types of computer Crossword Puzzles

Computer Term Crossword 2021-10-06

Computer Term Crossword crossword puzzle
Across
  1. A basic element that is required for the computer to function.
  2. A device or unit that works separately from the CPU but is connected to the computer.
  3. A website that allows any users to edit the content.
  4. A collection of LANs, it is a network of networks.
  5. It is a small portable hard drive that can be inserted into the computer through the USB port to see data inside the drive.
  6. Taking someone else's work and stating that it is yours.
  7. A memory storage device that contains semiconductor chips.
Down
  1. The correct way to use the internet.
  2. Brain of the computer and it lets the computer interact with the programs.
  3. A right given to the originator to stop people from copying he/she’s work.
  4. A set of rules that protects integrity.
  5. To make digital devices give unauthorized access to a computer system.
  6. Sending unwanted messages in a bulk.
  7. A set of devices that is connected together in a limited area.
  8. A network security that monitors network traffic and blocks data base on the security rules.
  9. Storage device for computers which uses magnetic storage.
  10. Also called universal serial bus, it is a standard that is used for connecting peripheral devices to a computer.
  11. to copy a copyrighted material for a limited purpose.
  12. A hardware in a computer that saves data that is currently in use so it can be reached easily.

19 Clues: The correct way to use the internet.Sending unwanted messages in a bulk.A set of rules that protects integrity.A collection of LANs, it is a network of networks.A website that allows any users to edit the content.to copy a copyrighted material for a limited purpose.Taking someone else's work and stating that it is yours....

computer words 2023-10-27

computer words crossword puzzle
Across
  1. to cool the cpu dowm
  2. what hold all of the pc
  3. That powers the computer
  4. to water cool your cpu
  5. The take the water to the cpu and gpu
  6. to type on the computer
  7. to navigate the computer
  8. What you use to see what you are doing
  9. A digital way to store your data
  10. To pump the water though the system
  11. That holds the cpu,gpu and ram
Down
  1. to hear your pc
  2. to water cool your gpu
  3. A magnetism way to store your data
  4. This is to water cool you pc
  5. the brain of the computer
  6. to take photos on your computer
  7. A way to store your data out side of you pc
  8. to cool your gpu and ram
  9. what you plug in to your monitor and pc if you have a gpu
  10. what helps on 3d rendering.

21 Clues: to hear your pcto cool the cpu dowmto water cool your gputo water cool your cpuwhat hold all of the pcto type on the computerThat powers the computerto cool your gpu and ramto navigate the computerthe brain of the computerwhat helps on 3d rendering.This is to water cool you pcThat holds the cpu,gpu and ramto take photos on your computer...

IT - Crossword 2024-11-25

IT - Crossword crossword puzzle
Across
  1. Any action derived from intelligent threats to violate the security of the
  2. Involves actions that supplement the precautionary measures
  3. An act or instance of using or closely imitating the language and thoughts of another author without authorization
  4. A common type of online fraud
  5. A weakness, design, or implementation error
  6. A crime in which a computer is the object of the crime
  7. Ensuring that the information is accessible to authorized persons when required without delay.
  8. The exclusive legal right, given to an originator
  9. Use computer technology to access personal information,
  10. The identification and assurance of the origin of information
  11. Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or
Down
  1. Any action of stealing information from a users’ system.
  2. Action taken in advance to protect the system against potential threats or
  3. Information/data can be accessed only by those authorized
  4. An assurance for which someone cannot deny something
  5. Ending information out and collecting it from unsuspecting people
  6. A defined method of breaching the security of an IT system through
  7. Unauthorized access of or interference with computer systems, servers, or other information and communication systems
  8. User security allows the system to set security rules to determine what is displayed to which user.
  9. Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware
  10. Fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers

21 Clues: A common type of online fraudA weakness, design, or implementation errorThe exclusive legal right, given to an originatorAn assurance for which someone cannot deny somethingA crime in which a computer is the object of the crimeUse computer technology to access personal information,Any action of stealing information from a users’ system....

Coding and Programming 2023-12-07

Coding and Programming crossword puzzle
Across
  1. A true or false statement that decides which block of code will be executed or performed
  2. An error in a program
  3. The physical components of a computer
  4. Finding and fixing errors or problems in a program
  5. The rules and structure of a programming language that determines how instructions are written
  6. A named storage location in a program that holds a value that can change
  7. Data or information that is provided to a program
  8. Creating a set of instructions that tells a computer how to solve a problem
Down
  1. A set of instructions to be repeated multiple times
  2. An electronic device that can store, process, and retrieve data; it can perform various operations based on instructions given to it
  3. A computer language written in 0s and 1s
  4. Using a programming language to create instructions for a computer to follow
  5. The background of a Tynker project; where you can see your program run
  6. The instructions that tell a computer what to do; includes operating systems, applications and programs
  7. An action that initiates or begins a code block in Tynker
  8. A step-by-step set of instructions that tells a computer how to solve a problem
  9. Short for "picture element;" the smallest unit on a display
  10. A character or item that can be animated in Tynker
  11. The result or response produced by a program after processing data

19 Clues: An error in a programThe physical components of a computerA computer language written in 0s and 1sData or information that is provided to a programFinding and fixing errors or problems in a programA character or item that can be animated in TynkerA set of instructions to be repeated multiple times...

Computer Term Crossword 2021-10-06

Computer Term Crossword crossword puzzle
Across
  1. to copy a copyrighted material for a limited purpose.
  2. A collection of LANs, it is a network of networks.
  3. A right given to the originator to stop people from copying he/she’s work.
  4. A basic element that is required for the computer to function.
  5. A website that allows any users to edit the content.
  6. It is a small portable hard drive that can be inserted into the computer through the USB port to see data inside the drive.
  7. A set of devices that is connected together in a limited area.
  8. Also called universal serial bus, it is a standard that is used for connecting peripheral devices to a computer.
Down
  1. A hardware in a computer that saves data that is currently in use so it can be reached easily.
  2. A set of rules that protects integrity.
  3. A device or unit that works separately from the CPU but is connected to the computer.
  4. The correct way to use the internet.
  5. Sending unwanted messages in a bulk.
  6. Brain of the computer and it lets the computer interact with the programs.
  7. Storage device for computers which uses magnetic storage.
  8. A network security that monitors network traffic and blocks data base on the security rules.
  9. To make digital devices give unauthorized access to a computer system.
  10. Taking someone else's work and stating that it is yours.
  11. A memory storage device that contains semiconductor chips.

19 Clues: The correct way to use the internet.Sending unwanted messages in a bulk.A set of rules that protects integrity.A collection of LANs, it is a network of networks.A website that allows any users to edit the content.to copy a copyrighted material for a limited purpose.Taking someone else's work and stating that it is yours....

School Subjects 2025-01-31

School Subjects crossword puzzle
Across
  1. Subject in which we learn about tecnology and programming.
  2. Language that people from a large country in Asia speak.
  3. Subject where we pray and learn about God and the Bible.
  4. Subject in which we learn about geography and information of countries.
  5. Language that is your mother tongue.
  6. Subject in which you exercise your body.
Down
  1. Subject about number and shapes.
  2. Subject about body, plants, universe and more.
  3. Subject in which we use different types of materials to create crafts.
  4. Subject about how to administrate your house and social skills
  5. Subject focused on de structure of sentences and words.
  6. Language that we use when we go to other countries and they don't speak Spanish.
  7. Subject full of rhythm and instruments.
  8. Subject in which we analyze a story and look for the title, characters, setting, etc.
  9. It is the art of speaking in public.

15 Clues: Subject about number and shapes.Language that is your mother tongue.It is the art of speaking in public.Subject full of rhythm and instruments.Subject in which you exercise your body.Subject about body, plants, universe and more.Subject focused on de structure of sentences and words.Language that people from a large country in Asia speak....

Computer Programming 2020-09-17

Computer Programming crossword puzzle
Across
  1. base 16 numbering system (0-F)
  2. A language that is turned into machine language by a computer in advance of program execution
  3. A computer program that turns a program into machine language line by line at the time of execution
  4. 2 bytes
  5. DOS
  6. A computer programming language that is closer to machine language than to human written/spoken language
  7. Instructions for a computer to complete a part of a greater task.
  8. Instructions for a computer to complete a part of a greater task. These typically reside outside of the sequential program flow in memory.
  9. A physical place to store data on a computer. Memory can be accessed using addresses (numbers) for each piece of data.
  10. Chart A graphical chart that shows the flow of a program
  11. An integer
  12. The process of finding and fixing bugs in code
  13. Nothing (typically used in reference to pointers meaning nothing.
  14. base 10 numbering system (0-9)
  15. HyperText Markup Language
  16. either a 1 or a zero
  17. A human-readable set of instructions meant to be turned into a computer language at a later time.
  18. The order in which instructions can be processed.
  19. increase
  20. A sequence of variables.
  21. To store data on the top of a stack
  22. A variable that contains the memory address of stored data
  23. American Standard Code for Information Interchange.
  24. Oriented In programming, this describes the flow of execution. A program creates ``Objects'' that have instructions in them that are executed independent of the main program's timeline.
  25. RAM
  26. A micro-chip that accepts input, does something (or possible nothing) to that input, and creates output.
  27. Arithmetic Logic Unit
  28. An operating system specific to Apple computers
  29. Counter A variable that keeps track of the memory location of the instruction being executed
  30. Down In programming, this describes the flow of execution. A program's instructions are processed in order starting at the top and moving downward
  31. 8 bits
  32. AI
  33. Traditionally this is a person who uses multiple methods over and over again to break into a computer system (as in to hack with a hatchet through a wooden door). Nowadays it's used more to describe someone who can use computers for evil purposes.
  34. A sequential set of characters
  35. A programming language created by MIT to help students learn how to program.
  36. A programming language. Beginner's All-purpose Symbolic Instruction Code
  37. First-in-first-out
  38. CPU
Down
  1. To retrieve data from the top of a stack
  2. Nowadays it's a piece of code that has an error in it.
  3. ROM
  4. In programming, this is an entity that represents something else. When programming, these are usually stored in RAM.
  5. A set of instructions, in a specific order, to solve a problem.
  6. Operating System
  7. The person using a program.
  8. When a program creates a state in the CPU that the CPU cannot process, so it stops functioning properly.
  9. Nowadays this refers to an OS created by Microsoft
  10. A singular command
  11. Language A language that is turned into machine language by a computer at the time of the program's execution, instruction by instruction
  12. Design, Implement, and Debug
  13. base 8 numbering system (0-7)
  14. A repetition.
  15. In programming, this is when the expected size of data is greater than the amount of memory needed to store it.
  16. in a specific order
  17. A code segment that cause a program to perform unexpectedly
  18. Statement A computer instruction that changes the flow of execution based on logic
  19. To compile or as a noun it's a specific snapshot of compiled code.
  20. A list of all the singular commands a computer language can process
  21. 4 bits
  22. Code The native language of a computer. This is the set of numbers that are fed into the CPU that produce specific numbers as output. These numbers are typically see as base 16 (Hexadecimal).
  23. A repeated set of instructions
  24. A physical location to put data
  25. base 2 numbering system (0-1)
  26. An input/output device built into the computer
  27. Code that calls itself
  28. A type of memory in which data is FILO
  29. In reference to variables, it's what kind of variable one is.
  30. decrease
  31. An ASCII byte
  32. An operating system specific to Apple devices
  33. A type of numeric variable
  34. either a 1 or a 0 (a true or a false)
  35. A variable type that contains multiple variables.
  36. A computer program that turns an entire program written in a language other than machine language into machine language
  37. When the flow of execution of a computer program jumps to a different part of memory to perform some task
  38. Instructions for a computer to complete a task.
  39. A computer programming language that is closer to human written/spoken language than machine language
  40. a system or set of principles underlying the arrangements of elements in a computer or electronic device so as to perform a specified task.
  41. A Floating point number
  42. Cycle One tick of the computer's internal clock
  43. Input/Output
  44. When the flow of execution of a computer program jumps to a different part of memory to perform some task, and then returns back to its' original spot.
  45. First-in-last-out
  46. computer instructions. To program.

84 Clues: AIROMDOSRAMCPU4 bits8 bits2 bytesincreasedecreaseAn integerInput/OutputA repetition.An ASCII byteOperating SystemFirst-in-last-outA singular commandFirst-in-first-outin a specific ordereither a 1 or a zeroArithmetic Logic UnitCode that calls itselfA Floating point numberA sequence of variables.HyperText Markup LanguageA type of numeric variable...

Internet & Email SBGG 2022-10-17

Internet & Email SBGG crossword puzzle
Across
  1. a portable computer
  2. a system operation in most of computer/laptop
  3. one of email service provider
  4. a computer's component
  5. a web browser develop by Google
  6. an input device to move the cursor
  7. a wireless technology used to connect computers, tablets, smartphones and other devices to the internet
Down
  1. an input device that allows you to enter letters, numbers and symbols into your computer.
  2. a technology company with the symbol of a fruit
  3. file(s) that we include in our email
  4. part of computer which produces sound
  5. world wide web
  6. the brain of a computer
  7. a global network where we can find information and communication
  8. a string of characters used to verify the identity of a user during the authentication process
  9. electronic mail
  10. Universal Serial Bus

17 Clues: world wide webelectronic maila portable computerUniversal Serial Busa computer's componentthe brain of a computerone of email service providera web browser develop by Googlean input device to move the cursorfile(s) that we include in our emailpart of computer which produces sounda system operation in most of computer/laptop...

technology concepts 2024-05-30

technology concepts crossword puzzle
Across
  1. a device that transforms ac to dc
  2. random acess memory but shorter
  3. definition of HDD
  4. solid-state drive but shorter
  5. an alteration or vibration of space
  6. a device that contains energy
  7. a device that allows sound to come out from the computer
  8. a device used to write in the computer
Down
  1. a technology use to connect devices wireless
  2. the main circuit in a computer
  3. shielded twisted pair but shorter
  4. a device that regulated electricity of an electric circuit
  5. everything you can touch from the computer
  6. technology that provides internet access
  7. a device that copies a text or image into a paper
  8. a color of printers represented with k
  9. unshielded twisted pair but shorter
  10. everything you cannot touch from the computer

18 Clues: definition of HDDsolid-state drive but shortera device that contains energythe main circuit in a computerrandom acess memory but shortera device that transforms ac to dcshielded twisted pair but shorteran alteration or vibration of spaceunshielded twisted pair but shortera color of printers represented with ka device used to write in the computer...

Hey, look who actually decided to come to work today 2023-03-23

Hey, look who actually decided to come to work today crossword puzzle
Across
  1. (2 words) a common characteristic in some types of sedimentary rock
  2. the process of sediment being glued together
  3. the process of sediment being buried and pressed together
  4. a common characteristic in some types of igneous rock
  5. (2 words) the substance that holds sedimentary rocks together
Down
  1. the rock type formed when lava or magma cools and becomes solid
  2. the movement of sediment from one place to another, often caused by wind or flowing water
  3. small pieces of rock
  4. the process of rock broken into smaller pieces due to wind or moving water
  5. (2 words) everything made of rock: sediment, magma, lava, and all rock types
  6. the rock type formed when sediment is compacted and cemented
  7. hot liquid rock above the surface
  8. the 25th Pokémon
  9. hot liquid rock below the surface
  10. one of the many different types of substances that make up rocks

15 Clues: the 25th Pokémonsmall pieces of rockhot liquid rock above the surfacehot liquid rock below the surfacethe process of sediment being glued togethera common characteristic in some types of igneous rockthe process of sediment being buried and pressed togetherthe rock type formed when sediment is compacted and cemented...

Chapter 18 2017-05-12

Chapter 18 crossword puzzle
Across
  1. engine / a computer program that can produce a list of documents related to a given topic
  2. Wide Web / a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet
  3. / an extension of the intranet of a company or organization
  4. / The transmission of information over communication lines
  5. reality / an artificial, three-dimensional visual world created by a computer
  6. computer / a small portable computer designed to be used while it is worn on the body
Down
  1. / a program that can insert copies of itself into a computer without the user's knowledge, often damaging stored data
  2. design / software for designing products with a computer
  3. / an arrangement that allows employees to work at home while communicating with the workplace by phone, fax, or modern
  4. / bits of information about a computer user that are stored on that computer's hard drive
  5. / a global computer network
  6. / a person who illegally gains access to and sometimes tampers with information in a computer system
  7. / a computer network used by an organization
  8. technology / computing, electronics, and telecommunications to process and distribute information in digital and other forms

14 Clues: / a global computer network/ a computer network used by an organizationdesign / software for designing products with a computer/ The transmission of information over communication lines/ an extension of the intranet of a company or organizationreality / an artificial, three-dimensional visual world created by a computer...

Jake Ryan Hardware Crossword Puzzle 2019-01-14

Jake Ryan Hardware Crossword Puzzle crossword puzzle
Across
  1. the retention of retrievable data on a computer or other electronic system
  2. a printed circuit board containing the principal components of a computer
  3. the brains of the computer where most calculations take place
  4. a flexible removable magnetic disk for storing data
  5. a machine for printing text or pictures, especially one linked to a computer
  6. a type of computer memory that can be accessed randomly
Down
  1. a common interface that enables communication between devices and a host controller such as a PC
  2. a type of non-volatile memory used in computers and other electronic devices
  3. the enclosure that contains most of the components of a computer
  4. a panel of keys that operate a computer or typewriter
  5. A device used to click on icons on a screen
  6. a printed circuit board that controls the output to a display screen.
  7. a type of compact disc able to store large amounts of data, especially high-resolution audiovisual material.
  8. an electromechanical data storage device that uses magnetic storage
  9. A display screen used to provide visual output from a computer

15 Clues: A device used to click on icons on a screena flexible removable magnetic disk for storing dataa panel of keys that operate a computer or typewritera type of computer memory that can be accessed randomlythe brains of the computer where most calculations take placeA display screen used to provide visual output from a computer...

