types of computer Crossword Puzzles
BIS2180 Information Technology 2017-09-12
Across
- A duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed.
- A computer dedicated to providing one or more services to other computers or devices on a network.
- A small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink.
- A personal computer designed to be in a stationary location, where all of its components fit on or under a desk.
- An output device that produces text and graphics on a physical medium, such as paper.
- A light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process.
- An Internet-enabled phone that usually also includes a calendar, an address book, a calculator, a notepad, games, and several other apps.
- Software that acts without a user's knowledge and deliberately alters the computer's or mobile device's operations.
- Contains keys you press to enter data and instructions into a computer or mobile device.
- Any data and instructions entered into the memory of a computer.
- The smallest unit of data that computer can process.
Down
- A Software that enables users with an Internet connection to access and view Webpages on a computer or mobile device.
- A worldwide collection of computer networks that connects millions of businesses, government agencies, educational institutions, and individuals.
- A point device that fits under the palm of your hand comfortably.
- Real-time meeting between two or more geographically separated people who use a network to transmit audio and video.
- An instruction that causes a program or app to perform a specific action.
- A small symbol on the screen whose location and shape change as a user moves a pointing device.
- Approximately one trillion bytes.
- magnetically coated ribbon of plastic capable of storing large amounts of data and information
- A collection of related Webpages, which are stored on a Web server.
20 Clues: Approximately one trillion bytes. • The smallest unit of data that computer can process. • Any data and instructions entered into the memory of a computer. • A point device that fits under the palm of your hand comfortably. • A collection of related Webpages, which are stored on a Web server. • ...
Computer parts 2024-02-06
Across
- computer expansion card that generates a feed of graphics
- Power SuppMonitor
- Device with a screen used for display
- stores all your digital content
- hand-held pointing device
- enters characters and functions into the computer
- worldwide system of computer networks
Down
- used to draw cooler air into the case from the outside
- device that accepts text and graphic output from a computer and transfers the information to paper
- Computer processor
- the main printed circuit
- contains most of the hardware of a personal computer
- random access memory
- allows you to use CDs
14 Clues: Power SuppMonitor • Computer processor • random access memory • allows you to use CDs • the main printed circuit • hand-held pointing device • stores all your digital content • Device with a screen used for display • worldwide system of computer networks • enters characters and functions into the computer • contains most of the hardware of a personal computer • ...
Computer Terms # 1 2014-03-21
Across
- - to move the mouse while its button is being depressed.
- - first thing you see in your computer.
- - The pointer, usually arrow or cross shaped, which is controlled by the mouse.
- - an acronym for Compact Disc Read-Only Memory.
- - to transfer data from one computer to another. (If you are on the receiving end, you are downloading. If you are on the sending end, you are uploading ).
- Drive - Stores Data (information) a way to move more data from one computer to another it is a portable drive.
- - to start up a computer.
- - the Central Processing Unit. The processing chip that is the "brains" of a computer.
- - the smallest piece of information used by the computer. Derived from "binary digit". In computer language, either a one (1) or a zero (0).
- - When Computers are connected with wires, cables, or satellites that provide wireless connection to share information & data. The Internet is a global word that is uppercase all the time a proper noun.
- - the generic word for an application, document, control panel or other computer data.
Down
- drive - the machinery that writes the data from a disk and/or writes data to a disk.
- - a file you create, as opposed to the application which created it.
- - Electronic device for storing and processing data.
- - Is another word for Information. Data (Information) can be text and/or numbers, examples of data: names, dates, places, addresses, phone numbers.
- - is a collection of data or information.
- - an electronic subdirectory which contains files.
- - a typeface that contains the characters of an alphabet or some other letterforms.
- box - an on-screen message box that appears when the Mac requires additional information before completing a command.
19 Clues: - to start up a computer. • - first thing you see in your computer. • - is a collection of data or information. • - an acronym for Compact Disc Read-Only Memory. • - an electronic subdirectory which contains files. • - Electronic device for storing and processing data. • - to move the mouse while its button is being depressed. • ...
CYBERCRIME 2021-07-17
Across
- - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
- - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
- - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - tools used to dismantle the hardware for seizure.
- - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
- - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
- - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
- - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
- - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- - refers to the modification or change, in form or substance, of an existing computer data or program.
- - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
- - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
- - terrorist activity that targets computer networks and information systems for attack.
- - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- - remember that often, latent prints can be taken from disks or other storage media or hardware.
- - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
- - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- - refers to the transmission of information through ICT media, including voice, video and other forms of data.
- - these can be used to store copies of files from the computer for use in his investigation.
- - legally institutionalized rights to own and control goods.
Down
- - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
- - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
- - refers to a computer or a computer network, the electronic medium in which online communication takes place
- - the right to be left alone; freedom from observation and interference from others.
- - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
- - Intentional alteration or reckless interference with the functioning of a computer or computer network.
- - pieces of computer code that can infect computer system causing disruptions to their normal operation.
- - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - the act of copying digital material posted online into the storage medium on one’s computer.
- - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
- - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
- - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- - the interactional space or environment created by linking computers together into a communication net5work.
- - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- - proof of identity is an essential component to identify intruder.
- - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
- - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
- - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
- - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
49 Clues: - tools used to dismantle the hardware for seizure. • - legally institutionalized rights to own and control goods. • - proof of identity is an essential component to identify intruder. • - the right to be left alone; freedom from observation and interference from others. • ...
Cybercrime crossword 2021-07-08
Across
- - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - legally institutionalized rights to own and control goods.
- - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- - proof of identity is an essential component to identify intruder.
- - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
- - tools used to dismantle the hardware for seizure.
- - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
- - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
- - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- - terrorist activity that targets computer networks and information systems for attack.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- - refers to the transmission of information through ICT media, including voice, video and other forms of data.
- - remember that often, latent prints can be taken from disks or other storage media or hardware.
- - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
- - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
- - pieces of computer code that can infect computer system causing disruptions to their normal operation.
- - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- - refers to the modification or change, in form or substance, of an existing computer data or program.
- - these can be used to store copies of files from the computer for use in his investigation.
- - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
Down
- - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
- - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
- – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
- - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
- - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
- - the right to be left alone; freedom from observation and interference from others.
- - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
- - Intentional alteration or reckless interference with the functioning of a computer or computer network.
- - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
- - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
- - refers to a computer or a computer network, the electronic medium in which online communication takes place
- - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
- - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- - the act of copying digital material posted online into the storage medium on one’s computer.
- - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- - the interactional space or environment created by linking computers together into a communication net5work.
- - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
49 Clues: - tools used to dismantle the hardware for seizure. • - legally institutionalized rights to own and control goods. • - proof of identity is an essential component to identify intruder. • - the right to be left alone; freedom from observation and interference from others. • ...
heriberto puzzle 2014-08-26
Across
- The physical structure of a person
- A place to store facts
- A Folder
- What is put in, taken in, or operated on by any process or system
- A book that lists words in groups of synonyms and related concepts
- The central processing unit (CPU) is the brain of your computer
- A section or expanse of rural scenery
- A body's relative mass or the quantity of matter contained by it, giving rise to a downward force; the heaviness of a person or thing
- The study of people's efficiency in their working environment
- A particularly powerful mainframe computer
- A computer that is portable and suitable for use while traveling
- A flat paper container with a sealable flap
- A movable indicator on a computer screen
- Various possible meanings of the acronym, abbreviation, shorthand
- Something uttered
- copy A printed version on paper of data held in a computer
Down
- A plural of datum
- A line at the head of a dispatch
- A small computer that contains a microprocessor as its central processor
- page A page at the beginning of a book giving its title, the names of the author and publisher, and other publication information
- row key A, S, D, F, J, K, L, AND SEMICOLON (;) these are designated as the keys from which all keystrokes are made
- checker A grammar checker, in computing terms, is a program, or part of a program, that attempts to verify written text for grammatical correctness
- Any netlike combination of filaments
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- A printed circuit board containing the principal components of a computer or other device
- unit A component of a computer's central processing unit (CPU) that directs operation of the processor
- Read to find errors
- The official procedure or system of rules governing affairs of state or diplomatic occasions
- The act of turning out
- printer A printer, linked to a computer, producing good-quality printed material by using a laser to form a pattern of electrostatically charged dots on a light-sensitive drum, which attract toner
30 Clues: A Folder • A plural of datum • Something uttered • Read to find errors • A place to store facts • The act of turning out • A line at the head of a dispatch • The physical structure of a person • Any netlike combination of filaments • A section or expanse of rural scenery • A movable indicator on a computer screen • A particularly powerful mainframe computer • ...
TECHNOLOGY VOCABULARY 2021-09-06
Across
- up for a particular purpose
- device that takes signals and displays them
- fault or defect in a computer program, system, or machine
- small compartment
- computer providing shared resources to a computer network
- e-mail.
- :
- a software program capable of reproducing itself
- electronic device that generates a digital representation of an image for data input to a computer.
Down
- navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver
- a program that gives a computer instructions.
- restricted computer network
- the smallest discrete component of an image on a screen
- unit of measurement of information
- a copy of a file or directory on a separate storage device
- specific size and style of type within a type family
16 Clues: : • e-mail. • small compartment • up for a particular purpose • restricted computer network • unit of measurement of information • device that takes signals and displays them • a program that gives a computer instructions. • a software program capable of reproducing itself • specific size and style of type within a type family • ...
ram vs rom 2023-01-30
Across
- operating system
- memory partitioned virtually
- Solid State Drive
- hardisk , SSD
- can be moved across computers
- Personal Computer
- 1st part of fec cycle
Down
- cant be moved across computers
- holds address of current instruction
- loading a program into a computer by means of a few initial instructions
- set of computer instructions in firmware which control input and output operations.
- read only memory
- 2nd part of fec cycle
- GIGA BYTE
- random access memory
- lets computer access some information more quickly than
16 Clues: GIGA BYTE • hardisk , SSD • operating system • read only memory • Solid State Drive • Personal Computer • random access memory • 2nd part of fec cycle • 1st part of fec cycle • memory partitioned virtually • can be moved across computers • cant be moved across computers • holds address of current instruction • lets computer access some information more quickly than • ...
COMPUTER crossword puzzle 2019-02-10
Across
- computer is the fastest, most powerful computer.
- visually conveys text, graphics and video information.
- device computing device small enough to hold in your hand.
- is an input device that contains keys users press to enter data.
- is a data that has been processed into a useful form.
- is the main circuit board of tye computer.
- produces text and graphics on a physical medium.
- is any data and instructions entered into the memory of a conputer.
- joins a cable to a port.
- is a self-service banking terminal that connects to a host computer through a network.
- consists of electronic components that store instructions waiting to be executed by the processor and the results of processing the data.
- allowas the various devices both inside and attaached to the system unit to communicates with one another.
- is an electronic programmable device.
- control access to the hardware, softwarr and other resources on a network.
- chips usually reside on a memory module and are inserted into memory slots
Down
- is a light-sensing input device that reads printed text and graphics and then translate the result into a form the comouter can process.
- is a display that is packaged as a separate peripheral device.
- also called the central processor unit (CPU)
- is the number of horizontal and vertical pixels in a display.
- is the point at which a peripheral device attaches to or communicates with a computer or mobile device so that the peripheral device can send data or receive information from mobile device and computer.
- is a large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously.
- are used to produce high-quality drawings.
- also called earphones.
- is a thin, lighter-weight mobile computer that has a touch screen.
- refers to memory chips storing permanent data and instructions.
25 Clues: also called earphones. • joins a cable to a port. • is an electronic programmable device. • is the main circuit board of tye computer. • are used to produce high-quality drawings. • also called the central processor unit (CPU) • computer is the fastest, most powerful computer. • produces text and graphics on a physical medium. • ...
Input and Output 2014-03-25
5 Clues: It prints the information on the paper. • We input information by clicking the buttons. • It takes information and displays it on the screen for us. • It is used to type or input information into the computer. • It gives out different types of sound processed by the computer.
Computer Terms 2021-02-19
Across
- When two or more separate pieces of a computer system share information
- usually this can make annoying or for some people satisfying sounds
- Stands for random access memory
- This consist of 8 bits
- A computer program that is being executed sometimes by multiple threads
- This is used to store data and instructions
- A machine or a device that helps to process any kind of information.
- This is an abbreviation for binary digit
- This device is used to move an image from the monitor to paper
- Relating to visual art or computer graphics
- Once you login to your computer you become this
- This runs online websites and is used instead of mobile data
- we use this to drive and control what is pressed on the monitor
- This word is a shorter version of Read-only memory
- This means to store and access data and programs over the internet instead of your computer's hard drive
- This is an input device that scans documents such as photos and pages of text
Down
- This is a shortened word for Internet of Things
- these can be dragged into folders and when double clicked opens the document
- A collection of tasks that can be done by a computer to perform an instruction
- an object with LED lights inside to project an image
- These are used to graphic drawings from a vector graphics file
- This is short for Modulator-Demodulator
- Because of these we can hear the video we are playing
- Something that connects and works with a computer is one of these
- this is what the computer receives when a signal or command
- Because of this we can connect 2 or more devices together such as wireless headphones
- This stands for Graphical User Interface
- Data that is sent out by a computer
- these can hold files together and still be accessed
29 Clues: This consist of 8 bits • Stands for random access memory • Data that is sent out by a computer • This is short for Modulator-Demodulator • This is an abbreviation for binary digit • This stands for Graphical User Interface • This is used to store data and instructions • Relating to visual art or computer graphics • This is a shortened word for Internet of Things • ...
BIS2180 Information Technology 2017-09-12
Across
- A small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink.
- An instruction that causes a program or app to perform a specific action.
- A Software that enables users with an Internet connection to access and view Webpages on a computer or mobile device.
- Contains keys you press to enter data and instructions into a computer or mobile device.
- A point device that fits under the palm of your hand comfortably.
- Any data and instructions entered into the memory of a computer.
- A duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed.
- A personal computer designed to be in a stationary location, where all of its components fit on or under a desk.
- Real-time meeting between two or more geographically separated people who use a network to transmit audio and video.
- Approximately one trillion bytes.
- A computer dedicated to providing one or more services to other computers or devices on a network.
Down
- magnetically coated ribbon of plastic capable of storing large amounts of data and information
- A light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process.
- Software that acts without a user's knowledge and deliberately alters the computer's or mobile device's operations.
- An Internet-enabled phone that usually also includes a calendar, an address book, a calculator, a notepad, games, and several other apps.
- A collection of related Webpages, which are stored on a Web server.
- A worldwide collection of computer networks that connects millions of businesses, government agencies, educational institutions, and individuals.
- An output device that produces text and graphics on a physical medium, such as paper.
- The smallest unit of data that computer can process.
- A small symbol on the screen whose location and shape change as a user moves a pointing device.
20 Clues: Approximately one trillion bytes. • The smallest unit of data that computer can process. • Any data and instructions entered into the memory of a computer. • A point device that fits under the palm of your hand comfortably. • A collection of related Webpages, which are stored on a Web server. • ...
BIS2180 Information Technology 2017-09-12
Across
- A duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed.
- A point device that fits under the palm of your hand comfortably.
- magnetically coated ribbon of plastic capable of storing large amounts of data and information
- A Software that enables users with an Internet connection to access and view Webpages on a computer or mobile device.
- A light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process.
- A worldwide collection of computer networks that connects millions of businesses, government agencies, educational institutions, and individuals.
- A small symbol on the screen whose location and shape change as a user moves a pointing device.
- Real-time meeting between two or more geographically separated people who use a network to transmit audio and video.
- Contains keys you press to enter data and instructions into a computer or mobile device.
Down
- Any data and instructions entered into the memory of a computer.
- Software that acts without a user's knowledge and deliberately alters the computer's or mobile device's operations.
