the computer function.
  5. is a portable personal computer, where all parts of the computer are contained in one device.
  6. is another type of portable personal computer. Are often used for entertainment activities like watching movies or playing games.

11 Clues: allow you to listen to sound that comes from the computer.the intangible parts of a computer, the parts that can't be touched.is a portable personal computer, where all parts of the computer are contained in one device.is an electronic machine that can process, store, and retrieve different types of data and information....

Anatomy Crossword (no abbreviations) 2017-02-10

Anatomy Crossword (no abbreviations) crossword puzzle
Across
  1. temporary information, such as data relating to open programs, is stored here
  2. covered by a heatsink, and the "brain" of the computer
  3. MP3's, modern printers, and personal digital assistants require these connections
  4. these slots let peripherals communicate quickly with the processor
  5. a very outdated port, most of the time it is unused
  6. use these to connect many different types of peripherals
  7. if your computer does not come with one, you can buy one and attach it to a PCI slot
Down
  1. houses the computer's graphics card, and often include additional RAM
  2. activates when you turn on the computer and performs system checks before starting the computer's main OS
  3. most mice and keyboards require these ports
  4. for older printers and scanners, you would need to plug them into this
  5. houses most of the components in a computer
  6. funnels power through multicolored cables

13 Clues: funnels power through multicolored cablesmost mice and keyboards require these portshouses most of the components in a computera very outdated port, most of the time it is unusedcovered by a heatsink, and the "brain" of the computeruse these to connect many different types of peripherals...

Adaeze C. 2014-11-13

Adaeze C. crossword puzzle
Across
  1. computer or device on network that holds and manages network resources and answers to requests for information. Other types are file and print.
  2. stands for wireless fidelity; type of broadband internet connection that works with radio signals to give high speed internet connections
  3. world wide connection of networks that connect many businesses, government agencies, educational institutions, and individual
  4. stands for Uniform Resource Locator; an address for documents on Web.
  5. quality of a picture or the screen on a computer.
  6. made of 8 bits also is a unit of memory on a computer chip that can hold the equivalent of one character.
  7. when being connected to the Internet.
Down
  1. something that is for usage by a end user.
  2. things on a computer that you can see and feel (examples: keyboard, monitor, and printer)
  3. stands for hyper-text markup language; file format for documents seen using browser network. Language of web.
  4. page- main page of Web site.
  5. box- box that shows up on display screen and asks for input or gives you information.
  6. stands for internet etiquette; code of acceptable behaviors one should abide while on internet
  7. places on computer you can't touch - set of instructions that gives computer directions on what to do
  8. part of filename that usually tells the program in which the file was made and will use to open.

15 Clues: page- main page of Web site.when being connected to the Internet.something that is for usage by a end user.quality of a picture or the screen on a computer.stands for Uniform Resource Locator; an address for documents on Web.box- box that shows up on display screen and asks for input or gives you information....

Adaeze C. 2014-11-13

Adaeze C. crossword puzzle
Across
  1. computer or device on network that holds and manages network resources and answers to requests for information. Other types are file and print.
  2. stands for wireless fidelity; type of broadband internet connection that works with radio signals to give high speed internet connections
  3. world wide connection of networks that connect many businesses, government agencies, educational institutions, and individual
  4. stands for Uniform Resource Locator; an address for documents on Web.
  5. quality of a picture or the screen on a computer.
  6. made of 8 bits also is a unit of memory on a computer chip that can hold the equivalent of one character.
  7. when being connected to the Internet.
Down
  1. something that is for usage by a end user.
  2. things on a computer that you can see and feel (examples: keyboard, monitor, and printer)
  3. stands for hyper-text markup language; file format for documents seen using browser network. Language of web.
  4. page- main page of Web site.
  5. box- box that shows up on display screen and asks for input or gives you information.
  6. stands for internet etiquette; code of acceptable behaviors one should abide while on internet
  7. places on computer you can't touch - set of instructions that gives computer directions on what to do
  8. part of filename that usually tells the program in which the file was made and will use to open.

15 Clues: page- main page of Web site.when being connected to the Internet.something that is for usage by a end user.quality of a picture or the screen on a computer.stands for Uniform Resource Locator; an address for documents on Web.box- box that shows up on display screen and asks for input or gives you information....

anatomy of a computer 2021-02-08

anatomy of a computer crossword puzzle
Across
  1. ports that transfer data and are used to connect many different types of input/output devices
  2. houses your graphics card and supplies the images to your monitor
  3. the brain of the computer
  4. a computer's built-in sound chip
  5. a port for older printers or scanners
  6. houses most of your computer's components and manages data traffic
Down
  1. a computer's built-in operating system which performs a basic check on start-up before booting up your main OS
  2. a port for older keyboards, mice, and modems
  3. slots that let input/output devices communicate with the processor quickly when placed in one of those slots.
  4. a port that connects devices to a computer and allows them to draw power from the computer
  5. a storage unit which holds temporary information and sends that info to your hard drive when it reaches max capacity
  6. gives power to the computer through wires
  7. ports dedicated for mice and keyboards.

13 Clues: the brain of the computera computer's built-in sound chipa port for older printers or scannersports dedicated for mice and keyboards.gives power to the computer through wiresa port for older keyboards, mice, and modemshouses your graphics card and supplies the images to your monitorhouses most of your computer's components and manages data traffic...

Lesson 26 crossword 2015-04-23

Lesson 26 crossword crossword puzzle
Across
  1. types of personal informational scams
  2. something intended to deceive; deliberate trickery intended to gain an advantage
  3. an attempt to deceive an audience into believing that something false is real
  4. a technique that examines fingerprint, voice pattern, or this iris of the eye
  5. computer virus triggered by the (dis)appearance of specified data
  6. virus that makes many copies of itself, which slows down the computer
Down
  1. the practice of adding keywords to content to simplify searching
  2. profits are based on the investor's ability to recruit people who are enrolled to make payments
  3. a format originally developed to facilitate the syndication of news articles
  4. good manners and proper behaviors when communicating through electronic mail
  5. telecommunications service in which parties can participate via phone in a group meeting
  6. a process that can be used to cut down on or eliminate most junk mail
  7. computer virus that does not cause its damage until a certain date or until the system is booted
  8. a computer program that is written to cause corruption of data
  9. computer virus that does something different from what it is expected to do
  10. a story which once could have been true, but has grown from constant retelling into a mythical yarn
  11. unsolicited commercial e-mail that is sent to many people at the same time to promote products

17 Clues: types of personal informational scamsa computer program that is written to cause corruption of datathe practice of adding keywords to content to simplify searchingcomputer virus triggered by the (dis)appearance of specified dataa process that can be used to cut down on or eliminate most junk mail...