Technology Vocabulary 2021-06-19

Technology Vocabulary crossword puzzle
Across
  1. any computer that is hooked up to a computer network
  2. transfer a file or program to a smaller computer
  3. science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
  4. locate and correct errors in a computer program code
  5. an organized body of related information
  6. the exclusive right to sell a work
  7. short line of text that a web site puts on your computer's hard drive when you access the web site
  8. sequence of data processed as a single unit of information
  9. (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
Down
  1. transfer out of a database or document
  2. activity of converting data or information into code
  3. the symbolic arrangement of data in a computer program
  4. ram memory that is set aside as a specialized buffer storage
  5. or defect in a computer program, system, or machine
  6. restore something reduced in volume to its full volume

15 Clues: the exclusive right to sell a worktransfer out of a database or documentan organized body of related informationtransfer a file or program to a smaller computeror defect in a computer program, system, or machineany computer that is hooked up to a computer networkactivity of converting data or information into code...

CS Review Puzzle 2024-10-15

CS Review Puzzle crossword puzzle
Across
  1. A type of hacking that doesn't require code
  2. A Faster version of hard drives
  3. The _____ is measured in GHz
  4. How the computer takes in and sends out signals
  5. The software that manages the computer
  6. A more secure to protect you information
  7. The ____ has 2 parts called the north and south bridge
Down
  1. A type of memory that holds one number
  2. The part of the CPU that controls it
  3. The process The CPU goes through
  4. The brain of the computer
  5. The ____ draws heat away from the CPU
  6. A part of computer that connects everything
  7. The basic tools on a computer
  8. 8 bits is a ____
  9. An extended version of ASCII

16 Clues: 8 bits is a ____The brain of the computerThe _____ is measured in GHzAn extended version of ASCIIThe basic tools on a computerA Faster version of hard drivesThe process The CPU goes throughThe part of the CPU that controls itThe ____ draws heat away from the CPUA type of memory that holds one numberThe software that manages the computer...

Technology words 2023-05-08

Technology words crossword puzzle
Across
  1. the strength and vitality required for sustained physical or mental activity.
  2. A ____ is a finite sequence of rigorous instructions
  3. A _____ is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically
  4. A group of two or more devices or nodes that can communicate
  5. includes the physical parts of a computer
  6. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  7. a set of computer programs associated documentaton and data.
  8. used to protect data from being stolen, changed, or compromised
  9. major focuses on computer programming, embedded systems, networks, telecommunications, computer systems, computer investigations and cyber operations.
  10. an interdisciplinary branch of computer science and engineering
  11. an online video game developed by Epic Games and released in 2017.
Down
  1. a computer system designed to make decisions and perform actions autonomously.
  2. expressed as series of the digits 0 and 1, typically represented by values of a physical quantity such as voltage or magnetic polarization.
  3. an engineering discipline concerned with the study, design, and application of equipment, devices, and systems which use electricity, electronics, and electromagnetism.
  4. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

15 Clues: includes the physical parts of a computerA ____ is a finite sequence of rigorous instructionsA group of two or more devices or nodes that can communicatea set of computer programs associated documentaton and data.used to protect data from being stolen, changed, or compromisedan interdisciplinary branch of computer science and engineering...

crossword vocab 24 2016-04-19

crossword vocab 24 crossword puzzle
Across
  1. an internet connection technology provides for the transfer of information to a computer at a high speed bandwidth over ordinary copper telephone lines
  2. a network configuration that allows selected outside organizations to access internal information systems
  3. computer network that covers a large geographical area most WANs are made up of several connected LANs
  4. a computer that uses the services of another program
  5. communications hardware device that facilitates the transmission of data
  6. a device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their place of destination
  7. computer configuration in which one or more computers on the same network acts as a server
  8. an ISP that provides connection speeds more than 30 times faster than dial up connections from 384 Kbps to 2.0 Mdps
  9. link from one computer to another through which data can be transmitted
  10. a series of connected personal computers workstations and other devices such as printers or scanners within a confined space such as an office building
  11. expert computer user who invades someone else's computer for either for personal gain or simply for the satisfaction of being able to do it
Down
  1. a device on a network
  2. examine a finger print a voice pattern or the iris or retina of the eye these must match the entry that originally was stored in the system for an employee to gain access to a secure area
  3. a device that uses coaxial cable to send and receive data
  4. a type of fiber optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitized voice channels
  5. a variation of a LAN that uses no physical wires
  6. high end programs designed to provide network control and include special functions for connecting computers and other devices in to a network
  7. the words collection of interconnected commercial and government owned voice oriented systems
  8. a recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone home computer or car stands for worldwide interoperability for microwave access
  9. a computer that handles requests for data email file transfers and other network services from other computers clients
  10. computer architecture in which all of the computers on a network are equal and there is no computer designed as the server
  11. the largest network used as a communication tool
  12. a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
  13. a server that acts as an intermediary between a user and the internet
  14. a junction where information arrives from connected computers or peripheral devices and is then forwarded in one or more directions to other computers and devices
  15. a combination of hardware and software that creates a buffer between an internal network and the internet to prevent unauthorized access

26 Clues: a device on a networka variation of a LAN that uses no physical wiresthe largest network used as a communication toola computer that uses the services of another programa device that uses coaxial cable to send and receive dataa server that acts as an intermediary between a user and the internet...

Computer Words for ESL 2021-12-06

Computer Words for ESL crossword puzzle
Across
  1. Frequently Asked Questions
  2. As Soon As Possible
  3. Click to answer an email to one person
  4. Keep what you have created as a file
  5. A small computer that you can use on your lap
  6. For Your Information
  7. Erase something typed; also use Backspace button
  8. Hugs and Kisses
Down
  1. Save your files in another place
  2. The part of the computer you view; AKA monitor
  3. Small device to make the computer do what you want
  4. Mystery place where computer communicate
  5. Large computer that is not moved easily; PC
  6. Best friends forever
  7. Good Luck
  8. What you see on your screen when you open computer
  9. Press the key on the keyboard, click means press
  10. Thanks
  11. Rolling on the floor laughing

19 Clues: ThanksGood LuckHugs and KissesAs Soon As PossibleBest friends foreverFor Your InformationFrequently Asked QuestionsRolling on the floor laughingSave your files in another placeKeep what you have created as a fileClick to answer an email to one personMystery place where computer communicateLarge computer that is not moved easily; PC...

Cyber Security 2020-09-09

Cyber Security crossword puzzle
Across
  1. Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
  2. Chief Information Security Officer
  3. To protect personal information, avoid sending it via
  4. Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
  5. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
  6. Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
  7. A malicious program designed to record which keys are pressed on a computer keyboard
  8. _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
  9. Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
  10. Unwanted advertising that comes to your email address
  11. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
  12. An unauthorized person seeking to maliciously disrupt or damage a computer
  13. a string of words that must be used to gain access to a computer system or service
  14. The assurance that the confidentiality of, and access to, certain information about an entity is protected
  15. An Internet scam that targets unsuspecting users through email
Down
  1. A technology that allows us to access our files and/or services through the internet from anywhere in the world
  2. Always _______your computer when you leave your desk
  3. Small files that Web sites put on your computer hard disk drive when you first visit
  4. Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
  5. Domino's is known for selling
  6. Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
  7. Global system of interconnected computer networks that use the Internet protocol suite
  8. media websites and applications that enable users to create and share content or to participate in social networking
  9. An acronym that stands for distributed denial of service – a form of cyber attack
  10. A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
  11. A characteristic or specific weakness that renders an organization or asset open to exploitation.
  12. Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
  13. An attempt by hackers to damage or destroy a computer network or system
  14. A type of malware designed to block access to a computer system or data until a sum of money is paid
  15. A system invented by Google that uses a test to establish if a user is a human or a robot
  16. A regular system update that is designed to cover security blunders that have been discovered

31 Clues: Domino's is known for sellingChief Information Security OfficerAlways _______your computer when you leave your deskTo protect personal information, avoid sending it viaUnwanted advertising that comes to your email addressLock your _ _ _ _ _ _ _ _ and mobile phone when not in useInformation security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _...

Week 1 - Week 4 2017-04-25

Week 1 - Week 4 crossword puzzle
Across
  1. Pointing device that fits under the palm of your hand comfortably
  2. a series of instructions that tells the computer to do and how to do it
  3. refers to the program that you interact with to perform specific computer tasks
  4. an optical device that projects an image (or moving images) onto a surface, commonly a projection screen
  5. input device which converts analog information into digital form.
  6. MICR are used in banks because a large number of _____________ to be processed every day
Down
  1. An input device that contains keys users press to enter data and instructions into a computer
  2. Program Allows user to perform maintenance-type tasks usually related to managing a computer, its devices or its programs
  3. is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
  4. Like a laptop this is a small portable computer but the biggest difference is that its user interface is all through touch.
  5. The process of using the personal computer and page layout software to combine text and graphics to create publication documents such as newsletters, brochures, books, etc.
  6. ______________Scanner device used for reading bar coded data (data in form of light and dark lines).
  7. one byte are needed to store one ____________
  8. one byte contains 8 _____
  9. is a computer that combines the case, monitor, keyboard and mouse in one unit
  10. is by far the most common type of computer
  11. displays an online advertisement in a banner or pop-up window
  12. An input device that contains keys users press to enter data and instructions into a computer

18 Clues: one byte contains 8 _____is by far the most common type of computerone byte are needed to store one ____________displays an online advertisement in a banner or pop-up windowPointing device that fits under the palm of your hand comfortablyinput device which converts analog information into digital form....

Computer Basic Vocabulary 2014-11-05

Computer Basic Vocabulary crossword puzzle
Across
  1. device through which a computer sends out information
  2. silicon chip that processes data and carries out instructions
  3. device that stores, retrieves, manipulates and processes data to produce an outcome
  4. Input device used to type text
  5. physical equipment of a computer
  6. set of instructions that makes computer hardware work; programs or applications
  7. output device that transfers information to a hard copy
Down
  1. use of technology tools to input, store, process, and communicate information
  2. a type of software that includes programs that help people do certain tasks
  3. component that allows people to select text and icons from the computer screen to choose commands and files and start application software; makes computers user friendly
  4. language a computer can understand; made up of a series of ones and zeroes
  5. Application;ordered instructions done by the computer
  6. Output device that displays graphics on a screen
  7. Two or more computers linked together to share files and resources
  8. Only Memory ROM; starts up the computer and holds its start up instructions

15 Clues: Input device used to type textphysical equipment of a computerOutput device that displays graphics on a screendevice through which a computer sends out informationApplication;ordered instructions done by the computeroutput device that transfers information to a hard copysilicon chip that processes data and carries out instructions...

Puzzle 1 2017-04-26

Puzzle 1 crossword puzzle
Across
  1. A popular navigation instrument used in maritime travel during the past few centuries
  2. Surveying instrument used in the oceans
  3. An equipment essential for many types of levelling
  4. An all in one surveying instrument
Down
  1. Produces 3D images
  2. Technique used by GPS satellites to determine the location
  3. A computer aided software that links geographic information with descriptive information
  4. A surveying instrument that can only measure angles

8 Clues: Produces 3D imagesAn all in one surveying instrumentSurveying instrument used in the oceansAn equipment essential for many types of levellingA surveying instrument that can only measure anglesTechnique used by GPS satellites to determine the locationA popular navigation instrument used in maritime travel during the past few centuries...

COMPUTERS! 2022-03-02

COMPUTERS! crossword puzzle
Across
  1. the principal part of any digital computer system, generally composed of the main memory, control unit, and arithmetic-logic unit.
  2. a computer accessory that allows a user to type text into a computer
  3. The short-term memory of a computer, which is used to handle all active processes and programmes.
  4. information that's stored in or used by a computer
  5. an internal or external computer disc drive that reads and writes data using laser beam technology
  6. storage device used in computers
  7. a software application that uses keywords or phrases to help people locate the information they're seeking for on the internet
  8. a specialised processor created to speed up the processing of graphics
  9. a tiny portable input device that controls the cursor on a computer screen
Down
  1. a data storage device that is a flexible magnetic disc which is removable.
  2. an electronic device with a screen used for display
  3. information shown in the form of diagrams, graphs, drawings, and symbols on a visual display device or on a computer printout
  4. the primary screen of a computer, from which windows and applications may be launched and operated
  5. the primary piece of circuitry into which all other components plug into to form a unified whole.
  6. permanent or semi-permanent data stored on non-volatile computer memory chips

15 Clues: storage device used in computersinformation that's stored in or used by a computeran electronic device with a screen used for displaya computer accessory that allows a user to type text into a computera specialised processor created to speed up the processing of graphicsa data storage device that is a flexible magnetic disc which is removable....

Coding Crossword 2021-08-26

Coding Crossword crossword puzzle
Across
  1. The Caesar ______ is a method of encryption
  2. The physical parts of a computer, such as the CPU, monitor, GPU, motherboard
  3. Facts and statistics collected together
  4. converting information or data into a code
  5. The information about a person that is on the internet
  6. Hard Disc Drive
  7. A collection of instructions and data that tell a computer how to work
  8. Central Processing Unit
  9. Random Access Memory
Down
  1. A base 2 system code, represented by just 0s and 1s
  2. A network that connects devices all over the world
  3. A set of rules or instructions
  4. A diagram representation of an algorithm
  5. A pocket-sized computer that introduces you to how software and hardware work together. It has an LED light display, buttons, sensors
  6. Light-Emitting Diode
  7. The process or activity of writing programs
  8. A programming language
  9. A code meant for human reading instead of machine or computer reading
  10. provide a computer with coded instructions for the automatic performance of a task

19 Clues: Hard Disc DriveLight-Emitting DiodeRandom Access MemoryA programming languageCentral Processing UnitA set of rules or instructionsFacts and statistics collected togetherA diagram representation of an algorithmconverting information or data into a codeThe Caesar ______ is a method of encryptionThe process or activity of writing programs...

Jaiiime Crossword 2020-09-09

Jaiiime Crossword crossword puzzle
Across
  1. Ransomware does this to critical files
  2. Malware stands for _________ Software
  3. An example of Malicious software which logs what you do
  4. _____ Optic cables are used to transmit data at a higher speed than other forms
  5. A program disguised to find Viruses
  6. A virus which is disguised as another program
  7. An abreviation for 'Solid State Drive'
  8. Malware which forces your browser to display unwanted ads
  9. The area that the BIOS is stored
  10. A program designed to find all types of Malware
  11. A type of malicious software which logs key-presses
Down
  1. An abreviation for the term - IP Address
  2. Several nodes connected together to form a __________
  3. The most common type of wired connection to a LAN
  4. An alternative to a wired connection to a LAN
  5. A piece of malicious software which copies itself hundreds of times
  6. The largest WAN in the world
  7. A piece of malware designed to encrypt your files with a key which will be held at ransom
  8. A word or phrase used to protect access to your computer

19 Clues: The largest WAN in the worldThe area that the BIOS is storedA program disguised to find VirusesMalware stands for _________ SoftwareRansomware does this to critical filesAn abreviation for 'Solid State Drive'An abreviation for the term - IP AddressAn alternative to a wired connection to a LANA virus which is disguised as another program...

Cyber Security 2020-09-09

Cyber Security crossword puzzle
Across
  1. Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
  2. Chief Information Security Officer
  3. Avoid sending personal information via
  4. Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
  5. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
  6. Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
  7. A malicious program designed to record which keys are pressed on a computer keyboard
  8. _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
  9. Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
  10. Unwanted advertising that comes to your email address
  11. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
  12. An unauthorized person seeking to maliciously disrupt or damage a computer
  13. A string of words that must be used to gain access to a computer system or service
  14. The assurance that the confidentiality of, and access to, certain information about an entity is protected
  15. An Internet scam that targets unsuspecting users through email
Down
  1. A technology that allows us to access our files and/or services through the internet from anywhere in the world
  2. Always _ _ _ _ your computer when you leave your desk
  3. Small files that Web sites put on your computer hard disk drive when you first visit
  4. Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
  5. Domino's is known for selling
  6. Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
  7. Global system of interconnected computer networks that use the Internet protocol suite
  8. media Websites and applications that enable users to create and share content or to participate in social networking
  9. An acronym that stands for distributed denial of service – a form of cyber attack
  10. A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
  11. A characteristic or specific weakness that renders an organization or asset open to exploitation.
  12. Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
  13. An attempt by hackers to damage or destroy a computer network or system
  14. A type of malware designed to block access to a computer system or data until a sum of money is paid
  15. A system invented by Google that uses a test to establish if a user is a human or a robot
  16. A regular system update that is designed to cover security blunders that have been discovered

31 Clues: Domino's is known for sellingChief Information Security OfficerAvoid sending personal information viaAlways _ _ _ _ your computer when you leave your deskUnwanted advertising that comes to your email addressLock your _ _ _ _ _ _ _ _ and mobile phone when not in useInformation security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _...

Eva F. 2024-09-19

Eva F. crossword puzzle
Across
  1. software that runs on computer devices
  2. the address of a web page
  3. An image that is animated of screen
  4. a piece of computer hardware that is used to display images
  5. a computer program that displays your web
  6. a worldwide network that links computers. It connects billions of electronics together
  7. a collection of instructions, data and program that tells the computer to do that task
Down
  1. is the primary display to organize icons on the screen
  2. is what comes between the @ in your email address
  3. the short-range wireless interconnection of phones, computer and other devices
  4. a way to save organize and too save your data on the internet
  5. to transfer, move or copy data
  6. Used to connect computers with phones and keyboards
  7. the physical features on a computer or machinery on a computer
  8. a wireless networking technology that uses radio waves that allow all devices to connect to the internet
  9. it's all the things that you can access on the internet

16 Clues: the address of a web pageto transfer, move or copy dataAn image that is animated of screensoftware that runs on computer devicesa computer program that displays your webis what comes between the @ in your email addressUsed to connect computers with phones and keyboardsis the primary display to organize icons on the screen...