- A collection of related Webpages, which are stored on a Web server.
- A small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink.
- An instruction that causes a program or app to perform a specific action.
- An Internet-enabled phone that usually also includes a calendar, an address book, a calculator, a notepad, games, and several other apps.
- Approximately one trillion bytes.
- An output device that produces text and graphics on a physical medium, such as paper.
- A computer dedicated to providing one or more services to other computers or devices on a network.
- The smallest unit of data that computer can process.
- A personal computer designed to be in a stationary location, where all of its components fit on or under a desk.
20 Clues: Approximately one trillion bytes. • The smallest unit of data that computer can process. • Any data and instructions entered into the memory of a computer. • A point device that fits under the palm of your hand comfortably. • A collection of related Webpages, which are stored on a Web server. • ...
tech terms 1-3 2022-05-10
Across
- Hypertext Markup Language is the most basic building block of the web
- two input devices
- 8
- allows the computer to restart
- what is CPU
- what is the machine language
- you cant touch it, it is on the computer
- what are firefox and google chrome examples of
- a software component that enables a service provider to monitor, control, analyze, and manage the services on its network.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- Portable Document Format
- a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
- 0-1
- what does DNS stand for
- what does ROM stand for
Down
- you can physically touch it
- the computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors.
- a unit of information equal to 220 bytes or, loosely, one million bytes.
- data from A website that is stored within a web browsers that a website can visit later
- a combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line.
- what does ram stand for
- family of wired computers networking technologies commonl used in local area networks
- what are yahoo and bing examples of
- the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
- what is URL
- device which forwards data packets to the appropriate parts of a computer network.
- what is WWW
- something that stores all digital info
- what is copy from a different computer
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
30 Clues: 8 • 0-1 • what is CPU • what is URL • what is WWW • two input devices • what does DNS stand for • what does ROM stand for • what does ram stand for • Portable Document Format • you can physically touch it • what is the machine language • allows the computer to restart • what are yahoo and bing examples of • something that stores all digital info • what is copy from a different computer • ...
computer parts 2013-10-27
Across
- Read-Only Memory
- is the basic unit of information in computing and digital communications
- is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data, Modems can be used with any means of transmitting analog signals
- a computer peripheral is any external device that provides input and output for the computer
- a maniacal device to make an image on paper
- can refer to either a hardware connection
- what you can type on when on a computer
- a tipe of computer like ?8
- when something happens in ? it is done step by step
- Random Access Memory
- where you can see on you computer (image)
- allow people to organize their files in a way that makes sense to them
- to put something in a docs or other things like that
Down
- a hand device for better work on computers (it does not have a tail)
- is a computer printer for printing vector graphics. In the past, plotters were used in applications such as computer-aided design
- is a unit of digital information in computing and telecommunications that most commonly consists of eight bits
- an image or visual representation of an object
- were created in 1969, the same year the Internet had its origin
- to record sounds
- a technical setting stored in the memory of a machine or piece of hardware to be executed, including computers like on scratch
- the information is stored using a series of ones and zeros
- to make a sound
- When you have two or more computers connected to each other
- can be used for gaming and other things like that
- to make a manual pic
- a ? normaly has a computer ? acount
- can be used to store things like an image (like a photo) on your computer
- a place were things can be stored it starts with m
- Data generated by a computer is referred to as output
- A file is a collection of data stored in one unit, identified by a ?name
30 Clues: to make a sound • Read-Only Memory • to record sounds • to make a manual pic • Random Access Memory • a tipe of computer like ?8 • a ? normaly has a computer ? acount • what you can type on when on a computer • can refer to either a hardware connection • where you can see on you computer (image) • a maniacal device to make an image on paper • ...
computer parts 2013-10-27
Across
- can be used for gaming and other things like that
- to make a sound
- an image or visual representation of an object
- When you have two or more computers connected to each other
- is a unit of digital information in computing and telecommunications that most commonly consists of eight bits
- a ? normaly has a computer ? acount
- is a computer printer for printing vector graphics. In the past, plotters were used in applications such as computer-aided design
- to record sounds
- is the basic unit of information in computing and digital communications
- were created in 1969, the same year the Internet had its origin
- can be used to store things like an image (like a photo) on your computer
- Read-Only Memory
- to put something in a docs or other things like that
- a maniacal device to make an image on paper
- is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data, Modems can be used with any means of transmitting analog signals
Down
- can refer to either a hardware connection
- to make a manual pic
- a computer peripheral is any external device that provides input and output for the computer
- a place were things can be stored it starts with m
- Data generated by a computer is referred to as output
- a tipe of computer like ?8
- what you can type on when on a computer
- allow people to organize their files in a way that makes sense to them
- when something happens in ? it is done step by step
- A file is a collection of data stored in one unit, identified by a ?name
- a technical setting stored in the memory of a machine or piece of hardware to be executed, including computers like on scratch
- the information is stored using a series of ones and zeros
- Random Access Memory
- where you can see on you computer (image)
- a hand device for better work on computers (it does not have a tail)
30 Clues: to make a sound • to record sounds • Read-Only Memory • to make a manual pic • Random Access Memory • a tipe of computer like ?8 • a ? normaly has a computer ? acount • what you can type on when on a computer • can refer to either a hardware connection • where you can see on you computer (image) • a maniacal device to make an image on paper • ...
Alisha's crossword puzzle 2017-03-16
Across
- processing unit
- card can give extra facilities or memory
- physical parts of a computer
- contains principle components for a computer
- random access memory
- connects to the motherboard
- universal serial bus
- an integrated circuit is embedded
- can move on screen cursor
- digital optical disc
Down
- most components of the computer
- a display screen
- panel of keys
- set of computers connected together
- hardware component
- self-contained storage device
- allows use of audio
- compact disc
- central processing unit
19 Clues: compact disc • panel of keys • processing unit • a display screen • hardware component • allows use of audio • random access memory • universal serial bus • digital optical disc • central processing unit • can move on screen cursor • connects to the motherboard • physical parts of a computer • self-contained storage device • most components of the computer • an integrated circuit is embedded • ...
Computer Terms # 1 2014-03-21
Across
- - the Central Processing Unit. The processing chip that is the "brains" of a computer.
- - an electronic subdirectory which contains files.
- - Is another word for Information. Data (Information) can be text and/or numbers, examples of data: names, dates, places, addresses, phone numbers.
- - a file you create, as opposed to the application which created it.
- - Electronic device for storing and processing data.
- - the smallest piece of information used by the computer. Derived from "binary digit". In computer language, either a one (1) or a zero (0).
- - a typeface that contains the characters of an alphabet or some other letterforms.
- box - an on-screen message box that appears when the Mac requires additional information before completing a command.
- - is a collection of data or information.
- - an acronym for Compact Disc Read-Only Memory.
Down
- - the generic word for an application, document, control panel or other computer data.
- - The pointer, usually arrow or cross shaped, which is controlled by the mouse.
- - When Computers are connected with wires, cables, or satellites that provide wireless connection to share information & data. The Internet is a global word that is uppercase all the time a proper noun.
- - to move the mouse while its button is being depressed.
- Drive - Stores Data (information) a way to move more data from one computer to another it is a portable drive.
- - to transfer data from one computer to another. (If you are on the receiving end, you are downloading. If you are on the sending end, you are uploading ).
- - to start up a computer.
- - first thing you see in your computer.
- drive - the machinery that writes the data from a disk and/or writes data to a disk.
19 Clues: - to start up a computer. • - first thing you see in your computer. • - is a collection of data or information. • - an acronym for Compact Disc Read-Only Memory. • - an electronic subdirectory which contains files. • - Electronic device for storing and processing data. • - to move the mouse while its button is being depressed. • ...
English lesson 2020-04-28
Across
- obtain or retrieve computer data or a file
- visual images produced by computer processing
- not having official permission or approval.
- the action of moving around a website, the Internet, etc
- made or produced by human beings rather than occurring naturally, especially as a copy of something natural
- language we are learning in this class
- short for weblog, online diary
- task you should have sent to Helis before 30th of March
- copy (data) from one computer system to another, typically over the Internet
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
Down
- a person who uses computers to gain unauthorized access to data
- the state of being aware of and responsive to one's surroundings
- the programs and other operating information used by a computer
- the machines, wiring, and other physical components of a computer or other electronic system
- a set of related web pages located under a single domain name
- a fictional or hypothetical person whose physical abilities are extended beyond normal human limitations by mechanical elements built into the body
- name of our teacher
- denoting or performed by a device capable of operating without direct human control
- a dishonest scheme; a fraud
- a machine resembling a human being and able to replicate certain human movements and functions automatically
20 Clues: name of our teacher • a dishonest scheme; a fraud • short for weblog, online diary • language we are learning in this class • obtain or retrieve computer data or a file • not having official permission or approval. • visual images produced by computer processing • task you should have sent to Helis before 30th of March • ...
Intro Computer Science Crossword 2023-08-24
Across
- understand and identify your audience's problems or needs
- how a computer takes in information from the world (keyboard, mouse, touchscreen)
- *abbreviation* a framework for identifying problems, designing solutions, testing and refining
- a set of (often repeated) steps used to solve a problem
- long-term memory even when the computer is turned off
- something that happens outside a program that the program can respond to (like a screen tap or mouse click)
- a programming language found in editors—such as Microsoft MakeCode and Scratch—that uses different colored and shaped blocks that connect in a specific order to allow beginners to learn concepts without having to worry about syntax
- construct rough drafts or sketches of your ideas
- a chip inside the computer and it's how the computer transforms information
- test your prototype solutions
- a handheld microcomputer with many inputs and outputs
- a text-based programming language that uses letters, numbers, and symbols. It's one of the most popular programming languages in the world
Down
- a self contained set of instructions for performing a specific task within a computer program
- a detailed outline or rough draft of a program. natural language and code
- brainstorm several possible creative solutions
- a coding editor in Code Connection that lets you code with two programming languages: Block or JavaScript
- part of a program that runs when a specific event happens
- where you will build your programs
- how the computer remembers things
- learning more about the target audience
- virtual space that shows what your program will look like when running on a micro:bit
- *abbreviation* short-term memory that disappears when the computer is turned off
- how a computer displays or communicates information
23 Clues: test your prototype solutions • how the computer remembers things • where you will build your programs • learning more about the target audience • brainstorm several possible creative solutions • construct rough drafts or sketches of your ideas • how a computer displays or communicates information • long-term memory even when the computer is turned off • ...
Quiz #2 2019-10-11
Across
- program used for the user like Microsoft word
- malware that blocks access to a computer system until the user pays a sum of money
- how relevant a website is
- the source of the information on a website like who the author is
- a type of malware that copy's itself to spread onto another computer
- malware that is a program loaded on to another persons computer without them knowing
- malware that misleads the user of its full intent
- a global system interconnected by computer networks
- the reality and truth of a website
- how current a website is
Down
- language for creating a web page
- link that takes you from one location to another
- a collection of data used by computers
- supports a computers basic functions
- malware that is meant to find information about a person or a organization
- one of the first packet switching networks
- what is the point of the website
- large scale computer network made to avoid doubling on research
- transmission control protocol communication over the internet
- the web address
20 Clues: the web address • how current a website is • how relevant a website is • language for creating a web page • what is the point of the website • the reality and truth of a website • supports a computers basic functions • a collection of data used by computers • one of the first packet switching networks • program used for the user like Microsoft word • ...
V-TECH 2016-12-01
Across
- center a large computer room
- to virtual the manual or automated process that transfers data
- power the speed and capacity of computer chips
- an open source operating system
- metal computer server without any operating system software installed
- the ability to abstract a physical server into virtual machine
- visor is called a virtual machine monitor
- are virtual machines that already contain an operating system
- processing unit the core or brain of a computer where the user and system commands are executed
- virtualization format defines a format for the packaging and distribution of a virtual machine
- an exact copy of a virtual machine
Down
- shots a set of files that preserve the state of a virtual machine
- a virtual machine
- the practice of condensing
- the practice of deploying new applications virtual machine
- vitalized workloads
- a UNIX or Linux program that runs as a background process
- machine a container that runs a guest operating system
- time protocol is an open standard that defines and implements a computers ability
- small computer system interface
20 Clues: a virtual machine • vitalized workloads • the practice of condensing • center a large computer room • an open source operating system • small computer system interface • an exact copy of a virtual machine • visor is called a virtual machine monitor • power the speed and capacity of computer chips • machine a container that runs a guest operating system • ...
Code 2016-02-08
Across
- When something bad gets into your computer
- A block to a puzzle for games or programs
- When you add something onto your computer
- A place where power or information leaves a system
- A programming language is formal constructed language that is programmed in the computer
- block A block that repeats how many times in coding
- to identify or remove errors from the computer
- A conditional clause or conjunction
- When you are working on a website and it needs to be ___
- Get mail from the computer, phone, tablet, and computers
Down
- A system
- A folder that items
- A part of a puzzle for coding
- The use of parallel in computers
- A virus on the computer
- A site that you visit or when you install a game on a software
- bully Bullies that are online
- citizenship Behaviors online
- A logic gate is an elementary building block on a digital circuit
- When something repeats it self
20 Clues: A system • A folder that items • A virus on the computer • citizenship Behaviors online • A part of a puzzle for coding • bully Bullies that are online • When something repeats it self • The use of parallel in computers • A conditional clause or conjunction • A block to a puzzle for games or programs • When you add something onto your computer • ...
Technology Crossword Puzzle 2022-05-12
Across
- - gaming or something you play computer games on
- - to look for something
- - a digital recreation of something real
- - the opposite of in-person
- - it has a mouse, a keyboard and a monitor
- - chrome book, laptop, phone, computer, etc.
- - not always furry, with a long tail or pink nose
- - singers use them to be heard
- - open too many and your computer will lag
- - something you can tap or click on to open up a document
- - makes televisions, computers louder
- - people are on them waaaay too much
Down
- - shows everyone what is on the monitor
- - the network that connects computers from anywhere
- - where you can search information
- - a screen that helps us see what is on the computer
- - you can record online meetings
- - allows wireless communication between devices
- - TVs, computers, cells, projectors all have one
- - electric piano
- - portable computer
- - must be plugged in to work
- - what you type on
23 Clues: - electric piano • - what you type on • - portable computer • - to look for something • - the opposite of in-person • - must be plugged in to work • - singers use them to be heard • - you can record online meetings • - where you can search information • - people are on them waaaay too much • - makes televisions, computers louder • - shows everyone what is on the monitor • ...
Welcome to Informatics 2020-10-30
Across
- What is the coding language synonym of coffee?
- What do you call it when computer science majors make fun of each other? Cyber.......
- Which protocol is used to receive email?
- What is the hypothetical point in time at which technological growth becomes uncontrollable and irreversible? Technological ...........
- Which type of memory stores data only for the time your computer is turned on, but loses the data at a power break?
- Error in a software program?
- What is the question-answering computer system capable of answering questions posed in natural language?
- What is the object-oriented way to become wealthy?
- Who created the C programming language?
- What is the algorithm that finds the position of a target value within a sorted array?
- A Computer program that plays the board game go?
- Why do java programmers tend to wear glasses? Because they can't…
- Where does Tarzan buy his computers from?
- int x; for (x=2; x<=7; x++) { } printf(''%d'', x);
Down
- Who developed the Java programming language?
- Which woman is considered by many to be the world's first computer programmer?
- With respect to computer science principles, what is the term used for a reasonably detailed sequence of steps designed to solve a problem or perform a task?
- Google can search through everything on the internet? True or False
- What does the ‘s’ in USB stand for?
- A folder in a windows computer cannot be made with which name?
- A Computer generated simulation in which a person can interact through a headset?
- How many programmers does it take to change a light bulb? (...., It's a hardware problem.)
