types of computer Crossword Puzzles
Spelling lesson 29 2024-04-12
Across
- acting weird
- stop the continuous progress of talking
- "the software industry"
- a computer program used to create and manipulate spreadsheets.
- the way in which a person or group lives.
- a tiny creature
- a movable indicator on a computer
- a combined device for modulation and demodulation
- online shopping
- many of...
Down
- a point where two systems,
- copy from one computer system to the next
- autocorrect
- a computer that is durable for traveling
- an image of a document made by electronic scanning
- tools, machinery, and other durable equipment
- a tiny wafer
- a close family member
- a book to write notes in
- a small place to play video games
20 Clues: many of... • autocorrect • acting weird • a tiny wafer • a tiny creature • online shopping • a close family member • "the software industry" • a book to write notes in • a point where two systems, • a movable indicator on a computer • a small place to play video games • stop the continuous progress of talking • a computer that is durable for traveling • ...
Hardware 2016-11-29
Across
- The device that translates software information into video that a video screen can use.
- The part of the computer which lets you store your data persistently (for a long time / long term).
- This is the thing that makes sound in a computer or any other machine.
- Abbreviated as CPU this is responsible for moving data around the entire computer.
- The device you use to control the cursor / pointer on your computer screen.
- Bad software in your computer that runs underneath other programs which makes it hard to notice what it does or how it travels from computer to computer (across the network).
- The general word for devices that translates software information into a hardware function.
Down
- This is the metaphor used in class to describe Random Access Memory (RAM).
- Bad software that runs on your computer to do things you don't want it to do.
- Abbreviated as RAM and sometimes called the "Memory" of the computer. This is used to store data temporarily to help it move around the computer.
- This is at the bottom of the well, means a large body of stored water, and is a metaphor of the Hard Drive (HD), Solid State Drive (SSD), or Flash Drive, long term storage.
- Long term state; Stays a certain way for a long time.
- The device you use to type words, text, or characters into the computer.
- The device that translates software information into sound that a speaker can use.
- This is the metaphor used in class to represent the Hardware System. It is what farmers use long ago to get water from underground.
- Another word for the video screen.
- This is the metaphor used to represent the Central Processing Unit (CPU) of the computer. It is used to move water to higher places, or to far away places.
17 Clues: Another word for the video screen. • Long term state; Stays a certain way for a long time. • This is the thing that makes sound in a computer or any other machine. • The device you use to type words, text, or characters into the computer. • This is the metaphor used in class to describe Random Access Memory (RAM). • ...
Hardware 2016-11-29
Across
- Bad software that runs on your computer to do things you don't want it to do.
- This is the metaphor used to represent the Central Processing Unit (CPU) of the computer. It is used to move water to higher places, or to far away places.
- The part of the computer which lets you store your data persistently (for a long time / long term).
- This is at the bottom of the well, means a large body of stored water, and is a metaphor of the Hard Drive (HD), Solid State Drive (SSD), or Flash Drive, long term storage.
- The device you use to control the cursor / pointer on your computer screen.
- Abbreviated as CPU this is responsible for moving data around the entire computer.
- Bad software in your computer that runs underneath other programs which makes it hard to notice what it does or how it travels from computer to computer (across the network).
- The device you use to type words, text, or characters into the computer.
Down
- The device that translates software information into video that a video screen can use.
- This is the thing that makes sound in a computer or any other machine.
- Abbreviated as RAM and sometimes called the "Memory" of the computer. This is used to store data temporarily to help it move around the computer.
- This is the metaphor used in class to describe Random Access Memory (RAM).
- The general word for devices that translates software information into a hardware function.
- Long term state; Stays a certain way for a long time.
- The device that translates software information into sound that a speaker can use.
- Another word for the video screen.
- This is the metaphor used in class to represent the Hardware System. It is what farmers use long ago to get water from underground.
17 Clues: Another word for the video screen. • Long term state; Stays a certain way for a long time. • This is the thing that makes sound in a computer or any other machine. • The device you use to type words, text, or characters into the computer. • This is the metaphor used in class to describe Random Access Memory (RAM). • ...
Computer science vocabulary: week 2 2024-08-20
Across
- A list of steps to finish a task
- The area where you drag and drop commands to build your program
- devices like a keyboard, mic, mouse or trackpad
- component that holds memory temporarily until the computer powers off
- “bit”) is the smallest information piece on a computer; either a 1 or 0
- another word for repetition or doing something over and over again
- to break a problem
- An error or mistake in the program
- component that is needed to connect all other components in the computer
- An algorithm that has been coded into something that can be run by a machine
- Programs or apps
Down
- component that holds memory permanently
- the language that tells the computer what to do
- often shortened to “app”-a series of codes that allow specific tasks to happen.
- this causes the computer to do the commands you’ve written
- devices like monitors, speakers and headphones
- Someone who writes code
- the physical hard parts of a computer
- component that processes graphics
19 Clues: Programs or apps • to break a problem • Someone who writes code • A list of steps to finish a task • component that processes graphics • An error or mistake in the program • the physical hard parts of a computer • component that holds memory permanently • devices like monitors, speakers and headphones • the language that tells the computer what to do • ...
Computers 2013-12-18
Across
- basic input output system
- not connected
- cellular device
- a bad piece of code
- organized list of instructions
- performs arithmetic computations
- a way to enter data into a computer
- spreadsheet program
- to line up
- used for 3D apps
- internal storage
- Disk magnetic disk that stores computer data
Down
- handheld device that can access the internet
- Drive memory card
- portable computer
- no wires
- electronic and digital hardware
- a collection of information
- global network
- IC socket
- ports data
- app used to locate web pages
- a device that forwards data
- compressed picture
- designed for net display
- world wide web director
26 Clues: no wires • IC socket • ports data • to line up • not connected • global network • cellular device • used for 3D apps • internal storage • Drive memory card • portable computer • compressed picture • a bad piece of code • spreadsheet program • world wide web director • designed for net display • basic input output system • a collection of information • a device that forwards data • ...
Cyber Ethics Crosswords Puzzle 2025-06-05
Across
- Criminal activity involving computer
- Using others original works
- Unwanted emails from a unknown sources
- Copied and distributed illegally
- Converting encrypted data into readable form
- Appropriately using the Internet
- A type of Spamming
- Sending emails to user to get their information
- A security system
- A criminal practice on social influence
Down
- Attackers send mails to make server full
- Illegal intrusion in a computer system
- Harassing a person in a deliberate manner
- Disrupts normal functioning of a Computer
- Protecting original ideas
- Keep it secret and change periodically
- Set of procedures and moral principles
- Secretly breaks into a computer system
- Convert data into a code
- Prevent Plagiarism
20 Clues: A security system • Prevent Plagiarism • A type of Spamming • Convert data into a code • Protecting original ideas • Using others original works • Copied and distributed illegally • Appropriately using the Internet • Criminal activity involving computer • Illegal intrusion in a computer system • Keep it secret and change periodically • Unwanted emails from a unknown sources • ...
2B Vocabulary Crossword 2026-02-11
Across
- a/an (singular/feminine)
- (computer) keyboard
- (computer) mouse
- the (plural/feminine)
- chair
- desk
- of
- your
- there
- poster
- here
- behind ...(singular/feminine)
- (computer) screen
- on top of...(singular/feminine)
- in front of (singular/masculine)
- pencil sharpener
- There is, There are
- It's a......(singular/masculine)
- the (plural/masculine)
- door
Down
- some (feminine)
- next to, beside ...(singular/masculine)
- clock
- What is this?
- the (singular/feminine)
- flag
- wastepaper basket
- my
- computer
- table
- some (masculine)
- window
- underneath...(singular/feminine)
- a/an (singular/masculine)
- diskette
- backpack
- the (singular/masculine)
- in/on
- Where
39 Clues: my • of • flag • desk • your • here • door • clock • chair • there • table • in/on • Where • poster • window • computer • diskette • backpack • What is this? • some (feminine) • (computer) mouse • some (masculine) • pencil sharpener • wastepaper basket • (computer) screen • (computer) keyboard • There is, There are • the (plural/feminine) • the (plural/masculine) • the (singular/feminine) • a/an (singular/feminine) • ...
Hey, look who actually decided to come to work today 2023-03-23
Across
- (2 words) a common characteristic in some types of sedimentary rock
- the process of sediment being glued together
- the process of sediment being buried and pressed together
- a common characteristic in some types of igneous rock
- (2 words) the substance that holds sedimentary rocks together
Down
- the rock type formed when lava or magma cools and becomes solid
- the movement of sediment from one place to another, often caused by wind or flowing water
- small pieces of rock
- the process of rock broken into smaller pieces due to wind or moving water
- (2 words) everything made of rock: sediment, magma, lava, and all rock types
- the rock type formed when sediment is compacted and cemented
- hot liquid rock above the surface
- the 25th Pokémon
- hot liquid rock below the surface
- one of the many different types of substances that make up rocks
15 Clues: the 25th Pokémon • small pieces of rock • hot liquid rock above the surface • hot liquid rock below the surface • the process of sediment being glued together • a common characteristic in some types of igneous rock • the process of sediment being buried and pressed together • the rock type formed when sediment is compacted and cemented • ...
Semester Test Crossword 2018-01-05
Across
- Online transactions
- Copying someone else's work and calling it your own.
- Showing all of your emotion without holding back online.
- The class you are attending.
- The act of being a decent person online and using the golden rule.
- An online writing platform
- Where the information on your computer is displayed
- Stores that you visit online
- A video made through multiple pictures.
- An alternative to Google Slides.
- Used for presenting projects.
- This college made the first ABC computer in 1942.
- An offline writing platform
Down
- Effect on iMovie.
- A term first used to describe someone who did math for you in 1613.
- Finding hidden code
- The 'brains of the operation' in your computer
- Cools down your computer
- Stores that you physically go to
- Hiding something through code
- A software by Google used to organize or analyze information
- A program used to develop video
- Founder of Appple
- Credit Card number, social security number, bank account
- Cofounder of Apple
25 Clues: Effect on iMovie. • Founder of Appple • Cofounder of Apple • Finding hidden code • Online transactions • Cools down your computer • An online writing platform • An offline writing platform • The class you are attending. • Stores that you visit online • Hiding something through code • Used for presenting projects. • A program used to develop video • Stores that you physically go to • ...
Annika Lau_Crossword 2026-02-04
Across
- it is the standard technology for connecting wired devices into an LAN.
- technology file system it is the primary filling system that newer Windows systems use to organize, store, and find files on internal hard drives.
- it is a small removable flash memory card used for storing data in electronic devices.
- unit the component within a CPU that acts as the “manager” of the computer.
- technology attachment it is a standardized interface which is used to connect storage devices to a computer’s motherboard.
- advanced technology attachment it is the standard hardware interface used to connect storage devices to a computer’s motherboard.
- processing unit it is a specialized circuit designed to quickly manipulate computer memory.
- graphics array it is a connector on a computer that sends video signals so you can see images on a screen.
- definition multimedia interface a standard physical connector and cable used to transmit high-quality video and audio from a source.
- array of independence a hardware system that combines multiple physical hard drives into a single unit to increase performance or protect against data loss.
- input or output system it is the pre-installed software firmware that runs when it’s turned on.
- state drive a type of computer storage that saves data using memory chips.
- interface card a piece of computer hardware that allows a computer, server, or other device to connect to a network.
- crystal display a type of flat-panel screen used in electronics to display text, images, or videos.
Down
- unit interface it is part of any technical document that’s created for a government contract that should be protected because it could release personal information.
- series bus a small device that stores data and plugs into a computer’s USB port.
- function array a type of external data storage that uses flash memory hardware media for data storage.
- only memory a type of computer hardware that stores data permanently, even when the device is turned off.
- processing unit the main hardware component that acts like the “brain” of the computer.
- PC it is a functional computer which is kept in a small compact case.
- it is a tiny computer contained on a single chip.
- logic unit a digital circuit that performs all math calculations on binary data.
- visual interface it is a video hardware connector used to send high-quality video signals.
- access memory a computer’s short term memory.
- disk drive it is a physical storage device used in computers to permanently store digital information.
- a program or code that can attach itself to files or software on a computer. It can be very dangerous to parts of your computer.
26 Clues: it is a tiny computer contained on a single chip. • it is the standard technology for connecting wired devices into an LAN. • access memory a computer’s short term memory. • it is a small removable flash memory card used for storing data in electronic devices. • ...
Directions: Identify the word/words that match the hint below the puzzle. 2023-10-19
Across
- The brain of a computer contains all the circuitry needed to process input, store data, and output results.
- It is your computer or laptop's short-term memory.
- hardware It is a hardware device found inside the system unit of the computer.
- fan A computer case used for active cooling.
- drive It is a hardware component that stores all of your digital content.
- hardware It is the physical part of the computer system. (anything you can see and touch).
- device It is the hardware device that sends data to a computer, allowing you to interact with and control it.
Down
- It is the hardware component of a computer that supplies all other components with power.
- card It is a computer expansion card that generates a feed of graphics output to a display device such as a monitor.
- card It is a computer component responsible for generating and recording audio.
- device It is a piece of computer equipment on which information can be stored.
- hardwareA hardware device that is located outside the computer.
- It is a type of storage medium that permanently stores data on personal computers (PCs) and other electronic devices.
- It is the main printed circuit board (PCB) in a computer. It is a computer's central communications backbone connectivity point, through which all components and external peripherals connect
- device It is a programmable device that stores, retrieves, and processes data.
15 Clues: fan A computer case used for active cooling. • It is your computer or laptop's short-term memory. • hardwareA hardware device that is located outside the computer. • drive It is a hardware component that stores all of your digital content. • device It is a piece of computer equipment on which information can be stored. • ...