Week 1 - Week 4 2017-04-25

Week 1 - Week 4 crossword puzzle
Across
  1. is a computer that combines the case, monitor, keyboard and mouse in one unit
  2. An input device that contains keys users press to enter data and instructions into a computer
  3. is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
  4. Pointing device that fits under the palm of your hand comfortably
  5. an optical device that projects an image (or moving images) onto a surface, commonly a projection screen
  6. Like a laptop this is a small portable computer but the biggest difference is that its user interface is all through touch.
  7. refers to the program that you interact with to perform specific computer tasks
  8. An input device that contains keys users press to enter data and instructions into a computer
  9. MICR are used in banks because a large number of _____________ to be processed every day
Down
  1. ______________Scanner device used for reading bar coded data (data in form of light and dark lines).
  2. displays an online advertisement in a banner or pop-up window
  3. The process of using the personal computer and page layout software to combine text and graphics to create publication documents such as newsletters, brochures, books, etc.
  4. one byte contains 8 _____
  5. Allows user to perform maintenance-type tasks usually related to managing a computer, its devices or its programs
  6. input device which converts analog information into digital form.
  7. one byte are needed to store one ____________
  8. is by far the most common type of computer
  9. a series of instructions that tells the computer to do and how to do it

18 Clues: one byte contains 8 _____is by far the most common type of computerone byte are needed to store one ____________displays an online advertisement in a banner or pop-up windowPointing device that fits under the palm of your hand comfortablyinput device which converts analog information into digital form....

Week 1 - Week 4 2017-04-25

Week 1 - Week 4 crossword puzzle
Across
  1. Like a laptop this is a small portable computer but the biggest difference is that its user interface is all through touch.
  2. MICR are used in banks because a large number of _____________ to be processed every day
  3. An input device that contains keys users press to enter data and instructions into a computer
  4. refers to the program that you interact with to perform specific computer tasks
  5. an optical device that projects an image (or moving images) onto a surface, commonly a projection screen
  6. is by far the most common type of computer
  7. displays an online advertisement in a banner or pop-up window
  8. one byte contains 8 _____
Down
  1. Pointing device that fits under the palm of your hand comfortably
  2. ______________Scanner device used for reading bar coded data (data in form of light and dark lines).
  3. The process of using the personal computer and page layout software to combine text and graphics to create publication documents such as newsletters, brochures, books, etc.
  4. input device which converts analog information into digital form.
  5. is a computer that combines the case, monitor, keyboard and mouse in one unit
  6. Allows user to perform maintenance-type tasks usually related to managing a computer, its devices or its programs
  7. one byte are needed to store one ____________
  8. a series of instructions that tells the computer to do and how to do it
  9. An input device that contains keys users press to enter data and instructions into a computer
  10. is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources

18 Clues: one byte contains 8 _____is by far the most common type of computerone byte are needed to store one ____________displays an online advertisement in a banner or pop-up windowPointing device that fits under the palm of your hand comfortablyinput device which converts analog information into digital form....

computer science 2020-12-09

computer science crossword puzzle
Across
  1. give an authority order
  2. a folder or box for holding loose papers that are typically arranged a difference
  3. its a corona that can contact everybody
  4. browser is a software application for accessing information on the world wide web.
  5. the amount of something produced by a person,machine,industry
  6. an island town or city
  7. device is a piece of computer device hardware equipment wich converts information
  8. storage cloud computing model thatstores data and information
  9. a person or thing that provides commonly
  10. something remmembered from the past
  11. annoy or bother someone
  12. local area network is a collection of devices together
  13. software thats designed to dirupt and damage
Down
  1. a small sweet cake typically round and flat and having a crisp flat between chewy textures
  2. wireless fidelity that can connect to a radio using waves without needing to use wires
  3. copy data from a computer system to another typically over internet
  4. devices a piece of equipment used to provide data and control signals into a information processing system as computer
  5. bar a long thin section at the edge of a computer
  6. process in restarting a computer
  7. a wall designed whit fire
  8. network is a group of networks that uses a set of communications
  9. a act or instance of booting a computer

22 Clues: an island town or citygive an authority orderannoy or bother someonea wall designed whit fireprocess in restarting a computersomething remmembered from the pastits a corona that can contact everybodya act or instance of booting a computera person or thing that provides commonlysoftware thats designed to dirupt and damage...

Technology 2024-10-09

Technology crossword puzzle
Across
  1. a digital pen
  2. one of the most popular and advanced AI chatbots
  3. used to send digital messages
  4. a computer for individual use (acronym)
  5. holds the computer screen
  6. a well known electronics company founded by Steve Jobs
  7. a social media platform created by Mark Zuckerberg
  8. a communication and media company founded in Toronto, 1960
  9. powers a device and converts chemical energy to electrical energy
  10. drags a cursor
  11. used to listen to music privately
  12. a visual set of data (goes in a straight line)that you scan
  13. a platform used to post videos
  14. global network
  15. used to refuel a battery in a device
  16. short term memory of a computer (acronym)
Down
  1. non-portable computer
  2. a mobile device used to make calls
  3. a type of laptop that the school provides
  4. most popular search engine
  5. used to amplify sound
  6. portable computer
  7. larger version of a cellphone
  8. little squares that make up a digital image
  9. used to type
  10. transfers data between electronics (acronym)
  11. a social media platform for cringeworthy dancing videos
  12. used to make physical copies of things
  13. something that is online
  14. a search engine launched in 2009
  15. like the engine of a computer (acronym)

31 Clues: used to typea digital pendrags a cursorglobal networkportable computernon-portable computerused to amplify soundsomething that is onlineholds the computer screenmost popular search engineused to send digital messageslarger version of a cellphonea platform used to post videosa search engine launched in 2009used to listen to music privately...

Types of Credit - Vocabulary 2022-01-19

Types of Credit - Vocabulary crossword puzzle
Across
  1. monetary charge for borrowing money
  2. an individual or entity that is using money, assets, or services on credit
  3. sign jointly with a borrower for a loan
  4. unchanging rate charged on a liabilitylegal debt or obligation that an entity must pay back
  5. a long-term loan used to finance the purchase of real estate
  6. source of continuous funds that works like a credit card
  7. management of money
  8. an agreement between a lender and a borrower
  9. a company engaged in the business of dealing with financial and monetary transactions such as deposits, loans, investments, and currency exchange
  10. original sum of money borrowed in a loan or put into an investment
Down
  1. loans that are not backed by collateral
  2. personal or commercial loans that borrowers must repay with regularly scheduled payments or installments
  3. an individual, a public or private group, or a financial institution that makes funds available to a person or business with the expectation that the funds will be paid back
  4. the cost of borrowing money or the reward for saving it.
  5. any type of deposit account which does not pay its holder a fixed interest rate
  6. backed by collateral

16 Clues: management of moneybacked by collateralmonetary charge for borrowing moneyloans that are not backed by collateralsign jointly with a borrower for a loanan agreement between a lender and a borrowerthe cost of borrowing money or the reward for saving it.source of continuous funds that works like a credit card...

Types of TV programme 2020-08-11

Types of TV programme crossword puzzle
Across
  1. Find out what happened today on the _________.
  2. A_______ affairs programme covers up-to-date social and political stories.
  3. This programme mixes reality and fiction.
  4. This programme features animals.
  5. Short funny pieces are acted out on a _____ show.
  6. A private eye solves a murder every week in a ________ series.
  7. A set of programmes, for example, a new ______ of Strictly Come Dancing.
  8. A programme about something real.
Down
  1. Number 8 down is one kind of ______ show.
  2. A ______ opera has romance and drama and is on regularly.
  3. This type of show often puts ordinary people in extraordinary situations.
  4. It's full of suspense.
  5. Actors ears clothes from the past in a _______ drama.
  6. This has the same characters each week in funny situations.
  7. It's a story or drama broadcast in different parts.
  8. Competitors answer questions on a ________ show.

16 Clues: It's full of suspense.This programme features animals.A programme about something real.Number 8 down is one kind of ______ show.This programme mixes reality and fiction.Find out what happened today on the _________.Competitors answer questions on a ________ show.Short funny pieces are acted out on a _____ show....

Types of TV programme 2020-08-11

Types of TV programme crossword puzzle
Across
  1. Find out what happened today on the _________.
  2. A_______ affairs programme covers up-to-date social and political stories.
  3. This programme mixes reality and fiction.
  4. This programme features animals.
  5. Short funny pieces are acted out on a _____ show.
  6. A private eye solves a murder every week in a ________ series.
  7. A set of programmes, for example, a new ______ of Strictly Come Dancing.
  8. A programme about something real.
Down
  1. Number 14 down is one kind of ______ show.
  2. A ______ opera has romance and drama and is on regularly.
  3. This type of show often puts ordinary people in extraordinary situations.
  4. It's full of suspense.
  5. Actors wears clothes from the past in a _______ drama.
  6. This has the same characters each week in funny situations.
  7. It's a story or drama broadcast in different parts.
  8. Competitors answer questions on a ________ show.

16 Clues: It's full of suspense.This programme features animals.A programme about something real.This programme mixes reality and fiction.Number 14 down is one kind of ______ show.Find out what happened today on the _________.Competitors answer questions on a ________ show.Short funny pieces are acted out on a _____ show....

Types of Motors II 2015-03-19

Types of Motors II crossword puzzle
Across
  1. The end structure of an electric motor that normally contains the bearings and lubrication system.
  2. The region of a magnet towards which the lines of magnetic induction converge (south pole) or from which the lines of induction diverge (north pole).
  3. This is the voltage-generating effect of an electric motor’s rotor turning within the motor.
  4. Circuit in which the current leads the voltage.
  5. An electronic device in a motor circuit that is used to control motor speed for variable-speed motors.
  6. The rotating or moving component of a motor, including the shaft.
  7. A switch that uses a centrifugal action to disconnect the start windings from the circuit.
  8. The speed at which the variable frequency drive’s power device switches the waveform’s positive and negative halves on and off is referred to as the switch frequency or carrier frequency.
  9. A two wire Alternating Current (AC) power circuit.
Down
  1. A compressor starting devices which are variable resistors that vary their resistance when the surrounding temperature changes.
  2. An alternating current motor where the rotor turns from induced magnetism from the field windings.
  3. The amount by which the current leads or lags the voltage.
  4. An electrical storage device used to start motors (start capacitor) and to improve the efficiency of motors (run capacitor).
  5. Cycles per second.
  6. The minimum back electromotive force (BEMF) that the potential relay coil must experience or its armature will drop out and the contacts between terminals 1 and 2 will close.
  7. An electrical device activated by a change in current flow.

16 Clues: Cycles per second.Circuit in which the current leads the voltage.A two wire Alternating Current (AC) power circuit.The amount by which the current leads or lags the voltage.An electrical device activated by a change in current flow.The rotating or moving component of a motor, including the shaft....

Different types of organizations 2021-09-03

Different types of organizations crossword puzzle
Across
  1. money given by the state in support of an activity.
  2. buildings or rooms whare a copany's offices are based.
  3. said of an organisation which aims at helping people or animals or protecting the environment. It is not funded by the governement (two words).
  4. person providing help to an organisation without any financial compensation (no salary).
  5. which lasts for a very long time.
  6. an organisation whose goal is to make profit
  7. products that are directly taken from the ground, in their natural state (two words).
  8. money that an organsation makes when selling their products or offering their services.
Down
  1. goods products manufactured in order to be sold (two words)
  2. a company with less than 10 employees.
  3. a skill you gain from experience and proves the quality of your work (2 words)
  4. the leader of a company or charity.
  5. a design representing an organisation.
  6. a sum of money a bank accepts to lend you and which is going to be paid back over a determined period of time.
  7. the place where goods are manufactured.
  8. servant person working for the state who provide a public service (two words).

16 Clues: which lasts for a very long time.the leader of a company or charity.a company with less than 10 employees.a design representing an organisation.the place where goods are manufactured.an organisation whose goal is to make profitmoney given by the state in support of an activity.buildings or rooms whare a copany's offices are based....

Different types of organizations 2021-09-03

Different types of organizations crossword puzzle
Across
  1. Buildings or rooms where a company's offices are based.
  2. Something you gain from experience which proves the quality of your work (2 words).
  3. A company with less than 10 employees.
  4. A person working for the state who provides a public service (two words).
  5. A design representing an organisation.
  6. Said of an organisation which aims at helping people or animals or protecting the environment. It is not funded by the governement (two words).
  7. Products manufactured in order to be sold (two words).
Down
  1. Products that are directly taken from the ground, in their natural state (two words).
  2. Which lasts for a very long time.
  3. Money given by the state in support of an activity.
  4. The place where goods are manufactured.
  5. Money that an organisation makes when selling their products or offering their services.
  6. A person providing help and giving their time to an organisation without any financial compensation (no salary).
  7. The leader of a company or charity.
  8. An organisation whose goal is to make profit
  9. A sum of money a bank accepts to lend which is going to be paid back over a determined period of time.

16 Clues: Which lasts for a very long time.The leader of a company or charity.A company with less than 10 employees.A design representing an organisation.The place where goods are manufactured.An organisation whose goal is to make profitMoney given by the state in support of an activity.Products manufactured in order to be sold (two words)....

DIFFERENT TYPES OF ROPE 2018-04-01

DIFFERENT TYPES OF ROPE crossword puzzle
Across
  1. funga, saula de pavilion
  2. a rugini
  3. parime
  4. parima prova
  5. parime de remorcaj
  6. manevre fixe
  7. line parima pupa
  8. a putrezi
Down
  1. parime din nuca de cocos
  2. plutitor, flotabil
  3. amarare(a marfii)
  4. traversa
  5. matisat (despre parime)
  6. spring pupa
  7. a se umfla
  8. saula de loch

16 Clues: parimetraversaa ruginia putrezia se umflaspring pupaparima provamanevre fixesaula de lochline parima pupaamarare(a marfii)plutitor, flotabilparime de remorcajmatisat (despre parime)parime din nuca de cocosfunga, saula de pavilion

Types of digital marketing 2023-12-17

Types of digital marketing crossword puzzle
Across
  1. Short for "application," it refers to a software program designed for a specific task, often used on mobile devices.
  2. A regularly updated website or web page, typically run by an individual or a group, that provides information, commentary, and discussions.
  3. A message posted on Twitter, limited to 280 characters, used for sharing information or opinions.
  4. A clickable element that connects one web page or online resource to another.
  5. A location on the internet, represented by a specific web address, where digital content is hosted.
  6. The action of distributing or reposting digital content on social media or other online platforms.
  7. Content that spreads rapidly online through sharing, often gaining widespread attention.
  8. A positive interaction with digital content, indicating approval or support.
Down
  1. A keyword or phrase assigned to digital content, making it easier to categorize, search, and discover.
  2. The action of pressing a button on a mouse or touchscreen to select and access content, often used to measure user engagement.
  3. Any piece of content shared on social media, a blog, or a forum.
  4. The smallest unit of a digital image. In marketing, it can refer to a tracking pixel used to collect data on user behavior.
  5. A potential customer who has expressed interest in a product or service, often through providing contact information.
  6. Electronic mail sent over the internet, often used in marketing for communication and promotional purposes.
  7. Visual content in a digital format, often used for marketing to convey information or tell a story.
  8. A promotional message displayed online or in other media to attract attention and encourage engagement.

16 Clues: Any piece of content shared on social media, a blog, or a forum.A positive interaction with digital content, indicating approval or support.A clickable element that connects one web page or online resource to another.Content that spreads rapidly online through sharing, often gaining widespread attention....

Types of chemical reactions 2024-05-08

Types of chemical reactions crossword puzzle
Across
  1. of metals as a result of exposure to moisture or air
  2. A single substance decomposes to give two or more products.
  3. method to prevent rancidity
  4. A more reactive metal displaces a less reactive metal from its salt solution
  5. a type of decomposition that involves sunlight
  6. formula of the substance is CaCO3
  7. Two or more substances combine to form a single substance
  8. process which involves gain of oxygen or loss of hydrogen
  9. reaction in which insoluble salts are formed
  10. a type of decomposition that involves heat
Down
  1. method to prevent corrosion
  2. reactions during which heat is evolved
  3. process of passing electricity in water to break water molecules into water and hydrogen
  4. process which involves gain of hydrogen or loss of oxygen
  5. the oxidation of oils or fats in food resulting in bad taste and smell
  6. Both oxidation and reduction take place together

16 Clues: method to prevent corrosionmethod to prevent rancidityformula of the substance is CaCO3reactions during which heat is evolveda type of decomposition that involves heatreaction in which insoluble salts are formeda type of decomposition that involves sunlightBoth oxidation and reduction take place together...

Types of Chemical Reactions 2024-05-11

Types of Chemical Reactions crossword puzzle
Across
  1. A chemical reaction that releases energy in the form of heat
  2. When two compounds switch partners in a reaction
  3. The number and types of atoms on both sides of the equation must be equal in this type of reaction
  4. A reaction in which an acid reacts with a base to produce salt and water
  5. Residue formed from the reaction between an acid and a base
  6. A solid formed from a chemical reaction that settles out of a solution
  7. A type of reaction that absorbs heat from its surroundings
  8. The outcome of a chemical reaction
  9. This type of reaction involves the breaking down of a compound into simpler substances
Down
  1. The foul smell that develops in oils due to exposure to oxygen for a long time
  2. The gradual destruction of materials, especially metals
  3. The starting materials in a chemical reaction
  4. A substance that undergoes a reduction in a chemical reaction
  5. These minute particles are like the letters of the alphabet
  6. A type of reaction where a single element replaces another element in a compound
  7. Splitting compounds using electricity to obtain elements

16 Clues: The outcome of a chemical reactionThe starting materials in a chemical reactionWhen two compounds switch partners in a reactionThe gradual destruction of materials, especially metalsSplitting compounds using electricity to obtain elementsA type of reaction that absorbs heat from its surroundings...