- What is the name for a manipulated video produced by sophisticated AI that yields fabricated images/sounds that appear to be real?
- The term ‘Computer’ is derived from……….?
24 Clues: Error in a software program? • What does the ‘s’ in USB stand for? • Who created the C programming language? • Which protocol is used to receive email? • The term ‘Computer’ is derived from……….? • Where does Tarzan buy his computers from? • Who developed the Java programming language? • What is the coding language synonym of coffee? • ...
TECHNOLOGY VOCABULARY 2021-09-06
Across
- :
- up for a particular purpose
- electronic device that generates a digital representation of an image for data input to a computer.
- restricted computer network
- unit of measurement of information
- a program that gives a computer instructions.
- computer providing shared resources to a computer network
Down
- a software program capable of reproducing itself
- navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver
- e-mail.
- fault or defect in a computer program, system, or machine
- specific size and style of type within a type family
- the smallest discrete component of an image on a screen
- a copy of a file or directory on a separate storage device
- small compartment
- device that takes signals and displays them
16 Clues: : • e-mail. • small compartment • up for a particular purpose • restricted computer network • unit of measurement of information • device that takes signals and displays them • a program that gives a computer instructions. • a software program capable of reproducing itself • specific size and style of type within a type family • ...
Chapter 11: Distributing and Marketing 2014-12-01
Across
- offering a product for sale in a small area for a limited period of time to see how well it sells before offering it nationally
- business transactions conducted over computer networks, in particular the World Wide Web
- the role of the consumer as ruler of the market when determining the types of goods and services produced
- practice of setting prices close to those charged by other companies selling similar products
- selling a new product at a low price to attract customers away from an established product
- use of advertising to inform consumers that a new or improved product or service is available and to persuade them to purchase it
- type of promotion using a mailer that usually includes a letter describing the product or service and an order blank or application form
- amount of satisfaction one gets from a good or service
Down
- businesses that purchase large quantities of goods from producers for resale to other businesses
- gatering, recording, and analyzing data about the types of goods and services that people want
- info gathered by researchers about possible users of a product based on such characteristics as age, gender, income, education, and location
- routes by which goods are moved from producers to consumers
- series of stages that a product goes through from first introduction to complete withdrawal from the market
- businesses that sell consumer goods directly to the public
- all activities needed to move goods & services from producers to consumer
15 Clues: amount of satisfaction one gets from a good or service • businesses that sell consumer goods directly to the public • routes by which goods are moved from producers to consumers • all activities needed to move goods & services from producers to consumer • business transactions conducted over computer networks, in particular the World Wide Web • ...
Technology vocabulary 2021-07-06
Across
- an image represented as a Two dimensional array of brightness vales for pixels
- the part of a computer that does most of the data processing
- (computer science) software that controls the execution of computer programs and may provide various services
- a significant word used in indexing or cataloging
- the smallest discrete component of an image on a screen
- crime committed using a computer and the internet
- a coppy of a file por directory on a separate storage device
Down
- a computer program that retrieves documents or files or data from a database or from a computer network (especially from the internet)
- adjusting the parts of something in relaction To each other
- written programs operating on a computer system
- the branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information
- electronic equipment connected by cable to a computer
- having an output that is proportional yo the input
- computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol
- of or relating to a combinatorial system devised by George boole that combines propositions with the logical operatoria AND and OR and IF THEN and EXCEPT and NOT
15 Clues: written programs operating on a computer system • a significant word used in indexing or cataloging • crime committed using a computer and the internet • having an output that is proportional yo the input • electronic equipment connected by cable to a computer • the smallest discrete component of an image on a screen • ...
FINLAYS HARDWARE CROSSWORD 2019-01-10
Across
- CONTROLS THE CURSOR ON THE SCREEN
- STORES COMPUTER DATA
- DEVICE DISPLAYS LOUD SPEAKERS
- A MINI COMPUTER INSIDE A SMALL PHONE
- THE MAIN CIRCUIT BOARD OF A COMPUTER
Down
- A TYPE OF PORT THAT LINKS TO THE COMPUTER
- A CHIP THAT CONTAINS A CPU
- READS TEXT ON PAPER
- LETS YOU STORE MEMORY IN THE COMPUTER
- DATA GIVES DATA TO THE COMPUTER LIKE A MOUSE OR A KEYBOARD
- THE BRAIN OF THE COMPUTER WHERE MOST CALCULATIONS HAPPEN
- LETS YOU FEED DATA TO THE COMPUTER
- A DISPLAY SCREEN
13 Clues: A DISPLAY SCREEN • READS TEXT ON PAPER • STORES COMPUTER DATA • A CHIP THAT CONTAINS A CPU • DEVICE DISPLAYS LOUD SPEAKERS • CONTROLS THE CURSOR ON THE SCREEN • LETS YOU FEED DATA TO THE COMPUTER • A MINI COMPUTER INSIDE A SMALL PHONE • THE MAIN CIRCUIT BOARD OF A COMPUTER • LETS YOU STORE MEMORY IN THE COMPUTER • A TYPE OF PORT THAT LINKS TO THE COMPUTER • ...
computer vocab 2014-02-09
Across
- items of the same type stored in a hidden or inaccessible place
- Basic Input Output System
- Universal serial bus
- It is a software that anyone can edit
- a workstation on a network that gains access to central data files, programs, and peripheral devices through a server.
- The collection of software that directs a computer's operations,controlling and scheduling the execution of other programs.
- an arrangement of conducting elements, as resistors,capacitors, or instructors, connected by conducting wire.
- Random access memory
- The programs used to direct the operation of a computer
- Central processing unit
- adjacent bits, usually eight, processed by a computer as a unit
- A disk drive containing a hard disk
- Read only memory
- A code that identifies a computer network
- Domain name system
- Different search engines used for the internet
Down
- Small or compact enough to fit or be used on a desk
- Internet-based computing in which large groups of remote servers aren't worked
- Failure to act
- uniform resource locator
- a system of representing letters, numbers, or other characters, using binary notation
- Pertaining to a peripheral
- It as all computers in one area hooked up to the one server
- A board that other boards that contain the basics of a computer.
- The mechanical, magnetic, disk drives, CPU, and etc.
- A computer based tool used for search
- Internet Service Provider
- It track who visits their webpage and tells you the address of the computer
- To restart the computer
29 Clues: Failure to act • Read only memory • Domain name system • Universal serial bus • Random access memory • Central processing unit • To restart the computer • uniform resource locator • Basic Input Output System • Internet Service Provider • Pertaining to a peripheral • A disk drive containing a hard disk • It is a software that anyone can edit • A computer based tool used for search • ...
Software Puzzel 2022-04-24
Across
- network that is designed to block unauthorized access while permitting outward communication.
- code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- Stores programs and data and retains its information even when the power is turned off.
- The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials.
- a bridge between two networks so that data can be transferred between a number of computers
- The part of a computer that controls and performs all its operations.
- A small picture on a computer screen that represents a function that can be opened.
- Computer hardware disk was first introduced in 1956 by
- a Unix-like OS composed entirely of free software
Down
- when your program has good syntax but there is a mistake in the order of the statements
- When a program displays a message and pauses for the user to type some input to the program.
- Reads the source code of the program as written by programmers
- is not a core data type in Python programming
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Founder of bluetooth.
- A little application that gets downloaded to your computer along with a web page.
- Software program that manages one/more virtual machines
- data sent to your computer by a Web server that records your actions on a certain Web site
- The density of pixels described in pixels per inch.
- Bhatkar Father of Supercomputing
20 Clues: Founder of bluetooth. • Bhatkar Father of Supercomputing • is not a core data type in Python programming • a Unix-like OS composed entirely of free software • The density of pixels described in pixels per inch. • Computer hardware disk was first introduced in 1956 by • Software program that manages one/more virtual machines • ...
Software Puzzle 2022-04-24
Across
- when your program has good syntax but there is a mistake in the order of the statements
- Computer hardware disk was first introduced in 1956 by
- Founder of bluetooth.
- is not a core data type in Python programming
- Software program that manages one/more virtual machines
- The density of pixels described in pixels per inch.
- data sent to your computer by a Web server that records your actions on a certain Web site
- A little application that gets downloaded to your computer along with a web page.
- a Unix-like OS composed entirely of free software
- a bridge between two networks so that data can be transferred between a number of computers
Down
- A small picture on a computer screen that represents a function that can be opened.
- The part of a computer that controls and performs all its operations.
- Reads the source code of the program as written by programmers
- network that is designed to block unauthorized access while permitting outward communication.
- code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- When a program displays a message and pauses for the user to type some input to the program.
- Stores programs and data and retains its information even when the power is turned off.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Bhatkar Father of Supercomputing
- The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials.
20 Clues: Founder of bluetooth. • Bhatkar Father of Supercomputing • is not a core data type in Python programming • a Unix-like OS composed entirely of free software • The density of pixels described in pixels per inch. • Computer hardware disk was first introduced in 1956 by • Software program that manages one/more virtual machines • ...
CrossWord_Puzzle 1 2022-04-24
Across
- network that is designed to block unauthorized access while permitting outward communication.
- The density of pixels described in pixels per inch.
- Software program that manages one/more virtual machines
- A small picture on a computer screen that represents a function that can be opened.
- when your program has good syntax but there is a mistake in the order of the statements
- The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials.
- The part of a computer that controls and performs all its operations.
- Bhatkar Father of Supercomputing
Down
- Reads the source code of the program as written by programmers
- a Unix-like OS composed entirely of free software
- A little application that gets downloaded to your computer along with a web page.
- Founder of bluetooth.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Stores programs and data and retains its information even when the power is turned off.
- data sent to your computer by a Web server that records your actions on a certain Web site
- When a program displays a message and pauses for the user to type some input to the program.
- code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- is not a core data type in Python programming
- Computer hardware disk was first introduced in 1956 by
- a bridge between two networks so that data can be transferred between a number of computers
20 Clues: Founder of bluetooth. • Bhatkar Father of Supercomputing • is not a core data type in Python programming • a Unix-like OS composed entirely of free software • The density of pixels described in pixels per inch. • Computer hardware disk was first introduced in 1956 by • Software program that manages one/more virtual machines • ...
Crossword_1 2022-04-24
Across
- Father of Supercomputing
- network that is designed to block unauthorized access while permitting outward communication.
- Computer hardware disk was first introduced in 1956 by
- Reads the source code of the program as written by programmers
- A small picture on a computer screen that represents a function that can be opened.
- The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials.
- Founder of bluetooth.
- Software program that manages one/more virtual machines
- Stores programs and data and retains its information even when the power is turned off.
- When a program displays a message and pauses for the user to type some input to the program.
Down
- A little application that gets downloaded to your computer along with a web page.
- code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- is not a core data type in Python programming
- when your program has good syntax but there is a mistake in the order of the statements
- a bridge between two networks so that data can be transferred between a number of computers
- a Unix-like OS composed entirely of free software
- The density of pixels described in pixels per inch.
- data sent to your computer by a Web server that records your actions on a certain Web site
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- The part of a computer that controls and performs all its operations.
20 Clues: Founder of bluetooth. • Father of Supercomputing • is not a core data type in Python programming • a Unix-like OS composed entirely of free software • The density of pixels described in pixels per inch. • Computer hardware disk was first introduced in 1956 by • Software program that manages one/more virtual machines • ...
PC PRO Key Terms Chapter 1 2020-09-24
Across
- A proprietary closed-source, operating system.
- An open source operating system.
- A custom version of Linux.
- Instructions or data that are stored electronically, either on a hard drive or a special chip.
- The features or programs included with an operating system that perform system-related tasks.
- Hierarchical File System.
- The ability to run multiple parts of an application simultaneously.
- The core of the operating system that is loaded into memory when the system boots up.
- The ability to run multiple applications simultaneously.
- The physical components that compose a computer system or network.
- The practice of connecting two or more computers in order to transfer data.
Down
- The ability to use multiple processing devices.
- What allows the user to interact with the kernel and the utilities.
- A type of computer program that enables the operating system to interact with hardware devices.
- The movement of data or commands to the internal computer hardware.
- The process of the computer presenting, displaying, or otherwise giving data.
- The flow of data through a series of procedures as defined by a set of instructions.
- Devices that contain non-volatile memory for saving or maintaining data.
- A set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware.
- A subclass computer program that is designed for end users.
- A command line interface.
21 Clues: Hierarchical File System. • A command line interface. • A custom version of Linux. • An open source operating system. • A proprietary closed-source, operating system. • The ability to use multiple processing devices. • The ability to run multiple applications simultaneously. • A subclass computer program that is designed for end users. • ...
Digital Literacy Exam Review 2024-05-06
Across
- greeting of the letter
- specifies the size of the characters
- address of person receiving the letter
- when you press enter to begin a new line while typing is a ____ return
- computer that delivers requested webpages to your computer
- two inch top margin is ______ single spaces
- any hardware component that allows you to enter data
- type of computer that can be found in a smart watch
- email messages which are personal information scams
- reference initials in a letter belong to the _____
Down
- number of times you hit enter after complimentary closing
- not an example of an output device
- a page break you force into a document
- body of a letter is typed ______spaced
- space between complimentary closing and writers identification
- when all lines of a letter begin on the left margin it is typed in ____ style
- what it is called when you keep typing until the computer returns itself
- references in a report are ______ spaced
- address that appears first in a letter
- reports are typed ________ spaced
- when you keep typing and computer returns itself
21 Clues: greeting of the letter • reports are typed ________ spaced • not an example of an output device • specifies the size of the characters • a page break you force into a document • body of a letter is typed ______spaced • address of person receiving the letter • address that appears first in a letter • references in a report are ______ spaced • ...
Tech Terms 2025-10-21
Across
- the web address for a specific page or file on the internet
- global network
- a part of a computer system or network which is designed to block unauthorized access
- hypertext markup language
- a multiple of the unit byte for digital information.
- Ctrl+C (Copy)
- a group of binary digits or bits
- provides the logic and instructions for those tasks to be carried out
- the process of transferring a file or data from a remote server
- output device
- performs the tasks
- Ctrl+V (Paste)
Down
- IP
- a system of interlinked hypertext
- software intentionally designed to cause disruption to a computer
- a system for connecting a number of computer systems
- input device
- The process of starting a computer or device from a powered-off state
- Restarting a computer or device that is already powered on.
- are small text files stored on a user's device
- A file format that provides an electronic image of text
- a hardware component that stores and retrieves digital information
- brain
23 Clues: IP • brain • input device • Ctrl+C (Copy) • output device • global network • Ctrl+V (Paste) • performs the tasks • hypertext markup language • a group of binary digits or bits • a system of interlinked hypertext • are small text files stored on a user's device • a system for connecting a number of computer systems • a multiple of the unit byte for digital information. • ...
Chapter 5, "Network Protocols" 2025-03-11
Across
- used to access a Windows computer remotely by using the Windows graphical user interface (GUI)
- a server protocol used to transfer and manage files across a network
- used to monitor and manage network devices and gather statistics about network traffic
- stores name and IP address pairs along with other pertinent DNS data for names that have been resolved recently
- used to connect to a device across a network via a command-line interface
- the data contained in a zone, such as host records, but other resource types can be found in a DNS zone
- the standard protocol for sending e-mail over the internet
- used to send error, status, and control messages between systems or devices
- prevents a destination from becoming overwhelmed by data, resulting in dropped packets
Down
- consists of rules and procedures for communication and behavior or etiquette
- a range of IP addresses the server leases to clients that request an IP address
- connection oriented and designed for reliable transfer of information in complex internetworks
- name-to-address resolution protocol that keeps a list of computer names and their IP addresses
- used to resolve a logical (IP) address to a physical (MAC) address
- an IP address tied to a particular MAC address
- one or more IP addresses excluded from the IP address scope
- allows computers and other devices to contact their primary DNS server whenever their name or address changes.