Hardware & Software 2020-08-25
Across
- computer chips that store data and programs while the computer is working; often called RAM or Random Access Memory
- system software that acts as a "go-between", allowing computer hardware and other software to communicate with each other
- external hardware used to store and retrieve data, such as a disk drive, CD/DVD drive, flash drive, or tape drive
- a program on a computer that allows the user to create, edit, view, print, rename, copy, or delete files, folders, or an entire file system
- storing data for later use
- allows the user to view or listen to the data a computer processes such as a monitor, printer, headphones, or speakers
Down
- computer software created to allow the user to perform specific a job or task Examples: Word processing, Spreadsheets, Database, and Graphics software
- additional hardware that isn't necessary for a computer to function, but does enhance how the computer can be used Examples: Scanner, Webcam, Computer joystick
- an extension at the end of a file name, indicating which application was used to create a document i.e., Word files end in .doc and Excel files end in .xls
- the action of gaining access to a computer or a network by entering a username and password; also called Login/Sign In
- a feature that allows the user to change the attributes of a file (such as location, file name, or file type) before saving it
- a computer case that contains the CPU, power supply, memory, and storage
- executes commands from a computer's hardware and software; the principal computer chip that contains several processing components, which determines the computer's operating speed; the "brain" of a computer
- software responsible for the general operation of a computer system, including the operation of hardware, running application software, and file management Examples: BIOS, Microsoft Windows, Mac OS X, Linux, or utility software
- data entered into the computer through a variety of devices such as a keyboard, microphone, scanner, flash drive, or mouse
15 Clues: storing data for later use • a computer case that contains the CPU, power supply, memory, and storage • external hardware used to store and retrieve data, such as a disk drive, CD/DVD drive, flash drive, or tape drive • computer chips that store data and programs while the computer is working; often called RAM or Random Access Memory • ...
Hardware 2016-11-29
Across
- Bad software in your computer that runs underneath other programs which makes it hard to notice what it does or how it travels from computer to computer (across the network).
- This is at the bottom of the well, means a large body of stored water, and is a metaphor of the Hard Drive (HD), Solid State Drive (SSD), or Flash Drive, long term storage.
- The device that translates software information into video that a video screen can use.
- Bad software that runs on your computer to do things you don't want it to do.
- This is the metaphor used in class to describe Random Access Memory (RAM).
- Abbreviated as CPU this is responsible for moving data around the entire computer.
- The device you use to control the cursor / pointer on your computer screen.
- The general word for devices that translates software information into a hardware function.
Down
- Abbreviated as RAM and sometimes called the "Memory" of the computer. This is used to store data temporarily to help it move around the computer.
- This is the metaphor used in class to represent the Hardware System. It is what farmers use long ago to get water from underground.
- This is the thing that makes sound in a computer or any other machine.
- The part of the computer which lets you store your data persistently (for a long time / long term).
- Long term state; Stays a certain way for a long time.
- The device you use to type words, text, or characters into the computer.
- The device that translates software information into sound that a speaker can use.
- Another word for the video screen.
- This is the metaphor used to represent the Central Processing Unit (CPU) of the computer. It is used to move water to higher places, or to far away places.
17 Clues: Another word for the video screen. • Long term state; Stays a certain way for a long time. • This is the thing that makes sound in a computer or any other machine. • The device you use to type words, text, or characters into the computer. • This is the metaphor used in class to describe Random Access Memory (RAM). • ...
computing devices 2026-02-18
Across
- Transmission Control Protocol
- a global computer network providing a variety of information
- a device that uses recourses from a sever
- is the fundamental unit of data transmitted
- the transmission capacity of a computer network
- customers access to the Internet
- data, or systems to enhance reliability
- is a fundamental component of the internet infrastructure
- a combined device for modulation and demodulation
- connection for a wireless network device
- a hardware device that connects multiple devices within a network
- process that transforms readable data,
- a networking hardware device
- refers to the intentional duplication of critical components or functions
Down
- high-performance computer system
- high-performance data transmission medium
- is a standardized set of rules
- is a computer or software that provides services
- refers to the time delay between initiating a request for data.
- stands for Local Area Network
- internet protocol laws
- a networking device that connects multiple computer networks
- facility allowing computers, smartphones, or other devices to connect to the internet
23 Clues: internet protocol laws • a networking hardware device • Transmission Control Protocol • stands for Local Area Network • is a standardized set of rules • high-performance computer system • customers access to the Internet • process that transforms readable data, • data, or systems to enhance reliability • connection for a wireless network device • ...
Chemical Reactions 2023-01-24
Across
- the tiny pieces that all matter
- a starting substance that is part of a chemical reaction
- example of rust
- to change the order or position of something
- a group of atoms together
- something that can be observed about a substance, such as color, smell, or boiling point
Down
- temperature at which a substance changes from the solid phase to the liquid phase
- some of this can kill bees
- a structure formed by repeating groups of atoms linked together in a large network
- the relative size of things
- something that is made of all the same atoms or groups of atoms
- an object, diagram, or computer program that helps us understand something by making it simpler or easier to see
- a model volcano is an example of
- 100 degrees Celsius 212 Fahrenheit
- to solution of a multiplication equation
- letters and numbers showing the types and number of atoms that repeat to make up a substance
16 Clues: example of rust • a group of atoms together • some of this can kill bees • the relative size of things • the tiny pieces that all matter • a model volcano is an example of • 100 degrees Celsius 212 Fahrenheit • to solution of a multiplication equation • to change the order or position of something • a starting substance that is part of a chemical reaction • ...
Team 7 Crossword Puzzle 2026-02-11
Across
- Fix errors in code
- Open source operating system
- IBM’s first scientific computer
- Early way to input data
- Early GUI personal computer
- OOP feature for reusing code
- How easy code is to write
- Organized data storage
- Device that replaced vacuum tubes
- Operating system used by many others
- Early version of the Internet
- Easy-to-read programming language
- Text-processing scripting language
- How easy code is to read
- Ancient counting tool
- Logic based programming language
Down
- First commercial computer
- Part of a compiler that scans code
- Code that repeats
- When a function calls itself
- Program that translates code
- Computer language of 0s and 1s
- Connected smart devices network
- Language for web pages
- Small piece of code
- Programming language by Matz
- Step by step instructions
- Programming language by Wirth
- Safe and fast systems language
- Popular object-oriented language
- Low level programming language
- Smallest unit of computer data
32 Clues: Code that repeats • Fix errors in code • Small piece of code • Ancient counting tool • Language for web pages • Organized data storage • Early way to input data • How easy code is to read • First commercial computer • How easy code is to write • Step by step instructions • Early GUI personal computer • Open source operating system • When a function calls itself • ...
computing devices 2026-02-18
Across
- Transmission Control Protocol
- a global computer network providing a variety of information
- a device that uses recourses from a sever
- is the fundamental unit of data transmitted
- the transmission capacity of a computer network
- customers access to the Internet
- data, or systems to enhance reliability
- is a fundamental component of the internet infrastructure
- a combined device for modulation and demodulation
- connection for a wireless network device
- a hardware device that connects multiple devices within a network
- process that transforms readable data,
- a networking hardware device
- refers to the intentional duplication of critical components or functions
Down
- high-performance computer system
- high-performance data transmission medium
- is a standardized set of rules
- is a computer or software that provides services
- refers to the time delay between initiating a request for data.
- stands for Local Area Network
- internet protocol laws
- a networking device that connects multiple computer networks
- facility allowing computers, smartphones, or other devices to connect to the internet
23 Clues: internet protocol laws • a networking hardware device • Transmission Control Protocol • stands for Local Area Network • is a standardized set of rules • high-performance computer system • customers access to the Internet • process that transforms readable data, • data, or systems to enhance reliability • connection for a wireless network device • ...
it key words 2019-07-09
Across
- used to move the courser
- A display screen used to provide visual output from a computer
- is the most popular connection used to connect a computer
- Alternatively referred to as a cord, connector or plug
- is the part of a computer system that is commonly referred to as the "brains"
- cools the computer down
- allows to connect to browsers
- a legal means of protecting an author's work
- an exact replica of the contents of a storage device
- allows u to type
Down
- is either a pointer or an array with only one dimension
- consisting of the hardware and associated circuitry
- is an application used to access and view websites
- is the transmission of a file from one computer
- , is the protection of information systems from theft or damage to the hardware
- of interconnected computers that share a central storage
- is new, improved, or fixed software, which replaces older versions
- keeps storage in
- stored as lots of binary numbers
- a numeric system that only uses two digits
20 Clues: keeps storage in • allows u to type • cools the computer down • used to move the courser • allows to connect to browsers • stored as lots of binary numbers • a numeric system that only uses two digits • a legal means of protecting an author's work • is the transmission of a file from one computer • is an application used to access and view websites • ...
Computer Science Chapter 1: Vocabulary Crossword 2021-01-12
Across
- a hardware component that supplies power to an electrical device.
- uses intuitive and visual elements to simplify the process of viewing files and executing programs.
- allows the computer to receive data and instructions from an external source.
- the physical components of the computer, ex: keyboard, monitor.
- packaged on separate chips and communicates with the CPU using lower-speed circuitry.
- storage device that connects to computers and other devices using a USB plug that is built onto the drive.
- represents a connection to another page and is usually displayed in a Web page as underlined or as colored text.
- the programs that run on the computer, carrying out tasks such as word processing.
- access a Web page, interpret the HTML formatting information, and display the formatted page accordingly.
- a software program that runs on your computer to perform an activity.
- a hardware component that stores all digital content.
- software that communicates with the hardware and allows other programs to run.
Down
- software that assists in the creation of new software.
- allows the computer to display or broadcast its results.
- a device that receives, stores, and processes information.
- an interconnected system of public web pages accessible through the Internet.
- responsible for controlling the internal workings of the machine.
- a collection of files that are organized together and labeled with a common name.
- consists of 8 bits, each of which consists of a 0 or 1.
- a global wide area network that connects computer systems across the world.
- a specific name that users can identify them and browsers can locate them.
- units of data that corresponds to one of two potential values.
- a single platform to connect all of the parts of a computer together.
- built into the CPU and utilizes high-speed circuitry to provide extremely fast access to data.
24 Clues: a hardware component that stores all digital content. • software that assists in the creation of new software. • consists of 8 bits, each of which consists of a 0 or 1. • allows the computer to display or broadcast its results. • a device that receives, stores, and processes information. • units of data that corresponds to one of two potential values. • ...
Technology 2024-01-11
Across
- A device that connects a computer to the internet
- a mobile phone
- A screen that shows information
- A portable computer with a touchscreen interface
- A device that converts sound into an electrical signal
- A device that prints
- A machine that processes data
- A global network that connects computers
- Devices that produce sound
- A device that provides power
- A program used to access and navigate the internet
- A standard for connecting devices to computers
Down
- A portable computer
- A camera connected to a computer
- Devices worn over the ears to listen to audio
- Moving images displayed on a screen
- Programs and applications
- A location with Wi-Fi access
- A physical connection used to transfer data
- The storage space in a computer
- Wireless technology that allows an internet connection
- A visual representation or image
- keys that you press to input information into a computer
- Vibrations that travel through the air
- A collection of data stored under a specific name
- A powerful computer that provides services
- A device used to move the cursor
27 Clues: a mobile phone • A portable computer • A device that prints • Programs and applications • Devices that produce sound • A location with Wi-Fi access • A device that provides power • A machine that processes data • The storage space in a computer • A screen that shows information • A camera connected to a computer • A visual representation or image • A device used to move the cursor • ...
Unit 1 2015-07-12
Across
- Pictorial representation of program
- Stores the information in the form of 0's and 1's
- Full form of EPROM
- Set of computer program for performing a particular task in the computer system
- Used for providing the input to the computer system
- Performs arithmetic and logical operations
Down
- Full form of ROM
- Full form of CPU
- Translates line by line of program from high level language to low level language
- Translates whole program from high level language to low level language
- Full form of RAM
- Program that manages hardware and as well as software
- Physical components of computer system
- Step by step solution of program.
- Used for displaying the output of program
- Controls each and every activity of computer system
16 Clues: Full form of ROM • Full form of CPU • Full form of RAM • Full form of EPROM • Step by step solution of program. • Pictorial representation of program • Physical components of computer system • Used for displaying the output of program • Performs arithmetic and logical operations • Stores the information in the form of 0's and 1's • ...
Tech terms 2023-04-28
Across
- A printed circuit board.
- Systems The software that supports a computer's basic functions.
- A unit of information equal to one million bytes.
- Address Internet protocol address.
- A combined device for modulation and demodulation.
- Copying from one computer system to another.
- Property A work or invention that is the result of creativity.
- Hypertext markup language.
- A packet of data sent by a web server to a browser.
- Reality A computer simulation that's in 3d.
- A device that forwards data packets.
- Personal data.
- A part of a computer system or network which is designed to block unauthorized access.
Down
- Short term memory.
- Portable document format.
- A group of binary digits.
- Starting up system.
- Divide The gulf between those who have ready access to computers and the internet, and those who don't.
- language 1 & 0.
- A system for connecting a number of computer systems to form a local area network.
- Read only memory.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- A regularly updates website or web page.
- Central Processing Unit.
- Restart.
- Domain name system.
- A computer or computer program which manages access to a centralized resource or service in a network.
- Drive A piece of hardware used to store digital content and data on computers.
- Operational support system.
- The process of converting information or data into code.
- Smallest unit of data.
- Address of a web page.
- World Wide Web.