Types of Chemical Reactions 2024-05-14

Types of Chemical Reactions crossword puzzle
Across
  1. Ca(OH)2 is used for
  2. CuO+H2---> Cu+H2O where Cu is a
  3. what are the products of CaO+H2O
  4. One or More substance react to form new compounds
  5. CaO is also known as ?
  6. A type of decomposition reaction with the influence of electric energy
  7. 2H2+O2--->2H2O
Down
  1. which solution will double displacement occur ?
  2. Gaining hydrogen/ losing oxygen/ gain of electrons
  3. when heating FeSO4.7H2O Fe2O3 is one of the products what are the other products ?
  4. A type of reaction where exchange of ions occur between the reactants
  5. What is the type of reaction taking place : 2AgCl--->(sunlight) 2Ag+Cl2
  6. Zn+CuSO4--->ZnSO4+Cu
  7. Gaining oxygen/ losing hydrogen/ loss of electrons
  8. A substance that reduces another substance
  9. CaCO3--->(heat) CaO+CO2

16 Clues: 2H2+O2--->2H2OCa(OH)2 is used forZn+CuSO4--->ZnSO4+CuCaO is also known as ?CaCO3--->(heat) CaO+CO2CuO+H2---> Cu+H2O where Cu is awhat are the products of CaO+H2OA substance that reduces another substancewhich solution will double displacement occur ?One or More substance react to form new compoundsGaining hydrogen/ losing oxygen/ gain of electrons...

Types of chemical reactions 2024-08-06

Types of chemical reactions crossword puzzle
Across
  1. refers to the loss of electrons.
  2. -Displacement reaction is a type of reaction in which two ionic compounds are mixed together.
  3. reaction is which an insoluble solid is formed during a chemical reaction.
  4. the opposite of base.
  5. reaction a reaction in which one substance is reduced and the other substance is oxidized.
  6. a reaction in which the less reactive element is displaced by a more reactive element in a chemical reaction.
  7. a reaction in which hydrocarbon reacts with oxygen to produce carbon dioxide and water.
  8. a reaction where a substance is formed as a result of chemical combination.
  9. a base that can dissolve in water.
  10. -Displacement reaction is a type of reaction where a more reactive element displaces another less reactive element from a compound.
Down
  1. a reaction where one reactants yields two or more products. It is the opposite of combination reaction.
  2. the reaction between an acid and a base.
  3. the law of .....of mass states that matter can neither be created nor destroyed.
  4. chemical .... represent the names of the reactants and the products that are written on each side of the arrow to make a word equation for the reaction.
  5. refers to the gaining of electrons.
  6. ....rules describe which compounds are soluble and which compounds are not soluble.

16 Clues: the opposite of base.refers to the loss of electrons.a base that can dissolve in water.refers to the gaining of electrons.the reaction between an acid and a base.reaction is which an insoluble solid is formed during a chemical reaction.a reaction where a substance is formed as a result of chemical combination....

Types of Chemical Reactions 2024-02-28

Types of Chemical Reactions crossword puzzle
Across
  1. One reactant is broken down into two or more products
  2. replacement Chemical change in which 2 reactants become 2 new products (2 Words)
  3. Reaction where heat is released
  4. replacement Single element replaces an element in a binary compound (2 Words)
  5. Metal that releases a blue-white light when burned
  6. compounds compound that has two parts, a negative ion and a positive ion. I.e. a salt
  7. Reactants form one product
  8. This law states that atoms must be equal in reactants & products
Down
  1. Reaction where heat is absorbed
  2. Substances on the left side of the arrow
  3. Substances on the right side of the arrow
  4. You multiply the entire molecule by this number
  5. Gas molecule in reactant of combustion
  6. Another word for a synthesis reaction
  7. Substance used to start reaction
  8. Oxygen is a reactant; i.e. burning

16 Clues: Reactants form one productReaction where heat is absorbedReaction where heat is releasedSubstance used to start reactionOxygen is a reactant; i.e. burningAnother word for a synthesis reactionGas molecule in reactant of combustionSubstances on the left side of the arrowSubstances on the right side of the arrow...

TYPES OF CHEMICAL REACTIONS 2024-04-30

TYPES OF CHEMICAL REACTIONS crossword puzzle
Across
  1. Reaction where both reduction and oxidation takes place.
  2. Reaction of an acid with a base to form a salt and water.
  3. Type of decomposition which takes place due to heat.
  4. Reaction where a highly reactive metal displaces a lesser reactive metal from its salt solution.
  5. Reaction where substance gains oxygen or loses hydrogen.
  6. Negative electrode where hydrogen is collected during electrolysis of water.
  7. Type of decomposition which takes place due to sunlight.
  8. Reaction where two reacting molecules exchange their ions in aqueous solutions.
  9. A reaction where a single product is formed from two or more reactants.
Down
  1. Reaction where substance loses oxygen or gains hydrogen.
  2. Type of decomposition which takes place due to electricity.
  3. Reaction where an insoluble solid is formed, it is a type of double displacement reaction.
  4. Compounds which have molecules of water of crystallisation.
  5. Positive electrode where oxygen is collected during electrolysis of water.
  6. Compounds from which the water of crystallisation molecules were evaporated.
  7. A reaction where a single reactant is broken down into simpler products.

16 Clues: Type of decomposition which takes place due to heat.Reaction where substance loses oxygen or gains hydrogen.Reaction where both reduction and oxidation takes place.Reaction where substance gains oxygen or loses hydrogen.Type of decomposition which takes place due to sunlight.Reaction of an acid with a base to form a salt and water....

Types of Company Ownership 2025-01-08

Types of Company Ownership crossword puzzle
Across
  1. Company with on owner
  2. Owner of Proprietorship
  3. Only owner’s business is a risk
  4. Legal Document of LLC
  5. tax on business profit
  6. Legal Document of partnership
Down
  1. Has limited liability but lasts forever
  2. Legal Document of Corporation
  3. Owner of LLC
  4. Rule that govern how a company is run
  5. Owner of Corporation
  6. Has limited liability but it temporary
  7. Owner’s business and personal assets are at risk
  8. Company with 2 of more owners
  9. A Corporation is managed by this
  10. Owners of Partnership

16 Clues: Owner of LLCOwner of CorporationCompany with on ownerLegal Document of LLCOwners of Partnershiptax on business profitOwner of ProprietorshipLegal Document of CorporationCompany with 2 of more ownersLegal Document of partnershipOnly owner’s business is a riskA Corporation is managed by thisRule that govern how a company is run...

Types of Analog Circuits 2025-11-18

Types of Analog Circuits crossword puzzle
Across
  1. compare against a reference
  2. increase signals
  3. decrease signals
  4. change
  5. arithmetic division
  6. arithmetic multiplication
  7. remove information
Down
  1. change direction
  2. regulate
  3. turn on or off
  4. change AC to DC
  5. hold to a value
  6. prevent, set limits
  7. add signals
  8. remove unwanted
  9. another name for adders

16 Clues: changeregulateadd signalsturn on or offchange AC to DChold to a valueremove unwantedchange directionincrease signalsdecrease signalsremove informationprevent, set limitsarithmetic divisionanother name for addersarithmetic multiplicationcompare against a reference

Per 4 Chapter 11 - Espino, C 2023-03-03

Per 4 Chapter 11 - Espino, C crossword puzzle
Across
  1. A port that can provide power to charge and run an unpwered attached device such as a flash drive.
  2. The part of a computer that temporarily stores applications, documents, and system operating info.
  3. Combines hardware and software attributes.
  4. An RJ-45 port that connects a device to a wired network.
  5. An electronic circuit card that inserts into an expansion slot.
  6. A mouse that has an optical sensor.
  7. A device that shows computer output.
  8. A tangible physical item.
  9. A signal using 1s and 0s to represent data.
  10. A devices that converts AC voltage to DC voltage so a computer can power on all devices.
  11. An application consisiting of a set of instructions that makes hardware work.
  12. Special software that allows an operating system to access a piece of hardware.
  13. A storage device that accepts disks.
  14. A sealed data storage medium in which info is stored.
  15. A motherboard socket into which adapters are connected
  16. A wireless technology for personal area networks. (PAN)
  17. A USB port that connects to a USB HUB or USB device
Down
  1. A DIN connector on the motherboard that should only accpet a mouse cable.
  2. Approximately 1 million Bytes of info. 1,048,576
  3. piece of software that loads a computer and makes it operational.
  4. A type of video port on PCIe adapters or on apple computers.
  5. A type of digital visual interface connector from the computer port to the display.
  6. 1 trillion bytes of information. 1,099,511,627,776
  7. A wireless input/output technology. Has a longer range than infrared.
  8. What is The main circuit board of a computer called?
  9. Allows user to input info into the computer.
  10. A port that connects a computer to a wired network.
  11. A connector located on the motherboard or on a separate adapter.
  12. An electronically charged 1 or 0.
  13. A cable without an embedded ship to boost signal strength. Short and thicker than an active cable.
  14. Other name for Personal Computer.
  15. Approximately 1000 Bytes of info. 1,024

32 Clues: A tangible physical item.An electronically charged 1 or 0.Other name for Personal Computer.A mouse that has an optical sensor.A device that shows computer output.A storage device that accepts disks.Approximately 1000 Bytes of info. 1,024Combines hardware and software attributes.A signal using 1s and 0s to represent data....

Digital Tech 2021-08-23

Digital Tech crossword puzzle
Across
  1. It is the data that is stored inside the computer.
  2. Allows other devices to connect to the computer and vice versa.
  3. Stores all the digital content. Can be internal and external.
  4. A form of coding using dots and dashes.
  5. Settings that allow your personal data and social media accounts to be private.
  6. A trace you leave behind after posting something on social media.
  7. Computer language. This language helps programmers develop algorithms.
  8. Cooling process unit
  9. Source of charge and power for the device.
  10. Random access memory
  11. Units of information, most often numeric, which are collected through surveys.
Down
  1. An address that identifies your device on a local network.
  2. It is the physical part of a computer, the machinery or equipment.
  3. Video graphics card
  4. Connects the computer from one spot. Without the motherboard, the computer won’t be able to communicate or work with each other.
  5. A form of communication, used to send signals, instructions, and messages through encrypted language.
  6. Online security used to protect your data.
  7. A worldwide infrastructure.
  8. Used to transmit power and data.
  9. A set of instructions that computers follow. A good analogy of it would be a recipe it says what needs to be done, step by step.

20 Clues: Video graphics cardCooling process unitRandom access memoryA worldwide infrastructure.Used to transmit power and data.A form of coding using dots and dashes.Online security used to protect your data.Source of charge and power for the device.It is the data that is stored inside the computer.An address that identifies your device on a local network....

My project crosword 2020-05-06

My project crosword crossword puzzle
Across
  1. A learning program
  2. the Part of the computer that stores the data that alowsyou to read and accsess it
  3. the person that writes the code
  4. a structered set of data held in a computer
  5. inverse function to exponentiation.
  6. the form that electrons are in when there not measured
  7. It performs computions using qubits
Down
  1. an electronic device that stores or proceses information
  2. the link betwwen all the other compontents of the computer
  3. A set of things working together to get something done
  4. A repeted design
  5. A close reaction that can happen between two qubits
  6. A finite sequence with instructures.
  7. A detielted examination of a structure of something
  8. the brain of the computer
  9. Visual images or designs on some suface
  10. the person that makes the software

17 Clues: A repeted designA learning programthe brain of the computerthe person that writes the codethe person that makes the softwareinverse function to exponentiation.It performs computions using qubitsA finite sequence with instructures.Visual images or designs on some sufacea structered set of data held in a computer...

My Computer Anatomy Crossword-Manjot 2017-09-20

My Computer Anatomy Crossword-Manjot crossword puzzle
Across
  1. Is a common interface that enables communication between devices
  2. a local area network
  3. Worldwide system of computer networks
  4. Network that is deigned to block unauthorized access while permitting outward communication
  5. Wide area network
  6. Link form a hypertext file or document to another location
  7. Type of computer memory that can be accessed randomly
  8. Printed circuit board containing the principle components
Down
  1. The brain of the computer
  2. Collection of physical parts of a computer system
  3. The programs and other operating information used by a computer
  4. Ability to use information and communication
  5. for web pages
  6. set of computers connected together for the purpose of sharing resources
  7. Retains the its content even when the computer is turned off

15 Clues: for web pagesWide area networka local area networkThe brain of the computerWorldwide system of computer networksAbility to use information and communicationCollection of physical parts of a computer systemType of computer memory that can be accessed randomlyPrinted circuit board containing the principle components...

COMPUTER TERMINOLOGY 2020-01-07

COMPUTER TERMINOLOGY crossword puzzle
Across
  1. The smallest piece of information used by the computer.
  2. The shaded or colored backdrop of the screen.
  3. The pointer, usually an arrow or cross-shaped, controlled by the mouse.
  4. A file you create, as opposed to the application that created it.
  5. A program in which you do your work.
  6. A graphic symbol for an application, file or folder.
  7. A system malfunction in which the computer stops working.
Down
  1. To start up a computer.
  2. To send a file from one computer to another through a network.
  3. To transfer data from one computer to another.
  4. Files on disk that contain instructions for a computer.
  5. Acronym for Random-Access Memory.
  6. A list of program commands listed by topic.
  7. Start an application.
  8. Acronym for personal computer.
  9. To write a file onto a disk.

16 Clues: Start an application.To start up a computer.To write a file onto a disk.Acronym for personal computer.Acronym for Random-Access Memory.A program in which you do your work.A list of program commands listed by topic.The shaded or colored backdrop of the screen.To transfer data from one computer to another....

Data types and structures 2024-02-01

Data types and structures crossword puzzle
Across
  1. Positive or negative number with a decimal point
  2. Whole number, positive or negative
  3. a numerical indicator of an item of data’s position in an array."
  4. a composite data type comprising several related items that may be of different data types."
  5. a list containing several items operating on the last in, first out (LIFO) principle.
  6. Sequence of alphanumerical characters
Down
  1. Logical values, True (1) and False (2)
  2. – a list containing several items operating on the first in, first out (FIFO) principle.
  3. a data structure containing several elements of the same data type.
  4. a collection of data stored by a computer program to be used again."
  5. a unique name applied to an item of data.

11 Clues: Whole number, positive or negativeSequence of alphanumerical charactersLogical values, True (1) and False (2)a unique name applied to an item of data.Positive or negative number with a decimal pointa data structure containing several elements of the same data type.a numerical indicator of an item of data’s position in an array."...

ICT BASES 2017-10-06

ICT BASES crossword puzzle
Across
  1. de centrale chip die al het rekenwerk doet, het hart van de computer
  2. Geordende reeks instructies om een probleem op te lossen
  3. Alle apparatuur, die niet tot een computer behoort, maar daar wel mee is verbonden
  4. Het is een computerprogramma om webpagina’s mee te kunnen bekijken
  5. MS Word om te schrijven brieven
  6. Dit zijn mensen die zonder toestemming iemand zijn computer binnendringen en er gegevens inkijken stelen beschadigen of vernietigen
  7. Klein computerprogramma, dat zichzelf kopieert, zich in andere programma's nestelt en zich verspreidt via kopieën van programma's
  8. programmaatjes worden vervaardigd die onder meer in webpagina's kunnen worden opgenomen
Down
  1. Bestanden van eigen computer naar een andere computer kopiëren
  2. programma's die op een computer kunnen worden uitgevoerd
  3. het grootste onderdeel van uw computer, en in de meeste gevallen is het moederbord gemonteerd langs de zijkant van uw kast van de computer
  4. versturen pakketjes tussen twee computers
  5. zelfgekozen naam, een punt,3 letters die erachter komen
  6. apparaat dat plaatjes tekstfragmenten en driedimensionale afbeeldingen optisch aftast en omzet in een digitaal beeld dat met de computer bewerkt kan worden
  7. voor ongevraagde reclame via e-mail
  8. Tekst die door een tekstverwerkingsprogramma onderaan iedere pagina wordt afgedrukt
  9. Een verwijzing naar bijvoorbeeld een ander deel op de pagina van een website of een ander document op het world wide web
  10. Veelgebruikte extensie voor een afbeelding in JPEG-formaat
  11. een programma dat uw computer beschermt tegen de gevaren van buitenaf

19 Clues: MS Word om te schrijven brievenvoor ongevraagde reclame via e-mailversturen pakketjes tussen twee computersprogramma's die op een computer kunnen worden uitgevoerdGeordende reeks instructies om een probleem op te lossenzelfgekozen naam, een punt,3 letters die erachter komenVeelgebruikte extensie voor een afbeelding in JPEG-formaat...

Game Creation 2024-10-17

Game Creation crossword puzzle
Across
  1. a software program used to locate and display information on the Internet or an internet.
  2. footprint, the trail of data created as a result of your online activity
  3. is a computer program or device that provides a service to another computer program and its user
  4. The Domain Name System turns domain names into IP addresses
  5. a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
Down
  1. AI, a type of artificial intelligence technology that can produce various types of content, including text, imagery, audio and synthetic data.
  2. Engine, a software program used to locate and display information on the Internet or an intranet.
  3. Literacy, the ability of individuals and communities to understand and use digital technologies for meaningful actions within life situations.
  4. a procedure used for solving a problem or performing a computation
  5. a global network of billions of computers and other electronic devices.

10 Clues: The Domain Name System turns domain names into IP addressesa procedure used for solving a problem or performing a computationa global network of billions of computers and other electronic devices.footprint, the trail of data created as a result of your online activity...

TECHNOLOGY VOCABULARY 2021-07-28

TECHNOLOGY VOCABULARY crossword puzzle
Across
  1. of or relating to or being a communications network in which the bandwidth can be divided and shared by multiple simultaneous signals (as for voice or data or video)
  2. a computer providing shared resources to a computer network
  3. set up for a particular purpose
  4. RAM memory that is set aside as a specialized buffer storage
  5. transfer data into a database or document
  6. transfer a file or program to a smaller computer
  7. the process in which output of a system is returned to input
  8. any computer that is hooked up to a computer network
  9. a networked computer that provides access to client stations
Down
  1. the exclusive right to sell a work
  2. user interface a user interface based on graphics instead of text
  3. a part of RAM used for temporary storage of data
  4. the activity of converting data or information into code
  5. a compact disk that is used with a computer
  6. or circuits
  7. any small compartment

16 Clues: or circuitsany small compartmentset up for a particular purposethe exclusive right to sell a worktransfer data into a database or documenta compact disk that is used with a computera part of RAM used for temporary storage of datatransfer a file or program to a smaller computerany computer that is hooked up to a computer network...