- when a set of protocols works cooperatively
- the unit of information that the Transport layer works with when TCP
- connectionless and designed for efficient communication of generally small amounts of data
20 Clues: when a set of protocols works cooperatively • an IP address tied to a particular MAC address • the standard protocol for sending e-mail over the internet • one or more IP addresses excluded from the IP address scope • used to resolve a logical (IP) address to a physical (MAC) address • a server protocol used to transfer and manage files across a network • ...
FINLAYS HARDWARE CROSSWORD 2019-01-10
Across
- THE BRAIN OF THE COMPUTER WHERE MOST CALCULATIONS HAPPEN
- STORES COMPUTER DATA
- A DISPLAY SCREEN
- A MINI COMPUTER INSIDE A SMALL PHONE
- LETS YOU STORE MEMORY IN THE COMPUTER
- DEVICE DISPLAYS LOUD SPEAKERS
- THE MAIN CIRCUIT BOARD OF A COMPUTER
Down
- READS TEXT ON PAPER
- A CHIP THAT CONTAINS A CPU
- DATA GIVES DATA TO THE COMPUTER LIKE A MOUSE OR A KEYBOARD
- A TYPE OF PORT THAT LINKS TO THE COMPUTER
- LETS YOU FEED DATA TO THE COMPUTER
- CONTROLS THE CURSOR ON THE SCREEN
13 Clues: A DISPLAY SCREEN • READS TEXT ON PAPER • STORES COMPUTER DATA • A CHIP THAT CONTAINS A CPU • DEVICE DISPLAYS LOUD SPEAKERS • CONTROLS THE CURSOR ON THE SCREEN • LETS YOU FEED DATA TO THE COMPUTER • A MINI COMPUTER INSIDE A SMALL PHONE • THE MAIN CIRCUIT BOARD OF A COMPUTER • LETS YOU STORE MEMORY IN THE COMPUTER • A TYPE OF PORT THAT LINKS TO THE COMPUTER • ...
Computer Basics 2013-09-06
Across
- A worldwide collectin of public networks that are linked to each other for information exchange.
- ISP, a company that provides internet connectivity.
- A group of computers that are connected to share resources and exchange information.
- A computer connected to a network.
- A path or link that connects computers or peripheral devices.
- A sequence of instructions that can be executed by a computer.
- The smallest unit of information that a computer handles.
- A sequence of instructions that a computer can execute.
- The process by which a computer system validates a user's logon information.
- The unit of data measurement equal to 1,024 MB.
Down
- The unit of data measurement that is equal to 1,024 GB.
- A network that connects devices within a limited area, sucah a home or small group of offices.
- An on-screen work area that uses a combination of menus and icons.
- The unite of data measurement that is equal to 1,024 bytes.
- WAN, a network that connects devices geographically separated areas.
- A guide that takes the user through each step of a particular task, such as installing hardware and software.
- The primary hardware device that interprets and runs the commands you give to the computer.
- an item of information
- A rectangular area on the monitor that displays a program.
- The unite of data measurement that is equal to 1,024 KB.
- The main computer on a network that provides services to other computers on the network.
- The process by which a user can associate specific permissions to each username.
- A combination of eight bits arranged in sequence.
23 Clues: an item of information • A computer connected to a network. • The unit of data measurement equal to 1,024 MB. • A combination of eight bits arranged in sequence. • ISP, a company that provides internet connectivity. • The unit of data measurement that is equal to 1,024 GB. • The unite of data measurement that is equal to 1,024 KB. • ...
Computers 2023-07-05
Across
- A harmful program that can damage files and disrupt the operation of a computer.
- A digital message sent electronically to communicate with others.
- A device that produces a hard copy of digital documents.
- Programs and applications that run on a computer.
- A portable computer that can be used anywhere.
- An input device that allows you to move the cursor and click on the screen.
- A screen that displays information and images from the computer.
- The physical components of a computer, such as the processor and memory.
Down
- A global network that connects computers and allows communication and access to information.
- A digital document or collection of data stored on a computer.
- A flat and portable device that allows you to interact with the screen using touch.
- A secret code or phrase used to protect access to a computer or account.
- A machine that can perform various tasks and store information.
- An input device used to type letters, numbers, and symbols on a computer.
- A collection of web pages that can be accessed on the internet.
15 Clues: A portable computer that can be used anywhere. • Programs and applications that run on a computer. • A device that produces a hard copy of digital documents. • A digital document or collection of data stored on a computer. • A machine that can perform various tasks and store information. • A collection of web pages that can be accessed on the internet. • ...
BIM Vocab 2024-12-12
Across
- Not permitted; Unlawful.
- One of two or more words or expressions of the same language that have the same or nearly the same meaning in some or all senses.
- A flat usually paper container (as for a letter).
- Computer hardware or software that prevents unauthorized access to private data (as on a company’s local area network or intranet) by outside computer users (as of the internet).
- A private computer network that functions over a public network.
- Social methods (such as phishing) that are used to obtain personal or confidential information which can then be used illicitly.
- The practice of tricking Internet users (as through the use of deceptive email messages or websites) into revealing personal or confidential information which can then be used illicitly.
- A computer program enabling the user to enter or alter text.
- A software that is installed in a computer or mobile device without the user’s knowledge and that transmits information about the user’s activities.
- A book or electronic resource that lists words or groups of synonyms and related concepts.
- For a word processor, a device intended to improve or perfect what is already there.
Down
- The practice of collecting, organizing, storing, and sharing information to support decision making and create value for organizations, communities, and societies.
- A direct or personal written or printed message addressed to a person or organization.
- To mark directions for delivery.
- Measures taken to protect a computer or computer system (as on the internet) against unauthorized access or attack.
- A word of opposite meaning.
- The person sending correspondence.
- To give permission or approval.
- The numeric address of a computer on the internet.
19 Clues: Not permitted; Unlawful. • A word of opposite meaning. • To give permission or approval. • To mark directions for delivery. • The person sending correspondence. • A flat usually paper container (as for a letter). • The numeric address of a computer on the internet. • A computer program enabling the user to enter or alter text. • ...
lesson 24 vocab 2016-04-19
Across
- A combination of hardware and software that creates a buffer between an internal network and the Internet to prevent unauthorized access
- Computer architecture in which all of the computers on a network are equal and there is no computer designated as the server
- An Internet connection technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines
- An ISP that provides connection speeds more than 30 times faster than dial-up connections--from 384 kbps to 2.0 Mbps
- Link from one computer to another through which data can be transmitted
- A computer that uses the services of another program
- A series of connected personal computers, workstations, and other devices, such as printers or scanners, within a confined space, such as an office building
- High-end programs designed to provide network control and include special functions for connecting computers and other devices into a network
- A server that acts as an intermediary between a user and the Internet
- A type of security measures where it matches a biometric entry originally stored in the system to gain access to a secure area.
Down
- Computer configuration in which one or more computers on the network acts as a server
- The world's collection of interconnected commercial and government-owned voice-oriented systems
- A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitized voice channel
- A computer that handles requests for data, e-mail, file transfers, and other network services from other computers
- A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car. Stands for Worldwide Interoperability for Microwave Access
- Computer network that covers a large geographical area. Most WANs are made up of several connected LANs
- Expert computer user who invades someone else's computer either for personal gain or simply for the satisfaction of being able to do it
- A network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
- A device on the network
- A variation of a LAN that uses no physical wires
- A device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination
- A device that uses coaxial cable to send and receive data
- A network configuration that allows selected outside organizations to access internal information systems
- Communications hardware device that facilitates the transmission of data
- A junction where information arrives from connected computers or peripheral devices and is then forwarded in one or more directions to other computers and devices
25 Clues: A device on the network • A variation of a LAN that uses no physical wires • A computer that uses the services of another program • A device that uses coaxial cable to send and receive data • A server that acts as an intermediary between a user and the Internet • Link from one computer to another through which data can be transmitted • ...
Software Puzzel 2022-04-24
Across
- when your program has good syntax but there is a mistake in the order of the statements
- Computer hardware disk was first introduced in 1956 by
- Founder of bluetooth.
- is not a core data type in Python programming
- Software program that manages one/more virtual machines
- The density of pixels described in pixels per inch.
- data sent to your computer by a Web server that records your actions on a certain Web site
- A little application that gets downloaded to your computer along with a web page.
- a Unix-like OS composed entirely of free software
- a bridge between two networks so that data can be transferred between a number of computers
Down
- A small picture on a computer screen that represents a function that can be opened.
- The part of a computer that controls and performs all its operations.
- Reads the source code of the program as written by programmers
- network that is designed to block unauthorized access while permitting outward communication.
- code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- When a program displays a message and pauses for the user to type some input to the program.
- Stores programs and data and retains its information even when the power is turned off.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Bhatkar Father of Supercomputing
- The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials.
20 Clues: Founder of bluetooth. • Bhatkar Father of Supercomputing • is not a core data type in Python programming • a Unix-like OS composed entirely of free software • The density of pixels described in pixels per inch. • Computer hardware disk was first introduced in 1956 by • Software program that manages one/more virtual machines • ...
PC PRO: Chapter1 Key Terms 2020-09-24
Across
- A proprietary closed-source, operating system.
- An open source operating system.
- A custom version of Linux.
- Instructions or data that are stored electronically, either on a hard drive or a special chip.
- The features or programs included with an operating system that perform system-related tasks.
- Hierarchical File System.
- The ability to run multiple parts of an application simultaneously.
- The core of the operating system that is loaded into memory when the system boots up.
- The ability to run multiple applications simultaneously.
- The physical components that compose a computer system or network.
- The practice of connecting two or more computers in order to transfer data.
Down
- The ability to use multiple processing devices.
- What allows the user to interact with the kernel and the utilities.
- A type of computer program that enables the operating system to interact with hardware devices.
- The movement of data or commands to the internal computer hardware.
- The process of the computer presenting, displaying, or otherwise giving data.
- The flow of data through a series of procedures as defined by a set of instructions.
- Devices that contain non-volatile memory for saving or maintaining data.
- A set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware.
- A subclass computer program that is designed for end users.
- A command line interface.
21 Clues: Hierarchical File System. • A command line interface. • A custom version of Linux. • An open source operating system. • A proprietary closed-source, operating system. • The ability to use multiple processing devices. • The ability to run multiple applications simultaneously. • A subclass computer program that is designed for end users. • ...
BIM Vocab 2024-12-12
Across
- Not permitted; Unlawful.
- One of two or more words or expressions of the same language that have the same or nearly the same meaning in some or all senses.
- A flat usually paper container (as for a letter).
- Computer hardware or software that prevents unauthorized access to private data (as on a company’s local area network or intranet) by outside computer users (as of the internet).
- A private computer network that functions over a public network.
- Social methods (such as phishing) that are used to obtain personal or confidential information which can then be used illicitly.
- The practice of tricking Internet users (as through the use of deceptive email messages or websites) into revealing personal or confidential information which can then be used illicitly.
- A computer program enabling the user to enter or alter text.
- A software that is installed in a computer or mobile device without the user’s knowledge and that transmits information about the user’s activities.
- A book or electronic resource that lists words or groups of synonyms and related concepts.
- For a word processor, a device intended to improve or perfect what is already there.
Down
- The practice of collecting, organizing, storing, and sharing information to support decision making and create value for organizations, communities, and societies.
- A direct or personal written or printed message addressed to a person or organization.
- To mark directions for delivery.
- Measures taken to protect a computer or computer system (as on the internet) against unauthorized access or attack.
- A word of opposite meaning.
- The person sending correspondence.
- To give permission or approval.
- The numeric address of a computer on the internet.
19 Clues: Not permitted; Unlawful. • A word of opposite meaning. • To give permission or approval. • To mark directions for delivery. • The person sending correspondence. • A flat usually paper container (as for a letter). • The numeric address of a computer on the internet. • A computer program enabling the user to enter or alter text. • ...
Vocab Choice Board 2025-09-17
Across
- System that manages a computer's hardware and software
- The part of a computer that processes information and controls operations
- A computers physical storage device
- Random Access Memory
- Computer storage device
Down
- string of characters that identifies each computer using the Internet
- Allows all the part of the computer to communicate with one another
- The physical part of the computer
- External add ons to a computer
- The connection of multiple devices through the internet
- The global computer network
- Computers that provide services to other devices
- Connects peripheral devices to computers
13 Clues: Random Access Memory • Computer storage device • The global computer network • External add ons to a computer • The physical part of the computer • A computers physical storage device • Connects peripheral devices to computers • Computers that provide services to other devices • System that manages a computer's hardware and software • ...
Chemicals 2017-10-02
Across
- fits to container, unstable
- Fits to container slightly unstable form
- any two or more things mixed together
- change an irreversible change done to something
- purest form of matter
- purification through some sort of straining to separate physically
- A chemically bonded mixture of 2 or more types of matter
- mixture a mixture of 2 or more types of substances where all chemical properties are kept
- change a reversible change done to something
- the thing that makes up everything that is matter - smallest piece
Down
- Atoms in their most stable form
- Carbon after under extreme pressure
- Modern day writing utensils utilize it
- purification of a liquid through heat
- smallest grouping of chemicals
- mixture a mixture that is the same throughout
- a responding force to an action
- a physically bonded substance of 2 or more types of matter
- a mixture of 2 metals
- substance a substance with no contaminants
- physical objects, opposite of energy
21 Clues: a mixture of 2 metals • purest form of matter • fits to container, unstable • smallest grouping of chemicals • Atoms in their most stable form • a responding force to an action • Carbon after under extreme pressure • physical objects, opposite of energy • purification of a liquid through heat • any two or more things mixed together • Modern day writing utensils utilize it • ...
Hairs and fibers crossword 2012-10-31
Across
- Pigment granules that gives hair its color.
- Outside covering of hair.
- This is made of fibers.
- Hair that is dying and ready to fall out.
- This gives hair its shape.
- Fibers are what kind of evidence?
- acetate Cellulose chemically altered to create a new compound.
- Specific product of substance by body processes.
- most frequently found evidence at a crime scene.
- Inside layer running down the center of the cortex.
- Curly is the cross section for...
- This is an example of Artificial fibers.
Down
- Hair that is actively growing.
- There is how many types of hairs?
- This and Artificial are two types of fibers.
- What's another name for Artificial fibers?
- This is one of the three basic patterns of hair.
- Fusi Air spaces, usually found near the root.
- This Tissue is attached to DNA.
- Vegetable fiber; strong and flexible.
- There is how many types of fibers?
- filaments what fibers are made out of.
- Hair is not growing.
23 Clues: Hair is not growing. • This is made of fibers. • Outside covering of hair. • This gives hair its shape. • Hair that is actively growing. • This Tissue is attached to DNA. • There is how many types of hairs? • Fibers are what kind of evidence? • Curly is the cross section for... • There is how many types of fibers? • Vegetable fiber; strong and flexible. • ...
Chapter 11: Distributing and Marketing 2014-12-01
Across
- routes by which goods are moved from producers to consumers
- businesses that purchase large quantities of goods from producers for resale to other businesses
- offering a product for sale in a small area for a limited period of time to see how well it sells before offering it nationally
- gatering, recording, and analyzing data about the types of goods and services that people want
- info gathered by researchers about possible users of a product based on such characteristics as age, gender, income, education, and location
- series of stages that a product goes through from first introduction to complete withdrawal from the market
- all activities needed to move goods & services from producers to consumer
- amount of satisfaction one gets from a good or service
Down
- practice of setting prices close to those charged by other companies selling similar products
- the role of the consumer as ruler of the market when determining the types of goods and services produced
- businesses that sell consumer goods directly to the public
- selling a new product at a low price to attract customers away from an established product
- type of promotion using a mailer that usually includes a letter describing the product or service and an order blank or application form
- business transactions conducted over computer networks, in particular the World Wide Web
- use of advertising to inform consumers that a new or improved product or service is available and to persuade them to purchase it
15 Clues: amount of satisfaction one gets from a good or service • businesses that sell consumer goods directly to the public • routes by which goods are moved from producers to consumers • all activities needed to move goods & services from producers to consumer • business transactions conducted over computer networks, in particular the World Wide Web • ...