33 Clues: Restart. • Personal data. • World Wide Web. • Read only memory. • Short term memory. • language 1 & 0. • Starting up system. • Domain name system. • Smallest unit of data. • Address of a web page. • A printed circuit board. • Central Processing Unit. • Portable document format. • A group of binary digits. • Hypertext markup language. • Operational support system. • ...
crossword vocab 24 2016-04-19
Across
- an internet connection technology provides for the transfer of information to a computer at a high speed bandwidth over ordinary copper telephone lines
- a network configuration that allows selected outside organizations to access internal information systems
- computer network that covers a large geographical area most WANs are made up of several connected LANs
- a computer that uses the services of another program
- communications hardware device that facilitates the transmission of data
- a device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their place of destination
- computer configuration in which one or more computers on the same network acts as a server
- an ISP that provides connection speeds more than 30 times faster than dial up connections from 384 Kbps to 2.0 Mdps
- link from one computer to another through which data can be transmitted
- a series of connected personal computers workstations and other devices such as printers or scanners within a confined space such as an office building
- expert computer user who invades someone else's computer for either for personal gain or simply for the satisfaction of being able to do it
Down
- a device on a network
- examine a finger print a voice pattern or the iris or retina of the eye these must match the entry that originally was stored in the system for an employee to gain access to a secure area
- a device that uses coaxial cable to send and receive data
- a type of fiber optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitized voice channels
- a variation of a LAN that uses no physical wires
- high end programs designed to provide network control and include special functions for connecting computers and other devices in to a network
- the words collection of interconnected commercial and government owned voice oriented systems
- a recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone home computer or car stands for worldwide interoperability for microwave access
- a computer that handles requests for data email file transfers and other network services from other computers clients
- computer architecture in which all of the computers on a network are equal and there is no computer designed as the server
- the largest network used as a communication tool
- a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
- a server that acts as an intermediary between a user and the internet
- a junction where information arrives from connected computers or peripheral devices and is then forwarded in one or more directions to other computers and devices
- a combination of hardware and software that creates a buffer between an internal network and the internet to prevent unauthorized access
26 Clues: a device on a network • a variation of a LAN that uses no physical wires • the largest network used as a communication tool • a computer that uses the services of another program • a device that uses coaxial cable to send and receive data • a server that acts as an intermediary between a user and the internet • ...
computer words 2023-10-27
Across
- to cool the cpu dowm
- what hold all of the pc
- That powers the computer
- to water cool your cpu
- The take the water to the cpu and gpu
- to type on the computer
- to navigate the computer
- What you use to see what you are doing
- A digital way to store your data
- To pump the water though the system
- That holds the cpu,gpu and ram
Down
- to hear your pc
- to water cool your gpu
- A magnetism way to store your data
- This is to water cool you pc
- the brain of the computer
- to take photos on your computer
- A way to store your data out side of you pc
- to cool your gpu and ram
- what you plug in to your monitor and pc if you have a gpu
- what helps on 3d rendering.
21 Clues: to hear your pc • to cool the cpu dowm • to water cool your gpu • to water cool your cpu • what hold all of the pc • to type on the computer • That powers the computer • to cool your gpu and ram • to navigate the computer • the brain of the computer • what helps on 3d rendering. • This is to water cool you pc • That holds the cpu,gpu and ram • to take photos on your computer • ...
Jaiiime Crossword 2020-09-09
Across
- Ransomware does this to critical files
- Malware stands for _________ Software
- An example of Malicious software which logs what you do
- _____ Optic cables are used to transmit data at a higher speed than other forms
- A program disguised to find Viruses
- A virus which is disguised as another program
- An abreviation for 'Solid State Drive'
- Malware which forces your browser to display unwanted ads
- The area that the BIOS is stored
- A program designed to find all types of Malware
- A type of malicious software which logs key-presses
Down
- An abreviation for the term - IP Address
- Several nodes connected together to form a __________
- The most common type of wired connection to a LAN
- An alternative to a wired connection to a LAN
- A piece of malicious software which copies itself hundreds of times
- The largest WAN in the world
- A piece of malware designed to encrypt your files with a key which will be held at ransom
- A word or phrase used to protect access to your computer
19 Clues: The largest WAN in the world • The area that the BIOS is stored • A program disguised to find Viruses • Malware stands for _________ Software • Ransomware does this to critical files • An abreviation for 'Solid State Drive' • An abreviation for the term - IP Address • An alternative to a wired connection to a LAN • A virus which is disguised as another program • ...
Data types and structures 2024-02-01
Across
- Positive or negative number with a decimal point
- Whole number, positive or negative
- a numerical indicator of an item of data’s position in an array."
- a composite data type comprising several related items that may be of different data types."
- a list containing several items operating on the last in, first out (LIFO) principle.
- Sequence of alphanumerical characters
Down
- Logical values, True (1) and False (2)
- – a list containing several items operating on the first in, first out (FIFO) principle.
- a data structure containing several elements of the same data type.
- a collection of data stored by a computer program to be used again."
- a unique name applied to an item of data.
11 Clues: Whole number, positive or negative • Sequence of alphanumerical characters • Logical values, True (1) and False (2) • a unique name applied to an item of data. • Positive or negative number with a decimal point • a data structure containing several elements of the same data type. • a numerical indicator of an item of data’s position in an array." • ...
Internet & Email SBGG 2022-10-17
Across
- a portable computer
- a system operation in most of computer/laptop
- one of email service provider
- a computer's component
- a web browser develop by Google
- an input device to move the cursor
- a wireless technology used to connect computers, tablets, smartphones and other devices to the internet
Down
- an input device that allows you to enter letters, numbers and symbols into your computer.
- a technology company with the symbol of a fruit
- file(s) that we include in our email
- part of computer which produces sound
- world wide web
- the brain of a computer
- a global network where we can find information and communication
- a string of characters used to verify the identity of a user during the authentication process
- electronic mail
- Universal Serial Bus
17 Clues: world wide web • electronic mail • a portable computer • Universal Serial Bus • a computer's component • the brain of a computer • one of email service provider • a web browser develop by Google • an input device to move the cursor • file(s) that we include in our email • part of computer which produces sound • a system operation in most of computer/laptop • ...
Puzzle 1 2017-04-26
Across
- A popular navigation instrument used in maritime travel during the past few centuries
- Surveying instrument used in the oceans
- An equipment essential for many types of levelling
- An all in one surveying instrument
Down
- Produces 3D images
- Technique used by GPS satellites to determine the location
- A computer aided software that links geographic information with descriptive information
- A surveying instrument that can only measure angles
8 Clues: Produces 3D images • An all in one surveying instrument • Surveying instrument used in the oceans • An equipment essential for many types of levelling • A surveying instrument that can only measure angles • Technique used by GPS satellites to determine the location • A popular navigation instrument used in maritime travel during the past few centuries • ...
IT - Crossword 2024-11-25
Across
- Any action derived from intelligent threats to violate the security of the
- Involves actions that supplement the precautionary measures
- An act or instance of using or closely imitating the language and thoughts of another author without authorization
- A common type of online fraud
- A weakness, design, or implementation error
- A crime in which a computer is the object of the crime
- Ensuring that the information is accessible to authorized persons when required without delay.
- The exclusive legal right, given to an originator
- Use computer technology to access personal information,
- The identification and assurance of the origin of information
- Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or
Down
- Any action of stealing information from a users’ system.
- Action taken in advance to protect the system against potential threats or
- Information/data can be accessed only by those authorized
- An assurance for which someone cannot deny something
- Ending information out and collecting it from unsuspecting people
- A defined method of breaching the security of an IT system through
- Unauthorized access of or interference with computer systems, servers, or other information and communication systems
- User security allows the system to set security rules to determine what is displayed to which user.
- Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware
- Fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
21 Clues: A common type of online fraud • A weakness, design, or implementation error • The exclusive legal right, given to an originator • An assurance for which someone cannot deny something • A crime in which a computer is the object of the crime • Use computer technology to access personal information, • Any action of stealing information from a users’ system. • ...
Computer Term Crossword 2021-10-06
Across
- A basic element that is required for the computer to function.
- A device or unit that works separately from the CPU but is connected to the computer.
- A website that allows any users to edit the content.
- A collection of LANs, it is a network of networks.
- It is a small portable hard drive that can be inserted into the computer through the USB port to see data inside the drive.
- Taking someone else's work and stating that it is yours.
- A memory storage device that contains semiconductor chips.
Down
- The correct way to use the internet.
- Brain of the computer and it lets the computer interact with the programs.
- A right given to the originator to stop people from copying he/she’s work.
- A set of rules that protects integrity.
- To make digital devices give unauthorized access to a computer system.
- Sending unwanted messages in a bulk.
- A set of devices that is connected together in a limited area.
- A network security that monitors network traffic and blocks data base on the security rules.
- Storage device for computers which uses magnetic storage.
- Also called universal serial bus, it is a standard that is used for connecting peripheral devices to a computer.
- to copy a copyrighted material for a limited purpose.
- A hardware in a computer that saves data that is currently in use so it can be reached easily.
19 Clues: The correct way to use the internet. • Sending unwanted messages in a bulk. • A set of rules that protects integrity. • A collection of LANs, it is a network of networks. • A website that allows any users to edit the content. • to copy a copyrighted material for a limited purpose. • Taking someone else's work and stating that it is yours. • ...
Max H. Period 7 2024-02-06
Across
- a wireless networking technology that allow computers to connect to the internet
- Another word for the internet
- text files with small pieces of data
- a type of image file that is commonly used on the internet
- a piece of computer hardware that displays information
- software programs that run alone on computer devices
Down
- physical elements of a computer
- A computer file format for image files
- a collection of instructions, programs, and data that tell a computer how to perform specific tasks
- The address of a web page
- to send data to a file or program
- A worldwide network that people use to exchange data and information while also connects billions of computers
- to bring data into a file
- an application for accessing the internet
- a computer file format for the compression and storage of digital images
- a file format that provides an electronic image of text
16 Clues: The address of a web page • to bring data into a file • Another word for the internet • physical elements of a computer • to send data to a file or program • text files with small pieces of data • A computer file format for image files • an application for accessing the internet • software programs that run alone on computer devices • ...
Coding and Programming 2023-12-07
Across
- A true or false statement that decides which block of code will be executed or performed
- An error in a program
- The physical components of a computer
- Finding and fixing errors or problems in a program
- The rules and structure of a programming language that determines how instructions are written
- A named storage location in a program that holds a value that can change
- Data or information that is provided to a program
- Creating a set of instructions that tells a computer how to solve a problem
Down
- A set of instructions to be repeated multiple times
- An electronic device that can store, process, and retrieve data; it can perform various operations based on instructions given to it
- A computer language written in 0s and 1s
- Using a programming language to create instructions for a computer to follow
- The background of a Tynker project; where you can see your program run
- The instructions that tell a computer what to do; includes operating systems, applications and programs
- An action that initiates or begins a code block in Tynker
- A step-by-step set of instructions that tells a computer how to solve a problem
- Short for "picture element;" the smallest unit on a display
- A character or item that can be animated in Tynker
- The result or response produced by a program after processing data
19 Clues: An error in a program • The physical components of a computer • A computer language written in 0s and 1s • Data or information that is provided to a program • Finding and fixing errors or problems in a program • A character or item that can be animated in Tynker • A set of instructions to be repeated multiple times • ...
Computer Words for ESL 2021-12-06
Across
- Frequently Asked Questions
- As Soon As Possible
- Click to answer an email to one person
- Keep what you have created as a file
- A small computer that you can use on your lap
- For Your Information
- Erase something typed; also use Backspace button
- Hugs and Kisses
Down
- Save your files in another place
- The part of the computer you view; AKA monitor
- Small device to make the computer do what you want
- Mystery place where computer communicate
- Large computer that is not moved easily; PC
- Best friends forever
- Good Luck
- What you see on your screen when you open computer
- Press the key on the keyboard, click means press
- Thanks
- Rolling on the floor laughing
19 Clues: Thanks • Good Luck • Hugs and Kisses • As Soon As Possible • Best friends forever • For Your Information • Frequently Asked Questions • Rolling on the floor laughing • Save your files in another place • Keep what you have created as a file • Click to answer an email to one person • Mystery place where computer communicate • Large computer that is not moved easily; PC • ...
Jake Ryan Hardware Crossword Puzzle 2019-01-14
Across
- the retention of retrievable data on a computer or other electronic system
- a printed circuit board containing the principal components of a computer
- the brains of the computer where most calculations take place
- a flexible removable magnetic disk for storing data
- a machine for printing text or pictures, especially one linked to a computer
- a type of computer memory that can be accessed randomly
Down
- a common interface that enables communication between devices and a host controller such as a PC
- a type of non-volatile memory used in computers and other electronic devices
- the enclosure that contains most of the components of a computer
- a panel of keys that operate a computer or typewriter
- A device used to click on icons on a screen
- a printed circuit board that controls the output to a display screen.
- a type of compact disc able to store large amounts of data, especially high-resolution audiovisual material.
- an electromechanical data storage device that uses magnetic storage
- A display screen used to provide visual output from a computer
15 Clues: A device used to click on icons on a screen • a flexible removable magnetic disk for storing data • a panel of keys that operate a computer or typewriter • a type of computer memory that can be accessed randomly • the brains of the computer where most calculations take place • A display screen used to provide visual output from a computer • ...
Computer Term Crossword 2021-10-06
Across
- to copy a copyrighted material for a limited purpose.
- A collection of LANs, it is a network of networks.
- A right given to the originator to stop people from copying he/she’s work.
- A basic element that is required for the computer to function.
- A website that allows any users to edit the content.
- It is a small portable hard drive that can be inserted into the computer through the USB port to see data inside the drive.
- A set of devices that is connected together in a limited area.
- Also called universal serial bus, it is a standard that is used for connecting peripheral devices to a computer.
Down
- A hardware in a computer that saves data that is currently in use so it can be reached easily.
- A set of rules that protects integrity.
- A device or unit that works separately from the CPU but is connected to the computer.
- The correct way to use the internet.
- Sending unwanted messages in a bulk.
- Brain of the computer and it lets the computer interact with the programs.
- Storage device for computers which uses magnetic storage.
- A network security that monitors network traffic and blocks data base on the security rules.
- To make digital devices give unauthorized access to a computer system.
- Taking someone else's work and stating that it is yours.
- A memory storage device that contains semiconductor chips.
19 Clues: The correct way to use the internet. • Sending unwanted messages in a bulk. • A set of rules that protects integrity. • A collection of LANs, it is a network of networks. • A website that allows any users to edit the content. • to copy a copyrighted material for a limited purpose. • Taking someone else's work and stating that it is yours. • ...
Technology words 2023-05-08
Across
- the strength and vitality required for sustained physical or mental activity.
- A ____ is a finite sequence of rigorous instructions
- A _____ is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically
- A group of two or more devices or nodes that can communicate
- includes the physical parts of a computer
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- a set of computer programs associated documentaton and data.
- used to protect data from being stolen, changed, or compromised
- major focuses on computer programming, embedded systems, networks, telecommunications, computer systems, computer investigations and cyber operations.