Computer Crossword Puzzle 2020-09-30

Computer Crossword Puzzle crossword puzzle
Across
  1. handheld computers, and similar technology
  2. an electronic device for the visual presentation of data.
  3. designed to block unauthorized access while permitting outward communication.
  4. the retention of retrievable data on a computer or other electronic system
  5. type of graphical user interface
  6. different types of data storage
  7. an electronic device for storing and processing data
  8. a set of things working together as parts of a mechanism
Down
  1. an electrical impulse or radio wave transmitted or received.
  2. a continuous area or expanse which is free, available, or unoccupied.
  3. values of a physical quantity such as voltage
  4. the smallest operable units of storage
  5. facts and statistics collected together for reference or analysis
  6. the application of scientific knowledge for practical purposes
  7. component used to store data

15 Clues: component used to store datadifferent types of data storagetype of graphical user interfacethe smallest operable units of storagehandheld computers, and similar technologyvalues of a physical quantity such as voltagean electronic device for storing and processing dataa set of things working together as parts of a mechanism...

3.1 Malware Vocabulary Practice 2021-10-20

3.1 Malware Vocabulary Practice crossword puzzle
Across
  1. prevents a user's endpoint device from properly and fully functioning until a fee is paid
  2. tracking software that is deployed without the consent or control of the user
  3. computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it
  4. malware that can hide its presence and the presence of other malware on the computer
  5. a malicious program that uses a computer network to replicate
Down
  1. type of malware that imprisons users and encrypts all files on the device so that none of them can be opened
  2. does not attach itself to a file
  3. gives access to a computer, program, or service that circumvents any normal security protections
  4. silently captures and stores each keystroke that a user types on the computer's keyboard
  5. software that enters a computer system without the user's knowledge or consent and then performs an unwanted and harmful action
  6. Infected robot computer
  7. an executable program that masquerades as performing a benign activity but also does something malicious

12 Clues: Infected robot computerdoes not attach itself to a filea malicious program that uses a computer network to replicatetracking software that is deployed without the consent or control of the usermalware that can hide its presence and the presence of other malware on the computer...

IT Media Content Area 3 - L7-12 2025-04-11

IT Media Content Area 3 - L7-12 crossword puzzle
Across
  1. An actual disk on which the data is stored, this is then read by a mechanical arm.
  2. A kind of audio recording that sends two different signals to separate channels when played back
  3. he place where computers store their data, this is typically done using either a Hard Disk Drive (HDD) or a Solid State Drive (SSD).
  4. USB and SD card where there are no moving parts.
  5. Designed to store audio data for use with/on Apple technologies and applications.
  6. designed to remove the graphical processing tasks from the processor
  7. Often referred to as the brain of the computer.
  8. Primary memory that stores data - including those programs and processes that are frequently accessed.
  9. A set of instructions that a computer can run
  10. Can contain various types of audio content, from audiobooks, to songs, to podcasts.
Down
  1. A core circuit board through which all components of a computer communicate
  2. Type of compression where the image/audio can not be rebuilt to the original file.
  3. Type of compression where the image/audio can be rebuilt to the original file
  4. A computer programme that allows the user to perform an activity or complete a task.
  5. Allows the computer to process and deliver sound.
  6. Used in recording this is a larger audio file size (uncompressed).
  7. A type of audio recording that sends a single signal when played back, creating a single-level experience of the sound.
  8. One of the most distributed audio files used today.
  9. One of the most distributed video files.

19 Clues: One of the most distributed video files.A set of instructions that a computer can runOften referred to as the brain of the computer.USB and SD card where there are no moving parts.Allows the computer to process and deliver sound.One of the most distributed audio files used today.Used in recording this is a larger audio file size (uncompressed)....

Anotomy of a Computer 2020-12-03

Anotomy of a Computer crossword puzzle
Across
  1. random access memory
  2. port communications port
  3. port Type of port for older printer and scanners
  4. power supply unit
  5. Basic input/output system
  6. universal serial bus
Down
  1. printed circuit board
  2. connect many different types of peripherals
  3. Type of port for older mouse and keyboard
  4. brain of the computer
  5. accelerated graphics port
  6. peripheral component interconnect
  7. card produces sound

13 Clues: power supply unitcard produces soundrandom access memoryuniversal serial busprinted circuit boardbrain of the computerport communications portaccelerated graphics portBasic input/output systemperipheral component interconnectType of port for older mouse and keyboardconnect many different types of peripherals...

Hardware & Software 2022-11-04

Hardware & Software crossword puzzle
Across
  1. hardware that allows you to put input information into a computer.
  2. these types of controls involve application security and control.
  3. handled by cloud service providers, include physical and environmental controls, such as security of equipment and maintaining a safe and secure environment.
  4. shared by both the user and cloud service providers, include patch management, configuration management and awareness and training.
  5. peripherals computer hardware components that are located outside a computer.
Down
  1. hardware that allows you to send information from a computer.
  2. computer hardware components that are located within a computer.
  3. computer programs and related data that provide the instructions for telling the computer hardware how to do it.
  4. physical components that make up a computer system.

9 Clues: physical components that make up a computer system.hardware that allows you to send information from a computer.computer hardware components that are located within a computer.these types of controls involve application security and control.hardware that allows you to put input information into a computer....

Types and Components of Computer Systems 2022-10-12

Types and Components of Computer Systems crossword puzzle
Across
  1. Device displays the result of the processing of data.
  2. An input device you can use to type something in.
  3. It's a touchable part of the computer.
  4. Basic input output system.
  5. Is used to perform some operations and applications.
  6. Easily stolen, easily broken, difficult to control the touchpad.
  7. The instruction, programs, and applications running on the computer.
  8. Any hardware device that sends data to a computer.
Down
  1. It's the RAM & ROM.
  2. GAME
  3. Easier to communicate through calls, text, and internet and addictive.
  4. Used to save data, programs, and output.
  5. Easier to repair and upgrade, but heavy and consumes much space.
  6. It cannot be removed, edited, or changed.
  7. Holds the data the user is currently using.