Tech crosswords 2023-11-02
Across
- displays information on screen for any device
- hand/arrow on your screen
- an icon that points to a program or data file
- when pressed in conjunction with another key, performs a special operation
- A digital device you can work on or play
- clicking your computer mouse button twice
- to keep and store something on the internet
- data sort
- a type of file that was created or saved by an application
- allows you to display information in a form of a election side show
Down
- the act of pressing a computer mouse button
- something you can store stuff in
- a document that stores data in a grid
- to use something if you cant see your screen fully
- a bar that spans the bottom of a screen
- a set of options presented to the user of a computer application to help them
- a small graphical representation of a program or file
- a computer file that contains an encoded sequence of instructions
- to drag icons and other objects on your screen
- gets a computer up and running
20 Clues: data sort • hand/arrow on your screen • gets a computer up and running • something you can store stuff in • a document that stores data in a grid • a bar that spans the bottom of a screen • A digital device you can work on or play • clicking your computer mouse button twice • the act of pressing a computer mouse button • to keep and store something on the internet • ...
AI - TERMINOLOGY 2022-06-18
Across
- are made with an intext of accomplishing tasks which either too tedious for humans or are time consuming.
- Rahul is excellent in publishing articles on blog .this ability refer to
- aim is to achieve 17SDGs by the end of.
- intelligence
- is doing problem scoping . she is not familiar with the term used for the people who face the problem and would be benefited from the solution. who are they .
- _ is Anamoly in the output of machine learning algorithms which could be due to prejudiced assumptions made during developing algorithm and training data .
- intelligence
Down
- to man -made does not occur naturally.
- domain of Ai uses scientific methods , processes, algorithms and system to extract knowledge from different types of data ?
- bias
- one odd example of computer vision.
- science
- many goals have been announced by united Nation?
- rani intelligent in performing calculations and logical reasoning. This ability refers to .
14 Clues: bias • science • intelligence • intelligence • one odd example of computer vision. • to man -made does not occur naturally. • aim is to achieve 17SDGs by the end of. • many goals have been announced by united Nation? • Rahul is excellent in publishing articles on blog .this ability refer to • ...
Computer 2 2024-09-08
Across
- Code - The system of representing numbers, letters, and other characters using only two digits, 0 and 1.
- Systems - Master programs that manage the hardware and software resources of a computer.
- - The set of instructions that directs the hardware to perform specific tasks.
- Architecture - The way a computer system is designed and how its components interact.
- Languages - Languages used to write instructions for a computer to perform tasks.
- Math - The study of mathematical structures that are fundamentally discrete rather than continuous.
- Structures - Organized ways to store and access data in a computer.
- - The process of connecting computers to share information and resources.
Down
- Devices - Devices that allow users to enter data into a computer.
- - Step-by-step instructions used to solve a problem or perform a task.
- Devices - Devices that display or print data from a computer.
- Systems - Computer systems designed to perform specific tasks with limited flexibility.
- Engineering - The application of engineering principles to design and build computing systems.
- Design - The design of digital circuits using Boolean algebra and logic gates.
- - The physical components of a computer system.
15 Clues: - The physical components of a computer system. • Devices - Devices that display or print data from a computer. • Devices - Devices that allow users to enter data into a computer. • Structures - Organized ways to store and access data in a computer. • - Step-by-step instructions used to solve a problem or perform a task. • ...
Computer 2020-10-26
Across
- Heart of computer
- creates images on monitor
- responsible for starting your computer
- supplies power
- any device that allows data to be entered
- brain of computer
- you use this to type
Down
- allows you to connect to the internet
- holds info while computer is off
- holds data and software
- the result of the process is displayed
- lost when the computer is shut off
- creates sound through speakers
- responsible for graphics
- uses a laser to read cds and disks
15 Clues: supplies power • Heart of computer • brain of computer • you use this to type • holds data and software • responsible for graphics • creates images on monitor • creates sound through speakers • holds info while computer is off • lost when the computer is shut off • uses a laser to read cds and disks • allows you to connect to the internet • the result of the process is displayed • ...
Week 19 - MindTap Vocabulary Review 2024-01-04
Across
- A program designed to make users more productive and/or assist them with personal tasks.
- A tool that reorganizes the files and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and apps run faster.
- A business transaction that occurs over an electronic network such as the Internet. Short for electronic commerce.
- Any hardware component that allows you to enter data and instructions into a computer or mobile device.
- The trend of computers and devices with technologies that overlap can result in consumers needing fewer devices for the functionality they require.
- Tool that shrinks the size of a file(s).
- A compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider.
- A device that uses electrical components to provide a stable current flow and minimize the chances of an overvoltage reaching the computer and other electronic equipment.
- A security tool that detects and protects a personal computer and its data from unauthorized intrusions.
Down
- Number system that has just two unique digits, 0 and 1, called bits.
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- Any hardware component that conveys information from a computer or mobile device to one or more people.
- A technology-related health condition that affects eyesight.
- Someone who accesses a computer or network illegally.
- A website or web app sometimes called a curation website, that allows users to collect and compile content from a variety of websites.
- A small text file that a web server stores on your computer.
- The code of acceptable behaviors users should follow while on the Internet. Short for Internet etiquette.
- A website development approach that adapts the layout of a website to fit the screen on which it is being displayed.
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
- Someone who demands payment to stop an attack on an organization’s technology infrastructure.
- A website that encourages its members in its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.
- The number of horizontal and vertical pixels in a display device.
- A computer that delivers requested webpages to your computer or mobile device.
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- Practices that involve reducing electricity and environmental waste while using computers, mobile devices, and related technologies.
- Area of memory that stores the contents of frequently used data or instructions.
- A collection of computers and mobile devices connected, often wirelessly, via communications devices and transmission media.
27 Clues: Tool that shrinks the size of a file(s). • Someone who accesses a computer or network illegally. • A technology-related health condition that affects eyesight. • A small text file that a web server stores on your computer. • The number of horizontal and vertical pixels in a display device. • Number system that has just two unique digits, 0 and 1, called bits. • ...
Chapter 11: Distributing and Marketing 2014-12-01
Across
- amount of satisfaction one gets from a good or service
- routes by which goods are moved from producers to consumers
- the role of the consumer as ruler of the market when determining the types of goods and services produced
- offering a product for sale in a small area for a limited period of time to see how well it sells before offering it nationally
- info gathered by researchers about possible users of a product based on such characteristics as age, gender, income, education, and location
- all activities needed to move goods & services from producers to consumer
- businesses that purchase large quantities of goods from producers for resale to other businesses
- series of stages that a product goes through from first introduction to complete withdrawal from the market
- practice of setting prices close to those charged by other companies selling similar products
- selling a new product at a low price to attract customers away from an established product
Down
- use of advertising to inform consumers that a new or improved product or service is available and to persuade them to purchase it
- business transactions conducted over computer networks, in particular the World Wide Web
- gatering, recording, and analyzing data about the types of goods and services that people want
- type of promotion using a mailer that usually includes a letter describing the product or service and an order blank or application form
- businesses that sell consumer goods directly to the public
15 Clues: amount of satisfaction one gets from a good or service • businesses that sell consumer goods directly to the public • routes by which goods are moved from producers to consumers • all activities needed to move goods & services from producers to consumer • business transactions conducted over computer networks, in particular the World Wide Web • ...
Computer Terms Review 2016-05-27
Across
- A component that receives data from the computer for processing
- The type of software needed to access the internet
- The main circuit board on any computer
- An electronic machine that can be programmed
- Physical components of a computer
Down
- A type of device that sends information into a computer to be processed
- The worldwide network of computers
- The type of software that you use when looking for something on the internet.
- The primary storage device of any computer
- RAM Random Access ______
- The brains of a computer
- A web site's address
- The language used in designing Web Sites
13 Clues: A web site's address • RAM Random Access ______ • The brains of a computer • Physical components of a computer • The worldwide network of computers • The main circuit board on any computer • The language used in designing Web Sites • The primary storage device of any computer • An electronic machine that can be programmed • The type of software needed to access the internet • ...
Computer Viruses 11 2018-12-06
15 Clues: A message • a girl name • ancient troy • starts with my • computer locker • self replicating • named after drink • program of computer • made for cyberwarfare • infection on computer • a good summer activity • named after a greek god • most virulent computer virus • looking back on old memories • Distributed Denial of Service
CrossWord_Puzzle 1 2022-04-24
Across
- network that is designed to block unauthorized access while permitting outward communication.
- When a program displays a message and pauses for the user to type some input to the program.
- The part of a computer that controls and performs all its operations.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Bhatkar Father of Supercomputing
- The density of pixels described in pixels per inch.
- Software program that manages one/more virtual machines
- a Unix-like OS composed entirely of free software
- Stores programs and data and retains its information even when the power is turned off.
- Computer hardware disk was first introduced in 1956 by
Down
- code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials.
- a bridge between two networks so that data can be transferred between a number of computers
- Reads the source code of the program as written by programmers
- when your program has good syntax but there is a mistake in the order of the statements
- Founder of bluetooth.
- A little application that gets downloaded to your computer along with a web page.
- A small picture on a computer screen that represents a function that can be opened.
- is not a core data type in Python programming
- data sent to your computer by a Web server that records your actions on a certain Web site
20 Clues: Founder of bluetooth. • Bhatkar Father of Supercomputing • is not a core data type in Python programming • a Unix-like OS composed entirely of free software • The density of pixels described in pixels per inch. • Computer hardware disk was first introduced in 1956 by • Software program that manages one/more virtual machines • ...
Computer Terminology 2021-11-26
Across
- Internal memory storage whose contents can be retrieved and altered by the user.
- a device that allows one computer to connect another computer and transfer data over.
- a way to simply connect your other devices and electronics to your computer.
- equal to a character and is formed by 8 bytes.
- a portion of the screen that can contain its own documents or messages.
- main board of a computer containing the primary components to process information.
Down
- where all the main information is stored in a computer.
- non-conductive material where computer microprocessor and other electronic components.
- a measure of storage that equals 1 million bytes.
- Television-like output device that displays information on a screen.
- a compact disk that stores a large amount of data.
- a measure of storage that equals 1 million bytes.
- The smallest bit of information on a computer.
- a small, manual device that controls the movement of the cursor on a computer display.
- The smallest unit of information in a computer.
15 Clues: equal to a character and is formed by 8 bytes. • The smallest bit of information on a computer. • The smallest unit of information in a computer. • a measure of storage that equals 1 million bytes. • a measure of storage that equals 1 million bytes. • a compact disk that stores a large amount of data. • where all the main information is stored in a computer. • ...
computer technology 2022-04-26
Across
- Main board of a computer containing the primary components to process information.
- The smallest unit of information in a computer
- Non-conductive material where computer microprocessor and other electronic components
- monitor Television-like output device that displays information on a screen
- Equal to a character and is formed by 8 bytes.
- Compact disk that stores a large amount of data
- A measure of storage that equals 1 million bytes.
- A portion of the screen that can contain its own documents or messages.
Down
- There all the main information is stored in the computer.
- A measure of storage that equals 1 billion bytes.
- A device that allows one computer to connect another computer and transfer data over
- A way to simply connect your other devices and electronics to your computer.
- Internal memory storage whose contents can be retrieved and altered by the user.
- Small, manual device that controls the movement of the cursor on a computer display.
14 Clues: The smallest unit of information in a computer • Equal to a character and is formed by 8 bytes. • Compact disk that stores a large amount of data • A measure of storage that equals 1 billion bytes. • A measure of storage that equals 1 million bytes. • There all the main information is stored in the computer. • ...
Computer language , Browsing safely 2025-06-12
Across
- protects computer
- fooling email
- Language used by computer
- prevent unauthorised entry in computer
- unethical hackers
- criminal activities in computer
- Illegal entry in computer
Down
- misleading email
- online befriending
- Prevents virus
- hacks computer
- Illegal method of getting money
- bullying someone using computer
13 Clues: fooling email • Prevents virus • hacks computer • misleading email • protects computer • unethical hackers • online befriending • Language used by computer • Illegal entry in computer • Illegal method of getting money • bullying someone using computer • criminal activities in computer • prevent unauthorised entry in computer
Crossword Computing 2022-04-27
Across
- A coding language which we are doing at school.
- A value of 1024 cubed bytes.
- A binary value of 0 or 1.
- a value of 4 bits.
- Carries out the instruction in a CPU
- When you are doing a binary shift to the left.
- A device in the CPU which calculates all the logical decisions and calculations.
- A programming language that computer's use.
- A type of storage that has moving parts.
- Inspects the instruction and works out what it is that needs doing in a CPU.
- An interface which is based on commands and code.
- A defined list of characters, recognized by a computer.
- a non-volatile memory storage in a computer.
- A number format which humans use.
- A value of 1024 to the power of 5 bytes.
Down
- Memory that is used when the RAM is full.
- An act that helps you keep your computer protected.
- A computer with a dedicated purpose.
- An item you can physically touch and feel.
- A value of 1024 bytes.
- A type of storage that is thin lightweight and portable.
- A software that helps take care of your computer.
- Fetching the instruction given by the user from the main memory (RAM)in a CPU.
- a device that reads and writes data.
- A volatile memory storage in a computer.
- A value of 1o24 to the power of 4 bytes.
- A storage device in a computer that is very fast.
- A method to make items take up less storage.
- A value of 1024 squared bytes.
- a value of 8 bits
30 Clues: a value of 8 bits • a value of 4 bits. • A value of 1024 bytes. • A binary value of 0 or 1. • A value of 1024 cubed bytes. • A value of 1024 squared bytes. • A number format which humans use. • A computer with a dedicated purpose. • Carries out the instruction in a CPU • a device that reads and writes data. • A type of storage that has moving parts. • ...
Computers 2023-07-05
Across
- A device that produces a hard copy of digital documents.
- A collection of web pages that can be accessed on the internet.
- Programs and applications that run on a computer.
- A flat and portable device that allows you to interact with the screen using touch.
- An input device that allows you to move the cursor and click on the screen.
- The physical components of a computer, such as the processor and memory.
- A portable computer that can be used anywhere.
- A harmful program that can damage files and disrupt the operation of a computer.
Down
- An input device used to type letters, numbers, and symbols on a computer.
- A digital document or collection of data stored on a computer.
- A machine that can perform various tasks and store information.
- A secret code or phrase used to protect access to a computer or account.
- A screen that displays information and images from the computer.
- A global network that connects computers and allows communication and access to information.
- A digital message sent electronically to communicate with others.
15 Clues: A portable computer that can be used anywhere. • Programs and applications that run on a computer. • A device that produces a hard copy of digital documents. • A digital document or collection of data stored on a computer. • A machine that can perform various tasks and store information. • A collection of web pages that can be accessed on the internet. • ...
Business Key Terms 2021-04-06
Across
- A family of personal computers designed, manufactured, and sold by Apple Inc.
- A high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line.
- The application of psychological and physiological principles to the engineering and design of products, processes, and systems.
- The unauthorized use or reproduction of another's work.
- A small, portable personal computer with a "clamshell" form factor, typically having a thin LCD or LED computer screen mounted on the inside of the upper lid of the clamshell.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- Also called a central processor, main processor or just processor, is the electronic circuitry within a computer that executes instructions that make up a computer program.