- an interdisciplinary branch of computer science and engineering
- an online video game developed by Epic Games and released in 2017.
Down
- a computer system designed to make decisions and perform actions autonomously.
- expressed as series of the digits 0 and 1, typically represented by values of a physical quantity such as voltage or magnetic polarization.
- an engineering discipline concerned with the study, design, and application of equipment, devices, and systems which use electricity, electronics, and electromagnetism.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
15 Clues: includes the physical parts of a computer • A ____ is a finite sequence of rigorous instructions • A group of two or more devices or nodes that can communicate • a set of computer programs associated documentaton and data. • used to protect data from being stolen, changed, or compromised • an interdisciplinary branch of computer science and engineering • ...
Computer Vocabulary 2017-06-21
Across
- flash drive small, ultra-portable storage device which, unlike an optical drive or a traditional hard drive, has no moving parts
- drive
- when a computer program, such as a software application or an
- working surface of a desk
- high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit
- copy (data) from one computer system to another, typically over the Internet
- for central processing unit and it is the brain of the computer where most calculations take place
- an object on a computer that stores data, information, settings, or commands used with a computer program
- important downloads that the user wants
Down
- a computer or computer program that manages access to a centralized resource or service in a network.
- bunch of messages or downloads at one time
- system stops functioning properly and exits.
- act or instance of booting a computer system again
- machinery, and other durable equipment
- or nearly as described, but not completely or according to strict definition
- combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a telephone line
- Wide Web
17 Clues: drive • Wide Web • working surface of a desk • machinery, and other durable equipment • important downloads that the user wants • bunch of messages or downloads at one time • system stops functioning properly and exits. • act or instance of booting a computer system again • when a computer program, such as a software application or an • ...
Anna G. Period 3 2024-02-06
Across
- The device that is used to display images, text, video, and graphics information on a computer.
- A computer file format for image files that support both animated and static images
- To bring data into a file or program
- Refers to physical elements of a computer
- Software programs that run stand alone or locally on computer devices
- To transfer, move, or copy data from a computer to a remote device
- Used to connect computers with peripheral devices
Down
- Another word for the internet
- A wireless networking technology that uses radio waves
- A collection of instructions, programs, and data that tell a computer how to perform specific tasks.
- A worldwide network that links computers
- To transfer, move, copy data from a website to a computer or other device
- A computer file format for the compression and storage of digital images
- The address of a web page
- To send data to a file or program
15 Clues: The address of a web page • Another word for the internet • To send data to a file or program • To bring data into a file or program • A worldwide network that links computers • Refers to physical elements of a computer • Used to connect computers with peripheral devices • A wireless networking technology that uses radio waves • ...
computer science 2020-12-09
Across
- give an authority order
- a folder or box for holding loose papers that are typically arranged a difference
- its a corona that can contact everybody
- browser is a software application for accessing information on the world wide web.
- the amount of something produced by a person,machine,industry
- an island town or city
- device is a piece of computer device hardware equipment wich converts information
- storage cloud computing model thatstores data and information
- a person or thing that provides commonly
- something remmembered from the past
- annoy or bother someone
- local area network is a collection of devices together
- software thats designed to dirupt and damage
Down
- a small sweet cake typically round and flat and having a crisp flat between chewy textures
- wireless fidelity that can connect to a radio using waves without needing to use wires
- copy data from a computer system to another typically over internet
- devices a piece of equipment used to provide data and control signals into a information processing system as computer
- bar a long thin section at the edge of a computer
- process in restarting a computer
- a wall designed whit fire
- network is a group of networks that uses a set of communications
- a act or instance of booting a computer
22 Clues: an island town or city • give an authority order • annoy or bother someone • a wall designed whit fire • process in restarting a computer • something remmembered from the past • its a corona that can contact everybody • a act or instance of booting a computer • a person or thing that provides commonly • software thats designed to dirupt and damage • ...
Technology 2024-10-09
Across
- a digital pen
- one of the most popular and advanced AI chatbots
- used to send digital messages
- a computer for individual use (acronym)
- holds the computer screen
- a well known electronics company founded by Steve Jobs
- a social media platform created by Mark Zuckerberg
- a communication and media company founded in Toronto, 1960
- powers a device and converts chemical energy to electrical energy
- drags a cursor
- used to listen to music privately
- a visual set of data (goes in a straight line)that you scan
- a platform used to post videos
- global network
- used to refuel a battery in a device
- short term memory of a computer (acronym)
Down
- non-portable computer
- a mobile device used to make calls
- a type of laptop that the school provides
- most popular search engine
- used to amplify sound
- portable computer
- larger version of a cellphone
- little squares that make up a digital image
- used to type
- transfers data between electronics (acronym)
- a social media platform for cringeworthy dancing videos
- used to make physical copies of things
- something that is online
- a search engine launched in 2009
- like the engine of a computer (acronym)
31 Clues: used to type • a digital pen • drags a cursor • global network • portable computer • non-portable computer • used to amplify sound • something that is online • holds the computer screen • most popular search engine • used to send digital messages • larger version of a cellphone • a platform used to post videos • a search engine launched in 2009 • used to listen to music privately • ...
Computer Programming 2020-09-17
Across
- base 16 numbering system (0-F)
- A language that is turned into machine language by a computer in advance of program execution
- A computer program that turns a program into machine language line by line at the time of execution
- 2 bytes
- DOS
- A computer programming language that is closer to machine language than to human written/spoken language
- Instructions for a computer to complete a part of a greater task.
- Instructions for a computer to complete a part of a greater task. These typically reside outside of the sequential program flow in memory.
- A physical place to store data on a computer. Memory can be accessed using addresses (numbers) for each piece of data.
- Chart A graphical chart that shows the flow of a program
- An integer
- The process of finding and fixing bugs in code
- Nothing (typically used in reference to pointers meaning nothing.
- base 10 numbering system (0-9)
- HyperText Markup Language
- either a 1 or a zero
- A human-readable set of instructions meant to be turned into a computer language at a later time.
- The order in which instructions can be processed.
- increase
- A sequence of variables.
- To store data on the top of a stack
- A variable that contains the memory address of stored data
- American Standard Code for Information Interchange.
- Oriented In programming, this describes the flow of execution. A program creates ``Objects'' that have instructions in them that are executed independent of the main program's timeline.
- RAM
- A micro-chip that accepts input, does something (or possible nothing) to that input, and creates output.
- Arithmetic Logic Unit
- An operating system specific to Apple computers
- Counter A variable that keeps track of the memory location of the instruction being executed
- Down In programming, this describes the flow of execution. A program's instructions are processed in order starting at the top and moving downward
- 8 bits
- AI
- Traditionally this is a person who uses multiple methods over and over again to break into a computer system (as in to hack with a hatchet through a wooden door). Nowadays it's used more to describe someone who can use computers for evil purposes.
- A sequential set of characters
- A programming language created by MIT to help students learn how to program.
- A programming language. Beginner's All-purpose Symbolic Instruction Code
- First-in-first-out
- CPU
Down
- To retrieve data from the top of a stack
- Nowadays it's a piece of code that has an error in it.
- ROM
- In programming, this is an entity that represents something else. When programming, these are usually stored in RAM.
- A set of instructions, in a specific order, to solve a problem.
- Operating System
- The person using a program.
- When a program creates a state in the CPU that the CPU cannot process, so it stops functioning properly.
- Nowadays this refers to an OS created by Microsoft
- A singular command
- Language A language that is turned into machine language by a computer at the time of the program's execution, instruction by instruction
- Design, Implement, and Debug
- base 8 numbering system (0-7)
- A repetition.
- In programming, this is when the expected size of data is greater than the amount of memory needed to store it.
- in a specific order
- A code segment that cause a program to perform unexpectedly
- Statement A computer instruction that changes the flow of execution based on logic
- To compile or as a noun it's a specific snapshot of compiled code.
- A list of all the singular commands a computer language can process
- 4 bits
- Code The native language of a computer. This is the set of numbers that are fed into the CPU that produce specific numbers as output. These numbers are typically see as base 16 (Hexadecimal).
- A repeated set of instructions
- A physical location to put data
- base 2 numbering system (0-1)
- An input/output device built into the computer
- Code that calls itself
- A type of memory in which data is FILO
- In reference to variables, it's what kind of variable one is.
- decrease
- An ASCII byte
- An operating system specific to Apple devices
- A type of numeric variable
- either a 1 or a 0 (a true or a false)
- A variable type that contains multiple variables.
- A computer program that turns an entire program written in a language other than machine language into machine language
- When the flow of execution of a computer program jumps to a different part of memory to perform some task
- Instructions for a computer to complete a task.
- A computer programming language that is closer to human written/spoken language than machine language
- a system or set of principles underlying the arrangements of elements in a computer or electronic device so as to perform a specified task.
- A Floating point number
- Cycle One tick of the computer's internal clock
- Input/Output
- When the flow of execution of a computer program jumps to a different part of memory to perform some task, and then returns back to its' original spot.
- First-in-last-out
- computer instructions. To program.
84 Clues: AI • ROM • DOS • RAM • CPU • 4 bits • 8 bits • 2 bytes • increase • decrease • An integer • Input/Output • A repetition. • An ASCII byte • Operating System • First-in-last-out • A singular command • First-in-first-out • in a specific order • either a 1 or a zero • Arithmetic Logic Unit • Code that calls itself • A Floating point number • A sequence of variables. • HyperText Markup Language • A type of numeric variable • ...
technology concepts 2024-05-30
Across
- a device that transforms ac to dc
- random acess memory but shorter
- definition of HDD
- solid-state drive but shorter
- an alteration or vibration of space
- a device that contains energy
- a device that allows sound to come out from the computer
- a device used to write in the computer
Down
- a technology use to connect devices wireless
- the main circuit in a computer
- shielded twisted pair but shorter
- a device that regulated electricity of an electric circuit
- everything you can touch from the computer
- technology that provides internet access
- a device that copies a text or image into a paper
- a color of printers represented with k
- unshielded twisted pair but shorter
- everything you cannot touch from the computer
18 Clues: definition of HDD • solid-state drive but shorter • a device that contains energy • the main circuit in a computer • random acess memory but shorter • a device that transforms ac to dc • shielded twisted pair but shorter • an alteration or vibration of space • unshielded twisted pair but shorter • a color of printers represented with k • a device used to write in the computer • ...
Game Creation 2024-10-17
Across
- a software program used to locate and display information on the Internet or an internet.
- footprint, the trail of data created as a result of your online activity
- is a computer program or device that provides a service to another computer program and its user
- The Domain Name System turns domain names into IP addresses
- a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
Down
- AI, a type of artificial intelligence technology that can produce various types of content, including text, imagery, audio and synthetic data.
- Engine, a software program used to locate and display information on the Internet or an intranet.
- Literacy, the ability of individuals and communities to understand and use digital technologies for meaningful actions within life situations.
- a procedure used for solving a problem or performing a computation
- a global network of billions of computers and other electronic devices.
10 Clues: The Domain Name System turns domain names into IP addresses • a procedure used for solving a problem or performing a computation • a global network of billions of computers and other electronic devices. • footprint, the trail of data created as a result of your online activity • ...
Technology Vocabulary 2021-06-19
Across
- any computer that is hooked up to a computer network
- transfer a file or program to a smaller computer
- science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
- locate and correct errors in a computer program code
- an organized body of related information
- the exclusive right to sell a work
- short line of text that a web site puts on your computer's hard drive when you access the web site
- sequence of data processed as a single unit of information
- (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
Down
- transfer out of a database or document
- activity of converting data or information into code
- the symbolic arrangement of data in a computer program
- ram memory that is set aside as a specialized buffer storage
- or defect in a computer program, system, or machine
- restore something reduced in volume to its full volume
15 Clues: the exclusive right to sell a work • transfer out of a database or document • an organized body of related information • transfer a file or program to a smaller computer • or defect in a computer program, system, or machine • any computer that is hooked up to a computer network • activity of converting data or information into code • ...
uncountable&countable nouns- interface and word features 2025-01-21
Across
- The process of moving through a system or document.
- The space at the beginning of a paragraph or line.
- A container used to organize files on a computer.
- A style of text used for displaying characters.
- The top section of a document, often with a title.
Down
- A small graphic symbol representing a program or file.
- The main screen area in an operating system where content is displayed.
- The use of various media types like text, images, and audio.
- The area where a user interacts with software or hardware.
9 Clues: A style of text used for displaying characters. • A container used to organize files on a computer. • The space at the beginning of a paragraph or line. • The top section of a document, often with a title. • The process of moving through a system or document. • A small graphic symbol representing a program or file. • ...
Crossword Puzzle (CYBERCRIME) 2021-07-05
Across
- Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
- A politically- or ideologically-motivated cyber attack or hack.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.
- a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
- or operating in transnational several nations
- The act of one individual harassing or intimidating another individual via the Internet.
- define as “malicious software” specifically designed to gain access to or damage a computer
- the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists.
- the co-option of another person's personal information (e.g., name, Social Security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge
- A unique Internet identifier registered to an entity (e.g. whitehouse.gov).
- an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing.
- other terms for cybercrime
- These are the types of hackers who break into systems and networks just to draw attention towards an alarming social cause.
- hidden collective of internet sites only accessible by a specialized web browser. It is used for keeping internet activity anonymous and private, which can be helpful in both legal and illegal applications.
- The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.
- (computer science) written programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory
- An online journal. Contraction of the term “web log.”
- The overarching program that runs all the functions on a computer or other electronic device.
- administrator An individual who manages and oversees a network.
- sexual arousal involving communication on the internet
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
- A group of computers that is linked to share data and other information.
- A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.
- hacker objective is to find black hat hackers, intercept and destroy their schemes.
- Plays an essential role in the detection, prevention, mitigation, and investigation of cybercrime because it predominantly owns and manages the critical infrastructure
- A massed data that is used to describe large amounts of other Internet data.
- A website that finds information across the Internet based on a set of search criteria.
- the activity of converting data or information into code
Down
- A coordinated attack that aims to overwhelm the resources of a targeted system to crash that system.