15 Clues: GAMEIt's the RAM & ROM.Basic input output system.It's a touchable part of the computer.Used to save data, programs, and output.It cannot be removed, edited, or changed.Holds the data the user is currently using.An input device you can use to type something in.Any hardware device that sends data to a computer....

Computer History and Types of Computers 2024-01-16

Computer History and Types of Computers crossword puzzle
Across
  1. Douglas Engelbart invented this device
  2. type of PC small and portable
  3. type of computer which supports thousands of users
  4. Christopher Latham Sholes invented this evice
  5. a network which led to the birth of the Internet
  6. type of PC small enough to hold in your hand
  7. An electronic device that receives data, processes data, produces a result, and stores data.
  8. WWW
  9. type of personal computer fits on a desk
Down
  1. fastest type of computer
  2. He is credited with being the "Father of the Computer"
  3. What is another name for integrated circuit
  4. First electronic programmable computer.
  5. First personal computer
  6. type of PC where the operating system is supported by Google

15 Clues: WWWFirst personal computerfastest type of computertype of PC small and portableDouglas Engelbart invented this deviceFirst electronic programmable computer.type of personal computer fits on a deskWhat is another name for integrated circuittype of PC small enough to hold in your handChristopher Latham Sholes invented this evice...

St10155076.Bcad group 4.Ice 2 2022-08-19

St10155076.Bcad group 4.Ice 2 crossword puzzle
Across
  1. : a computer hardware device that converts data from a digital format into a format suitable for an analog transmission
  2. layer : in charge of the delivery of packets from a source A to a destination B
  3. : virtual point where network connections start and end
  4. : a computer or device that links two similar LANs based on the same protocol.
  5. layer : in charge of the management of network access.
  6. : Define the rules that govern the communications between two computers connected to the network.
  7. layer : ensures a safe and efficient travel of data; consists of electronic circuits for data transmission etc.
  8. : allows the constitution of communication groups (newsgroups) organized around specific topics
  9. : a specialized computer that makes it convenient to manage a bank account holder's funds.
  10. : a network device that connects two different systems, using direct and systematic translation between protocols.
Down
  1. : the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).
  2. : allows the transfer of collection of files between two machines connected to the Internet.
  3. Model : Consists of only 4 layers: application, transport, internet and network.
  4. : a communication computer that connects different types of networks using different protocols.
  5. : Involves 7 layers, each playing a specific role when applications are communicating over the net.
  6. : a computer network in which the computers connected may be far apart, generally having a radius of more than 1 km.
  7. : allows the management of the network.
  8. : allows a user to connect to a remote host in terminal mode.
  9. : a collection of devices connected together in one physical location, such as a building, office, or home
  10. : defines a basic service for electronic mails.

20 Clues: : allows the management of the network.: defines a basic service for electronic mails.layer : in charge of the management of network access.: virtual point where network connections start and end: allows a user to connect to a remote host in terminal mode.layer : in charge of the delivery of packets from a source A to a destination B...

Types of Hardware and Computer Applications 2024-06-08

Types of Hardware and Computer Applications crossword puzzle
Across
  1. Weakness of computer (dumb machines)
  2. Physical part of computer
  3. Referred as texting
  4. Mid range servers
  5. Binary digit
  6. Volatile
  7. Input device
  8. Optical media
  9. Fast memory but limited size
Down
  1. Type of removable memories
  2. Strength of computers (immune)
  3. Electronic mail
  4. Flash Memories
  5. Unprocessed raw facts
  6. Combination of messaging and blogging

15 Clues: VolatileBinary digitInput deviceOptical mediaFlash MemoriesElectronic mailMid range serversReferred as textingUnprocessed raw factsPhysical part of computerType of removable memoriesFast memory but limited sizeStrength of computers (immune)Weakness of computer (dumb machines)Combination of messaging and blogging

Revision Crossword 2016-05-12

Revision Crossword crossword puzzle
Across
  1. opposite to straight hair
  2. a large area of fresh water
  3. interesting places in the city
  4. a thing you wear while riding a bike
  5. very tall building in the city
  6. a place where you buy cakes, pies and bread.
  7. everything you can see when you look across a large area of land
  8. solar panels save it
  9. a person who always tells the truth
  10. very old
  11. cuts peoples' hair
  12. people wear colourful costumes and masks there
Down
  1. you see them at an amusement park
  2. glasses that are used while swimming
  3. a film when you feel scary
  4. give a new life to appliances
  5. a city with people of different types and from fifferent countries
  6. you listen to music on your mobile phone or computer with the help of it
  7. types letters and answers the phone
  8. a place where you can buy medicine
  9. a mountain with a hole at the top caused by an eruption
  10. a piece of land surrounded by water

22 Clues: very oldcuts peoples' hairsolar panels save itopposite to straight haira film when you feel scarya large area of fresh watergive a new life to appliancesinteresting places in the cityvery tall building in the cityyou see them at an amusement parka place where you can buy medicinetypes letters and answers the phonea person who always tells the truth...

ADSI Kevin Lopez Morales 2022-05-05

ADSI Kevin Lopez Morales crossword puzzle
Across
  1. engages in one or more aspects of the software development process.
  2. is a type of methodology used to describe the process for building information systems, aimed at developing information systems in a very deliberate, structured and methodical way, iterating each stage of the life cycle.
  3. One of these is object-oriented programming.
  4. is a programmable digital electronic machine that executes a series of commands to process input data.
  5. It is a systems approach to the analysis and design of information systems.
  6. is a software life cycle model first defined by Barry Boehm in 1986.
  7. It is a scheme or framework that offers a base structure to develop a project with specific objectives.
  8. it is the set of knowledge and techniques that are applied in an orderly manner to achieve a specific objective or solve a problem.
  9. refers to a sequential procedure that allows a project to be represented based on phases that follow each other.
Down
  1. It is a system for storing and processing information.
  2. It is an organized collection of information or structured data, which is usually stored electronically in a computer system.
  3. is a software whose function is to perform mathematical operations from data arranged in the cells of the tables.
  4. use languages like java, js, python, html
  5. it is a block of code that performs some operation.
  6. It is one of the branches of computer science that studies the creation of reliable and quality software.
  7. it is a high-level perspective view of all deliverables, key milestones, and overall project goals.
  8. is a broad term for describing methodologies for developing high quality Information System which combines Information Technology.
  9. it is a portion of a computer program.
  10. is a computer program designed as a tool to allow a user to perform one or several types of tasks.
  11. text developed in a programming language and that must be compiled or interpreted in order to be executed on a computer

20 Clues: it is a portion of a computer program.use languages like java, js, python, htmlOne of these is object-oriented programming.it is a block of code that performs some operation.It is a system for storing and processing information.engages in one or more aspects of the software development process....