- A type of non-volatile memory used in computers and other electronic devices. Data cannot be electronically modified after the manufacture of the memory device.
Down
- A collection of instructions and data that tell the computer how to work.
- Includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.
- A computer connected to a network of other workstations called “clients”. Client computers request information from the server over the network. Tends to have more storage, memory and processing power than a normal workstation.
- A networking device that forwards data packets between computer networks. Performs the traffic directing functions on the Internet.
- A person who organizes and operates a business or businesses, taking on greater than normal financial risks in order to do so.
- A multi-purpose computer whose size, capabilities, and price make it feasible for individual use. Abbreviated.
- The highest-ranking person in a company or other institution, ultimately responsible for making managerial decisions.
16 Clues: The unauthorized use or reproduction of another's work. • A collection of instructions and data that tell the computer how to work. • A family of personal computers designed, manufactured, and sold by Apple Inc. • A multi-purpose computer whose size, capabilities, and price make it feasible for individual use. Abbreviated. • ...
IT CROSSWORD 2024-06-10
Across
- _______ connects all the components of a computer.
- _______ is used for connecting peripheral devices to a computer.
- _______ established the most successful computer software company.
- ________ is a popular social networking app that allows users to share photos and videos with their friends and followers.
- What does GPT stand for in Chat GPT.
- Fidelity What does Wi-Fi stand for ?
- _______ to manage computer hardware and software resources and provide common services for computer programs.
- What is the purpose of an SSD in a computer?
Down
- What is the full form of URL.
- Who developed the first computer mouse ?
- What does GUI stand for ?
- Network What does VPN stand for ?
- Who is credited with inventing the World Wide Web?
- What does LAN stand for ?
- _______ is networking device that forwards data packets between computer networks.
15 Clues: What does GUI stand for ? • What does LAN stand for ? • What is the full form of URL. • What does GPT stand for in Chat GPT. • Who developed the first computer mouse ? • Network What does VPN stand for ? • What is the purpose of an SSD in a computer? • _______ connects all the components of a computer. • Who is credited with inventing the World Wide Web? • ...
Lesson 24 Crossword 2015-04-15
Across
- Computer architecture in which all of the computers on a network are equal and there is no computer designated as the server
- A junction where information arrives from connected computers or peripheral devices and is then forwarded in one or more directions to other computers and devices.
- A computer that uses the services of another program
- A network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
- A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car. Stands for Worldwide Interoperability for Microwave Access.
- An Internet connectinon technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines.
- server that acts as an intermediary between a user and the Internet
- An ISP that provides connection speeds more than 30 times faster than dial-up connections--from 384 kbps to 2.0 Mbps
- A variation of a LAN that uses no physical wires.
- A series of connected personal computers, workstations, and other devices, such as printers or scanners, within a confined space, such as an office building
- Computer configuration in which one or more computers on the network acts as a server
- A combination of hardware and software that creates a buffer between an internal network and the Internet to prevent unauthorized access.
Down
- A device on the network
- The world's collection of interconnected commercial and government-owned voice-oriented systems
- Expert computer user who invades someone else's computer either for personal gain or simply for the satisfaction of being able to do it.
- security measures A type of security measures where it matches a biometric entry originally stored in the system to gain access to a secure area.
- A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitized voice channel
- Computer network that covers a large geographical area. Most WANs are made up of several connected LANs.
- A network configuration that allows selected outside organizations to access internal information systems
- High-end programs designed to provide network control and include special functions for connecting computers and other devices into a network.
- The largest network used as a communication tool.
- A computer that handles requests for data, e-mail, file transers, and other network services from other computers (clients).
- Link from one computer to another through which data can be transmitted.
- Communications hardware device that facilitates the transmission of data
- A device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination
- Modem A device that uses coaxial cable to send and receive data.
26 Clues: A device on the network • The largest network used as a communication tool. • A variation of a LAN that uses no physical wires. • A computer that uses the services of another program • Modem A device that uses coaxial cable to send and receive data. • server that acts as an intermediary between a user and the Internet • ...
Sofia Acero Virus 2019-11-06
Across
- Messages passed between computers through networks
- Information on a computer
- Virus that modifies computer system
- Type of virus named after Greek myth
- Infects a host and connects back to a central server
- Virus sent through email with just a text file that said “love-letter-for-you.txt”
- Programs used on a computer
- Unwanted software installed on your computer without your consent
Down
- Software designed to damage a computer
- Sending email pretending to be from a company to trick people into giving up personal information
- Computer that holds a virus
- Software that protects your computer against viruses
- Distributed Denial of Service
- Flaw in a computer that causes it to behave unexpectedly
- Virus that multiplies itself
15 Clues: Information on a computer • Computer that holds a virus • Programs used on a computer • Virus that multiplies itself • Distributed Denial of Service • Virus that modifies computer system • Type of virus named after Greek myth • Software designed to damage a computer • Messages passed between computers through networks • Software that protects your computer against viruses • ...
Computers and more 2019-01-15
Across
- A copy of files from a computer’s hard disk, usually made on some external medium such as CD-ROM or flash drive
- A cheap, outdated, removable disk used for storing or transferring information.
- A unit of information that is either 0 or 1
- An electronic book that can be downloaded and read on a computer or other device
- software A program that finds and removes viruses from a computer
- mail Messages sent from one computer to another. You can see the email on the screen or print it out.
- Usually means the information (text, pictures, audio, etc.) that you create or share on a computer
- a piece of information stored on your computer about internet documents that you have looked at
Down
- A (small) defect or fault in a program
- A self-contained program or piece of software, especially when downloadable on a mobile device
- The PC becomes ready for use by getting the necessary information into its memory
- A small program that tells a PC how a peripheral works
- A specific computer record. It can contain data such as texts (e.g. essay.doc), or a program such as paint.exe.
- a program like Firefox or Internet Explorer. You use it to view or browse the Internet.
- The original system used for PCs; you had to type in commands instead of pointing and clicking.
- A way of communicating wirelessly over short distances between electronic devices
- A subdivision of a computer’s hard disk where files are stored
- Central Processing Unit. This is a PC's heart or ‘brains’. It controls the other parts of the computer.
- An area or type of computer memory in which information that is often in use can be stored temporarily and got to especially quickly
19 Clues: A (small) defect or fault in a program • A unit of information that is either 0 or 1 • A small program that tells a PC how a peripheral works • A subdivision of a computer’s hard disk where files are stored • software A program that finds and removes viruses from a computer • A cheap, outdated, removable disk used for storing or transferring information. • ...
Computers and more 2019-01-15
Across
- A unit of information that is either 0 or 1
- An electronic book that can be downloaded and read on a computer or other device
- A copy of files from a computer’s hard disk, usually made on some external medium such as CD-ROM or flash drive
- Messages sent from one computer to another. You can see the email on the screen or print it out.
- Usually means the information (text, pictures, audio, etc.) that you create or share on a computer
- A small program that tells a PC how a peripheral works
- A way of communicating wirelessly over short distances between electronic devices
- Central Processing Unit. This is a PC's heart or ‘brains’. It controls the other parts of the computer.
- software A program that finds and removes viruses from a computer
Down
- A specific computer record. It can contain data such as texts (e.g. essay.doc), or a program such as paint.exe.
- An area or type of computer memory in which information that is often in use can be stored temporarily and got to especially quickly
- A self-contained program or piece of software, especially when downloadable on a mobile device
- A subdivision of a computer’s hard disk where files are stored
- A (small) defect or fault in a program
- The PC becomes ready for use by getting the necessary information into its memory
- a program like Firefox or Internet Explorer. You use it to view or browse the Internet.
- A cheap, outdated, removable disk used for storing or transferring information.
- a piece of information stored on your computer about internet documents that you have looked at
- The original system used for PCs; you had to type in commands instead of pointing and clicking.
19 Clues: A (small) defect or fault in a program • A unit of information that is either 0 or 1 • A small program that tells a PC how a peripheral works • A subdivision of a computer’s hard disk where files are stored • software A program that finds and removes viruses from a computer • A cheap, outdated, removable disk used for storing or transferring information. • ...
CS crossword 2022-05-11
Across
- short for internet service provider.
- a high-speed, high-capacity digital connection which forms the axis of a local or wide area network
- a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.
- Domain Name System
- a device for making and breaking the connection in an electric circuit.
- optic consisting of or using thin flexible fibres with a glass core through which light signals can be sent with very little loss of strength.
- the rate at which someone or something moves or operates or is able to move or operate
- an instruction to a computer to provide information or perform another function.
- a node that broadcasts data to every computer or Ethernet-based device connected to it.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
- a desktop computer or workstation that is capable of obtaining information and applications from a
- the length of the space between two points.
- the delay before a transfer of data begins following an instruction for its transfer.
- a computer or computer program which manages access to a centralized resource or service in a network.
Down
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- a unit of information equal to one thousand million (109) or (strictly) 230 bits.
- copy (data) from one computer system to another, typically over the internet.
- copper made up of two insulated copper wires that are twisted together
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- protect (a network or system) from unauthorized access with a firewall.
- server a computer system or router that functions as a relay between client and server
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.
- control a cloud computing model that stores data on the Internet
- a device which forwards data packets to the appropriate parts of a computer network.
- a range of frequencies within a given band, in particular that used for transmitting a signal.
- email.
- situated, occurring, or done below the sea or the surface of the sea.
28 Clues: email. • Domain Name System • short for internet service provider. • the length of the space between two points. • control a cloud computing model that stores data on the Internet • situated, occurring, or done below the sea or the surface of the sea. • copper made up of two insulated copper wires that are twisted together • ...
Tech Terms and Acronyms 2023-05-19
Across
- To load and initialise the operating system of a computer or other device
- Short-range wireless communication technology
- A communications technology whereby a single wire can carry more than one type of signal at once
- A microprocessor that performs many functions and calculations that make a computer function
- The method by which users access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
- Measures designed to protect a computer, device, or network from Cybercrime
- A computer that handles requests for data, email, file transfers, and other network services from other computers
- Can't stop laughing
- Hyper-text markup language
- A technology that allows computers and other devices to communicate via a wireless signal
- A device that allows computers to transmit information to each other
- Today I learnt
- A conventional method of transmitting data
- A type of digital subscriber line broadband technology that is used to connect to the Internet
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
Down
- The "brains" of a computer, responsible for performing tasks and calculations
- A link to a particular web page that is saved in the browser
- A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
- Portable document format
- A software programme that allows you to surf the web
- A type of software that allows users to create 2D and 3D design modelling
- A set of interconnected networks that allow computers in different locations to exchange information
- Uniform resource locator
- A document or other file that is sent along with an email
- Any type of illegal activity that is undertaken on a computer
- A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
- A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
- To compress and archive files into a (one) smaller size
- Direct message
- Unsolicited email messages sent for marketing purposes
- General term for a software programme that has been designed to harm other computers
- A way of sending messages over the Internet
- Referring to the storing and accessing of data and programmes over the Internet instead of another type of hard drive
- Random access memory
34 Clues: Direct message • Today I learnt • Can't stop laughing • Random access memory • Portable document format • Uniform resource locator • Hyper-text markup language • A conventional method of transmitting data • A way of sending messages over the Internet • Short-range wireless communication technology • A software programme that allows you to surf the web • ...
Practice Test 3 2024-12-11
Across
- Data sent across the internet
- The first section of an IP address
- Internet through radio waves
- Random Access Memory
- Internet through electrical pulses
- Physical parts of a computer
- Sends signals to the computer
- The second section of an IP address
Down
- Stack of computer that connect to internet
- People who take care of the internet
- The type of network of the internet
- Internet through light waves
- Receives signals from computer
- The last section of an IP address
- Device that cools the servers
- Domain Name System
16 Clues: Domain Name System • Random Access Memory • Internet through light waves • Internet through radio waves • Physical parts of a computer • Data sent across the internet • Device that cools the servers • Sends signals to the computer • Receives signals from computer • The last section of an IP address • The first section of an IP address • Internet through electrical pulses • ...
Sarah Maria D. Ramirez Types of Computer 2024-08-17
Across
- Computers that serve data to other computers
- Computers that work with continuous data
- Process data in binary form
- Also known as programs or applications
- Extremely powerful computer
Down
- Tangible parts of a computer
- Combination of both analog and digital computers
- Refers to the computer user
- Smaller and less powerful laptops
- Larger than smartphones
10 Clues: Larger than smartphones • Refers to the computer user • Process data in binary form • Extremely powerful computer • Tangible parts of a computer • Smaller and less powerful laptops • Also known as programs or applications • Computers that work with continuous data • Computers that serve data to other computers • Combination of both analog and digital computers
Computer Viruses 11 2018-12-06
15 Clues: A message • a girl name • ancient troy • starts with my • computer locker • self replicating • named after drink • program of computer • infection on computer • made for cyberwarfare • a good summer activity • named after a greek god • looking back on old memories • most virulent computer virus • Distributed Denial of Service
FINLAYS HARDWARE CROSSWORD 2019-01-10
Across
- DATA GIVES DATA TO THE COMPUTER LIKE A MOUSE OR A KEYBOARD
- THE MAIN CIRCUIT BOARD OF A COMPUTER
- THE BRAIN OF THE COMPUTER WHERE MOST CALCULATIONS HAPPEN
- A MINI COMPUTER INSIDE A SMALL PHONE
- A TYPE OF PORT THAT LINKS TO THE COMPUTER
- CONTROLS THE CURSOR ON THE SCREEN
- STORES COMPUTER DATA
Down
- A DISPLAY SCREEN
- A CHIP THAT CONTAINS A CPU
- LETS YOU FEED DATA TO THE COMPUTER
- DEVICE DISPLAYS LOUD SPEAKERS
- READS TEXT ON PAPER
- LETS YOU STORE MEMORY IN THE COMPUTER
13 Clues: A DISPLAY SCREEN • READS TEXT ON PAPER • STORES COMPUTER DATA • A CHIP THAT CONTAINS A CPU • DEVICE DISPLAYS LOUD SPEAKERS • CONTROLS THE CURSOR ON THE SCREEN • LETS YOU FEED DATA TO THE COMPUTER • THE MAIN CIRCUIT BOARD OF A COMPUTER • A MINI COMPUTER INSIDE A SMALL PHONE • LETS YOU STORE MEMORY IN THE COMPUTER • A TYPE OF PORT THAT LINKS TO THE COMPUTER • ...
Abby's Computer Viruses 2017-11-27
Across
- Computer worm that affects Windows computers in 2004
- Software that is intended to damage computers
- short for Distributed Denial of Service
- Gain unauthorized access to data
- Secretly allows viruses in
- Programs used by a computer
- Unwanted computer software on your computer
- A message distributed by electronic devices
Down
- Claims to be a virus cleaner but infects your computer
- A virus that sends a fake love letter
- A virus that replicates itself
- Disables a number of safeguards in word 97' and 2000
- A false warning about computer viruses
- An electronic device for storing and processing data
- Controls systems such as industrial power plants
15 Clues: Secretly allows viruses in • Programs used by a computer • A virus that replicates itself • Gain unauthorized access to data • A virus that sends a fake love letter • A false warning about computer viruses • short for Distributed Denial of Service • Unwanted computer software on your computer • A message distributed by electronic devices • ...
iNPUT AND OUTPUT 2022-02-04
Across
- HARD DRIVE IS A _____________ DEVICE
- AN OUTPUT DEVICE THAT SHOWS OUTPUT ON SCREEN
- DEVICES USED TO FEED DATA TO THE COMPUTER
- STORAGE DEVICE THAT CAN BE USED TO TRANSFER DATA FROM ONE PLACE TO ANOTHER WITH EASE
- A POINTING INPUT DEVICE NAMED AFTER A ANIMAL
- BRAIN OF THE COMPUTER
- AN INPUT DEVICE THAT IS USED TO RECORD VOICE ON THE COMPUTER
- PHYSICAL EQUIPMENTS ATTACHED TO THE COMPUTER AR CALLED ____________
- WHAT DO LAPTOPS USE INSTEAD OF MOUSE?