- Unsolicited advertising or other information sent out via email or other messaging service.
- A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.
- They are designed to trick people into giving up personal information or clicking on a malicious link that downloads malware.
- This is the set of individuals who simply want to observe and learn about the world of hacking. It comprises those who join learning communities to watch videos and tutorials about hacking.
- A company that offers access to the Internet.
- crime that involves a computer and a network.
- An information packet sent from a website to a web browser that records a user’s activity on that website.
- A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.
- These are individuals who are considered the “cutting-edge geniuses”. They are the real experts and the innovators in the field of hacking.
- Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- A satellite navigation system that identifies the precise location of the transmitting device.
- Malicious software, such as a virus or a worm, that attacks a target computer.
- when a website is designed to look like a real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to your systems, steal data, steal money, or spread malware.
- someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
- someone who attempts to prevent terrorism or intended to prevent terrorism
- These are hackers who use psychological manipulation to make people to divulge private contents or to perform certain actions. It is a more complex crime scheme.
- A way to access an electronic system by bypassing some or all security mechanisms.
- A username and password used to identify an individual attempting to gain access to a restricted page or network.
- A software robot that performs automated tasks.
- it is a modern day, technical twist on a crime that has been around for ages – extortion. At its core, it works when criminals steal something of great value and demand payment in exchange for its return.
- an assault on electronic communication networks
- A camera connected to a computer, generally used to then stream videos to the Internet.
51 Clues: other terms for cybercrime • A company that offers access to the Internet. • or operating in transnational several nations • crime that involves a computer and a network. • A software robot that performs automated tasks. • an assault on electronic communication networks • An online journal. Contraction of the term “web log.” • ...
Chapter 18 2017-05-12
Across
- engine / a computer program that can produce a list of documents related to a given topic
- Wide Web / a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet
- / an extension of the intranet of a company or organization
- / The transmission of information over communication lines
- reality / an artificial, three-dimensional visual world created by a computer
- computer / a small portable computer designed to be used while it is worn on the body
Down
- / a program that can insert copies of itself into a computer without the user's knowledge, often damaging stored data
- design / software for designing products with a computer
- / an arrangement that allows employees to work at home while communicating with the workplace by phone, fax, or modern
- / bits of information about a computer user that are stored on that computer's hard drive
- / a global computer network
- / a person who illegally gains access to and sometimes tampers with information in a computer system
- / a computer network used by an organization
- technology / computing, electronics, and telecommunications to process and distribute information in digital and other forms
14 Clues: / a global computer network • / a computer network used by an organization • design / software for designing products with a computer • / The transmission of information over communication lines • / an extension of the intranet of a company or organization • reality / an artificial, three-dimensional visual world created by a computer • ...
Computer Basic Vocabulary 2014-11-05
Across
- device through which a computer sends out information
- silicon chip that processes data and carries out instructions
- device that stores, retrieves, manipulates and processes data to produce an outcome
- Input device used to type text
- physical equipment of a computer
- set of instructions that makes computer hardware work; programs or applications
- output device that transfers information to a hard copy
Down
- use of technology tools to input, store, process, and communicate information
- a type of software that includes programs that help people do certain tasks
- component that allows people to select text and icons from the computer screen to choose commands and files and start application software; makes computers user friendly
- language a computer can understand; made up of a series of ones and zeroes
- Application;ordered instructions done by the computer
- Output device that displays graphics on a screen
- Two or more computers linked together to share files and resources
- Only Memory ROM; starts up the computer and holds its start up instructions
15 Clues: Input device used to type text • physical equipment of a computer • Output device that displays graphics on a screen • device through which a computer sends out information • Application;ordered instructions done by the computer • output device that transfers information to a hard copy • silicon chip that processes data and carries out instructions • ...
Cyber Security 2020-09-09
Across
- Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
- Chief Information Security Officer
- To protect personal information, avoid sending it via
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
- A malicious program designed to record which keys are pressed on a computer keyboard
- _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
- Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
- Unwanted advertising that comes to your email address
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- An unauthorized person seeking to maliciously disrupt or damage a computer
- a string of words that must be used to gain access to a computer system or service
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- An Internet scam that targets unsuspecting users through email
Down
- A technology that allows us to access our files and/or services through the internet from anywhere in the world
- Always _______your computer when you leave your desk
- Small files that Web sites put on your computer hard disk drive when you first visit
- Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
- Domino's is known for selling
- Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
- Global system of interconnected computer networks that use the Internet protocol suite
- media websites and applications that enable users to create and share content or to participate in social networking
- An acronym that stands for distributed denial of service – a form of cyber attack
- A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- A characteristic or specific weakness that renders an organization or asset open to exploitation.
- Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- An attempt by hackers to damage or destroy a computer network or system
- A type of malware designed to block access to a computer system or data until a sum of money is paid
- A system invented by Google that uses a test to establish if a user is a human or a robot
- A regular system update that is designed to cover security blunders that have been discovered
31 Clues: Domino's is known for selling • Chief Information Security Officer • Always _______your computer when you leave your desk • To protect personal information, avoid sending it via • Unwanted advertising that comes to your email address • Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use • Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • ...
Crossword Puzzle (CDI 04) 2021-07-05
Across
- A way to access an electronic system by bypassing some or all security mechanisms.
- A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.
- A politically- or ideologically-motivated cyber attack or hack.
- the co-option of another person's personal information (e.g., name, Social Security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge
- A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.
- or operating in transnational several nations
- A website that finds information across the Internet based on a set of search criteria.
- an assault on electronic communication networks
- An information packet sent from a website to a web browser that records a user’s activity on that website.
- This is the set of individuals who simply want to observe and learn about the world of hacking. It comprises those who join learning communities to watch videos and tutorials about hacking.
- Unsolicited advertising or other information sent out via email or other messaging service.
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
- A company that offers access to the Internet.
- someone who attempts to prevent terrorism or intended to prevent terrorism
- A username and password used to identify an individual attempting to gain access to a restricted page or network.
- A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.
- define as “malicious software” specifically designed to gain access to or damage a computer
- These are individuals who are considered the “cutting-edge geniuses”. They are the real experts and the innovators in the field of hacking.
- Plays an essential role in the detection, prevention, mitigation, and investigation of cybercrime because it predominantly owns and manages the critical infrastructure
- A software robot that performs automated tasks.
- A camera connected to a computer, generally used to then stream videos to the Internet.
- hidden collective of internet sites only accessible by a specialized web browser. It is used for keeping internet activity anonymous and private, which can be helpful in both legal and illegal applications.
- A unique Internet identifier registered to an entity (e.g. whitehouse.gov).
Down
- An online journal. Contraction of the term “web log.”
- crime that involves a computer and a network.
- These are hackers who use psychological manipulation to make people to divulge private contents or to perform certain actions. It is a more complex crime scheme.
- They are designed to trick people into giving up personal information or clicking on a malicious link that downloads malware.
- hacker objective is to find black hat hackers, intercept and destroy their schemes.
- an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing.
- sexual arousal involving communication on the internet
- The act of one individual harassing or intimidating another individual via the Internet.
- A massed data that is used to describe large amounts of other Internet data.
- someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
- the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists.
- when a website is designed to look like a real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to your systems, steal data, steal money, or spread malware.
- administrator An individual who manages and oversees a network.
- A satellite navigation system that identifies the precise location of the transmitting device.
- it is a modern day, technical twist on a crime that has been around for ages – extortion. At its core, it works when criminals steal something of great value and demand payment in exchange for its return.
- a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
- Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- These are the types of hackers who break into systems and networks just to draw attention towards an alarming social cause.
- Malicious software, such as a virus or a worm, that attacks a target computer.
- A coordinated attack that aims to overwhelm the resources of a targeted system to crash that system.
- (computer science) written programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory
- The overarching program that runs all the functions on a computer or other electronic device.
- other terms for cybercrime
- The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.
- the activity of converting data or information into code
- A group of computers that is linked to share data and other information.
- Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
51 Clues: other terms for cybercrime • crime that involves a computer and a network. • or operating in transnational several nations • A company that offers access to the Internet. • an assault on electronic communication networks • A software robot that performs automated tasks. • An online journal. Contraction of the term “web log.” • ...
COMPUTERS! 2022-03-02
Across
- the principal part of any digital computer system, generally composed of the main memory, control unit, and arithmetic-logic unit.
- a computer accessory that allows a user to type text into a computer
- The short-term memory of a computer, which is used to handle all active processes and programmes.
- information that's stored in or used by a computer
- an internal or external computer disc drive that reads and writes data using laser beam technology
- storage device used in computers
- a software application that uses keywords or phrases to help people locate the information they're seeking for on the internet
- a specialised processor created to speed up the processing of graphics
- a tiny portable input device that controls the cursor on a computer screen
Down
- a data storage device that is a flexible magnetic disc which is removable.
- an electronic device with a screen used for display
- information shown in the form of diagrams, graphs, drawings, and symbols on a visual display device or on a computer printout
- the primary screen of a computer, from which windows and applications may be launched and operated
- the primary piece of circuitry into which all other components plug into to form a unified whole.
- permanent or semi-permanent data stored on non-volatile computer memory chips
15 Clues: storage device used in computers • information that's stored in or used by a computer • an electronic device with a screen used for display • a computer accessory that allows a user to type text into a computer • a specialised processor created to speed up the processing of graphics • a data storage device that is a flexible magnetic disc which is removable. • ...
Cyber Security 2020-09-09
Across
- Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
- Chief Information Security Officer
- Avoid sending personal information via
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
- A malicious program designed to record which keys are pressed on a computer keyboard
- _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
- Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
- Unwanted advertising that comes to your email address
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- An unauthorized person seeking to maliciously disrupt or damage a computer
- A string of words that must be used to gain access to a computer system or service
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- An Internet scam that targets unsuspecting users through email
Down
- A technology that allows us to access our files and/or services through the internet from anywhere in the world
- Always _ _ _ _ your computer when you leave your desk
- Small files that Web sites put on your computer hard disk drive when you first visit
- Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
- Domino's is known for selling
- Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
- Global system of interconnected computer networks that use the Internet protocol suite
- media Websites and applications that enable users to create and share content or to participate in social networking
- An acronym that stands for distributed denial of service – a form of cyber attack
- A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- A characteristic or specific weakness that renders an organization or asset open to exploitation.
- Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- An attempt by hackers to damage or destroy a computer network or system
- A type of malware designed to block access to a computer system or data until a sum of money is paid
- A system invented by Google that uses a test to establish if a user is a human or a robot
- A regular system update that is designed to cover security blunders that have been discovered
31 Clues: Domino's is known for selling • Chief Information Security Officer • Avoid sending personal information via • Always _ _ _ _ your computer when you leave your desk • Unwanted advertising that comes to your email address • Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use • Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • ...
Digital Tech 2021-08-23
Across
- It is the data that is stored inside the computer.
- Allows other devices to connect to the computer and vice versa.
- Stores all the digital content. Can be internal and external.
- A form of coding using dots and dashes.
- Settings that allow your personal data and social media accounts to be private.
- A trace you leave behind after posting something on social media.
- Computer language. This language helps programmers develop algorithms.
- Cooling process unit
- Source of charge and power for the device.
- Random access memory
- Units of information, most often numeric, which are collected through surveys.
Down
- An address that identifies your device on a local network.
- It is the physical part of a computer, the machinery or equipment.
- Video graphics card
- Connects the computer from one spot. Without the motherboard, the computer won’t be able to communicate or work with each other.
- A form of communication, used to send signals, instructions, and messages through encrypted language.
- Online security used to protect your data.
- A worldwide infrastructure.
- Used to transmit power and data.
- A set of instructions that computers follow. A good analogy of it would be a recipe it says what needs to be done, step by step.
20 Clues: Video graphics card • Cooling process unit • Random access memory • A worldwide infrastructure. • Used to transmit power and data. • A form of coding using dots and dashes. • Online security used to protect your data. • Source of charge and power for the device. • It is the data that is stored inside the computer. • An address that identifies your device on a local network. • ...
Coding Crossword 2021-08-26
Across
- The Caesar ______ is a method of encryption
- The physical parts of a computer, such as the CPU, monitor, GPU, motherboard
- Facts and statistics collected together
- converting information or data into a code
- The information about a person that is on the internet
- Hard Disc Drive
- A collection of instructions and data that tell a computer how to work
- Central Processing Unit
- Random Access Memory
Down
- A base 2 system code, represented by just 0s and 1s
- A network that connects devices all over the world
- A set of rules or instructions
- A diagram representation of an algorithm
- A pocket-sized computer that introduces you to how software and hardware work together. It has an LED light display, buttons, sensors
- Light-Emitting Diode
- The process or activity of writing programs
- A programming language
- A code meant for human reading instead of machine or computer reading
- provide a computer with coded instructions for the automatic performance of a task
19 Clues: Hard Disc Drive • Light-Emitting Diode • Random Access Memory • A programming language • Central Processing Unit • A set of rules or instructions • Facts and statistics collected together • A diagram representation of an algorithm • converting information or data into a code • The Caesar ______ is a method of encryption • The process or activity of writing programs • ...
Types of Credit - Vocabulary 2022-01-19
Across
- monetary charge for borrowing money
- an individual or entity that is using money, assets, or services on credit
- sign jointly with a borrower for a loan
- unchanging rate charged on a liabilitylegal debt or obligation that an entity must pay back
- a long-term loan used to finance the purchase of real estate
- source of continuous funds that works like a credit card
- management of money
- an agreement between a lender and a borrower
- a company engaged in the business of dealing with financial and monetary transactions such as deposits, loans, investments, and currency exchange
- original sum of money borrowed in a loan or put into an investment
Down
- loans that are not backed by collateral
- personal or commercial loans that borrowers must repay with regularly scheduled payments or installments
- an individual, a public or private group, or a financial institution that makes funds available to a person or business with the expectation that the funds will be paid back
- the cost of borrowing money or the reward for saving it.