Lesson 24 vocab 2015-04-16

Lesson 24 vocab crossword puzzle
Across
  1. security that examines a fingerprint, a voice pattern, or the iris or retina of the eye.
  2. computer configuration in which one or more computers on the network acts as a server.
  3. a server that acts as an intermediary between a user and the Internet.
  4. link form one computer to another through which data can be transmitted.
  5. high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network.
  6. a network configuration that allows selected outside organizations to access internal information systems.
  7. a computer that uses the service of another program.
  8. The world's collection of interconnected commercial and government-owned voice-oriented systems.
  9. computer architecture in which all of the computers on a network are equal and there is no computer designated as the server.
  10. a junction where information arrives from connected computers or peripheral devices and is then forwarded in one or more directions to other computers and devices.
  11. an Internet connection technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines.
  12. computer network that covers a large geographical are. Most WANs are made up of several connected LANs
Down
  1. a device that uses coaxial cable to send and receive data.
  2. a type of fiber-optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitized voice channels.
  3. a device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination.
  4. An ISP that provides connection speeds more than 30 times faster than dial-up connection-from 384kbps to 2.0Mbps.
  5. communications hardware device that facilitates the transmission of data.
  6. a variation of a LAN that uses no physical wires.
  7. a combination of hardware and software that creates a buffer between an internal network and the Internet to prevent unauthorized access.
  8. a computer that handles requests for data, e-mail, file transfers, and other network services from other computers (clients).
  9. a device on the network.
  10. a series of connected personal computers, workstations, and other devices, such as printers or scanners, within a confined space, such as an office building.
  11. expert computer user who invades someone else's computer either for personal gain or simply for the satisfaction of being able to do it.
  12. The largest network used as a communication tool.
  13. a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside of the organization.
  14. a recent wireless technology that can deliver maximum speeds of up to 7Mbps to your cell phone, home computer, or car. Stands for Worldwide Interoperability for Microwave Access.

26 Clues: a device on the network.a variation of a LAN that uses no physical wires.The largest network used as a communication tool.a computer that uses the service of another program.a device that uses coaxial cable to send and receive data.a server that acts as an intermediary between a user and the Internet....

Computer Hardware & Software 2025-04-11

Computer Hardware & Software crossword puzzle
Across
  1. Makes hardware useful
  2. A true or false statement
  3. Central processing unit
  4. Uses pixels to create an image
  5. short for modulator demulator
  6. microsoft program that helps make presentations
  7. cable that connect hard drive to the mother boarThe measurement of how fast a computer refreshes
  8. Random Access memory
Down
  1. Protects against malware
  2. Wireless internet connection
  3. Measurement of computer storage (Giga)
  4. main input device for computers
  5. Measurement computer storage (Mega)
  6. main output device of computer
  7. A language used for web design
  8. Something you can touch
  9. maker of central processing units

17 Clues: Random Access memoryMakes hardware usefulCentral processing unitSomething you can touchProtects against malwareA true or false statementWireless internet connectionshort for modulator demulatormain output device of computerA language used for web designUses pixels to create an imagemain input device for computersmaker of central processing units...

Crossword Puzzle (CDI 04) 2021-07-05

Crossword Puzzle (CDI 04) crossword puzzle
Across
  1. A way to access an electronic system by bypassing some or all security mechanisms.
  2. A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.
  3. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.
  4. A politically- or ideologically-motivated cyber attack or hack.
  5. the co-option of another person's personal information (e.g., name, Social Security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge
  6. A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.
  7. or operating in transnational several nations
  8. A website that finds information across the Internet based on a set of search criteria.
  9. an assault on electronic communication networks
  10. An information packet sent from a website to a web browser that records a user’s activity on that website.
  11. This is the set of individuals who simply want to observe and learn about the world of hacking. It comprises those who join learning communities to watch videos and tutorials about hacking.
  12. Unsolicited advertising or other information sent out via email or other messaging service.
  13. A program that masks something harmful, such as a worm or virus, that it carries into a device.
  14. A company that offers access to the Internet.
  15. someone who attempts to prevent terrorism or intended to prevent terrorism
  16. A username and password used to identify an individual attempting to gain access to a restricted page or network.
  17. A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.
  18. define as “malicious software” specifically designed to gain access to or damage a computer
  19. These are individuals who are considered the “cutting-edge geniuses”. They are the real experts and the innovators in the field of hacking.
  20. Plays an essential role in the detection, prevention, mitigation, and investigation of cybercrime because it predominantly owns and manages the critical infrastructure
  21. A software robot that performs automated tasks.
  22. A camera connected to a computer, generally used to then stream videos to the Internet.
  23. hidden collective of internet sites only accessible by a specialized web browser. It is used for keeping internet activity anonymous and private, which can be helpful in both legal and illegal applications.
  24. A unique Internet identifier registered to an entity (e.g. whitehouse.gov).
Down
  1. An online journal. Contraction of the term “web log.”
  2. crime that involves a computer and a network.
  3. These are hackers who use psychological manipulation to make people to divulge private contents or to perform certain actions. It is a more complex crime scheme.
  4. They are designed to trick people into giving up personal information or clicking on a malicious link that downloads malware.
  5. hacker objective is to find black hat hackers, intercept and destroy their schemes.
  6. an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing.
  7. sexual arousal involving communication on the internet
  8. The act of one individual harassing or intimidating another individual via the Internet.
  9. A massed data that is used to describe large amounts of other Internet data.
  10. someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
  11. the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists.
  12. when a website is designed to look like a real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to your systems, steal data, steal money, or spread malware.
  13. administrator An individual who manages and oversees a network.
  14. A satellite navigation system that identifies the precise location of the transmitting device.
  15. it is a modern day, technical twist on a crime that has been around for ages – extortion. At its core, it works when criminals steal something of great value and demand payment in exchange for its return.
  16. a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  17. Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
  18. These are the types of hackers who break into systems and networks just to draw attention towards an alarming social cause.
  19. Malicious software, such as a virus or a worm, that attacks a target computer.
  20. A coordinated attack that aims to overwhelm the resources of a targeted system to crash that system.
  21. (computer science) written programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory
  22. The overarching program that runs all the functions on a computer or other electronic device.
  23. other terms for cybercrime
  24. The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.
  25. the activity of converting data or information into code
  26. A group of computers that is linked to share data and other information.
  27. Hardware and/or software designed to prevent unauthorized users from accessing a computer system.

51 Clues: other terms for cybercrimecrime that involves a computer and a network.or operating in transnational several nationsA company that offers access to the Internet.an assault on electronic communication networksA software robot that performs automated tasks.An online journal. Contraction of the term “web log.”...

COMM 205 C02 2024-08-26

COMM 205 C02 crossword puzzle
Across
  1. A program or computer that connects to and requests information from a server.
  2. The main circuit board on the computer that connects to the CPU, memory, and storage components
  3. A unit of data that computers use to represent a character.
  4. Device which sends data from a computer to another device or user.
  5. The part of a computer that contains the screen where messages to and from the CPU are displayed.
  6. An operating system used for mobile devices manufactured by Apple.
Down
  1. Any computer providing a service over the network.
  2. Microsoft’s operating system.
  3. A mobile operating system currently developed by Google.
  4. The smallest unit of data in a computer represented by one or zero.
  5. The 'brain' of the device.
  6. Any physical device capable of storing data temporarily or permanently.
  7. A measure of computer processing speed.
  8. Programs that run on tablet computers and smartphones.
  9. Peripheral devices used to provide data and control signals to a computer.

15 Clues: The 'brain' of the device.Microsoft’s operating system.A measure of computer processing speed.Any computer providing a service over the network.Programs that run on tablet computers and smartphones.A mobile operating system currently developed by Google.A unit of data that computers use to represent a character....

Jenna Soden 2018-04-11

Jenna Soden crossword puzzle
Across
  1. This was the first email virus
  2. distributed denial of service
  3. personal computer
  4. It a virus is still active and effecting computers it is in this
  5. the programs and other operating information used by a computer. (opposite of hard)
  6. The love letter and fizzer virus used this this tool to spread their virus to other computers.
  7. The process when a hacker is in your computer and you do not know.
Down
  1. message distributed by electronic means from one computer user to one to more recipients via network.
  2. A software that you can download onto your computer to keep viruses out of your computer system (You should update this frequently)
  3. The agnet.biz virus used this tool to get the virus into computers. (people insert it into their computer and it transfers the virus)
  4. when a virus makes multiple copies of itself.
  5. a piece of code that is capable of copying itself and typically had a detrimental effect. (On computer software)
  6. The destructive work that a virus does on a computer
  7. a fraudulent practice of sending emails to companies in order to get people's personal information.
  8. a type of virus that spreads through an email (An animal).

15 Clues: personal computerdistributed denial of serviceThis was the first email viruswhen a virus makes multiple copies of itself.The destructive work that a virus does on a computera type of virus that spreads through an email (An animal).It a virus is still active and effecting computers it is in this...

Bond Ch 1 Glossary Words 2016-01-13

Bond Ch 1 Glossary Words crossword puzzle
Across
  1. Output device that produces text and graphics on a physical medium
  2. Set of programs that coordinates all activities of a computer
  3. device Any hardware component that conveys information from a computer to a user
  4. Collection of unprocessed items
  5. Duplicate content that you can use in case the original is damaged or lost
  6. Mobile device on which you can store, organize, and play digital media
  7. computer Personal computer designed to be in a stationary location
  8. Electronic device operating under control of instructions
  9. Informal website consisting of posts in a diary or journal format
  10. Private combination of characters associated with a user name
  11. Recorded media that users can download
Down
  1. Input device that allows a user to control a small symbol on a screen
  2. Hardware that is capable of transferring items to and from computers and devices
  3. Internet service that provides storage to computer users
  4. Performs input, processing, output, and storage
  5. Software that enables users to access and view webpages
  6. A hard copy
  7. Programs designed to make users more productive, or assist them with tasks
  8. message Photo or image sent from a smartphone or other mobile device
  9. Refers to an on-screen work area on desktops, tablets, and laptops

20 Clues: A hard copyCollection of unprocessed itemsRecorded media that users can downloadPerforms input, processing, output, and storageSoftware that enables users to access and view webpagesInternet service that provides storage to computer usersElectronic device operating under control of instructions...

Crossword Puzzle (CYBERCRIME) 2021-07-05

Crossword Puzzle (CYBERCRIME) crossword puzzle
Across
  1. Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
  2. A politically- or ideologically-motivated cyber attack or hack.
  3. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.
  4. a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  5. or operating in transnational several nations
  6. The act of one individual harassing or intimidating another individual via the Internet.
  7. define as “malicious software” specifically designed to gain access to or damage a computer
  8. the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists.
  9. the co-option of another person's personal information (e.g., name, Social Security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge
  10. A unique Internet identifier registered to an entity (e.g. whitehouse.gov).
  11. an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing.
  12. other terms for cybercrime
  13. These are the types of hackers who break into systems and networks just to draw attention towards an alarming social cause.
  14. hidden collective of internet sites only accessible by a specialized web browser. It is used for keeping internet activity anonymous and private, which can be helpful in both legal and illegal applications.
  15. The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.
  16. (computer science) written programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory
  17. An online journal. Contraction of the term “web log.”
  18. The overarching program that runs all the functions on a computer or other electronic device.
  19. administrator An individual who manages and oversees a network.
  20. sexual arousal involving communication on the internet
  21. A program that masks something harmful, such as a worm or virus, that it carries into a device.
  22. A group of computers that is linked to share data and other information.
  23. A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.
  24. hacker objective is to find black hat hackers, intercept and destroy their schemes.
  25. Plays an essential role in the detection, prevention, mitigation, and investigation of cybercrime because it predominantly owns and manages the critical infrastructure
  26. A massed data that is used to describe large amounts of other Internet data.
  27. A website that finds information across the Internet based on a set of search criteria.
  28. the activity of converting data or information into code
Down
  1. A coordinated attack that aims to overwhelm the resources of a targeted system to crash that system.
  2. Unsolicited advertising or other information sent out via email or other messaging service.
  3. A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.
  4. They are designed to trick people into giving up personal information or clicking on a malicious link that downloads malware.
  5. This is the set of individuals who simply want to observe and learn about the world of hacking. It comprises those who join learning communities to watch videos and tutorials about hacking.
  6. A company that offers access to the Internet.
  7. crime that involves a computer and a network.
  8. An information packet sent from a website to a web browser that records a user’s activity on that website.
  9. A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.
  10. These are individuals who are considered the “cutting-edge geniuses”. They are the real experts and the innovators in the field of hacking.
  11. Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
  12. A satellite navigation system that identifies the precise location of the transmitting device.
  13. Malicious software, such as a virus or a worm, that attacks a target computer.
  14. when a website is designed to look like a real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to your systems, steal data, steal money, or spread malware.
  15. someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
  16. someone who attempts to prevent terrorism or intended to prevent terrorism
  17. These are hackers who use psychological manipulation to make people to divulge private contents or to perform certain actions. It is a more complex crime scheme.
  18. A way to access an electronic system by bypassing some or all security mechanisms.
  19. A username and password used to identify an individual attempting to gain access to a restricted page or network.
  20. A software robot that performs automated tasks.
  21. it is a modern day, technical twist on a crime that has been around for ages – extortion. At its core, it works when criminals steal something of great value and demand payment in exchange for its return.
  22. an assault on electronic communication networks
  23. A camera connected to a computer, generally used to then stream videos to the Internet.

51 Clues: other terms for cybercrimeA company that offers access to the Internet.or operating in transnational several nationscrime that involves a computer and a network.A software robot that performs automated tasks.an assault on electronic communication networksAn online journal. Contraction of the term “web log.”...

Chemical Reactions 2023-01-24

Chemical Reactions crossword puzzle
Across
  1. the tiny pieces that all matter
  2. a starting substance that is part of a chemical reaction
  3. example of rust
  4. to change the order or position of something
  5. a group of atoms together
  6. something that can be observed about a substance, such as color, smell, or boiling point
Down
  1. temperature at which a substance changes from the solid phase to the liquid phase
  2. some of this can kill bees
  3. a structure formed by repeating groups of atoms linked together in a large network
  4. the relative size of things
  5. something that is made of all the same atoms or groups of atoms
  6. an object, diagram, or computer program that helps us understand something by making it simpler or easier to see
  7. a model volcano is an example of
  8. 100 degrees Celsius 212 Fahrenheit
  9. to solution of a multiplication equation
  10. letters and numbers showing the types and number of atoms that repeat to make up a substance

16 Clues: example of rusta group of atoms togethersome of this can kill beesthe relative size of thingsthe tiny pieces that all mattera model volcano is an example of100 degrees Celsius 212 Fahrenheitto solution of a multiplication equationto change the order or position of somethinga starting substance that is part of a chemical reaction...

Input devices 2022-11-08

Input devices crossword puzzle
Across
  1. a pen-shaped device for direct interaction with a computer through a cathode-ray tube display.
  2. someone who delivers a speech or a device that makes sounds louder.
  3. a device that translates sound vibrations in the air into electronic signals and scribes them to a recording medium.
  4. a panel of keys that operate a computer or typewriter.
  5. a computer cursor control device used in many notebook and laptop computers.
  6. read barcodes on the products sold in shops and send the price to the computer in the cash register.
  7. an input device that can be used for controlling the movement of the cursor or a pointer in a computer device.
  8. a device for recording visual images in the form of photographs, film, or video signals.
  9. a device made for scanning photographic film directly into a computer without the use of any intermediate printmaking.
  10. Magnetic ink character recognition.
  11. small handheld device which is moved across a mat or flat surface to move the cursor on a computer screen.
Down
  1. this device connected to a computer, allowing its images to be seen by internet users.
  2. a device that captures images from photographic prints, posters, magazine pages and similar sources for computer editing and display.
  3. a device that is used to project rays of light, especially an apparatus with a system of lenses for projecting slides or film on to a screen.
  4. a summarizing visualization designed to provide a lot of information at one glance.
  5. this device used to capture lines of text, barcodes and numbers.
  6. a support framework with attached electronic devices that is worn on the head
  7. can capture text, colour images and even small 3D objects.

18 Clues: Magnetic ink character recognition.a panel of keys that operate a computer or typewriter.can capture text, colour images and even small 3D objects.this device used to capture lines of text, barcodes and numbers.someone who delivers a speech or a device that makes sounds louder....

brandon vocab 2014-11-13

brandon vocab crossword puzzle
Across
  1. the act of transferring a file
  2. is an acronym for the computer. This is the smallest storage.
  3. manages network resources
  4. parts you cant touch on the computer.
  5. A program designated for end user.
  6. this is the process in which computers are connected.
Down
  1. adrees of he web
  2. the act of saving a file to your computer
  3. to be connected to the internet
  4. page the main page of the internet.
  5. the image of the computer
  6. it allows you to have internet
  7. your always connected to the internet
  8. the parts on the computer that you usually touch
  9. it allows you to search something in the computer or any device.

15 Clues: adrees of he webthe image of the computermanages network resourcesit allows you to have internetthe act of transferring a fileto be connected to the internetA program designated for end user.page the main page of the internet.your always connected to the internetparts you cant touch on the computer.the act of saving a file to your computer...

Tech about me 2022-01-14

Tech about me crossword puzzle
Across
  1. can absorb unwanted heat
  2. can store a lot of your computers data
  3. does not have to be pluged in but has to be connected to your device
  4. connecting pieces of other items that cant directly be connected
  5. cool down your computer
  6. something the computer gives to us
Down
  1. An audio comes out of here making sure you can hear your computer
  2. the network you connect a digital device in it
  3. audio device you can plug in here
  4. letters and numbers you type up through here
  5. a flash drive that keeps storage on your computer
  6. something we give to our computers
  7. apps on a computer
  8. brain of computer
  9. the brain of the motherboard

15 Clues: brain of computerapps on a computercool down your computercan absorb unwanted heatthe brain of the motherboardaudio device you can plug in heresomething we give to our computerssomething the computer gives to uscan store a lot of your computers dataletters and numbers you type up through herethe network you connect a digital device in it...