Security and Networking 2024-07-24

Security and Networking crossword puzzle
Across
  1. Mining New patterns or relationships between data.
  2. A scam that threatens to delete or expose victims stolen data for money.
  3. provides multiple port for connecting nodes.
  4. Term for many types of malicious computer programs that is created to harm users and their computer systems.
  5. Some information sytems are called.
  6. A node on a network that serves as an entrance to another network.
  7. Is a type of computer that is able to continue when problems are present.
  8. Any step taken to ward off a threat.
  9. Allows sharing and communication between devices.
  10. A weakness that's not protected against threats.
Down
  1. system The complex system for acquiring, storing, organizing, using, and sharing data and information.
  2. Authentication Its two forms of identification, one being your password and entering a code sent directly to you.
  3. Information System Software tools that allows managers to gather, organize, and evaluate information.
  4. Is term for infected computers that under control of a hacker.
  5. warehouse Is an enormous digital warehouse that contains archived data gathered from multiple databases.
  6. Assessment Used to identify and examine possible threats.
  7. Anything that causes harm.
  8. The act of gaining someones trust by pretending you are someone else.
  9. Structures that data moves through networks.
  10. Is used to share company resources with individuals not in the organization.
  11. Designed to report activity on your computer to another party.
  12. The most widely used standard for local area networks.

22 Clues: Anything that causes harm.Some information sytems are called.Any step taken to ward off a threat.provides multiple port for connecting nodes.Structures that data moves through networks.A weakness that's not protected against threats.Allows sharing and communication between devices.Mining New patterns or relationships between data....

IT Security 1 2017-05-19

IT Security 1 crossword puzzle
Across
  1. This involves the illegal copying of information from the magnetic strip of a credit card.
  2. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
  3. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
  4. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
  5. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
  6. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
  7. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
  8. is another type of malware that is activated each time a computer system boots (loads) up.
  9. involves gaining access to a computer or network with authorization from a company or organisation.
  10. is the processed output of data making it meaningful to the person who receives it.
  11. This involves gaining personal information through deception.
  12. involves gaining access to a computer or network without authorization.
  13. is a type of malware that self-replicates and distributes copies of itself in a computer network.
Down
  1. is the conversion of data into a form that cannot be easily understood by unauthorized people.
  2. also known as zombie is a group of computers connected together for malicious purposes.
  3. is a software application that automatically displays advertising banners while the program is running.
  4. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
  5. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
  6. is a secret way to access a computer without passing security mechanisms.
  7. is a program that secretly installs itself on computers and collects information about users without their knowledge.
  8. refers to any crime that involves a computer and a network.
  9. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
  10. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
  11. is raw unorganized facts that need to be processed.
  12. is malicious software designed to install itself on a computer without the owner’s knowledge.
  13. The practice of recovering sensitive information from discarded material.
  14. is a system designed to prevent unauthorized access to or from a private network (LAN).
  15. is sequences of instructions that make a computer program perform a specific task.
  16. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.

29 Clues: is raw unorganized facts that need to be processed.refers to any crime that involves a computer and a network.This involves gaining personal information through deception.involves gaining access to a computer or network without authorization.is a secret way to access a computer without passing security mechanisms....

Final Exam Review 2022-05-19

Final Exam Review crossword puzzle
Across
  1. A System of Many Parts That Work Together.
  2. Sorting feature...Z-A; Highest to lowest
  3. A list of steps to finish a task.
  4. The brains of the computer. Any time you click the mouse or press a key on the keyboard.
  5. A collection of worksheets.
  6. Lets you explore the Internet where you can find lots of information, like pictures, videos, and webpages. Examples of browsers are Google Chrome, Apple Safari, Microsoft Edge, and Mozilla Firefox.
  7. An algorithm that has been coded into something that can be run by a machine.
  8. Horizontal part of the worksheet identified by numbers
  9. Looks like a TV screen and lets you see your work and your files.
  10. Are the parts of a computer that you can actually touch are called.
  11. Sorting Feature, Alphabetical Order or Lowest to Highest
  12. Tells the hardware what to do and how to do it. For example, writing and reading programs, and games might be some types of software you have used before.
  13. Used to add a long column of numbers.
  14. Not giving up. Persistence works best when you try things many different ways, many different times.
Down
  1. Small square in the lower right corner of a selection.
  2. Putting commands in correct order so computers can read the commands.
  3. Protects your computer so that it doesn't get a computer virus.
  4. The intersection of a row and column.
  5. Vertical part of the worksheet identified by letters.
  6. The art of creating a program.
  7. Is used for typing words and numbers on the computer. Whatever you type on the keyboard, you can see on your monitor.
  8. Part of a program that does not work correctly.
  9. The words or titles used in spreadsheets.
  10. Lets you point to objects on your screen, click on them, and even move them. You can also use the mouse to scroll (or move) through different parts of your screen.

24 Clues: A collection of worksheets.The art of creating a program.A list of steps to finish a task.The intersection of a row and column.Used to add a long column of numbers.Sorting feature...Z-A; Highest to lowestThe words or titles used in spreadsheets.A System of Many Parts That Work Together.Part of a program that does not work correctly....