- any type of deposit account which does not pay its holder a fixed interest rate
- backed by collateral
16 Clues: management of money • backed by collateral • monetary charge for borrowing money • loans that are not backed by collateral • sign jointly with a borrower for a loan • an agreement between a lender and a borrower • the cost of borrowing money or the reward for saving it. • source of continuous funds that works like a credit card • ...
Types of TV programme 2020-08-11
Across
- Find out what happened today on the _________.
- A_______ affairs programme covers up-to-date social and political stories.
- This programme mixes reality and fiction.
- This programme features animals.
- Short funny pieces are acted out on a _____ show.
- A private eye solves a murder every week in a ________ series.
- A set of programmes, for example, a new ______ of Strictly Come Dancing.
- A programme about something real.
Down
- Number 8 down is one kind of ______ show.
- A ______ opera has romance and drama and is on regularly.
- This type of show often puts ordinary people in extraordinary situations.
- It's full of suspense.
- Actors ears clothes from the past in a _______ drama.
- This has the same characters each week in funny situations.
- It's a story or drama broadcast in different parts.
- Competitors answer questions on a ________ show.
16 Clues: It's full of suspense. • This programme features animals. • A programme about something real. • Number 8 down is one kind of ______ show. • This programme mixes reality and fiction. • Find out what happened today on the _________. • Competitors answer questions on a ________ show. • Short funny pieces are acted out on a _____ show. • ...
Types of TV programme 2020-08-11
Across
- Find out what happened today on the _________.
- A_______ affairs programme covers up-to-date social and political stories.
- This programme mixes reality and fiction.
- This programme features animals.
- Short funny pieces are acted out on a _____ show.
- A private eye solves a murder every week in a ________ series.
- A set of programmes, for example, a new ______ of Strictly Come Dancing.
- A programme about something real.
Down
- Number 14 down is one kind of ______ show.
- A ______ opera has romance and drama and is on regularly.
- This type of show often puts ordinary people in extraordinary situations.
- It's full of suspense.
- Actors wears clothes from the past in a _______ drama.
- This has the same characters each week in funny situations.
- It's a story or drama broadcast in different parts.
- Competitors answer questions on a ________ show.
16 Clues: It's full of suspense. • This programme features animals. • A programme about something real. • This programme mixes reality and fiction. • Number 14 down is one kind of ______ show. • Find out what happened today on the _________. • Competitors answer questions on a ________ show. • Short funny pieces are acted out on a _____ show. • ...
Types of Motors II 2015-03-19
Across
- The end structure of an electric motor that normally contains the bearings and lubrication system.
- The region of a magnet towards which the lines of magnetic induction converge (south pole) or from which the lines of induction diverge (north pole).
- This is the voltage-generating effect of an electric motor’s rotor turning within the motor.
- Circuit in which the current leads the voltage.
- An electronic device in a motor circuit that is used to control motor speed for variable-speed motors.
- The rotating or moving component of a motor, including the shaft.
- A switch that uses a centrifugal action to disconnect the start windings from the circuit.
- The speed at which the variable frequency drive’s power device switches the waveform’s positive and negative halves on and off is referred to as the switch frequency or carrier frequency.
- A two wire Alternating Current (AC) power circuit.
Down
- A compressor starting devices which are variable resistors that vary their resistance when the surrounding temperature changes.
- An alternating current motor where the rotor turns from induced magnetism from the field windings.
- The amount by which the current leads or lags the voltage.
- An electrical storage device used to start motors (start capacitor) and to improve the efficiency of motors (run capacitor).
- Cycles per second.
- The minimum back electromotive force (BEMF) that the potential relay coil must experience or its armature will drop out and the contacts between terminals 1 and 2 will close.
- An electrical device activated by a change in current flow.
16 Clues: Cycles per second. • Circuit in which the current leads the voltage. • A two wire Alternating Current (AC) power circuit. • The amount by which the current leads or lags the voltage. • An electrical device activated by a change in current flow. • The rotating or moving component of a motor, including the shaft. • ...
Different types of organizations 2021-09-03
Across
- money given by the state in support of an activity.
- buildings or rooms whare a copany's offices are based.
- said of an organisation which aims at helping people or animals or protecting the environment. It is not funded by the governement (two words).
- person providing help to an organisation without any financial compensation (no salary).
- which lasts for a very long time.
- an organisation whose goal is to make profit
- products that are directly taken from the ground, in their natural state (two words).
- money that an organsation makes when selling their products or offering their services.
Down
- goods products manufactured in order to be sold (two words)
- a company with less than 10 employees.
- a skill you gain from experience and proves the quality of your work (2 words)
- the leader of a company or charity.
- a design representing an organisation.
- a sum of money a bank accepts to lend you and which is going to be paid back over a determined period of time.
- the place where goods are manufactured.
- servant person working for the state who provide a public service (two words).
16 Clues: which lasts for a very long time. • the leader of a company or charity. • a company with less than 10 employees. • a design representing an organisation. • the place where goods are manufactured. • an organisation whose goal is to make profit • money given by the state in support of an activity. • buildings or rooms whare a copany's offices are based. • ...
Different types of organizations 2021-09-03
Across
- Buildings or rooms where a company's offices are based.
- Something you gain from experience which proves the quality of your work (2 words).
- A company with less than 10 employees.
- A person working for the state who provides a public service (two words).
- A design representing an organisation.
- Said of an organisation which aims at helping people or animals or protecting the environment. It is not funded by the governement (two words).
- Products manufactured in order to be sold (two words).
Down
- Products that are directly taken from the ground, in their natural state (two words).
- Which lasts for a very long time.
- Money given by the state in support of an activity.
- The place where goods are manufactured.
- Money that an organisation makes when selling their products or offering their services.
- A person providing help and giving their time to an organisation without any financial compensation (no salary).
- The leader of a company or charity.
- An organisation whose goal is to make profit
- A sum of money a bank accepts to lend which is going to be paid back over a determined period of time.
16 Clues: Which lasts for a very long time. • The leader of a company or charity. • A company with less than 10 employees. • A design representing an organisation. • The place where goods are manufactured. • An organisation whose goal is to make profit • Money given by the state in support of an activity. • Products manufactured in order to be sold (two words). • ...
DIFFERENT TYPES OF ROPE 2018-04-01
16 Clues: parime • traversa • a rugini • a putrezi • a se umfla • spring pupa • parima prova • manevre fixe • saula de loch • line parima pupa • amarare(a marfii) • plutitor, flotabil • parime de remorcaj • matisat (despre parime) • parime din nuca de cocos • funga, saula de pavilion
Types of digital marketing 2023-12-17
Across
- Short for "application," it refers to a software program designed for a specific task, often used on mobile devices.
- A regularly updated website or web page, typically run by an individual or a group, that provides information, commentary, and discussions.
- A message posted on Twitter, limited to 280 characters, used for sharing information or opinions.
- A clickable element that connects one web page or online resource to another.
- A location on the internet, represented by a specific web address, where digital content is hosted.
- The action of distributing or reposting digital content on social media or other online platforms.
- Content that spreads rapidly online through sharing, often gaining widespread attention.
- A positive interaction with digital content, indicating approval or support.
Down
- A keyword or phrase assigned to digital content, making it easier to categorize, search, and discover.
- The action of pressing a button on a mouse or touchscreen to select and access content, often used to measure user engagement.
- Any piece of content shared on social media, a blog, or a forum.
- The smallest unit of a digital image. In marketing, it can refer to a tracking pixel used to collect data on user behavior.
- A potential customer who has expressed interest in a product or service, often through providing contact information.
- Electronic mail sent over the internet, often used in marketing for communication and promotional purposes.
- Visual content in a digital format, often used for marketing to convey information or tell a story.
- A promotional message displayed online or in other media to attract attention and encourage engagement.
16 Clues: Any piece of content shared on social media, a blog, or a forum. • A positive interaction with digital content, indicating approval or support. • A clickable element that connects one web page or online resource to another. • Content that spreads rapidly online through sharing, often gaining widespread attention. • ...
Types of chemical reactions 2024-05-08
Across
- of metals as a result of exposure to moisture or air
- A single substance decomposes to give two or more products.
- method to prevent rancidity
- A more reactive metal displaces a less reactive metal from its salt solution
- a type of decomposition that involves sunlight
- formula of the substance is CaCO3
- Two or more substances combine to form a single substance
- process which involves gain of oxygen or loss of hydrogen
- reaction in which insoluble salts are formed
- a type of decomposition that involves heat
Down
- method to prevent corrosion
- reactions during which heat is evolved
- process of passing electricity in water to break water molecules into water and hydrogen
- process which involves gain of hydrogen or loss of oxygen
- the oxidation of oils or fats in food resulting in bad taste and smell
- Both oxidation and reduction take place together
16 Clues: method to prevent corrosion • method to prevent rancidity • formula of the substance is CaCO3 • reactions during which heat is evolved • a type of decomposition that involves heat • reaction in which insoluble salts are formed • a type of decomposition that involves sunlight • Both oxidation and reduction take place together • ...
Types of Chemical Reactions 2024-05-11
Across
- A chemical reaction that releases energy in the form of heat
- When two compounds switch partners in a reaction
- The number and types of atoms on both sides of the equation must be equal in this type of reaction
- A reaction in which an acid reacts with a base to produce salt and water
- Residue formed from the reaction between an acid and a base
- A solid formed from a chemical reaction that settles out of a solution
- A type of reaction that absorbs heat from its surroundings
- The outcome of a chemical reaction
- This type of reaction involves the breaking down of a compound into simpler substances
Down
- The foul smell that develops in oils due to exposure to oxygen for a long time
- The gradual destruction of materials, especially metals
- The starting materials in a chemical reaction
- A substance that undergoes a reduction in a chemical reaction
- These minute particles are like the letters of the alphabet
- A type of reaction where a single element replaces another element in a compound
- Splitting compounds using electricity to obtain elements
16 Clues: The outcome of a chemical reaction • The starting materials in a chemical reaction • When two compounds switch partners in a reaction • The gradual destruction of materials, especially metals • Splitting compounds using electricity to obtain elements • A type of reaction that absorbs heat from its surroundings • ...
Types of Chemical Reactions 2024-05-14
Across
- Ca(OH)2 is used for
- CuO+H2---> Cu+H2O where Cu is a
- what are the products of CaO+H2O
- One or More substance react to form new compounds
- CaO is also known as ?
- A type of decomposition reaction with the influence of electric energy
- 2H2+O2--->2H2O
Down
- which solution will double displacement occur ?
- Gaining hydrogen/ losing oxygen/ gain of electrons
- when heating FeSO4.7H2O Fe2O3 is one of the products what are the other products ?
- A type of reaction where exchange of ions occur between the reactants
- What is the type of reaction taking place : 2AgCl--->(sunlight) 2Ag+Cl2
- Zn+CuSO4--->ZnSO4+Cu
- Gaining oxygen/ losing hydrogen/ loss of electrons
- A substance that reduces another substance
- CaCO3--->(heat) CaO+CO2
16 Clues: 2H2+O2--->2H2O • Ca(OH)2 is used for • Zn+CuSO4--->ZnSO4+Cu • CaO is also known as ? • CaCO3--->(heat) CaO+CO2 • CuO+H2---> Cu+H2O where Cu is a • what are the products of CaO+H2O • A substance that reduces another substance • which solution will double displacement occur ? • One or More substance react to form new compounds • Gaining hydrogen/ losing oxygen/ gain of electrons • ...
Types of chemical reactions 2024-08-06
Across
- refers to the loss of electrons.
- -Displacement reaction is a type of reaction in which two ionic compounds are mixed together.
- reaction is which an insoluble solid is formed during a chemical reaction.
- the opposite of base.
- reaction a reaction in which one substance is reduced and the other substance is oxidized.
- a reaction in which the less reactive element is displaced by a more reactive element in a chemical reaction.
- a reaction in which hydrocarbon reacts with oxygen to produce carbon dioxide and water.
- a reaction where a substance is formed as a result of chemical combination.
- a base that can dissolve in water.
- -Displacement reaction is a type of reaction where a more reactive element displaces another less reactive element from a compound.
Down
- a reaction where one reactants yields two or more products. It is the opposite of combination reaction.
- the reaction between an acid and a base.
- the law of .....of mass states that matter can neither be created nor destroyed.
- chemical .... represent the names of the reactants and the products that are written on each side of the arrow to make a word equation for the reaction.
- refers to the gaining of electrons.
- ....rules describe which compounds are soluble and which compounds are not soluble.
16 Clues: the opposite of base. • refers to the loss of electrons. • a base that can dissolve in water. • refers to the gaining of electrons. • the reaction between an acid and a base. • reaction is which an insoluble solid is formed during a chemical reaction. • a reaction where a substance is formed as a result of chemical combination. • ...
Types of Chemical Reactions 2024-02-28
Across
- One reactant is broken down into two or more products
- replacement Chemical change in which 2 reactants become 2 new products (2 Words)
- Reaction where heat is released
- replacement Single element replaces an element in a binary compound (2 Words)
- Metal that releases a blue-white light when burned
- compounds compound that has two parts, a negative ion and a positive ion. I.e. a salt
- Reactants form one product
- This law states that atoms must be equal in reactants & products
Down
- Reaction where heat is absorbed
- Substances on the left side of the arrow
- Substances on the right side of the arrow
- You multiply the entire molecule by this number
- Gas molecule in reactant of combustion
- Another word for a synthesis reaction
- Substance used to start reaction
- Oxygen is a reactant; i.e. burning
16 Clues: Reactants form one product • Reaction where heat is absorbed • Reaction where heat is released • Substance used to start reaction • Oxygen is a reactant; i.e. burning • Another word for a synthesis reaction • Gas molecule in reactant of combustion • Substances on the left side of the arrow • Substances on the right side of the arrow • ...
TYPES OF CHEMICAL REACTIONS 2024-04-30
Across
- Reaction where both reduction and oxidation takes place.
- Reaction of an acid with a base to form a salt and water.
- Type of decomposition which takes place due to heat.
- Reaction where a highly reactive metal displaces a lesser reactive metal from its salt solution.
- Reaction where substance gains oxygen or loses hydrogen.
- Negative electrode where hydrogen is collected during electrolysis of water.
- Type of decomposition which takes place due to sunlight.