Ruby's Hardware crossword 2019-01-10

Ruby's Hardware crossword crossword puzzle
Across
  1. Gigahertz. Thousand MegaHertz processor.
  2. A computer made by Apple.
  3. Another term for display screen
  4. The set of typewriter-like keys that enables you to search
  5. A device that feeds data into a computer,
  6. Universal Service Bus; a type of port on the computer
  7. Card An expansion board that enables a computer to manipulate
  8. to watch movies
Down
  1. The physical components of the computer
  2. A magnetic disk on which you can store computer data
  3. a mobile phone that uses the internet to text and talk
  4. A type of printer that works by spraying ink on paper
  5. Device Display screens, loudspeakers, and printers.
  6. The main circuit board of a microcomputer.
  7. The Central Processing Unit

15 Clues: to watch moviesA computer made by Apple.The Central Processing UnitAnother term for display screenThe physical components of the computerGigahertz. Thousand MegaHertz processor.A device that feeds data into a computer,The main circuit board of a microcomputer.Device Display screens, loudspeakers, and printers....

Internet 2014-11-26

Internet crossword puzzle
Across
  1. A program that appears legitimate but which performs some harmful activity when it is run. It may be used to locate password information, or make the system more vulnerable to future entry, or simply destroy programs or data on the hard disk drive.it does not replicate.
  2. A standard method of connecting devices such as keyboards and printers to a computer.
  3. A software application for retrieving, presenting and navigating information resources on the World Wide Web.
  4. A compressed file format for emailing files or downloading.
  5. Transfer of a file, e.g. a video, from a central computer to your computer.
  6. Unwanted or junk email sent to lots of recipients at the same time.
  7. A high-speed connection to the Internet.
  8. For security, data is translated into a secret code according to a set of rules in a special 'key'.
  9. Provides information about the content of a digital item
  10. A venue that offers a WiFi Internet connection.
  11. A type of website that encourages collaboration by allowing users to add, edit and remove content.
  12. A form of Internet fraud that aims to steal valuable information such as credit card details, usernames and passwords.
  13. A system designed to prevent unauthorised access to your computer when connected to a network such as the Internet.
  14. Small text files that are sent to your computer from certain websites. They track your behaviour and transactions.
  15. Devices connected together to allow communication and exchange of data.
Down
  1. Working from home but staying in touch with others with the help of technology.
  2. A program designed to cause other programs on a computer to malfunction or stop working altogether.
  3. Transfer a file from your computer to a central computer
  4. Short for 'web log', a shared online journal where people can post diary entries about their personal experiences and hobbies.
  5. Gives the creator of an original work exclusive rights regarding that work for a certain period of time, including its publication, distribution and adaptation.
  6. Software that can be installed on your computer without your knowledge, which collects information about your logins and passwords and sends details to another computer on the Internet.
  7. The amount of data that can fit through an Internet connection.
  8. Allows the exchange of data over short distances from fixed and mobile devices.
  9. A miniature electronic circuit used to control computers and most other electronic devices.
  10. A type of password applied to a credit or debit card.
  11. Wireless fidelity.
  12. Programs that give instructions to a computer and which allow the user to carry out different tasks.
  13. Software that is designed to cause problems for users.
  14. Someone who gains unauthorised access to a computer in order to obtain data stored on it.
  15. Part of a program that helps the user to create a new document, chart, etc.

30 Clues: Wireless fidelity.A high-speed connection to the Internet.A venue that offers a WiFi Internet connection.A type of password applied to a credit or debit card.Software that is designed to cause problems for users.Transfer a file from your computer to a central computerProvides information about the content of a digital item...

CROSSWORD 2025-01-25

CROSSWORD crossword puzzle
Across
  1. Emotion analysis
  2. Organizing data
  3. Coding language
  4. Virtual assistant
  5. Database system
  6. Data grouping
  7. Computer brain
  8. Computer memory
  9. Computer virus
  10. Image unit
Down
  1. Coding language
  2. User-friendly design
  3. Data visualization
  4. Coding goal
  5. Computer mistake
  6. Computer protection
  7. Cloud storage
  8. Computer mouse
  9. Internet connection
  10. Spreadsheet software

20 Clues: Image unitCoding goalData groupingCloud storageComputer brainComputer mouseComputer virusCoding languageOrganizing dataCoding languageDatabase systemComputer memoryEmotion analysisComputer mistakeVirtual assistantData visualizationComputer protectionInternet connectionUser-friendly designSpreadsheet software

Technology 2025-07-31

Technology crossword puzzle
Across
  1. A company that makes electric cars.
  2. Instructions written for a computer.
  3. A large, organized set of data.
  4. Used to play games.
  5. A step-by-step process to solve problems.
  6. Picks up or sends signals.
  7. Stores data online.
  8. Storage space in a computer.
  9. Pictures or visuals on screen.
  10. Software meant to harm computers.
  11. A GPS system for vehicles.
  12. Technology using the tiniest parts of matter.
  13. A machine that can do tasks automatically.
  14. Apple’s virtual assistant.
  15. How you control or interact with a machine.
  16. A camera that connects to the internet.
  17. Tiny circuits in most electronics.
  18. A group of connected computers.
  19. Data entered into a computer.
  20. Sending files to the internet.
  21. Related to the brain or AI.
  22. A flash of electricity or a fastener.
  23. Computers that can learn or solve problems.
  24. Basic system that starts a computer.
  25. Restart your computer or device.
  26. To find and fix computer errors.
  27. Programs that run on a device.
  28. A way to compress files.
  29. A tiny dot on a screen.
  30. Detects changes like motion or light.
  31. Where data is kept.
  32. Another popular coding language.
  33. The brain of the computer.
  34. A button on a keyboard.
  35. Software built into a device.
  36. A mini app or tool on a screen.
  37. A computer that sends data to others.
  38. A device that moves characters in video games.
  39. Information stored or used by devices.
  40. A digital letter sent over the internet.
  41. A tool to compress audio or video.
  42. Related to the internet or computers.
  43. The physical parts of a device.
  44. The core part of an operating system.
  45. To lock up data so others can't read it.
  46. A word used to describe tech that can "think."
  47. A connection point in a network.
  48. A computer that shares information.
  49. Protects a computer from harm.
  50. A smaller measure of digital storage.
  51. A tool used for online meetings.
  52. Code for building websites.
  53. A flat surface that works like a mouse.
  54. Short for “technology.”
  55. A person who designs and builds tech.
  56. The part you look at on a device.
Down
  1. Wireless connection for short distances.
  2. Small code that runs a task.
  3. Getting files from the internet.
  4. A strong, focused beam of light.
  5. A device that moves the cursor on screen.
  6. Connects your home to the internet.
  7. A system that apps run on.
  8. A first model of a new invention.
  9. Not real but computer-based.
  10. Very tiny technology.
  11. A tiny computer part.
  12. A wireless internet connection.
  13. A machine that makes paper copies.
  14. Used to send or receive information.
  15. Data a computer sends out.
  16. A strip of buttons on a screen.
  17. Powers up your device.
  18. Used for typing.
  19. A measure of digital storage.
  20. Sends WiFi through your house.
  21. Provides power to devices.
  22. Entering your username and password.
  23. A computer screen.
  24. A program used to view websites.
  25. Watching videos or music online in real-time.
  26. The rules of coding.
  27. Orbits Earth and sends signals.
  28. A system to find locations using satellites.
  29. A set of instructions for a computer.
  30. A device used to call or message others.
  31. The sound of a mouse or selection.
  32. Another name for the internet.
  33. Copies paper to a computer.
  34. Using machines to do tasks automatically.
  35. A piece of glass that focuses light.
  36. A flying robot controlled remotely.
  37. A machine for playing video games.
  38. A popular programming language.
  39. A language using 0s and 1s.
  40. A small software program for phones or tablets.
  41. The main board inside a computer.
  42. The power source for early engines.
  43. A wired internet connection.
  44. The science of light and lenses.

100 Clues: Used for typing.A computer screen.Used to play games.Stores data online.Where data is kept.The rules of coding.Very tiny technology.A tiny computer part.Powers up your device.A tiny dot on a screen.A button on a keyboard.Short for “technology.”A way to compress files.Picks up or sends signals.A system that apps run on.A GPS system for vehicles....

Technology 2025-07-31

Technology crossword puzzle
Across
  1. A company that makes electric cars.
  2. Instructions written for a computer.
  3. A large, organized set of data.
  4. Used to play games.
  5. A step-by-step process to solve problems.
  6. Picks up or sends signals.
  7. Stores data online.
  8. Storage space in a computer.
  9. Pictures or visuals on screen.
  10. Software meant to harm computers.
  11. A GPS system for vehicles.
  12. Technology using the tiniest parts of matter.
  13. A machine that can do tasks automatically.
  14. Apple’s virtual assistant.
  15. How you control or interact with a machine.
  16. A camera that connects to the internet.
  17. Tiny circuits in most electronics.
  18. A group of connected computers.
  19. Data entered into a computer.
  20. Sending files to the internet.
  21. Related to the brain or AI.
  22. A flash of electricity or a fastener.
  23. Computers that can learn or solve problems.
  24. Basic system that starts a computer.
  25. Restart your computer or device.
  26. To find and fix computer errors.
  27. Programs that run on a device.
  28. A way to compress files.
  29. A tiny dot on a screen.
  30. Detects changes like motion or light.
  31. Where data is kept.
  32. Another popular coding language.
  33. The brain of the computer.
  34. A button on a keyboard.
  35. Software built into a device.
  36. A mini app or tool on a screen.
  37. A computer that sends data to others.
  38. A device that moves characters in video games.
  39. Information stored or used by devices.
  40. A digital letter sent over the internet.
  41. A tool to compress audio or video.
  42. Related to the internet or computers.
  43. The physical parts of a device.
  44. The core part of an operating system.
  45. To lock up data so others can't read it.
  46. A word used to describe tech that can "think."
  47. A connection point in a network.
  48. A computer that shares information.
  49. Protects a computer from harm.
  50. A smaller measure of digital storage.
  51. A tool used for online meetings.
  52. Code for building websites.
  53. A flat surface that works like a mouse.
  54. Short for “technology.”
  55. A person who designs and builds tech.
  56. The part you look at on a device.
Down
  1. Wireless connection for short distances.
  2. Small code that runs a task.
  3. Getting files from the internet.
  4. A strong, focused beam of light.
  5. A device that moves the cursor on screen.
  6. Connects your home to the internet.
  7. A system that apps run on.
  8. A first model of a new invention.
  9. Not real but computer-based.
  10. Very tiny technology.
  11. A tiny computer part.
  12. A wireless internet connection.
  13. A machine that makes paper copies.
  14. Used to send or receive information.
  15. Data a computer sends out.
  16. A strip of buttons on a screen.
  17. Powers up your device.
  18. Used for typing.
  19. A measure of digital storage.
  20. Sends WiFi through your house.
  21. Provides power to devices.
  22. Entering your username and password.
  23. A computer screen.
  24. A program used to view websites.
  25. Watching videos or music online in real-time.
  26. The rules of coding.
  27. Orbits Earth and sends signals.
  28. A system to find locations using satellites.
  29. A set of instructions for a computer.
  30. A device used to call or message others.
  31. The sound of a mouse or selection.
  32. Another name for the internet.
  33. Copies paper to a computer.
  34. Using machines to do tasks automatically.
  35. A piece of glass that focuses light.
  36. A flying robot controlled remotely.
  37. A machine for playing video games.
  38. A popular programming language.
  39. A language using 0s and 1s.
  40. A small software program for phones or tablets.
  41. The main board inside a computer.
  42. The power source for early engines.
  43. A wired internet connection.
  44. The science of light and lenses.

100 Clues: Used for typing.A computer screen.Used to play games.Stores data online.Where data is kept.The rules of coding.Very tiny technology.A tiny computer part.Powers up your device.A tiny dot on a screen.A button on a keyboard.Short for “technology.”A way to compress files.Picks up or sends signals.A system that apps run on.A GPS system for vehicles....

Cybercrime crossword 2021-07-08

Cybercrime crossword crossword puzzle
Across
  1. - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
  2. - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  3. - legally institutionalized rights to own and control goods.
  4. - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
  5. - proof of identity is an essential component to identify intruder.
  6. - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
  7. - tools used to dismantle the hardware for seizure.
  8. - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
  9. - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
  10. - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
  11. - terrorist activity that targets computer networks and information systems for attack.
  12. - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  13. - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
  14. - refers to the transmission of information through ICT media, including voice, video and other forms of data.
  15. - remember that often, latent prints can be taken from disks or other storage media or hardware.
  16. - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
  17. - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
  18. - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
  19. - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
  20. - pieces of computer code that can infect computer system causing disruptions to their normal operation.
  21. - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
  22. - refers to the modification or change, in form or substance, of an existing computer data or program.
  23. - these can be used to store copies of files from the computer for use in his investigation.
  24. - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
Down
  1. - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
  2. - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
  3. – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
  4. - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
  5. - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
  6. - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
  7. - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
  8. - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
  9. - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
  10. - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
  11. - the right to be left alone; freedom from observation and interference from others.
  12. - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
  13. - Intentional alteration or reckless interference with the functioning of a computer or computer network.
  14. - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
  15. - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
  16. - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
  17. - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
  18. - refers to a computer or a computer network, the electronic medium in which online communication takes place
  19. - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
  20. - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
  21. - the act of copying digital material posted online into the storage medium on one’s computer.
  22. - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  23. - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
  24. - the interactional space or environment created by linking computers together into a communication net5work.
  25. - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.

49 Clues: - tools used to dismantle the hardware for seizure.- legally institutionalized rights to own and control goods.- proof of identity is an essential component to identify intruder.- the right to be left alone; freedom from observation and interference from others....

RODRIGUEZ, ANGELA B. CYBERCRIME INVESTIGATION 2021-07-17

RODRIGUEZ, ANGELA B. CYBERCRIME INVESTIGATION crossword puzzle
Across
  1. - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
  2. - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
  3. - remember that often, latent prints can be taken from disks or other storage media or hardware.
  4. - terrorist activity that targets computer networks and information systems for attack.
  5. - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
  6. - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
  7. - the act of copying digital material posted online into the storage medium on one’s computer.
  8. - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
  9. - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
  10. - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
  11. - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
  12. - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
  13. - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
  14. - refers to the modification or change, in form or substance, of an existing computer data or program.
  15. - the interactional space or environment created by linking computers together into a communication net5work.
  16. - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
  17. - refers to the transmission of information through ICT media, including voice, video and other forms of data.
  18. - Intentional alteration or reckless interference with the functioning of a computer or computer network.
  19. - pieces of computer code that can infect computer system causing disruptions to their normal operation.
  20. - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
  21. - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
  22. - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
  23. - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
  24. - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
Down
  1. - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
  2. - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
  3. - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  4. - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
  5. - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
  6. - legally institutionalized rights to own and control goods.
  7. - proof of identity is an essential component to identify intruder.
  8. - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
  9. - refers to a computer or a computer network, the electronic medium in which online communication takes place
  10. - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
  11. – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
  12. - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  13. - tools used to dismantle the hardware for seizure.
  14. - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
  15. - the right to be left alone; freedom from observation and interference from others.
  16. - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
  17. - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
  18. - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
  19. - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
  20. - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
  21. - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
  22. - these can be used to store copies of files from the computer for use in his investigation.
  23. - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
  24. - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  25. - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.

49 Clues: - tools used to dismantle the hardware for seizure.- legally institutionalized rights to own and control goods.- proof of identity is an essential component to identify intruder.- the right to be left alone; freedom from observation and interference from others....

CYBERCRIME 2021-07-17

CYBERCRIME crossword puzzle
Across
  1. - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
  2. - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
  3. - proof of identity is an essential component to identify intruder.
  4. - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
  5. - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
  6. - refers to the modification or change, in form or substance, of an existing computer data or program.
  7. - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
  8. - terrorist activity that targets computer networks and information systems for attack.
  9. - Intentional alteration or reckless interference with the functioning of a computer or computer network.
  10. - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
  11. - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
  12. - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
  13. - remember that often, latent prints can be taken from disks or other storage media or hardware.
  14. - the right to be left alone; freedom from observation and interference from others.
  15. - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
  16. - legally institutionalized rights to own and control goods.
  17. - pieces of computer code that can infect computer system causing disruptions to their normal operation.
  18. - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
  19. - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
  20. - refers to a computer or a computer network, the electronic medium in which online communication takes place
  21. - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
  22. - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
  23. - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
Down
  1. - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
  2. - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
  3. - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
  4. - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
  5. - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
  6. - these can be used to store copies of files from the computer for use in his investigation.
  7. - the act of copying digital material posted online into the storage medium on one’s computer.
  8. - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
  9. - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime
  10. - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  11. - refers to the transmission of information through ICT media, including voice, video and other forms of data.
  12. - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
  13. - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
  14. - tools used to dismantle the hardware for seizure.
  15. - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
  16. - the interactional space or environment created by linking computers together into a communication net5work.
  17. - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
  18. - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  19. - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
  20. - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
  21. - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
  22. - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
  23. - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
  24. – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
  25. - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  26. - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.

49 Clues: - tools used to dismantle the hardware for seizure.- legally institutionalized rights to own and control goods.- proof of identity is an essential component to identify intruder.- the right to be left alone; freedom from observation and interference from others....