Computer Terms by Miranda Díaz 2016-09-14

Computer Terms by Miranda Díaz crossword puzzle
Across
  1. a unit of information equal to 220 bytes or, loosely, one million bytes
  2. read-only memory
  3. the physical arrangement in a computer that contains the computers basic circuitry and components
  4. a collection of all the parts you can physically touch
  5. a flat screen, flat panel computer monitor or television
Down
  1. the smallest unit of data in a computer
  2. the many types of programs used to operate computers and related devices
  3. an opening on computer network equipment that ethernet cables plug into
  4. a type of Internet-based computing
  5. a wireless networking technology that allows computers and other devices to communicate over a wireless signal

10 Clues: read-only memorya type of Internet-based computingthe smallest unit of data in a computera collection of all the parts you can physically toucha flat screen, flat panel computer monitor or televisiona unit of information equal to 220 bytes or, loosely, one million bytesan opening on computer network equipment that ethernet cables plug into...

IT Security 1 2017-05-19

IT Security 1 crossword puzzle
Across
  1. is a type of malware that self-replicates and distributes copies of itself in a computer network.
  2. refers to any crime that involves a computer and a network.
  3. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
  4. is a program that secretly installs itself on computers and collects information about users without their knowledge.
  5. involves gaining access to a computer or network with authorization from a company or organisation.
  6. This involves the illegal copying of information from the magnetic strip of a credit card.
  7. is sequences of instructions that make a computer program perform a specific task.
  8. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
  9. is another type of malware that is activated each time a computer system boots (loads) up.
  10. also known as zombie is a group of computers connected together for malicious purposes.
  11. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.
  12. is a software application that automatically displays advertising banners while the program is running.
  13. is malicious software designed to install itself on a computer without the owner’s knowledge.
  14. is a system designed to prevent unauthorized access to or from a private network (LAN).
  15. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
  16. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
  17. This involves gaining personal information through deception.
  18. is the conversion of data into a form that cannot be easily understood by unauthorized people.
Down
  1. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
  2. involves gaining access to a computer or network without authorization.
  3. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
  4. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
  5. is raw unorganized facts that need to be processed.
  6. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
  7. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
  8. The practice of recovering sensitive information from discarded material.
  9. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
  10. is a secret way to access a computer without passing security mechanisms.
  11. is the processed output of data making it meaningful to the person who receives it.

29 Clues: is raw unorganized facts that need to be processed.refers to any crime that involves a computer and a network.This involves gaining personal information through deception.involves gaining access to a computer or network without authorization.The practice of recovering sensitive information from discarded material....

IT Security 1 2017-05-19

IT Security 1 crossword puzzle
Across
  1. This involves the illegal copying of information from the magnetic strip of a credit card.
  2. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
  3. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
  4. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
  5. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
  6. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
  7. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
  8. is another type of malware that is activated each time a computer system boots (loads) up.
  9. involves gaining access to a computer or network with authorization from a company or organisation.
  10. is the processed output of data making it meaningful to the person who receives it.
  11. This involves gaining personal information through deception.
  12. involves gaining access to a computer or network without authorization.
  13. is a type of malware that self-replicates and distributes copies of itself in a computer network.
Down
  1. is the conversion of data into a form that cannot be easily understood by unauthorized people.
  2. also known as zombie is a group of computers connected together for malicious purposes.
  3. is a software application that automatically displays advertising banners while the program is running.
  4. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
  5. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
  6. is a secret way to access a computer without passing security mechanisms.
  7. is a program that secretly installs itself on computers and collects information about users without their knowledge.
  8. refers to any crime that involves a computer and a network.
  9. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
  10. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
  11. is raw unorganized facts that need to be processed.
  12. is malicious software designed to install itself on a computer without the owner’s knowledge.
  13. The practice of recovering sensitive information from discarded material.
  14. is a system designed to prevent unauthorized access to or from a private network (LAN).
  15. is sequences of instructions that make a computer program perform a specific task.
  16. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.

29 Clues: is raw unorganized facts that need to be processed.refers to any crime that involves a computer and a network.This involves gaining personal information through deception.involves gaining access to a computer or network without authorization.is a secret way to access a computer without passing security mechanisms....

sarah oconnor 2019-11-05

sarah oconnor crossword puzzle
Across
  1. designed to detect and destroy computer viruses.
  2. Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware.
  3. software that is available free of charge.
  4. processor a program or machine for storing, manipulating, and formatting text entered from a keyboard and providing a printout.
  5. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  6. is a hardware component that allows a computer or another device
Down
  1. A horse or Trojan is a type of malware that is often disguised as legitimate software.
  2. the programs and other operating information used by a computer.
  3. software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
  4. a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid.
  5. infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.
  6. boot or be booted again.
  7. a standalone malware computer program that replicates itself in order to spread to other computers
  8. a separate viewing area on a computer display screen in a system that allows multiple viewing areas as part of a graphical user interface
  9. messages distributed by electronic means from one computer user to one or more recipients via a network.

15 Clues: boot or be booted again.software that is available free of charge.designed to detect and destroy computer viruses.the programs and other operating information used by a computer.is a hardware component that allows a computer or another deviceA horse or Trojan is a type of malware that is often disguised as legitimate software....

Networking puzzle,class 8 2025-06-07

Networking puzzle,class 8 crossword puzzle
Across
  1. A network device that is used to connect all computers woth each other in a network.
  2. A network device that connects a computer to an available internet connection.
  3. Sets of rules determining how data should be encoded.
  4. A computer network restricted to an organisation.
  5. Computer network mainly created for an individual person.
  6. A network security system (wall) that blocks malware.
  7. A system that allows devices to connect to the internet wirelessly using radio waves.
Down
  1. The word that means without a wire.
  2. A wireless technology used to interconnect electronic devices.
  3. Mobile phones are one of these too.
  4. Important for protecting the data and resources from unauthorised users.
  5. A device that connects two different types of networks with each other.
  6. Layout in which various components of a network communicate with each other.
  7. Connection between computers.
  8. Amount of data that can be transferred over a network in a given time.
  9. Short form of Wide Area Network.