- Reaction where two reacting molecules exchange their ions in aqueous solutions.
- A reaction where a single product is formed from two or more reactants.
Down
- Reaction where substance loses oxygen or gains hydrogen.
- Type of decomposition which takes place due to electricity.
- Reaction where an insoluble solid is formed, it is a type of double displacement reaction.
- Compounds which have molecules of water of crystallisation.
- Positive electrode where oxygen is collected during electrolysis of water.
- Compounds from which the water of crystallisation molecules were evaporated.
- A reaction where a single reactant is broken down into simpler products.
16 Clues: Type of decomposition which takes place due to heat. • Reaction where substance loses oxygen or gains hydrogen. • Reaction where both reduction and oxidation takes place. • Reaction where substance gains oxygen or loses hydrogen. • Type of decomposition which takes place due to sunlight. • Reaction of an acid with a base to form a salt and water. • ...
Types of Company Ownership 2025-01-08
Across
- Company with on owner
- Owner of Proprietorship
- Only owner’s business is a risk
- Legal Document of LLC
- tax on business profit
- Legal Document of partnership
Down
- Has limited liability but lasts forever
- Legal Document of Corporation
- Owner of LLC
- Rule that govern how a company is run
- Owner of Corporation
- Has limited liability but it temporary
- Owner’s business and personal assets are at risk
- Company with 2 of more owners
- A Corporation is managed by this
- Owners of Partnership
16 Clues: Owner of LLC • Owner of Corporation • Company with on owner • Legal Document of LLC • Owners of Partnership • tax on business profit • Owner of Proprietorship • Legal Document of Corporation • Company with 2 of more owners • Legal Document of partnership • Only owner’s business is a risk • A Corporation is managed by this • Rule that govern how a company is run • ...
Types of Analog Circuits 2025-11-18
16 Clues: change • regulate • add signals • turn on or off • change AC to DC • hold to a value • remove unwanted • change direction • increase signals • decrease signals • remove information • prevent, set limits • arithmetic division • another name for adders • arithmetic multiplication • compare against a reference
Vocanulary words of period 2 2024-01-23
Across
- is a type of software that is designed to detect and remove unwanted spyware programs. Spyware is a type of malware that is installed on a computer without the user's knowledge in order to collect information about them.
- Network bandwidth is a measure of the data transfer rate or capacity of a given network.
- Area Network (WAN)-is a large computer network that connects groups of computers over large distances.
- (Number)- In computer science and mathematics, binary is a system where numbers and values are expressed 0 or 1.
- Area Network (PAN)-A personal area network (PAN) connects electronic devices within a user's immediate area.
- Optic Cable-A fiber-optic cable contains anywhere from a few to hundreds of optical fibers within a plastic casing.
- Area Network (LAN)-Is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area.
Down
- a security program designed to prevent, detect, search and remove viruses and other types of malware from computers, networks and other devices.
- Router/ Wireless Access Point- A switch connects devices such as a desktop, laptop, and access point to the router.
- transmission is the transfer of data from one digital device to another.
- Check-Show ipa. noun. a quality check and error-control technique for data transferred over a computer network or other communications link, in which the data received is stored and also transmitted back to its point of origin, where it is compared with the original data.
- network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- Cable-UTP cable is made of 8 copper wires, grouped together in four twisted pairs.
13 Clues: transmission is the transfer of data from one digital device to another. • Cable-UTP cable is made of 8 copper wires, grouped together in four twisted pairs. • Network bandwidth is a measure of the data transfer rate or capacity of a given network. • Area Network (WAN)-is a large computer network that connects groups of computers over large distances. • ...
Week 1 - Week 4 2017-04-25
Across
- Pointing device that fits under the palm of your hand comfortably
- a series of instructions that tells the computer to do and how to do it
- refers to the program that you interact with to perform specific computer tasks
- an optical device that projects an image (or moving images) onto a surface, commonly a projection screen
- input device which converts analog information into digital form.
- MICR are used in banks because a large number of _____________ to be processed every day
Down
- An input device that contains keys users press to enter data and instructions into a computer
- Program Allows user to perform maintenance-type tasks usually related to managing a computer, its devices or its programs
- is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
- Like a laptop this is a small portable computer but the biggest difference is that its user interface is all through touch.
- The process of using the personal computer and page layout software to combine text and graphics to create publication documents such as newsletters, brochures, books, etc.
- ______________Scanner device used for reading bar coded data (data in form of light and dark lines).
- one byte are needed to store one ____________
- one byte contains 8 _____
- is a computer that combines the case, monitor, keyboard and mouse in one unit
- is by far the most common type of computer
- displays an online advertisement in a banner or pop-up window
- An input device that contains keys users press to enter data and instructions into a computer
18 Clues: one byte contains 8 _____ • is by far the most common type of computer • one byte are needed to store one ____________ • displays an online advertisement in a banner or pop-up window • Pointing device that fits under the palm of your hand comfortably • input device which converts analog information into digital form. • ...
My Computer Anatomy Crossword-Manjot 2017-09-20
Across
- Is a common interface that enables communication between devices
- a local area network
- Worldwide system of computer networks
- Network that is deigned to block unauthorized access while permitting outward communication
- Wide area network
- Link form a hypertext file or document to another location
- Type of computer memory that can be accessed randomly
- Printed circuit board containing the principle components
Down
- The brain of the computer
- Collection of physical parts of a computer system
- The programs and other operating information used by a computer
- Ability to use information and communication
- for web pages
- set of computers connected together for the purpose of sharing resources
- Retains the its content even when the computer is turned off
15 Clues: for web pages • Wide area network • a local area network • The brain of the computer • Worldwide system of computer networks • Ability to use information and communication • Collection of physical parts of a computer system • Type of computer memory that can be accessed randomly • Printed circuit board containing the principle components • ...
Week 1 - Week 4 2017-04-25
Across
- is a computer that combines the case, monitor, keyboard and mouse in one unit
- An input device that contains keys users press to enter data and instructions into a computer
- is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
- Pointing device that fits under the palm of your hand comfortably
- an optical device that projects an image (or moving images) onto a surface, commonly a projection screen
- Like a laptop this is a small portable computer but the biggest difference is that its user interface is all through touch.
- refers to the program that you interact with to perform specific computer tasks
- An input device that contains keys users press to enter data and instructions into a computer
- MICR are used in banks because a large number of _____________ to be processed every day
Down
- ______________Scanner device used for reading bar coded data (data in form of light and dark lines).
- displays an online advertisement in a banner or pop-up window
- The process of using the personal computer and page layout software to combine text and graphics to create publication documents such as newsletters, brochures, books, etc.
- one byte contains 8 _____
- Allows user to perform maintenance-type tasks usually related to managing a computer, its devices or its programs
- input device which converts analog information into digital form.
- one byte are needed to store one ____________
- is by far the most common type of computer
- a series of instructions that tells the computer to do and how to do it
18 Clues: one byte contains 8 _____ • is by far the most common type of computer • one byte are needed to store one ____________ • displays an online advertisement in a banner or pop-up window • Pointing device that fits under the palm of your hand comfortably • input device which converts analog information into digital form. • ...
Week 1 - Week 4 2017-04-25
Across
- Like a laptop this is a small portable computer but the biggest difference is that its user interface is all through touch.
- MICR are used in banks because a large number of _____________ to be processed every day
- An input device that contains keys users press to enter data and instructions into a computer
- refers to the program that you interact with to perform specific computer tasks
- an optical device that projects an image (or moving images) onto a surface, commonly a projection screen
- is by far the most common type of computer
- displays an online advertisement in a banner or pop-up window
- one byte contains 8 _____
Down
- Pointing device that fits under the palm of your hand comfortably
- ______________Scanner device used for reading bar coded data (data in form of light and dark lines).
- The process of using the personal computer and page layout software to combine text and graphics to create publication documents such as newsletters, brochures, books, etc.
- input device which converts analog information into digital form.
- is a computer that combines the case, monitor, keyboard and mouse in one unit
- Allows user to perform maintenance-type tasks usually related to managing a computer, its devices or its programs
- one byte are needed to store one ____________
- a series of instructions that tells the computer to do and how to do it
- An input device that contains keys users press to enter data and instructions into a computer
- is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
18 Clues: one byte contains 8 _____ • is by far the most common type of computer • one byte are needed to store one ____________ • displays an online advertisement in a banner or pop-up window • Pointing device that fits under the palm of your hand comfortably • input device which converts analog information into digital form. • ...
Technology 2025-07-31
Across
- A company that makes electric cars.
- Instructions written for a computer.
- A large, organized set of data.
- Used to play games.
- A step-by-step process to solve problems.
- Picks up or sends signals.
- Stores data online.
- Storage space in a computer.
- Pictures or visuals on screen.
- Software meant to harm computers.
- A GPS system for vehicles.
- Technology using the tiniest parts of matter.
- A machine that can do tasks automatically.
- Apple’s virtual assistant.
- How you control or interact with a machine.
- A camera that connects to the internet.
- Tiny circuits in most electronics.
- A group of connected computers.
- Data entered into a computer.
- Sending files to the internet.
- Related to the brain or AI.
- A flash of electricity or a fastener.
- Computers that can learn or solve problems.
- Basic system that starts a computer.
- Restart your computer or device.
- To find and fix computer errors.
- Programs that run on a device.
- A way to compress files.
- A tiny dot on a screen.
- Detects changes like motion or light.
- Where data is kept.
- Another popular coding language.
- The brain of the computer.
- A button on a keyboard.
- Software built into a device.
- A mini app or tool on a screen.
- A computer that sends data to others.
- A device that moves characters in video games.
- Information stored or used by devices.
- A digital letter sent over the internet.
- A tool to compress audio or video.
- Related to the internet or computers.
- The physical parts of a device.
- The core part of an operating system.
- To lock up data so others can't read it.
- A word used to describe tech that can "think."
- A connection point in a network.
- A computer that shares information.
- Protects a computer from harm.
- A smaller measure of digital storage.
- A tool used for online meetings.
- Code for building websites.
- A flat surface that works like a mouse.
- Short for “technology.”
- A person who designs and builds tech.
- The part you look at on a device.
Down
- Wireless connection for short distances.
- Small code that runs a task.
- Getting files from the internet.
- A strong, focused beam of light.
- A device that moves the cursor on screen.
- Connects your home to the internet.
- A system that apps run on.
- A first model of a new invention.
- Not real but computer-based.
- Very tiny technology.
- A tiny computer part.
- A wireless internet connection.
- A machine that makes paper copies.
- Used to send or receive information.
- Data a computer sends out.
- A strip of buttons on a screen.
- Powers up your device.
- Used for typing.
- A measure of digital storage.
- Sends WiFi through your house.
- Provides power to devices.
- Entering your username and password.
- A computer screen.
- A program used to view websites.
- Watching videos or music online in real-time.
- The rules of coding.
- Orbits Earth and sends signals.
- A system to find locations using satellites.
- A set of instructions for a computer.
- A device used to call or message others.
- The sound of a mouse or selection.
- Another name for the internet.
- Copies paper to a computer.
- Using machines to do tasks automatically.
- A piece of glass that focuses light.
- A flying robot controlled remotely.
- A machine for playing video games.
- A popular programming language.
- A language using 0s and 1s.
- A small software program for phones or tablets.
- The main board inside a computer.
- The power source for early engines.
- A wired internet connection.
- The science of light and lenses.
100 Clues: Used for typing. • A computer screen. • Used to play games. • Stores data online. • Where data is kept. • The rules of coding. • Very tiny technology. • A tiny computer part. • Powers up your device. • A tiny dot on a screen. • A button on a keyboard. • Short for “technology.” • A way to compress files. • Picks up or sends signals. • A system that apps run on. • A GPS system for vehicles. • ...
Technology 2025-07-31
Across
- A company that makes electric cars.
- Instructions written for a computer.
- A large, organized set of data.
- Used to play games.
- A step-by-step process to solve problems.
- Picks up or sends signals.
- Stores data online.
- Storage space in a computer.
- Pictures or visuals on screen.
- Software meant to harm computers.
- A GPS system for vehicles.
- Technology using the tiniest parts of matter.
- A machine that can do tasks automatically.
- Apple’s virtual assistant.
- How you control or interact with a machine.
- A camera that connects to the internet.
- Tiny circuits in most electronics.
- A group of connected computers.
- Data entered into a computer.
- Sending files to the internet.
- Related to the brain or AI.
- A flash of electricity or a fastener.
- Computers that can learn or solve problems.
- Basic system that starts a computer.
- Restart your computer or device.
- To find and fix computer errors.
- Programs that run on a device.
- A way to compress files.
- A tiny dot on a screen.
- Detects changes like motion or light.
- Where data is kept.
- Another popular coding language.
- The brain of the computer.
- A button on a keyboard.
- Software built into a device.
- A mini app or tool on a screen.
- A computer that sends data to others.
- A device that moves characters in video games.
- Information stored or used by devices.
- A digital letter sent over the internet.
- A tool to compress audio or video.
- Related to the internet or computers.
- The physical parts of a device.
- The core part of an operating system.
- To lock up data so others can't read it.
- A word used to describe tech that can "think."
- A connection point in a network.
- A computer that shares information.
- Protects a computer from harm.
- A smaller measure of digital storage.
- A tool used for online meetings.
- Code for building websites.
- A flat surface that works like a mouse.
- Short for “technology.”
- A person who designs and builds tech.
- The part you look at on a device.
Down
- Wireless connection for short distances.
- Small code that runs a task.
- Getting files from the internet.
- A strong, focused beam of light.
- A device that moves the cursor on screen.
- Connects your home to the internet.
- A system that apps run on.
- A first model of a new invention.
- Not real but computer-based.
- Very tiny technology.
- A tiny computer part.
- A wireless internet connection.
- A machine that makes paper copies.
- Used to send or receive information.
- Data a computer sends out.
- A strip of buttons on a screen.
- Powers up your device.
- Used for typing.
- A measure of digital storage.
- Sends WiFi through your house.
- Provides power to devices.
- Entering your username and password.
- A computer screen.
- A program used to view websites.