Crossword 3 2018-02-15

Crossword 3 crossword puzzle
Across
  1. A user command and an underlying TCP/IP protocol for accessing remote computers.
  2. A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
  3. A DNS translates a domain name into what?
  4. Part of the operating system, that boots up the PC.
  5. Main memory is also known as?
  6. This software runs the computer.
  7. Units for measuring the speed of the processor.
  8. Fast memory between CPU and RAM.
  9. Android 1.6.
  10. SpaceX is developed by?
  11. Computer understands ______ language.
Down
  1. An open source Operating system developed by Google and based on the Linux Kernel.
  2. CEO of Snapchat
  3. A free-to-play, location-based augmented reality game developed by Niantic for iOS and Android devices.
  4. Second Generation Computer are made of?
  5. A place on the desktop that shows the jobs you are doing (the programs you have open).
  6. Interactivity between the user and computer, allowing the user to start up applications and certain utility software.
  7. In information technology processed form of data is called?
  8. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a?
  9. The process of starting or restarting a computer is called?

20 Clues: Android 1.6.CEO of SnapchatSpaceX is developed by?Main memory is also known as?This software runs the computer.Fast memory between CPU and RAM.Computer understands ______ language.Second Generation Computer are made of?A DNS translates a domain name into what?Units for measuring the speed of the processor....

Crossword 3 2018-02-15

Crossword 3 crossword puzzle
Across
  1. A free-to-play, location-based augmented reality game developed by Niantic for iOS and Android devices.
  2. The process of starting or restarting a computer is called?
  3. A place on the desktop that shows the jobs you are doing (the programs you have open).
  4. SpaceX is developed by?
  5. Interactivity between the user and computer, allowing the user to start up applications and certain utility software.
  6. CEO of Snapchat
  7. A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
  8. Android 1.6.
Down
  1. This software runs the computer.
  2. Part of the operating system, that boots up the PC.
  3. An open source Operating system developed by Google and based on the Linux Kernel.
  4. A DNS translates a domain name into what?
  5. Fast memory between CPU and RAM.
  6. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a?
  7. Computer understands ______ language.
  8. In information technology processed form of data is called?
  9. Second Generation Computer are made of?
  10. A user command and an underlying TCP/IP protocol for accessing remote computers.
  11. Units for measuring the speed of the processor.
  12. Main memory is also known as?

20 Clues: Android 1.6.CEO of SnapchatSpaceX is developed by?Main memory is also known as?This software runs the computer.Fast memory between CPU and RAM.Computer understands ______ language.Second Generation Computer are made of?A DNS translates a domain name into what?Units for measuring the speed of the processor....

Computer Vocabulary 2017-06-21

Computer Vocabulary crossword puzzle
Across
  1. graphic representation on a screen of a program, option , or window
  2. a handheld device that is used to move a cursor on the screen
  3. flash drive an external flash drive that can be used if it has a USB port
  4. occurs when a software application stops functioning properly and exits
  5. a storage space that many files can placed into
  6. malicious software program
  7. the primary display screen of a graphical user interface
  8. device for observing or checking
  9. System the software that supports a computer’s basic functions
  10. restart
  11. collection of physical parts of a computer
Down
  1. a folder organizing loose articles
  2. device or program that enables a computer to transmit data
  3. a computer program that manages access to a central resource
  4. client software program that runs against a webserver
  5. distinguishes something that is merely conceptual from something that has physical reality
  6. practice of sending unwanted email messages
  7. receive data from a remote system
  8. an electronic device for storing and processing dataCPU-central processing unit
  9. a panel of keys that operate a computer
  10. global system of interconnected computer networks
  11. Drive storage device containing a read-write mechanism
  12. information system on the internet that allows the user search and use files

23 Clues: restartmalicious software programdevice for observing or checkingreceive data from a remote systema folder organizing loose articlesa panel of keys that operate a computercollection of physical parts of a computerpractice of sending unwanted email messagesa storage space that many files can placed into...

digital citizenship/Naliya 2022-12-14

digital citizenship/Naliya crossword puzzle
Across
  1. error in a program that keeps it from running as it should
  2. application that runs on a computer or workstation and relies on a server to perform some operations
  3. a global network connecting millions of computers
  4. small file that some websites attach to a user’s hard drive while the user is browsing that site; they can be used to track user preferences, speed loading times, and for advertising.
  5. people who have subscribed to an account’s updates on social media
  6. direct message, on Twitter or other social media platform. DMs allow a user to directly contact another user, without the messages being seen in a public forum
  7. online commenter whose intent is to attack views expressed online; these attacks are often personal
  8. news false information published as being authentic
  9. used to describe online harassment, which can be in the form of flames, comments made in chat rooms, the sending of offensive or cruel e-mail, or even harassing others by posting on blogs, Web pages or social networking sites
  10. short for “robot,” a program, or sequence of computer code, that runs on the Internet; bots can be created to accomplish a specific task more quickly than a human
  11. short for “application,” a computer program that performs a specific set of functions
  12. machine or external component that runs independently of a computer
Down
  1. being believed or accepted as true, real, or honest
  2. having a secret identity
  3. An alert that notifies a blog poster of a response to their post
  4. a way to get information out of a computer
  5. sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads.
  6. program ist of instructions that causes a computer to behave in a certain way
  7. online discussion group.
  8. instruction to a computer or device to perform a specific task
  9. repeating code
  10. to write computer instructions
  11. an attitude or prejudice that favors a way of feeling or acting over another

23 Clues: repeating codehaving a secret identityonline discussion group.to write computer instructionsa way to get information out of a computera global network connecting millions of computersbeing believed or accepted as true, real, or honestnews false information published as being authenticerror in a program that keeps it from running as it should...

ARTIFICIAL INTELLIGENCE 2025-03-11

ARTIFICIAL INTELLIGENCE crossword puzzle
Across
  1. – Something that exists on a computer but is not real.
  2. – A system that connects computers together.
  3. – Having intelligence or advanced technology.
  4. – A step-by-step set of instructions for solving a problem.
  5. – Tools and machines made using science.
  6. Learning – When computers learn from data and improve over time.
  7. – A computer program that talks like a human.
  8. – Deciding what is right or wrong, especially in technology.
  9. Network – A type of computer system that works like the human brain.
  10. – Writing instructions that tell a computer what to do.
Down
  1. – A global network that connects computers and allows sharing of information.
  2. – How a computer handles and organizes data.
  3. – Information that computers use to make decisions.
  4. – A new idea or invention that improves something.
  5. – The ability to understand, learn, and solve problems.
  6. Intelligence – When computers can think or learn like humans.
  7. – When machines or computers do tasks without human help.
  8. – A machine that can do tasks, sometimes like a human.
  9. – A machine that processes information and runs programs.
  10. – Information that is stored or used on computers.

20 Clues: – Tools and machines made using science.– How a computer handles and organizes data.– A system that connects computers together.– Having intelligence or advanced technology.– A computer program that talks like a human.– A new idea or invention that improves something.– Information that is stored or used on computers....

Review 2024-02-05

Review crossword puzzle
Across
  1. This professional oversees and coordinates various aspects of a system or organization, ensuring smooth and efficient operations.
  2. Programs designed to perform specific tasks for users
  3. The result of processed data that has context and meaning
  4. Space where data and instructions are saved for future use
  5. The brain of the computer responsible for processing instructions
  6. raw material eg, numbers,symbols etc
  7. Focused on safeguarding digital information, this professional assesses and implements security measures to protect data from unauthorized access or breaches
  8. Responsible for managing and operating computer systems, this role involves tasks such as monitoring system performance and executing commands.
  9. This component directs and manages the operations of the CPU, ensuring tasks are executed in the correct sequence
Down
  1. This role involves inputting and updating data into computer systems, ensuring accuracy and completene
  2. This term refers to the steps a computer takes to perform tasks and calculations
  3. Software that helps run the computer and coordinate its activities
  4. gives computer additional fuctions
  5. 1st stage of infomation cycle, data enter the computer
  6. The physical components of a computer, such as the monitor and keyboard
  7. Found within the CPU, this unit is responsible for performing mathematical calculations and logical operation
  8. Information is presented to the use

17 Clues: gives computer additional fuctionsInformation is presented to the useraw material eg, numbers,symbols etcPrograms designed to perform specific tasks for users1st stage of infomation cycle, data enter the computerThe result of processed data that has context and meaningSpace where data and instructions are saved for future use...

Vocanulary words of period 2 2024-01-23

Vocanulary words of period 2 crossword puzzle
Across
  1. is a type of software that is designed to detect and remove unwanted spyware programs. Spyware is a type of malware that is installed on a computer without the user's knowledge in order to collect information about them.
  2. Network bandwidth is a measure of the data transfer rate or capacity of a given network.
  3. Area Network (WAN)-is a large computer network that connects groups of computers over large distances.
  4. (Number)- In computer science and mathematics, binary is a system where numbers and values are expressed 0 or 1.
  5. Area Network (PAN)-A personal area network (PAN) connects electronic devices within a user's immediate area.
  6. Optic Cable-A fiber-optic cable contains anywhere from a few to hundreds of optical fibers within a plastic casing.
  7. Area Network (LAN)-Is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area.
Down
  1. a security program designed to prevent, detect, search and remove viruses and other types of malware from computers, networks and other devices.
  2. Router/ Wireless Access Point- A switch connects devices such as a desktop, laptop, and access point to the router.
  3. transmission is the transfer of data from one digital device to another.
  4. Check-Show ipa. noun. a quality check and error-control technique for data transferred over a computer network or other communications link, in which the data received is stored and also transmitted back to its point of origin, where it is compared with the original data.
  5. network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  6. Cable-UTP cable is made of 8 copper wires, grouped together in four twisted pairs.

13 Clues: transmission is the transfer of data from one digital device to another.Cable-UTP cable is made of 8 copper wires, grouped together in four twisted pairs.Network bandwidth is a measure of the data transfer rate or capacity of a given network.Area Network (WAN)-is a large computer network that connects groups of computers over large distances....

charvey/4th 2020-09-10

charvey/4th crossword puzzle
Across
  1. website that brings people together to talk, share ideas and interests, or make new friends
  2. a metaphysical space created by networked computers where users may shop chat or learn
  3. discussion groups over the Internet that links a group of people together with common interests via e-mail
  4. points to a location where data maybe located
  5. a location for storing files on a computer
  6. a text based communication that is live or in real time
  7. an icon, graphic, or text that links to another file or object
  8. the name given to a user on a computer or computer network
  9. a method of saving a web pages address
  10. a name email or other personal information that enables others to get a hold of someone
  11. locations with information on frequently asked
  12. an area where users share thoughts, ideas, or help by posting text messages
  13. another way of describing reloading or updating what is being displayed or stored
  14. a computer or another device connected to a computer network
  15. the act of browsing the Internet by going from one web page to another web page
Down
  1. a software or hardware device that accepts and responds to requests made over a network
  2. a small set of instructions designed to be scheduled and executed by the CPU independently of the parent process
  3. when a user, computer, or another device connects to the Internet.
  4. information placed in front of other data known
  5. a term used to describe computer storage
  6. the body or payload.
  7. the location of a website
  8. a term used to describe the unwritten rules of Internet courtesy.
  9. sending a file to another computer through a modem or network.
  10. the act of moving the visual portions of a window up, down, left, or right, to see additional information on the window

25 Clues: the body or payload.the location of a websitea method of saving a web pages addressa term used to describe computer storagea location for storing files on a computerpoints to a location where data maybe locatedlocations with information on frequently askedinformation placed in front of other data known...

Week 8 Review 2020-10-29

Week 8 Review crossword puzzle
Across
  1. To move up and down through a document or screen to reveal more information.
  2. When held down and another key is hit, that letter becomes a capital
  3. A part of a program that usually causes the computer to malfunction; often fixed with a patch or update.
  4. A movable/blinking marker that shows the position of where the next letter will be placed.
  5. Bar at the bottom of the screen that shows different information about the application.
  6. A picture placed inside of a document.
  7. Transferring data from your computer to a different computer.
  8. A list of options.
  9. A way of communicating wirelessly over short distances between devices.
  10. The small dots of color that make up all images on a computer screen.
  11. A small picture used to represent a file or program.
  12. The hardware device used to enter letters into the computer.
  13. To make text or pictures appear the way you wish by changing font, font color, size, etc.
Down
  1. Transforming data into different code so only people with the secret key can read it.
  2. The digital environment where communication over computer networks occurs.
  3. A program that searches for and identifies items in a database that match keywords specified by the user.
  4. Unwanted emails that mostly consist of promotional materials, also known as spam.
  5. A small flexible disk used for storing computer data.
  6. A group of characters used to verify a user into a system.
  7. Random access memory; type of storage that changes.
  8. A person who uses computers to gain unauthorized access to information.
  9. Read-only memory; the type of storage that is not changed even when the computer is turned off.
  10. To remove the previous keystroke or formatting.
  11. A self contained program or piece of software; typically downloaded to devices.
  12. To remove something typed, a picture, or other item.

25 Clues: A list of options.A picture placed inside of a document.To remove the previous keystroke or formatting.Random access memory; type of storage that changes.A small picture used to represent a file or program.To remove something typed, a picture, or other item.A small flexible disk used for storing computer data....

YOLO 2022-11-15

YOLO crossword puzzle
Across
  1. teasing coming from both sides but can turn hurtful.
  2. A lung disease that is caught by inhaling silica
  3. Lighthearted joking that can quickly be hurtful
Down
  1. a type bullying that can cause suicide
  2. a synonym of bullying
  3. something that can cause EMOTIONAL DAMAGE or physical damage. Other types are also there.
  4. Hello your computer has virus

7 Clues: a synonym of bullyingHello your computer has virusa type bullying that can cause suicideLighthearted joking that can quickly be hurtfulA lung disease that is caught by inhaling silicateasing coming from both sides but can turn hurtful.something that can cause EMOTIONAL DAMAGE or physical damage. Other types are also there.

NOVA Cybersecurity Lab Glossary 2022-10-03

NOVA Cybersecurity Lab Glossary crossword puzzle
Across
  1. a fictional virus modeled after the Stuxnet virus that is able to damage physical infrastructure.
  2. extra copies of computer files that can be used to restore files that are lost or damaged.
  3. a computer program that can copy itself and cause harm in various ways, such as stealing private
  4. the amount of data that can pass through a network or part of a network per second.
  5. or destroying data.
  6. a computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
  7. a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
  8. someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
  9. a company or organization that gives users and devices access to the Internet.
  10. two or more interconnected devices that can exchange data.
Down
  1. a type of malware that holds victims’ computer files hostage by locking access to them or encrypting them.
  2. a distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
  3. attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
  4. code written in a programming language that instructs computers to perform specific tasks.
  5. a type of connection between devices that can exchange information and power supply.
  6. a data storage device that is used to store, back up, and transfer computer files.
  7. multiple computers on a network that are infected with a program that can be controlled remotely.
  8. software designed to block malware from entering protected networks.
  9. programs that harm computers, networks, or people.
  10. viruses, worms, ransomware, and other
  11. unsolicited emails sent to many addresses in order to make money through advertising or identity theft.
  12. a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
  13. the process of using codes to make readable information unreadable.

23 Clues: or destroying data.viruses, worms, ransomware, and otherprograms that harm computers, networks, or people.two or more interconnected devices that can exchange data.the process of using codes to make readable information unreadable.software designed to block malware from entering protected networks....

Managing Physical and Information Resources 2020-03-26

Managing Physical and Information Resources crossword puzzle
Across
  1. Individual who breaks into a computer or network to delete, steal or alter files (6)
  2. Nonvolatile memory where data can be stored, retrieved and erased (5,6)
  3. Malicious software designed to look like something useful (6,5)
  4. A device that captures an image in digital form and transfers that image to a computer (7)
  5. An electronic device that combines the features of a PDA and a mobile phone (10)
  6. A malicious hacker with the intent of disabling the computer system or cracking the system for a profit (7)
  7. An input device used to give commands or write electronically on a screen; also called a stylus or electronic pen (7,3)
  8. The study of the problems of people in adjusting to their environment; the science that seeks to adapt work or working conditions to fit the user (10)
  9. Storage device that stores computer data magnetically on permanently sealed metal disks (4,5)
  10. A two-state (binary) electrical impulse in a digital computer system represented by 0's and 1's (3)
  11. Computer hardware that allows a user to input data through the use of an on-screen pointer such as an arrow or insertion point (8,6)
Down
  1. Small text file installed on a computer when a user visits a Website that stores information about the visit (6)
  2. Method of scrambling data or email messages, rendering them unreadable if intercepted (10)
  3. The use of a low level, non-disturbing background noise to blend in with the regular office noise (7)
  4. Indirect light that illuminates the area surrounding the work surface (7)
  5. Lightweight plastic disk that can be used to store and retrieve data with a low powered laser beam (7,4)
  6. Malicious, self-replicating computer program designed to cause damage to computer software or files (4)
  7. Stationary ball that can be rolled to move the cursor on the computer screen (9)
  8. Sharing space by two or more employees to efficiently occupy offices that are in use only 10 to 20 percent of the time (3,7)
  9. Software program that gathers personal information about the user without his or her permission (7)
  10. Direct light that illuminates the work surface (4,8)
  11. The unit measurement of the intensity of sound (7)

22 Clues: The unit measurement of the intensity of sound (7)Direct light that illuminates the work surface (4,8)Malicious software designed to look like something useful (6,5)Nonvolatile memory where data can be stored, retrieved and erased (5,6)Indirect light that illuminates the area surrounding the work surface (7)...

uncountable&countable nouns- interface and word features 2025-01-21

uncountable&countable nouns- interface and word features crossword puzzle
Across
  1. The process of moving through a system or document.
  2. The space at the beginning of a paragraph or line.
  3. A container used to organize files on a computer.
  4. A style of text used for displaying characters.
  5. The top section of a document, often with a title.
Down
  1. A small graphic symbol representing a program or file.
  2. The main screen area in an operating system where content is displayed.
  3. The use of various media types like text, images, and audio.
  4. The area where a user interacts with software or hardware.

9 Clues: A style of text used for displaying characters.A container used to organize files on a computer.The space at the beginning of a paragraph or line.The top section of a document, often with a title.The process of moving through a system or document.A small graphic symbol representing a program or file....