Down
- AN INPUT DEVICE THAT CAN CONVERT PRINTED TEXT/ IMAGES INTO COMPUTER FILES
- WHAT DO TABLET OR TOUCH DEVICES USE INSTEAD OF ?MOUSE?
- THE MAIN CIRCUIT BOARD OF THE COMPUTER
- A TYPE OF DEVICE THAT SHOWS THE PROCESSED information
- AN OUTPUT DEVICE THAT PRODUCES OUTPUT ON PAPER
- AN INPUT DEVICE THAT CAN BE ATTACHED TO COMPUTER TO PLAY GAMES
15 Clues: BRAIN OF THE COMPUTER • HARD DRIVE IS A _____________ DEVICE • WHAT DO LAPTOPS USE INSTEAD OF MOUSE? • THE MAIN CIRCUIT BOARD OF THE COMPUTER • DEVICES USED TO FEED DATA TO THE COMPUTER • AN OUTPUT DEVICE THAT SHOWS OUTPUT ON SCREEN • A POINTING INPUT DEVICE NAMED AFTER A ANIMAL • AN OUTPUT DEVICE THAT PRODUCES OUTPUT ON PAPER • ...
Malware 2023-03-27
Across
- A vulnerability in a computer system or application that can be used by attackers to gain unauthorized access or execute malicious code
- Criminal activity that involves the use of a computer or the internet
- A type of malware that can hide its existence or activities from users and security programs
- A network of computers that have been infected with malware and are controlled by a remote attacker
- A malicious program that disguises itself as a legitimate software
- Malware that encrypts files or data on a computer or device and demands payment in exchange for the decryption key
- The harmful or malicious part of a malware program
- A method of tricking people into giving away sensitive information, such as usernames, passwords, or credit card numbers
- Advertisements that pop up on a computer or device while using the internet
Down
- The use of codes and ciphers to protect information and communications from unauthorized access or modification
- Software that collects information about a user's activities or personal information without their knowledge or consent
- A type of malware that can self-replicate and spread without human intervention
- A type of malware that records keystrokes made on a computer or device
- A secret method of bypassing normal authentication or gaining unauthorized access to a computer or device
- A self-replicating program that can infect a computer or device and spread to other computers or devices
- Software designed to harm or exploit a computer system or network
- A computer or device that has been infected with malware and can be controlled remotely by an attacker
17 Clues: The harmful or malicious part of a malware program • Software designed to harm or exploit a computer system or network • A malicious program that disguises itself as a legitimate software • Criminal activity that involves the use of a computer or the internet • A type of malware that records keystrokes made on a computer or device • ...
Lesson 24 vocabulary 2015-04-15
Across
- Computer configuration in which one or more computers on the network acts as a server
- A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car. Stands for Worldwide Interoperability for Microwave Access
- A type of security measures where it matches a biometric entry originally stored in the system to gain access to a secure area.
- An Internet connectinon technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines
- A computer that uses the services of another program
- Communications hardware device that facilitates the transmission of data
- A server that acts as an intermediary between a user and the Internet
- A junction where information arrives from connected computers or peripheral devices and is then forwarded in one or more directions to other computers and devices
- An ISP that provides connection speeds more than 30 times faster than dial-up connections--from 384 kbps to 2.0 Mbps
- A network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
- Expert computer user who invades someone else's computer either for personal gain or simply for the satisfaction of being able to do it
- A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitized voice channel
Down
- A device on the network
- A variation of a LAN that uses no physical wires
- Link from one computer to another through which data can be transmitted
- A device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination
- Computer network that covers a large geographical area. Most WANs are made up of several connected LANs
- A device that uses coaxial cable to send and receive data.
- A series of connected personal computers, workstations, and other devices, such as printers or scanners, within a confined space, such as an office building
- The world's collection of interconnected commercial and government-owned voice-oriented systems
- A network configuration that allows selected outside organizations to access internal information systems
- High-end programs designed to provide network control and include special functions for connecting computers and other devices into a network
- A combination of hardware and software that creates a buffer between an internal network and the Internet to prevent unauthorized access
- A computer that handles requests for data, e-mail, file transers, and other network services from other computers (clients)
- Computer architecture in which all of the computers on a network are equal and there is no computer designated as the server
25 Clues: A device on the network • A variation of a LAN that uses no physical wires • A computer that uses the services of another program • A device that uses coaxial cable to send and receive data. • A server that acts as an intermediary between a user and the Internet • Link from one computer to another through which data can be transmitted • ...
Computers and more 2019-01-15
Across
- A (small) defect or fault in a program
- An area or type of computer memory in which information that is often in use can be stored temporarily and got to especially quickly
- An electronic book that can be downloaded and read on a computer or other device
- Usually means the information (text, pictures, audio, etc.) that you create or share on a computer
- a program like Firefox or Internet Explorer. You use it to view or browse the Internet.
- software A program that finds and removes viruses from a computer
- A subdivision of a computer’s hard disk where files are stored
- mail Messages sent from one computer to another. You can see the email on the screen or print it out.
- A cheap, outdated, removable disk used for storing or transferring information.
- The PC becomes ready for use by getting the necessary information into its memory
Down
- A specific computer record. It can contain data such as texts (e.g. essay.doc), or a program such as paint.exe.
- A unit of information that is either 0 or 1
- a piece of information stored on your computer about internet documents that you have looked at
- A self-contained program or piece of software, especially when downloadable on a mobile device
- The original system used for PCs; you had to type in commands instead of pointing and clicking.
- A small program that tells a PC how a peripheral works
- A way of communicating wirelessly over short distances between electronic devices
- A copy of files from a computer’s hard disk, usually made on some external medium such as CD-ROM or flash drive
- Central Processing Unit. This is a PC's heart or ‘brains’. It controls the other parts of the computer.
19 Clues: A (small) defect or fault in a program • A unit of information that is either 0 or 1 • A small program that tells a PC how a peripheral works • A subdivision of a computer’s hard disk where files are stored • software A program that finds and removes viruses from a computer • A cheap, outdated, removable disk used for storing or transferring information. • ...
Informatics Crossword 2022-12-21
Across
- Where you put your stuff when you run out of room
- I am made of electronic parts
- I remember new things but forget the old stuff
- It is the name of a single square in an excel sheet
- It looks like a human, but is made of electronic parts
- I am considered as the long-term memory of the computer
- You can use me to calculate your grades
- Device that stores, processes, and retrieves data
- you can download it and run it on a phone or computer
- The type of the characters used when typing
- I am 1 unit larger than the gigabyte
Down
- You use me to create presentations
- It makes the text look inclined
- I am a unit of measure for the storage
- Android, IOS, Windows.
- Without me the computer cannot start
- It makes the text look heavy
- I control everything in the computer
- It is all the applications you use
19 Clues: Android, IOS, Windows. • It makes the text look heavy • I am made of electronic parts • It makes the text look inclined • You use me to create presentations • It is all the applications you use • Without me the computer cannot start • I control everything in the computer • I am 1 unit larger than the gigabyte • I am a unit of measure for the storage • ...
Informatics Crossword 2022-12-21
Across
- I control everything in the computer
- I am made of electronic parts
- I am considered as the long-term memory of the computer
- It looks like a human, but is made of electronic parts
- Device that stores, processes, and retrieves data
- you can download it and run it on a phone or computer
- Where you put your stuff when you run out of room
- I am 1 unit larger than the gigabyte
- You can use me to calculate your grades
Down
- It is all the applications you use
- You use me to create presentations
- It makes the text look heavy
- Android, IOS, Windows.
- The type of the characters used when typing
- Without me the computer cannot start
- I am a unit of measure for the storage
- I remember new things but forget the old stuff
- It makes the text look inclined
- It is the name of a single square in an excel sheet
19 Clues: Android, IOS, Windows. • It makes the text look heavy • I am made of electronic parts • It makes the text look inclined • It is all the applications you use • You use me to create presentations • I control everything in the computer • Without me the computer cannot start • I am 1 unit larger than the gigabyte • I am a unit of measure for the storage • ...
All About PDF Files 2025-11-02
Across
- Saving a file from the internet or a website onto your computer or device
- A tool that changes other file types (like Word documents) into PDF format
- An electronic tool such as a computer, tablet, smartphone, or laptop
- Looking at or reading a document without making any changes to it
- Software used to access the internet (like Chrome, Firefox, Safari, Edge)
- Easy to send or give to other people (PDFs are shareable because anyone can open them)
- The way information is arranged or organized; also refers to the type of file (like PDF format or Word format)
- The way text, images, and layout appear in a document, including fonts, spacing, and page structure
Down
- The letters after the dot in a filename (like .pdf, .docx) that indicate the file type
- Special areas in a PDF where you can type information, such as your name and address, and save your changes
- Software that allows you to open and read PDF files, such as Adobe Reader
- The window that appears when you choose to print, where you can select printer options or save as PDF
- Making changes to a document, such as adding, deleting, or modifying text and images
- The automatic or standard setting that a program uses unless you change it (e.g., Word's default file format is .docx)
- To keep something the same or protect it from being changed (PDFs preserve formatting)
- To set up software or a program on your computer so you can use it
- Portable Document Format - a file format that preserves document formatting across different devices and platforms
17 Clues: Looking at or reading a document without making any changes to it • To set up software or a program on your computer so you can use it • An electronic tool such as a computer, tablet, smartphone, or laptop • Saving a file from the internet or a website onto your computer or device • Software that allows you to open and read PDF files, such as Adobe Reader • ...
Unit 4 Vocabulary 2024-10-18
Across
- an electronic machine that is used for playing games on a screen
- a set of computers that are connected to each other so that they can share information
- if a battery charges, or if you charge it, it takes in and stores electricity
- a special room or building in which a scientist does tests or prepares substances
- to get better after an illness, accident, shock etc
- to search for information on a computer or on the Internet
- a substance that is not a solid or a gas, for example water or milk
- happening once a year
- something important that you succeed in doing by your own efforts
- something that you give or do in order to help something be successful
- an amount (of money)
- someone who is receiving medical treatment from a doctor or in a hospital
- a substance used in chemistry or produced by a chemical process
- a sudden clear understanding of something or part of something, especially a complicated situation or idea
- a machine or tool that does a special job
Down
- a piece of written work that is stored on a computer
- to add (new software) to a computer so that it is ready to be used
- a machine for controlling a games console, that is small enough to hold in your hand when you use it
- any one of the buttons that you press on a computer keyboard to operate the computer
- to move information on a computer screen up or down so that you can read it
- a substance such as air, which is not solid or liquid, and usually cannot be seen
- the part of a television or computer where the picture or information appears
- to move (information or programs) from a computer network to a small computer
- a world that is made, done, seen etc on a computer, rather than the real world
- to use and control (a machine or equipment)
- an organisation that has a particular purpose such as scientific or educational work, or the building where this organisation is based
- very small living things, some of which cause illness or disease
- information on a computer that you store under a particular name
- the power that is carried by wires, cables etc, and is used to provide light or heat, to make machines work etc
- the place in a computer email program where new messages arrive
- a firm object or substance that has a fixed shape, not a gas or liquid
- a group of people who have been chosen to work together to do a particular job
- to be formed from one or more things or people
33 Clues: an amount (of money) • happening once a year • a machine or tool that does a special job • to use and control (a machine or equipment) • to be formed from one or more things or people • to get better after an illness, accident, shock etc • a piece of written work that is stored on a computer • to search for information on a computer or on the Internet • ...
CS crossword 2022-05-11
Across
- short for internet service provider.
- a high-speed, high-capacity digital connection which forms the axis of a local or wide area network
- a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.
- Domain Name System
- a device for making and breaking the connection in an electric circuit.
- optic consisting of or using thin flexible fibres with a glass core through which light signals can be sent with very little loss of strength.
- the rate at which someone or something moves or operates or is able to move or operate
- an instruction to a computer to provide information or perform another function.
- a node that broadcasts data to every computer or Ethernet-based device connected to it.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
- a desktop computer or workstation that is capable of obtaining information and applications from a
- the length of the space between two points.
- the delay before a transfer of data begins following an instruction for its transfer.
- a computer or computer program which manages access to a centralized resource or service in a network.
Down
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- a unit of information equal to one thousand million (109) or (strictly) 230 bits.
- copy (data) from one computer system to another, typically over the internet.
- copper made up of two insulated copper wires that are twisted together
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- protect (a network or system) from unauthorized access with a firewall.
- server a computer system or router that functions as a relay between client and server
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.
- control a cloud computing model that stores data on the Internet
- a device which forwards data packets to the appropriate parts of a computer network.
- a range of frequencies within a given band, in particular that used for transmitting a signal.
- email.
- situated, occurring, or done below the sea or the surface of the sea.
28 Clues: email. • Domain Name System • short for internet service provider. • the length of the space between two points. • control a cloud computing model that stores data on the Internet • situated, occurring, or done below the sea or the surface of the sea. • copper made up of two insulated copper wires that are twisted together • ...
CS crossword 2022-05-11
Across
- short for internet service provider.
- a high-speed, high-capacity digital connection which forms the axis of a local or wide area network
- a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.
- Domain Name System
- a device for making and breaking the connection in an electric circuit.
- optic consisting of or using thin flexible fibres with a glass core through which light signals can be sent with very little loss of strength.
- the rate at which someone or something moves or operates or is able to move or operate
- an instruction to a computer to provide information or perform another function.
- a node that broadcasts data to every computer or Ethernet-based device connected to it.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
- a desktop computer or workstation that is capable of obtaining information and applications from a
- the length of the space between two points.
- the delay before a transfer of data begins following an instruction for its transfer.
- a computer or computer program which manages access to a centralized resource or service in a network.
Down
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- a unit of information equal to one thousand million (109) or (strictly) 230 bits.
- copy (data) from one computer system to another, typically over the internet.
- copper made up of two insulated copper wires that are twisted together
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- protect (a network or system) from unauthorized access with a firewall.
- server a computer system or router that functions as a relay between client and server
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.
- control a cloud computing model that stores data on the Internet
- a device which forwards data packets to the appropriate parts of a computer network.
- a range of frequencies within a given band, in particular that used for transmitting a signal.
- email.
- situated, occurring, or done below the sea or the surface of the sea.
28 Clues: email. • Domain Name System • short for internet service provider. • the length of the space between two points. • control a cloud computing model that stores data on the Internet • situated, occurring, or done below the sea or the surface of the sea. • copper made up of two insulated copper wires that are twisted together • ...
LARE 2025-11-05
Across
- What does Section 3 test for?
- The LARE has multiple question types including multiple choice, drag-and-drop, and ___.
- The organization that administers the LARE (acronym).
- T/F The LARE is only in-person.
- In what order do you have to complete the LARE sections?
Down
- Whether in-person or not, the LARE is conducted via ___.
- What does the “R” in LARE stand for?
- Term describing the study of water movement on a site.
- ___ and Fill is the process of removing dirt from part of the site and reusing it elsewhere on site.
- A passing score is based on ___ scoring.
10 Clues: What does Section 3 test for? • T/F The LARE is only in-person. • What does the “R” in LARE stand for? • A passing score is based on ___ scoring. • The organization that administers the LARE (acronym). • Term describing the study of water movement on a site. • Whether in-person or not, the LARE is conducted via ___. • ...