16 Clues: Connection between computers.Short form of Wide Area Network.The word that means without a wire.Mobile phones are one of these too.A computer network restricted to an organisation.Sets of rules determining how data should be encoded.A network security system (wall) that blocks malware.Computer network mainly created for an individual person....

cybersecurity crossword 2022-12-02

cybersecurity crossword crossword puzzle
Across
  1. software that that enters a computer system without the users knowledge or consent and makes the comuter go bad
  2. software that prevents you from getting unwanted viruses on your device
  3. software that runs as a program on the local computer
  4. an attacker who controls a botnet
  5. a logical computer network of zombies under the control of an attacker
  6. software made to stop the spread of malware
  7. a malicious program designed to enter a computer via a network to take advantage of a vulnerability in a application or an operating system
  8. a new software made that was better the old one and fixes things that were bad or old in the old software
  9. software that prevents you from getting infected from differents spyware
  10. a set of software tools used by an attacker to hide the actions or presence of other types of malware
  11. software code that gives access to a program or service
Down
  1. a software program that gives advertising content that is unwanted by the user
  2. a microsoft windows function that provides info to users and obtains their approval before a program can make a change to the computers settings
  3. a undate that makes the software better or more efficient
  4. an infected computer that is under the remote control of an attacker
  5. getting information from a device without the owner knowing
  6. a backup of your data saved on a hard
  7. software that keeps data on where you hit the keyboard
  8. data that is compromised and wont be given back unless a fee is paid

19 Clues: an attacker who controls a botneta backup of your data saved on a hardsoftware made to stop the spread of malwaresoftware that runs as a program on the local computersoftware that keeps data on where you hit the keyboardsoftware code that gives access to a program or servicea undate that makes the software better or more efficient...

Wired networking 2020-10-14

Wired networking crossword puzzle
Across
  1. What uses optical fiber cables?
  2. What has 8 colored wires?
  3. What are unauthorized users going to run into while trying to intercept data?
  4. What is there less of while using wired networking?
Down
  1. What uses twisted-pair cables?
  2. What is faster when using wired networking?
  3. What uses coaxial cables?
  4. What is made of glass?
  5. How many wired transmission types are there?
  6. How many wired media types are there?
  7. How many Cat types are there?

11 Clues: What is made of glass?What has 8 colored wires?What uses coaxial cables?How many Cat types are there?What uses twisted-pair cables?What uses optical fiber cables?How many wired media types are there?What is faster when using wired networking?How many wired transmission types are there?What is there less of while using wired networking?...

Computing Keywords 2014-11-10

Computing Keywords crossword puzzle
Across
  1. A device that shows commands with pictures and light.
  2. Information that can be stored in many different types.
  3. Saved data that you can access again and edit.
  4. Every tiny square on your computer screen.
  5. Requires electricity and is programmed with commands.
  6. Something that can control certain things and is programmed.
Down
  1. Data processed to do several things.
  2. A type of coding used with a computer with 0's and 1's.
  3. An electronic device that picks up sound as a command.
  4. Files or folders which are saved onto the computer.

10 Clues: Data processed to do several things.Every tiny square on your computer screen.Saved data that you can access again and edit.Files or folders which are saved onto the computer.A device that shows commands with pictures and light.Requires electricity and is programmed with commands.An electronic device that picks up sound as a command....

Vocabulary 2016-09-20

Vocabulary crossword puzzle
Across
  1. information at the head/top of every page
  2. Short for hyper-text markup language; file format for documents viewed using a browser network. The language of the web.
  3. the state of being connected to the Internet.
  4. Name given to file. Made up of two parts - main name and extension.
  5. A list of steps that you can follow to finish a task.
  6. To choose part of a document by clicking and dragging over it with the mouse to highlight the text.
  7. The act of transferring a file from a local computer to a website on the interenet.
  8. short for internet etiquette; the code of acceptable behaviors you should follow while on the internet
  9. unique combination of characters such as letters of the alphabet and/or numbers that identifies a specific user
  10. A personal computer built by Apple that uses the Mac OS
  11. Programs that allow you to accomplish certain tasks such as write letters, analyze numbers, sort files, manage finances, draw pictures, and play games.
  12. short for Uniform Resource Locator; an address for documents found on the Web.
  13. An optical disc commonly used as a medium for digital representation of movies and other multimedia presentations that combine sound with graphics.
  14. application software that allows users to access and view web pages. Examples include Safari, Chrome, Internet Explorer, etc...
  15. The act of transferring a file from the internet to a local computer.
  16. unique address for a web page, another name for an URL
  17. A high-speed Internet connection that is always connected
  18. Technology that prevents users from visiting inappropriate web sites.
  19. An acronym for "binary digit." This is the smallest storage unit in a computer.
  20. information that appears at the foot/bottom of every page
  21. world wide connection of networks that connect millions of businesses, government agencies, educational institutions, and individual
  22. The parts of the computer you cannot touch - A set of instructions that tells the computer what to do.
  23. the main page of a Web site.
  24. Disk or Hard Drive Secondary/External memory: Non-removable and used a rigid metallic disk or platter
Down
  1. The part of an Internet address that identifies the website. CNN is the domain of www.cnn.com
  2. short for wireless fidelity; type of broadband internet connection that uses radio signals to provide high speed internet connections
  3. short for electronic mail; mail that is sent by your computer to anyone in the world with an e-mail account.
  4. AKA memory stick or thumb drive - portable place to store files
  5. Short for Operating System. The basic set of instructions that controls the computer. There are many different types including Windows, Mac, IOS,Linux, Android etc...
  6. An application designed to search for viruses and repair files on a computer.
  7. arrow like icon on the desktop that moves with the mouse, showing were the mouse is pointing.
  8. How your text conforms to the left and right margins of a page. The text can be right-aligned, centered, left-aligned, or fully-aligned/justified.
  9. Compact Disc-Read-Only Memory, a type of optical disk capable of storing large amounts of data;
  10. short for Internet Service Provider; a company that provides access to the Internet.
  11. A metaphor used to describe the user interface which consists of icons, files, folders and documents that is seen in an operating system.
  12. Part of the filename that normally indicates the program in which the file was created and will use to open.
  13. Those parts of a computer system that you can see and touch, such as, keyboard, monitor, printer
  14. A personal computer that uses Windows, Linux or another operating system. Brands include Dell, HP, Asus, Lenovo and Acer to name a few.
  15. A rectangular area on the desktop within which you see a program or data.
  16. A connection of computers - usually to share resources such as printers or files.
  17. a computer or device on a network that stores and manages network resources and responds to requests for information. Different types include file and print.

41 Clues: the main page of a Web site.information at the head/top of every pagethe state of being connected to the Internet.A list of steps that you can follow to finish a task.unique address for a web page, another name for an URLA personal computer built by Apple that uses the Mac OSA high-speed Internet connection that is always connected...