Techtronics 2019 2019-10-10

Techtronics 2019 crossword puzzle
Across
  1. tag line"Do no evil"
  2. First Indian movie released on Internet
  3. A website addresss is a unique name that identifies a specific ____________ on the web.
  4. The process of a computer receiving information from a server on the Internet is known as:
  5. developed by Ajith Balakrishnan and Manish Agarwal
  6. Fake antivirus softwares
  7. the initial internet
  8. IC chips used in computers are usually made of
  9. Which IT company's nickname is ' The Big Blue '
Down
  1. The first web based email service
  2. People who work on computer
  3. A company with tag line "Connecting people"
  4. The method of changing appearance of text in MsWord
  5. Whose motto is "wisdom of mass principle?
  6. Who is the father of computer ethics?
  7. Which IT company got name from Sanfrancisco?
  8. It is a small piece of text stored on a user's computer by a web browser for maintaining the state.
  9. A super computer developed in India

18 Clues: tag line"Do no evil"the initial internetFake antivirus softwaresPeople who work on computerThe first web based email serviceA super computer developed in IndiaWho is the father of computer ethics?First Indian movie released on InternetWhose motto is "wisdom of mass principle?A company with tag line "Connecting people"...

Aidens dictionary 2023-11-28

Aidens dictionary crossword puzzle
Across
  1. The most important software that runs on a computer.
  2. A high-capacity, self-contained storage device.
  3. Peripheral device that enables a user to input text into a computer
  4. It takes the signals that come from your Internet Service Provider.
  5. The responsibility use of the technology
  6. Text files with small pieces of data like a username and password.
  7. A screen that puts out pixels
  8. Wireless connection that connects you to the internet
  9. Uniform Resource Locators.
  10. An application for accessing websites and the Internet.
Down
  1. A place where u can store pictures and files.
  2. Video camera that is connected to a computer
  3. Device that performs many of the same functions as a computer
  4. It is the opposite of hardware
  5. is information that is easy to access
  6. network security device that monitors incoming and outgoing network traffic.
  7. A type of online fraud where a cyber criminal designs a fake
  8. Random Access Memory
  9. network Devices that can exchange data and share resources with each other
  10. A sequence of characters or encoded information
  11. computer Opposite of portable computers like laptops
  12. When you tell the readers that your source came with another writer
  13. engine Program that searches for and identifies items in a database
  14. Global network
  15. Universal Serial Bus

25 Clues: Global networkRandom Access MemoryUniversal Serial BusUniform Resource Locators.A screen that puts out pixelsIt is the opposite of hardwareis information that is easy to accessThe responsibility use of the technologyVideo camera that is connected to a computerA place where u can store pictures and files....

Unit 15 vocabulary puzzle 2024-10-29

Unit 15 vocabulary puzzle crossword puzzle
Across
  1. an emulation of an existing computer system. A computer OS running within another computer’s OS.
  2. the use of an app/device to imitate the behaviour of another program/device; for example, running an OS on a computer which is not normally compatible.
  3. circuit two half adders combined to allow the sum of several binary bits.
  4. electronic circuits with two stable conditions using sequential circuits.
  5. computer that uses multiple instructions multiple data sources
  6. the output from a process which influences the next input value to the process.
  7. computer that uses multiple instructions single data source
  8. circuit in which the output depends on input values produced from previous output values.
  9. virtual machine software that creates and runs virtual machines.
  10. computer that uses single instruction single data source
  11. a Boolean expression containing AND and OR terms.
  12. circuit in which the output depends entirely on the input values.
  13. an operating system that controls the physical hardware.
Down
  1. interconnection between two logic gates which make up a flip-flop.
  2. ordering of binary numbers such that successive numbers differ by one bit value only, for example, 00 01 11 10.
  3. an operating system running on a virtual machine.
  4. the complete set of all the instructions in machine code that can be recognized and executed by a central processing unit.
  5. stands for complex instruction set computer
  6. circuit that carries out binary addition on two bits giving sum and carry.
  7. is to allow several instructions to be processed simultaneously without having to wait for previous instructions to finish.
  8. is a signal that is sent to the processor to request immediate attention
  9. stands for reduced instruction set computer
  10. computer that uses single instruction multiple data sources
  11. a a method used to simplify logic statements and logic circuits – uses Gray codes.

24 Clues: stands for complex instruction set computerstands for reduced instruction set computeran operating system running on a virtual machine.a Boolean expression containing AND and OR terms.computer that uses single instruction single data sourcean operating system that controls the physical hardware....

Unit 4: Chemical Reactions 2021-11-13

Unit 4: Chemical Reactions crossword puzzle
Across
  1. One capital/shape type; can not break; atoms same
  2. Change type with substance remaining the same
  3. Liquid plus liquid makes this solid
  4. Change type with new substance being formed
  5. Proportion of number of each atom type
  6. With >1 type of substance that are not attached
  7. Shape or letters (& numbers) to represent matter
  8. Tiny building block has protons, neutrons, electrons
  9. With >1 chemical symbol touching is a chemical...
  10. Periodic Table abbreviation is a chemical...
Down
  1. Type of (color) change in chemical reactions
  2. Physical change (of state) that can go back
  3. Chemical reaction with oxygen to change color
  4. Element types on zig zag line of PTE
  5. Chemical change type that can't go back
  6. With >1 capital/shape type; can break chemically
  7. Element types on left side of Periodic Table
  8. Element types on right side of Periodic Table
  9. State of matter produced if fizzing/bubbling occurs

19 Clues: Liquid plus liquid makes this solidElement types on zig zag line of PTEProportion of number of each atom typeChemical change type that can't go backPhysical change (of state) that can go backChange type with new substance being formedType of (color) change in chemical reactionsElement types on left side of Periodic Table...

Ionic Bonding Review 2023-11-15

Ionic Bonding Review crossword puzzle
Across
  1. NaCl
  2. Manganese (II) Oxide
  3. K2S
  4. Barium Iodide
  5. Cations are these types of elements
  6. _____ give up their electrons to anions
  7. Copper (I) Oxide
  8. Be2N2
  9. MgSe
  10. CaTe
  11. SrBr2
Down
  1. Anions are these types of elements
  2. When naming ionic bonds, we use _________ _______ for transition and rare earth metals
  3. Chlorine has (word) _____ valence electrons
  4. Li3P
  5. Iron (III) Chloride
  6. ____ electrons are the electrons on the outermost ring of an element's Bohr Model
  7. Rb2O
  8. These elements have a full octet
  9. Cesium Fluoride

20 Clues: K2SNaClLi3PRb2OMgSeCaTeBe2N2SrBr2Barium IodideCesium FluorideCopper (I) OxideIron (III) ChlorideManganese (II) OxideThese elements have a full octetAnions are these types of elementsCations are these types of elements_____ give up their electrons to anionsChlorine has (word) _____ valence electrons...

Vocabulary Quiz 2015-09-08

Vocabulary Quiz crossword puzzle
Across
  1. the shape, style, and color of text
  2. A computer program designed to damage computer files
  3. The electronic posting of mean-spirited messages about a person
  4. To set the first line of a paragraph in from the margin in a word processing document
  5. is a printed circuit board that is the foundation of a computer, located at the bottom of the computer case
  6. The global communication network that allows almost all computers worldwide to connect and exchange information
  7. words on a page
  8. Part of the computer system such as a keyboard, screen, mouse, joystick, printer, speakers
Down
  1. any work done on a computer with applications software, such as a letter, report, budget, newsletter, or presentation
  2. central processing unit
  3. To use a combination of text, pictures, sounds, movies, and/or animation in a presentation
  4. a picture or symbol that stands for something else
  5. the acceptable way of communicating on the web
  6. Technology that prevents users from visiting inappropriate websites
  7. set of instructions that tell a computer what to do
  8. Columns and rows of cells that can be filled with text that are used to organize information

16 Clues: words on a pagecentral processing unitthe shape, style, and color of textthe acceptable way of communicating on the weba picture or symbol that stands for something elseset of instructions that tell a computer what to doA computer program designed to damage computer filesThe electronic posting of mean-spirited messages about a person...

computer vocab 2014-08-25

computer vocab crossword puzzle
Across
  1. The physical structure of a person
  2. The central processing unit (CPU) is the brain of your computer
  3. checker A grammar checker, in computing terms, is a program, or part of a program, that attempts to verify written text for grammatical correctness
  4. Read to find errors
  5. A plural of datum
  6. printer A printer, linked to a computer, producing good-quality printed material by using a laser to form a pattern of electrostatically charged dots on a light-sensitive drum, which attract toner
  7. The study of people's efficiency in their working environment
  8. An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
  9. Various possible meanings of the acronym, abbreviation, shorthand
  10. The act of turning out
  11. A particularly powerful mainframe computer
  12. A place to store facts
  13. A Folder
  14. A computer that is portable and suitable for use while traveling
  15. Any netlike combination of filaments
  16. A line at the head of a dispatch
Down
  1. unit A component of a computer's central processing unit (CPU) that directs operation of the processor Home row key. A, S, D, F, J, K, L, AND SEMICOLON (;) these are designated as the keys from which all keystrokes are made
  2. A small computer that contains a microprocessor as its central processor
  3. A section or expanse of rural scenery
  4. A movable indicator on a computer screen
  5. A book that lists words in groups of synonyms and related concepts Hard copy. A printed version on paper of data held in a computer
  6. Something uttered
  7. The official procedure or system of rules governing affairs of state or diplomatic occasions
  8. page A page at the beginning of a book giving its title, the names of the author and publisher, and other publication information
  9. A printed circuit board containing the principal components of a computer or other device
  10. A flat paper container with a sealable flap
  11. A body's relative mass or the quantity of matter contained by it, giving rise to a downward force; the heaviness of a person or thing
  12. What is put in, taken in, or operated on by any process or system

28 Clues: A FolderA plural of datumSomething utteredRead to find errorsThe act of turning outA place to store factsA line at the head of a dispatchThe physical structure of a personAny netlike combination of filamentsA section or expanse of rural sceneryA movable indicator on a computer screenA particularly powerful mainframe computer...

Computer Knowledge 2016-01-13

Computer Knowledge crossword puzzle
Across
  1. where the brains of the computer are it runs the computer
  2. a portable personal computer
  3. another name for monitor
  4. used to speak to others while on the computer
  5. a person who uses the internet
  6. used to make hard copies of documents or pictures
  7. the part of the computer that you look at
  8. electronic communication similar to a letter
Down
  1. the arrow that shows you where you are on the screen
  2. used to hear while you are using the computer
  3. used to copy images into the computer
  4. place to talk to people online
  5. used to video or chat with others while on computer
  6. used to click and drag

14 Clues: used to click and draganother name for monitora portable personal computerplace to talk to people onlinea person who uses the internetused to copy images into the computerthe part of the computer that you look atelectronic communication similar to a letterused to hear while you are using the computerused to speak to others while on the computer...

Computer Crossward 2013-11-28

Computer Crossward crossword puzzle
Across
  1. / a popular search engine.
  2. /most popular computer software (hint:you can look through them).
  3. /an encyclopedia website that is free.
  4. /a portable computer.
  5. /a popular video sharing website/app.
  6. /an external controller (hint: Cats chase them).
  7. /what you use to see what the computer is doing.
  8. /what is the simplest type of computer coding?
Down
  1. Computer /What does PC stand for?
  2. / what is the latest version of windows?
  3. /maker of some computer apps and the Xbox.
  4. /what you use to type.
  5. /a gaming application made by Valve.
  6. /what type computer is made by Apple?

14 Clues: /what you use to type./a portable computer.Computer /What does PC stand for?/ a popular search engine./an encyclopedia website that is free./maker of some computer apps and the Xbox./a popular video sharing website/app./a gaming application made by Valve./what type computer is made by Apple?...

Code 2016-02-08

Code crossword puzzle
Across
  1. bully Bullies that are online
  2. A place where power or information leaves a system
  3. The use of parallel in computers
  4. to identify or remove errors from the computer
  5. A block to a puzzle for games or programs
  6. A folder that items
  7. A logic gate is an elementary building block on a digital circuit
  8. Get mail from the computer, phone, tablet, and computers
  9. When you add something onto your computer
Down
  1. A conditional clause or conjunction
  2. A virus on the computer
  3. When something repeats it self
  4. A part of a puzzle for coding
  5. citizenship Behaviors online
  6. A site that you visit or when you install a game on a software
  7. A programming language is formal constructed language that is programmed in the computer
  8. A system
  9. When you are working on a website and it needs to be ___
  10. block A block that repeats how many times in coding
  11. When something bad gets into your computer

20 Clues: A systemA folder that itemsA virus on the computercitizenship Behaviors onlinebully Bullies that are onlineA part of a puzzle for codingWhen something repeats it selfThe use of parallel in computersA conditional clause or conjunctionA block to a puzzle for games or programsWhen you add something onto your computer...

COMPUTER crossword puzzle 2019-02-10

COMPUTER crossword puzzle crossword puzzle
Across
  1. is a self-service banking terminal that connects to a host computer through a network.
  2. is a large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously.
  3. also called the central processor unit (CPU)
  4. is an electronic programmable device.
  5. is the main circuit board of tye computer.
  6. is a thin, lighter-weight mobile computer that has a touch screen.
  7. computer is the fastest and the most powerful computer.
  8. joins a cable to a port.
  9. allowas the various devices both inside and attaached to the system unit to communicates with one another.
  10. produces text and graphics on a physical medium.
  11. device computing device small enough to hold in your hand.
Down
  1. is a light-sensing input device that reads printed text and graphics and then translate the result into a form the comouter can process.
  2. is a display that is packaged as a separate peripheral device.
  3. chips usually reside on a memory module and are inserted into memory slots
  4. refers to memory chips storing permanent data and instructions.
  5. is an input device that contains keys users press to enter data.
  6. is the number of horizontal and vertical pixels in a display.
  7. visually conveys text, graphics and video information.
  8. is a data that has been processed into a useful form.
  9. also called earphones.
  10. is the point at which a peripheral device attaches to or communicates with a computer or mobile device so that the peripheral device can send data or receive information from mobile device and computer.
  11. control access to the hardware, softwarr and other resources on a network.
  12. are used to produce high-quality drawings.
  13. consists of electronic components that store instructions waiting to be executed by the processor and the results of processing the data.
  14. is any data and instructions entered into the memory of a conputer.

25 Clues: also called earphones.joins a cable to a port.is an electronic programmable device.are used to produce high-quality drawings.is the main circuit board of tye computer.also called the central processor unit (CPU)produces text and graphics on a physical medium.is a data that has been processed into a useful form....

COMPUTER crossword puzzle 2019-02-10

COMPUTER crossword puzzle crossword puzzle
Across
  1. is the point at which a peripheral device attaches to or communicates with a computer or mobile device so that the peripheral device can send data or receive information from mobile device and computer.
  2. is a display that is packaged as a separate peripheral device.
  3. are used to produce high-quality drawings.
  4. visually conveys text, graphics and video information.
  5. is a large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously.
  6. is a data that has been processed into a useful form.
  7. consists of electronic components that store instructions waiting to be executed by the processor and the results of processing the data.
  8. joins a cable to a port.
  9. is the number of horizontal and vertical pixels in a display.
  10. is an input device that contains keys users press to enter data.
  11. allowas the various devices both inside and attaached to the system unit to communicates with one another.
  12. control access to the hardware, softwarr and other resources on a network.
  13. is a self-service banking terminal that connects to a host computer through a network.
Down
  1. produces text and graphics on a physical medium.
  2. chips usually reside on a memory module and are inserted into memory slots
  3. is a light-sensing input device that reads printed text and graphics and then translate the result into a form the comouter can process.
  4. computer is the fastest and the most powerful computer.
  5. is the main circuit board of tye computer.
  6. is an electronic programmable device.
  7. also called earphones.
  8. is any data and instructions entered into the memory of a conputer.
  9. also called the central processor unit (CPU)
  10. device computing device small enough to hold in your hand.
  11. is a thin, lighter-weight mobile computer that has a touch screen.
  12. refers to memory chips storing permanent data and instructions.

25 Clues: also called earphones.joins a cable to a port.is an electronic programmable device.is the main circuit board of tye computer.are used to produce high-quality drawings.also called the central processor unit (CPU)produces text and graphics on a physical medium.is a data that has been processed into a useful form....

Tech Terms 2023-04-27

Tech Terms crossword puzzle
Across
  1. Central processing unit
  2. a unit of data that is eight binary digits long
  3. the system that your computer uses to operate all of its user base functions
  4. Search engine
  5. internet box
  6. a website designed to make it easy for users to create entries in chronological order
  7. random access memory
  8. a computer-generated environment
  9. Open-source software
  10. portable document format
  11. turns domain names into IP addresses
  12. the gulf between those who have ready access to computers and the internet and those who do not
  13. computer code or program that is protected by law against copying
  14. Input device
  15. Output device
  16. malicious software
  17. An internet cord
  18. programs and operating systems that need to be installed
  19. a binary digit the smallest increment of data on a computer
  20. Copy (data) from one computer system to another, typically over the internet.
  21. provides a service to another computer program and its user
  22. hyper text markup language
Down
  1. CTRL C
  2. back up information on computer
  3. 1000 kilobytes
  4. server based pieces of data ion websites
  5. the process of protecting information using mathematical models
  6. Search engine
  7. ties the computer's components together at one spot and allows them to talk to each other.
  8. Back up information on computer
  9. Personally Identifiable Information
  10. A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.
  11. CTRL V
  12. Machine language
  13. a selective wall that lets certain ip addresses go through and blocks out viruses
  14. A global system of interconnected computer networks that uses the Internet protocol suite to communicate between networks and devices.
  15. Address Internet protocol address
  16. An information system enabling documents and other web resources to be accessed over the Internet.
  17. Turn on
  18. Control P
  19. keyboard, monitor, and speakers
  20. makes wifi
  21. Read-only memory

43 Clues: CTRL VCTRL CTurn onControl Pmakes wifiinternet boxInput deviceSearch engineSearch engineOutput device1000 kilobytesMachine languageAn internet cordRead-only memorymalicious softwarerandom access memoryOpen-source softwareCentral processing unitportable document formathyper text markup languageback up information on computer...