AE MODULE 7 - CYBER SECURITY 2024-01-29
Across
- Crime that involves a computer and/or a network
- Someone who uses a computer to gain access to systems or networks
- Malicious attempts by hackers to damage, steal, or destroy a computer
- Software that allows an attacker to obtain information on another computer
- Links two or more devices
- Descriptive data that contains information about other data
- In 1988, Robert __________ unleashed a malicious computer program
- Positions ideal for individuals with more than five years of experience
- Web browser feature
- Do not share ____________ across multiple sites
- Internet connection that encrypts traffic from a device to a private network
- software designed to disrupt, damage, or gain unauthorized access to a computer
Down
- Online harassment that uses electronic communication
- Attacker sends fraudulent emails to deceive someone into revealing information
- , Describes the digital environment in which computer networks communicate
- A type of malicious software
- Someone who uses the internet to cause harm to a victim
- ___________ engineering is when an attacker manipulates someone into revealing information
- Software that automatically displays or downloads advertising material
- Store information across pages within the site
- A trail of data intentionally left behind by a user
- Personally identifiable information
- A standalone self-replicating software application that invades and destroys computers
23 Clues: Web browser feature • Links two or more devices • A type of malicious software • Personally identifiable information • Store information across pages within the site • Crime that involves a computer and/or a network • Do not share ____________ across multiple sites • A trail of data intentionally left behind by a user • Online harassment that uses electronic communication • ...
Business Technology Puzzle 2021-03-25
Across
- is any kind of business or commercial transaction that includes sharing information across the internet
- tools, machinery, and other durable equipment
- is an electronic payment system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial institution's website.
- is essentially a live, interactive audio or audio-visual meeting that ensues between geographically dispersed participants.
- refers to the use of recording media to retain data using computers or other devices
- commercial transactions conducted electronically on the internet
- comprises the entire set of programs, procedures, and routines associated with the operation of a computer system
Down
- is a type of online meeting where two or more people engage in a live audio-visual call.
- is the use of computers to aid in the creation, modification, analysis, or optimization of a design.
- is the ever-increasing reliance on information technology by businesses of all types to handle and optimize their business processes
10 Clues: tools, machinery, and other durable equipment • commercial transactions conducted electronically on the internet • refers to the use of recording media to retain data using computers or other devices • is a type of online meeting where two or more people engage in a live audio-visual call. • ...
Tech Terms and Acronyms 2023-05-19
Across
- To load and initialise the operating system of a computer or other device
- Short-range wireless communication technology
- A communications technology whereby a single wire can carry more than one type of signal at once
- A microprocessor that performs many functions and calculations that make a computer function
- The method by which users access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
- Measures designed to protect a computer, device, or network from Cybercrime
- A computer that handles requests for data, email, file transfers, and other network services from other computers
- Can't stop laughing
- Hyper-text markup language
- A technology that allows computers and other devices to communicate via a wireless signal
- A device that allows computers to transmit information to each other
- Today I learnt
- A conventional method of transmitting data
- A type of digital subscriber line broadband technology that is used to connect to the Internet
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
Down
- The "brains" of a computer, responsible for performing tasks and calculations
- A link to a particular web page that is saved in the browser
- A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
- Portable document format
- A software programme that allows you to surf the web
- A type of software that allows users to create 2D and 3D design modelling
- A set of interconnected networks that allow computers in different locations to exchange information
- Uniform resource locator
- A document or other file that is sent along with an email
- Any type of illegal activity that is undertaken on a computer
- A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
- A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
- To compress and archive files into a (one) smaller size
- Direct message
- Unsolicited email messages sent for marketing purposes
- General term for a software programme that has been designed to harm other computers
- A way of sending messages over the Internet
- Referring to the storing and accessing of data and programmes over the Internet instead of another type of hard drive
- Random access memory
34 Clues: Direct message • Today I learnt • Can't stop laughing • Random access memory • Portable document format • Uniform resource locator • Hyper-text markup language • A conventional method of transmitting data • A way of sending messages over the Internet • Short-range wireless communication technology • A software programme that allows you to surf the web • ...
Technical Vocabulary 2024-01-21
Across
- Turning data into a code to prevent unauthorized access.
- A set of rules that allows different software applications to communicate with each other.
- A basic structure for developing software applications.
- A toolkit for developing websites and web apps with ready-to-use design elements.
- A collection of data stored in a computer in an organized way, easily accessible.
- The capacity of a network to transfer data in a certain amount of time.
- Software designed to harm or exploit any programmable device or network.
- The delay experienced in the communication of data over a network.
- Combining different computer systems and software so they work together.
- Creating a digital version of something, like a computer system, within another system.
- A way to send and receive data through the air without using cables.
Down
- Using the internet to store and access data and programs, rather than a computer's hard drive.
- A computer that provides services like websites or emails to other computers on a network.
- Permanent software that is installed on electronic devices.
- Programs that run on a computer and instruct it on what to do.
- Rules that determine how data is sent and received over a network.
- Finding and fixing mistakes or 'bugs' in computer programs.
- Studying data to find patterns and gain useful information.
- A person who operates or interacts with a computer or network.
- A small program that can be added to a webpage or desktop for specific functions.
20 Clues: A basic structure for developing software applications. • Turning data into a code to prevent unauthorized access. • Permanent software that is installed on electronic devices. • Finding and fixing mistakes or 'bugs' in computer programs. • Studying data to find patterns and gain useful information. • Programs that run on a computer and instruct it on what to do. • ...
Coding 2025-01-15
Across
- - the most important software that runs on a computer, managing applications
- - service to other computers, allowing for exchange data (stands for Application Programming Interface)
- - program that turns code into machine code line by line during execution
- - an issue with your code
- - a decimal number
- - a single, simple instruction that a coder can give to a computer
- - software that can run directly on a computer
- - to convert data into a cipher text, usually to prevent unauthorized access
- - a specific way to communicate with the computer, with its own set of instructions
- - to run a program / command
- - program that turns code into machine code at once
- - the set of rules for a specific programming language
Down
- - the information system allowing for information to be shared in a user-friendly manner
- - true or false
- - a way to store information that can be manipulated
- - one specific type of data
- - a resource for storing data on a computer
- - a step-by-step series of instructions for a computer program
- - a whole number
- - a person who writes computer programs
- - to decipher data from cipher into plaintext
- - the programming language to make webpages interactive
- - provides files and services for other computers
- - a list that can hold a specific number of values
- - accesses files on the internet
- - a very common programming language with a easy learning curve
- - a group of letters
27 Clues: - true or false • - a whole number • - a decimal number • - a group of letters • - an issue with your code • - one specific type of data • - to run a program / command • - accesses files on the internet • - a person who writes computer programs • - a resource for storing data on a computer • - to decipher data from cipher into plaintext • ...
REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16
Across
- a method, often secret, of bypassing normal authentication in a product.
- any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- a standalone malware computer program that replicates itself in order to spread to other computers.
- an attempt by hackers to damage or destroy a computer network or system.
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- are small files that Web sites put on your computer hard disk drive when you first visit.
Down
- someone who seeks and exploits weaknesses in a computer system or computer network.
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
- global system of interconnected computer networks that use the Internet protocol suite.
- designed to detect and destroy computer viruses.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- any software program in which advertising banners are displayed while the program is running.
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
19 Clues: designed to detect and destroy computer viruses. • a method, often secret, of bypassing normal authentication in a product. • an attempt by hackers to damage or destroy a computer network or system. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
TECHNOLOGY 2025-08-06
Across
- A wireless internet connection.
- Write using a keyboard.
- Internet storage for your files.
- To send a file to the internet.
- To get a file from the internet.
- To look for something online.
- Watch or listen online without downloading.
- The set of keys used to type on a computer.
Down
- To enter your username and password to access a computer, website, or app.
- Look at websites online.
- Put a program on your device.
- Secret code to enter an account.
- To exit your account or stop using a computer, website, or app.
- A piece of technology like a phone or tablet.
- To install a new version of a program.
- A program you use on your phone or computer.
- A program that can damage your computer.
- To give energy to a battery.
- The part of a device where you see images or text.
19 Clues: Write using a keyboard. • Look at websites online. • To give energy to a battery. • Put a program on your device. • To look for something online. • A wireless internet connection. • To send a file to the internet. • Secret code to enter an account. • Internet storage for your files. • To get a file from the internet. • To install a new version of a program. • ...
REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16
Across
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- a standalone malware computer program that replicates itself in order to spread to other computers.
- any software program in which advertising banners are displayed while the program is running.
- door a method, often secret, of bypassing normal authentication in a product.
- threat refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- someone who seeks and exploits weaknesses in a computer system or computer network.
- global system of interconnected computer networks that use the Internet protocol suite.
- designed to detect and destroy computer viruses.
- security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- are small files that Web sites put on your computer hard disk drive when you first visit.
- an attempt by hackers to damage or destroy a computer network or system.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
19 Clues: designed to detect and destroy computer viruses. • an attempt by hackers to damage or destroy a computer network or system. • door a method, often secret, of bypassing normal authentication in a product. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
virus charlie 2018-11-15
Across
- fake emails
- hacking technique
- an electronic device for storing and processing data
- hacker with bad intentions
- sending or receiving info sent from another computer
- blocks access to computer till money is paid
- software that damages or disables the computer
- unwanted code
Down
- the intentional paralyzing of a computer network by flooding it with data sent simultaneously from many individual computers.
- tester of security systems
- program used by a computer
- the desire to inflict retribution.
- person who uses computers to gain unauthorized access to data.
- program instruction
- self spreading virus
15 Clues: fake emails • unwanted code • hacking technique • program instruction • self spreading virus • tester of security systems • hacker with bad intentions • program used by a computer • the desire to inflict retribution. • blocks access to computer till money is paid • software that damages or disables the computer • an electronic device for storing and processing data • ...
Vocabulary Activity 2021-02-09
Across
- Using digital media tools such as the Internet and cell phones to deliberately and repeatedly hurt, harass or embarrass someone else.
- These can range from installing spyware on a personal computer to attempts to destroy the infrastructure of entire nations.
- The idea that copyright material may be quoted without the need for permission from or payment to the original source, provided that a citation is clearly given and the material quoted is reasonably brief.
- A crime that happens when someone gets the personal information (credit card, social security number, bank account) of another person, usually to steal money.
- A mean spirited message sent to others on the Internet
- Listing the source of specific information you have used for a project or writing assignment.
- A simple face or image, sometimes animated, that expresses an emotion.
- Physical, emotional and mental limits we set to protect ourselves from being manipulated, used, or harmed by others.
- Techniques used by predators to try to gain your trust.
- This attacks a person or group on the basis of attributes such as race, religion, ethnic origin, sexual orientation, disability, or gender. ... In some countries, a victim may seek redress under civil law, criminal law, or both.
- The law forbids virtually all use of handheld gadgets such as phones, tablets, laptop computers and gaming devices while driving. Fines start at $136 for the first offense and $234 for the second, and will be reported to the driver's insurance company (increa$e) and will appear on the driver's record.
- Used to block malicious (bad) programs, such as viruses or malware, from harming your computer.
- Hardware or software that blocks or filters certain types of network traffic from reaching your computer/device.
- A term for the actual computer equipment and computer parts.
Down
- A trail of data you (unintentionally) create while using the Internet. In includes the websites you visit, emails you send, and information you submit to online services...etc. It cannot be edited or deleted. All of the information online about a person either posted by that person or others, intentionally or unintentionally.
- Being a member of and supporting your community and country. This comes with both rights and responsibilities.
- A owner's legal protection to anything they create.
- A license that allows you to decide how other may use your work. You keep your copyright, but allow others to copy and distribute your work provided they give you credit and only follow the conditions you specify.
- Being aware of, sensitive to, and understanding what someone else is feeling or experiencing.
- Defined by your behaviors in the online environment and by the content you post about yourself and others. Tagged photos, blog posts and social networking interactions will all shape how you are perceived by others online and offline, both now and in the future.
- The process of transferring files from a website/Internet location to your personal computer/device.
- Also known as "digital motion sickness," symptoms that range from headaches to woozy feelings can occur when you quickly scroll on your smart phone or watch action-packed video on your screen. The sensation results from a mismatch between sensory inputs.
- A person who accesses computer information without permission.
- Someone who acts in an aggressive, hostile or hurtful way towards others.
- A person who witness the actions of a bully and the reaction of the victim(s), without taking action.
- To annoy someone repeatedly.
- A graphic (picture or image) that you use to represent yourself on the internet.
27 Clues: To annoy someone repeatedly. • A owner's legal protection to anything they create. • A mean spirited message sent to others on the Internet • Techniques used by predators to try to gain your trust. • A term for the actual computer equipment and computer parts. • A person who accesses computer information without permission. • ...
computer science 2020-10-23
Across
- The output might come as visible items on the computer screen, sound and music that you can hear, or printed information on a page.
- a video camera that can be plugged into your computer.
- able to create a very crisp, life-like representation of both text and image on the page. These printers usually produce black and white output only, but some high-end color laser printers are available.
- built-in device that lets you provide the same input.
- These cables are the same that you use to connect your television and cable box.
- allow you to communicate these commands and data to the computer.
- devices that are responsible for providing sound and music output from your computer.
- a device that controls electric current flow in a high vacuum between electrodes to which an electric potential difference has been applied.
- These printers use a traveling "head" that moves back and forth on the paper, building text and images by squirting very small spots of ink.
- each of its keys has only two possible states: on (down) or off (up).
- an electronic visual display used in just about every type of computer.
Down
- USB was designed to standardize the connection of computer peripherals to personal computers, both to communicate and to supply power
- an electronic circuit formed on a small piece of semiconducting material, performing the same function as a larger circuit made from discrete components.
- a small, thin disc that can hold a high volume of information.
- A cursor is the arrow or other icon you see that tracks the mouse position.
- an output device that creates a physical copy of text, documents, or graphics on paper.
- a semiconductor device used to amplify or switch electronic signals and electrical power.
- to understand how to use peripherals when they connect.
- the main form of user input for most desktop and laptop computers.
- A mouse offers a fast and flexible way to interact with a computer program.
- These printers are capable of building three-dimensional physical objects designed on a computer.
- The hardware pieces you can attach to a computer on the outside
22 Clues: built-in device that lets you provide the same input. • a video camera that can be plugged into your computer. • to understand how to use peripherals when they connect. • a small, thin disc that can hold a high volume of information. • The hardware pieces you can attach to a computer on the outside • ...
REVISION 2015-03-23
Across
- A field used to uniquely identify a record in a database
- A method or way of transmitting data without using a physical connection
- Stored as a list of attributes, rather than a bitmap
- 1024 Gigabytes
- When a database contains more than one linked table
- The fastest and most powerful type of computer
- Wide area network
- A check to make sure that an item of data is sensible and allowable
- Programs that are easy to learn are described this way
- A secret code that you use to gain access to a computer
- A stand-alone program which copies or replicates itself in order to spread to other computer systems
- A collection of information held in multimedia form on the internet
- A computer that handles requests for data, email, file transfer and other network services from other computers
Down
- A set of microchips that stores data temporarily lost when the computer is switched off
- A backing storage device which can be use optical media such as CD/DVD/Blu - ray
- Used to hold data being processed
- Compressed video format
- Useful for process that may be followed in a set order, like slides in powerpoint
- A program which can copy or replicate itself and infect other programs or computers
- What separates each part of an HTML document
- When the rules of the programming language are broken this error type occurs
- AN IF statement in a high level language is an example of this type of construct
- Contains rules and conditions which specify what is and is not allowed to pass through
- Small circuit board that is fitted inside a computer system to allow it to communicate with a computer network.
- A type of malware which, when installed on a user's computer collects information about them
25 Clues: 1024 Gigabytes • Wide area network • Compressed video format • Used to hold data being processed • What separates each part of an HTML document • The fastest and most powerful type of computer • When a database contains more than one linked table • Stored as a list of attributes, rather than a bitmap • Programs that are easy to learn are described this way • ...