Peripherals 2015-10-13

Peripherals crossword puzzle
Across
  1. used to copy physical printed materials into the computer. Scanners are often incorporated into printers
  2. input device used to control the pointer on the screen of a computer
  3. used to print photographs, images and text onto paper and card
  4. used to record sounds and communicate over the internet
  5. Near Field Communication built on RFID
  6. these enable users to control the computer by blinking
  7. came with the original Nintendo Wii
  8. used to control a device with fingers or a stylus
  9. wireless connection built for short ranges
Down
  1. motion sensor plugged into the computer through a usb connection
  2. designed for use with Microsoft's Xbox
  3. gives us access to the programs and the file system through a command line interface (CLI) or a graphical user interface (GUI)
  4. gives outputs that the user can sense based on inputs
  5. different types of cards use magnetic bands to store information
  6. similar to a mouse, this is used where extreme accuracy is needed

15 Clues: came with the original Nintendo Wiidesigned for use with Microsoft's XboxNear Field Communication built on RFIDwireless connection built for short rangesused to control a device with fingers or a stylusgives outputs that the user can sense based on inputsthese enable users to control the computer by blinking...

Software 2021-01-16

Software crossword puzzle
Across
  1. Tasks running on a computer, including application programs
  2. A copy of the files in another location so that they could be accessed if the original files have been damaged, lost or stolen
  3. A change or addition to a computer file, so that it has the most recent information
  4. A computer program that only allows certain types of information to pass through it
  5. a software which controls the data that travels into and out of the network
  6. The algorithm that the OS uses to allow each running process to use the CPU
  7. System A software designed for one particular hardware and which manages other programs’ access to the hardware
  8. A software, possibly a virus that has been secretly installed on a user's computer and could record private information as it is being entered
  9. A utility that moves file clusters on a disk so that they are closer to each other to improve speed up disk access
  10. A computer image stored and printed in the arrangement of bits
  11. Utilities that have been used to reduce the size of a file or a set of files
Down
  1. A type of Utility software that prepares storage media such as a hard disk or USB flash drive for its first use
  2. a type of algorithm that can find a solution to a problem quickly and easily
  3. a group of things together that are of the same type
  4. A link that could be clicked on to go to another location
  5. The ease which a device or application could be used
  6. Software that could create multiple copies of itself and requires a network to spread to the connected devices
  7. A proprietary software that is provided free of charge to users
  8. Brocken into pieces
  9. The process of proving a computer system who you are

20 Clues: Brocken into piecesa group of things together that are of the same typeThe ease which a device or application could be usedThe process of proving a computer system who you areA link that could be clicked on to go to another locationTasks running on a computer, including application programs...

Computer Anatomy 2021-02-17

Computer Anatomy crossword puzzle
Across
  1. houses all the computer's components
  2. used for older keyboards and mice
  3. power supply unit
  4. basic input/output system
  5. houses graphics card
Down
  1. connects different types of peripherals
  2. lots of peripherals need this to work
  3. connects to printers and scanners
  4. controls sound quality
  5. temporary storage
  6. permanent storage
  7. needed to use mice and keyboards
  8. the brain of the computer

13 Clues: temporary storagepermanent storagepower supply unithouses graphics cardcontrols sound qualitybasic input/output systemthe brain of the computerneeded to use mice and keyboardsconnects to printers and scannersused for older keyboards and micehouses all the computer's componentslots of peripherals need this to work...

Networking concept 2025-06-19

Networking concept crossword puzzle
Across
  1. it is a_____topology
  2. it is a set of______ computer
  3. It is a computer network that is created for a individual person
  4. It connects all the computer in a network with each other
Down
  1. it connects two different types of network
  2. It is a small area network
  3. It is a large network then lan
  4. The kind of network that connects two or more computer located at distant places

8 Clues: it is a_____topologyIt is a small area networkit is a set of______ computerIt is a large network then lanit connects two different types of networkIt connects all the computer in a network with each otherIt is a computer network that is created for a individual personThe kind of network that connects two or more computer located at distant places

Networking concept 2025-06-19

Networking concept crossword puzzle
Across
  1. it is a_____topology
  2. it is a set of______ computer
  3. It is a computer network that is created for a individual person
  4. It connects all the computer in a network with each other
Down
  1. it connects two different types of network
  2. It is a small area network
  3. It is a large network then lan
  4. The kind of network that connects two or more computer located at distant places

8 Clues: it is a_____topologyIt is a small area networkit is a set of______ computerIt is a large network then lanit connects two different types of networkIt connects all the computer in a network with each otherIt is a computer network that is created for a individual personThe kind of network that connects two or more computer located at distant places

What do you do? 2013-05-29

What do you do? crossword puzzle
Across
  1. helps cats
  2. grows food
  3. types on a computer
  4. gives news
  5. fights fires
  6. catches bad people
  7. cuts hair
Down
  1. fixes the toilet
  2. educates
  3. works with wood
  4. brings food
  5. sells clothes
  6. teaches sports
  7. helps you when you are sick

14 Clues: educatescuts hairhelps catsgrows foodgives newsbrings foodfights firessells clothesteaches sportsworks with woodfixes the toiletcatches bad peopletypes on a computerhelps you when you are sick

NETWORKING 2012-11-07

NETWORKING crossword puzzle
Across
  1. / ability to transfer data only in one direction at a time
  2. / the part of a network communications process that
  3. / all the physical parts of the computer system
  4. / a main computer that provides a storage area for data files on a network
  5. / an electronic device used to convert signals from analogue into digital ones.
  6. / a low-cost centrally- managed basic computer with a keyboard and display, but no disk drives or expansion sots
  7. / ability to transfer data on both directions simultaneously
  8. / a hardware device, often equipped with a keyboard and screen, through which data can be entered or displayed
  9. / the part of a network communications process that ensures the message is transmitted in a language that the receiving computer can interpret
  10. / an electronic device that isolates a network system from high voltage and allows it to use the mains electricity cables for connecting computers together and transferring data
  11. / a type of signal that has only two levels- on and off
  12. / programs and applications
  13. / a main data communication s cable connecting LANs together
  14. / a network computer that does some of the processing
  15. / stop-start transmission, data is sent one byte at a time
  16. / a data bit that marks the end of a data block in a network transmission
  17. / the computer that uses the services
  18. / an electronic device for connecting different types of networks together
Down
  1. / the only part of a network communications process that a user sees etc.
  2. / the most common way of connecting computers in LAN
  3. / the part of a network communications process that opens communications and has the job of keeping the straight the communications among all nodes on the network. It sets boundaries for the beginning and end of the message and establishes the way data is sent.
  4. / a network that covers a small area e.g. an office or a building
  5. / a common type of network cable that uses two wires twisted together to reduce interference from external signals
  6. / the part of a network communications process that
  7. / the interconnection of computers using signals carried through the air instead of through the connecting cables
  8. / calculated value that is stored with data to detect any errors that may occur when data is copied or transmitted
  9. / an electronic device for connecting different types of networks together and determining the best path for the signals
  10. / transmission where data is sent in blocks
  11. / an electronic device for dividing a LAN into separate parts or connecting similar networks together
  12. / a network computer that doesn’t have a processor, all the processing must be done by the server computer
  13. / a type of Network where the main server provides the services and client computers are attached
  14. / the part of a network communications process that forms the data into packets and selects a route for the message
  15. / the part of a network communications process that protects the data being sent. It subdivides the message into segments and creates the checksum.
  16. / a type of signal that can take any value from minimum to maximum
  17. / a start or stop bit pattern that marks the beginning or end of a transmitted data block
  18. / a data bit that marks the beginning of a data block in a network transmission
  19. / an electronic device at the center of a star network topology, amplifies the signals

37 Clues: / programs and applications/ the computer that uses the services/ transmission where data is sent in blocks/ all the physical parts of the computer system/ the part of a network communications process that/ the part of a network communications process that/ the most common way of connecting computers in LAN...

CompTIA ITF 1 2 3 Crossword Puzzle 2022-03-31

CompTIA ITF 1 2 3 Crossword Puzzle crossword puzzle
Across
  1. Which of the following language types is closest to the native commands recognized by a computer processor?
  2. Which of the following fields is MOST likely used as a primary key in a database? Mobile phone
  3. Which of the following BEST describes software components that allow as OS to directly communicate with a piece of attached hardware?
  4. A global variable called “age” will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
  5. Which of the following is the BEST for a user who travels frequently and needs internet access?
  6. A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
  7. Which of the following storage types is most useful for sharing files between home users in different countries?
Down
  1. After implementing the solution on a user’s system, which of the following troubleshooting steps should be performed NEXT?
  2. Which of the following BEST describes operators that are used to connect search terms?
  3. Which of the following should typically be known BEFORE installing software?
  4. Which of the following is primarily designed to be connected to a television for accessing internet-based movies?
  5. A database administrator has created an object that retrieves a collection of specific records in a native format. Which of the following BEST describes what the database administrator created?
  6. A Security administrator is adding accounting features to a web application. Which of the following would be the BEST action?
  7. Ann, a user, updates the driver for a webcam on a computer. But the update fails. The webcam is not working anymore. Ann should
  8. Which of the following uses the base 2 numbering system?

15 Clues: Which of the following uses the base 2 numbering system?Which of the following should typically be known BEFORE installing software?Which of the following BEST describes operators that are used to connect search terms?Which of the following fields is MOST likely used as a primary key in a database? Mobile phone...

Anatomy of a COmputer 2020-09-30

Anatomy of a COmputer crossword puzzle
Across
  1. It is the port that connects your mouse and keyboard to your computer
  2. more modern types of peripherals use this port to connect to your pc
  3. It is what houses your graphic card which allows videos to be displayed on your monitor
  4. These are how you used to connect your mouse and keyboard to your computer
  5. It is the brains of your computer
  6. It is how you computer gets power
  7. That large circuit board that houses most of the computers parts
  8. It is a port that allows you to connect to peripherals
Down
  1. This is an another way to connect your peripherals but is used less these days since there are fast and better alternatives
  2. It is that basic OS that comes with the motherboard
  3. They are what allow peripherals to communicate with the processor
  4. It is where the CPU temporarily stores data
  5. This is what allows you to hear audio

13 Clues: It is the brains of your computerIt is how you computer gets powerThis is what allows you to hear audioIt is where the CPU temporarily stores dataIt is that basic OS that comes with the motherboardIt is a port that allows you to connect to peripheralsThat large circuit board that houses most of the computers parts...

UNIT TEST III 2023-02-06

UNIT TEST III crossword puzzle
Across
  1. is the best example of Computer Vision.
  2. was the first computer scientist to connect a camera to a computer.
  3. automatically detects the language you type and translates it to the language you want.
  4. of Big Data refers to the speed at which data is being generated.
Down
  1. is the large volume of data that is required to run a business.
  2. is the Father of Computer Vision.
  3. is the time taken by a device to respond to a requestDeep learning is a subset of machine learning that learns features and tasks directly from the data.
  4. of Big Data refers to different types of data.
  5. technologies use NLP’s text classification abilities to scan emails of a language for threat.
  6. is the first image recognition app released by Google.
  7. of Big Data refers to the amount of data being generated.
  8. is the branch of AI that enables machines to understand human language.

12 Clues: is the Father of Computer Vision.is the best example of Computer Vision.of Big Data refers to different types of data.is the first image recognition app released by Google.of Big Data refers to the amount of data being generated.is the large volume of data that is required to run a business....

3.1 Malware 2021-10-19

3.1 Malware crossword puzzle
Across
  1. tracking software that is deployed without the consent or control of the user
  2. an executable program that masquerades as performing a benign activity but also does something malicious
  3. silently captures and stores each keystroke that user types
  4. gives access to a computer, program, or service that circumvents any normal security protections
  5. malware that encrypts all the files on the device
  6. a malicious program that uses a computer network to replicate
Down
  1. Malware that prevents a user's endpoint device from properly and fully functioning until a fee is paid
  2. malware that can hide its presence and the presence of other malware on the computer
  3. bomb computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it
  4. infected robot computer
  5. software that the user does not want on their computer

11 Clues: infected robot computermalware that encrypts all the files on the devicesoftware that the user does not want on their computersilently captures and stores each keystroke that user typesa malicious program that uses a computer network to replicatetracking software that is deployed without the consent or control of the user...