- Watching videos or music online in real-time.
- The rules of coding.
- Orbits Earth and sends signals.
- A system to find locations using satellites.
- A set of instructions for a computer.
- A device used to call or message others.
- The sound of a mouse or selection.
- Another name for the internet.
- Copies paper to a computer.
- Using machines to do tasks automatically.
- A piece of glass that focuses light.
- A flying robot controlled remotely.
- A machine for playing video games.
- A popular programming language.
- A language using 0s and 1s.
- A small software program for phones or tablets.
- The main board inside a computer.
- The power source for early engines.
- A wired internet connection.
- The science of light and lenses.
100 Clues: Used for typing. • A computer screen. • Used to play games. • Stores data online. • Where data is kept. • The rules of coding. • Very tiny technology. • A tiny computer part. • Powers up your device. • A tiny dot on a screen. • A button on a keyboard. • Short for “technology.” • A way to compress files. • Picks up or sends signals. • A system that apps run on. • A GPS system for vehicles. • ...
Unit 4: Chemical Reactions 2021-11-13
Across
- One capital/shape type; can not break; atoms same
- Change type with substance remaining the same
- Liquid plus liquid makes this solid
- Change type with new substance being formed
- Proportion of number of each atom type
- With >1 type of substance that are not attached
- Shape or letters (& numbers) to represent matter
- Tiny building block has protons, neutrons, electrons
- With >1 chemical symbol touching is a chemical...
- Periodic Table abbreviation is a chemical...
Down
- Type of (color) change in chemical reactions
- Physical change (of state) that can go back
- Chemical reaction with oxygen to change color
- Element types on zig zag line of PTE
- Chemical change type that can't go back
- With >1 capital/shape type; can break chemically
- Element types on left side of Periodic Table
- Element types on right side of Periodic Table
- State of matter produced if fizzing/bubbling occurs
19 Clues: Liquid plus liquid makes this solid • Element types on zig zag line of PTE • Proportion of number of each atom type • Chemical change type that can't go back • Physical change (of state) that can go back • Change type with new substance being formed • Type of (color) change in chemical reactions • Element types on left side of Periodic Table • ...
Computer Hardware & Software 2025-04-11
Across
- Makes hardware useful
- A true or false statement
- Central processing unit
- Uses pixels to create an image
- short for modulator demulator
- microsoft program that helps make presentations
- cable that connect hard drive to the mother boarThe measurement of how fast a computer refreshes
- Random Access memory
Down
- Protects against malware
- Wireless internet connection
- Measurement of computer storage (Giga)
- main input device for computers
- Measurement computer storage (Mega)
- main output device of computer
- A language used for web design
- Something you can touch
- maker of central processing units
17 Clues: Random Access memory • Makes hardware useful • Central processing unit • Something you can touch • Protects against malware • A true or false statement • Wireless internet connection • short for modulator demulator • main output device of computer • A language used for web design • Uses pixels to create an image • main input device for computers • maker of central processing units • ...
Corinne S. Common Terms 2026-03-12
Across
- What websites often ask users to accept before continuing to browse the website, data stored in the browser to identify the user’s computer.
- Wireless connection between electronic devices that allows them to communicate, often used to connect to wireless headphones/ airpods.
- The link address of a website on a user’s browser.
- Online cloud storage accessible from a web browser that users can access along with Docs or Slides.
- File format of an electronic image that cannot be editied by anyone else
- A group of software apps, such as Word or Powerpoint.
- To save files or apps to your computer from the internet.
- Allows the user to connect their computer with other devices like printers and keyboards.
- To extract data from a file or program.
Down
- An online cloud storage users can access on their browser along with Powerpoint and Word
- The physical machinery and elements of your computer, such as the keyboard.
- Where the icons are when you start your computer
- A type of file which supports animated images.
- A program people use to access the internet and websites everyday.
- Virtual programs and instructions built into the computer to direct the computer on how to work and process.
- Displays images and allows users to view images and information on their computer.
- To send files or apps from your computer to the internet.
17 Clues: To extract data from a file or program. • A type of file which supports animated images. • Where the icons are when you start your computer • The link address of a website on a user’s browser. • A group of software apps, such as Word or Powerpoint. • To send files or apps from your computer to the internet. • To save files or apps to your computer from the internet. • ...
CS Review Puzzle 2024-10-15
Across
- A type of hacking that doesn't require code
- A Faster version of hard drives
- The _____ is measured in GHz
- How the computer takes in and sends out signals
- The software that manages the computer
- A more secure to protect you information
- The ____ has 2 parts called the north and south bridge
Down
- A type of memory that holds one number
- The part of the CPU that controls it
- The process The CPU goes through
- The brain of the computer
- The ____ draws heat away from the CPU
- A part of computer that connects everything
- The basic tools on a computer
- 8 bits is a ____
- An extended version of ASCII
16 Clues: 8 bits is a ____ • The brain of the computer • The _____ is measured in GHz • An extended version of ASCII • The basic tools on a computer • A Faster version of hard drives • The process The CPU goes through • The part of the CPU that controls it • The ____ draws heat away from the CPU • A type of memory that holds one number • The software that manages the computer • ...
YOLO 2022-11-15
Across
- teasing coming from both sides but can turn hurtful.
- A lung disease that is caught by inhaling silica
- Lighthearted joking that can quickly be hurtful
Down
- a type bullying that can cause suicide
- a synonym of bullying
- something that can cause EMOTIONAL DAMAGE or physical damage. Other types are also there.
- Hello your computer has virus
7 Clues: a synonym of bullying • Hello your computer has virus • a type bullying that can cause suicide • Lighthearted joking that can quickly be hurtful • A lung disease that is caught by inhaling silica • teasing coming from both sides but can turn hurtful. • something that can cause EMOTIONAL DAMAGE or physical damage. Other types are also there.
Eva F. 2024-09-19
Across
- software that runs on computer devices
- the address of a web page
- An image that is animated of screen
- a piece of computer hardware that is used to display images
- a computer program that displays your web
- a worldwide network that links computers. It connects billions of electronics together
- a collection of instructions, data and program that tells the computer to do that task
Down
- is the primary display to organize icons on the screen
- is what comes between the @ in your email address
- the short-range wireless interconnection of phones, computer and other devices
- a way to save organize and too save your data on the internet
- to transfer, move or copy data
- Used to connect computers with phones and keyboards
- the physical features on a computer or machinery on a computer
- a wireless networking technology that uses radio waves that allow all devices to connect to the internet
- it's all the things that you can access on the internet
16 Clues: the address of a web page • to transfer, move or copy data • An image that is animated of screen • software that runs on computer devices • a computer program that displays your web • is what comes between the @ in your email address • Used to connect computers with phones and keyboards • is the primary display to organize icons on the screen • ...
Cybercrime crossword 2021-07-08
Across
- - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - legally institutionalized rights to own and control goods.
- - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- - proof of identity is an essential component to identify intruder.
- - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
- - tools used to dismantle the hardware for seizure.
- - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
- - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
- - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- - terrorist activity that targets computer networks and information systems for attack.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- - refers to the transmission of information through ICT media, including voice, video and other forms of data.
- - remember that often, latent prints can be taken from disks or other storage media or hardware.
- - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
- - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
- - pieces of computer code that can infect computer system causing disruptions to their normal operation.
- - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- - refers to the modification or change, in form or substance, of an existing computer data or program.
- - these can be used to store copies of files from the computer for use in his investigation.
- - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
Down
- - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
- - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
- – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
- - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
- - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
- - the right to be left alone; freedom from observation and interference from others.
- - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
- - Intentional alteration or reckless interference with the functioning of a computer or computer network.
- - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
- - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
- - refers to a computer or a computer network, the electronic medium in which online communication takes place
- - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
- - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- - the act of copying digital material posted online into the storage medium on one’s computer.
- - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- - the interactional space or environment created by linking computers together into a communication net5work.
- - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
49 Clues: - tools used to dismantle the hardware for seizure. • - legally institutionalized rights to own and control goods. • - proof of identity is an essential component to identify intruder. • - the right to be left alone; freedom from observation and interference from others. • ...
RODRIGUEZ, ANGELA B. CYBERCRIME INVESTIGATION 2021-07-17
Across
- - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
- - remember that often, latent prints can be taken from disks or other storage media or hardware.
- - terrorist activity that targets computer networks and information systems for attack.
- - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
- - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
- - the act of copying digital material posted online into the storage medium on one’s computer.
- - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
- - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
- - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
- - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
- - refers to the modification or change, in form or substance, of an existing computer data or program.
- - the interactional space or environment created by linking computers together into a communication net5work.
- - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
- - refers to the transmission of information through ICT media, including voice, video and other forms of data.
- - Intentional alteration or reckless interference with the functioning of a computer or computer network.
- - pieces of computer code that can infect computer system causing disruptions to their normal operation.
- - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
- - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
- - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
- - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
Down
- - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- - legally institutionalized rights to own and control goods.
- - proof of identity is an essential component to identify intruder.
- - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- - refers to a computer or a computer network, the electronic medium in which online communication takes place
- - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
- – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - tools used to dismantle the hardware for seizure.
- - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- - the right to be left alone; freedom from observation and interference from others.
- - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
- - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
- - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
- - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- - these can be used to store copies of files from the computer for use in his investigation.
- - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
49 Clues: - tools used to dismantle the hardware for seizure. • - legally institutionalized rights to own and control goods. • - proof of identity is an essential component to identify intruder. • - the right to be left alone; freedom from observation and interference from others. • ...
CYBERCRIME 2021-07-17
Across
- - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
- - proof of identity is an essential component to identify intruder.
- - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
- - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
- - refers to the modification or change, in form or substance, of an existing computer data or program.
- - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- - terrorist activity that targets computer networks and information systems for attack.
- - Intentional alteration or reckless interference with the functioning of a computer or computer network.
- - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
- - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- - remember that often, latent prints can be taken from disks or other storage media or hardware.
- - the right to be left alone; freedom from observation and interference from others.
- - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- - legally institutionalized rights to own and control goods.
- - pieces of computer code that can infect computer system causing disruptions to their normal operation.
- - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- - refers to a computer or a computer network, the electronic medium in which online communication takes place
- - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
- - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
Down
- - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
- - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
- - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
- - these can be used to store copies of files from the computer for use in his investigation.
- - the act of copying digital material posted online into the storage medium on one’s computer.
- - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
- - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - refers to the transmission of information through ICT media, including voice, video and other forms of data.
- - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
- - tools used to dismantle the hardware for seizure.
- - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
- - the interactional space or environment created by linking computers together into a communication net5work.
- - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
- - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
- - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
- - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
- - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
49 Clues: - tools used to dismantle the hardware for seizure. • - legally institutionalized rights to own and control goods. • - proof of identity is an essential component to identify intruder. • - the right to be left alone; freedom from observation and interference from others. • ...
TECHNOLOGY VOCABULARY 2021-07-28
Across
- of or relating to or being a communications network in which the bandwidth can be divided and shared by multiple simultaneous signals (as for voice or data or video)
- a computer providing shared resources to a computer network
- set up for a particular purpose
- RAM memory that is set aside as a specialized buffer storage
- transfer data into a database or document
- transfer a file or program to a smaller computer
- the process in which output of a system is returned to input
- any computer that is hooked up to a computer network
- a networked computer that provides access to client stations
Down
- the exclusive right to sell a work
- user interface a user interface based on graphics instead of text
- a part of RAM used for temporary storage of data
- the activity of converting data or information into code
- a compact disk that is used with a computer
- or circuits
- any small compartment
16 Clues: or circuits • any small compartment • set up for a particular purpose • the exclusive right to sell a work • transfer data into a database or document • a compact disk that is used with a computer • a part of RAM used for temporary storage of data • transfer a file or program to a smaller computer • any computer that is hooked up to a computer network • ...
Per 4 Chapter 11 - Espino, C 2023-03-03
Across
- A port that can provide power to charge and run an unpwered attached device such as a flash drive.
- The part of a computer that temporarily stores applications, documents, and system operating info.
- Combines hardware and software attributes.
- An RJ-45 port that connects a device to a wired network.
- An electronic circuit card that inserts into an expansion slot.
- A mouse that has an optical sensor.
- A device that shows computer output.
- A tangible physical item.
- A signal using 1s and 0s to represent data.
- A devices that converts AC voltage to DC voltage so a computer can power on all devices.
- An application consisiting of a set of instructions that makes hardware work.
- Special software that allows an operating system to access a piece of hardware.
- A storage device that accepts disks.
- A sealed data storage medium in which info is stored.
- A motherboard socket into which adapters are connected
- A wireless technology for personal area networks. (PAN)
- A USB port that connects to a USB HUB or USB device
Down
- A DIN connector on the motherboard that should only accpet a mouse cable.
- Approximately 1 million Bytes of info. 1,048,576
- piece of software that loads a computer and makes it operational.
- A type of video port on PCIe adapters or on apple computers.
- A type of digital visual interface connector from the computer port to the display.
- 1 trillion bytes of information. 1,099,511,627,776
- A wireless input/output technology. Has a longer range than infrared.
- What is The main circuit board of a computer called?
- Allows user to input info into the computer.
- A port that connects a computer to a wired network.
- A connector located on the motherboard or on a separate adapter.
- An electronically charged 1 or 0.
- A cable without an embedded ship to boost signal strength. Short and thicker than an active cable.
- Other name for Personal Computer.
- Approximately 1000 Bytes of info. 1,024
32 Clues: A tangible physical item. • An electronically charged 1 or 0. • Other name for Personal Computer. • A mouse that has an optical sensor. • A device that shows computer output. • A storage device that accepts disks. • Approximately 1000 Bytes of info. 1,024 • Combines hardware and software attributes. • A signal using 1s and 0s to represent data. • ...
Lesson 24 vocab 2015-04-16
Across
- security that examines a fingerprint, a voice pattern, or the iris or retina of the eye.
- computer configuration in which one or more computers on the network acts as a server.
- a server that acts as an intermediary between a user and the Internet.
- link form one computer to another through which data can be transmitted.
- high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network.
- a network configuration that allows selected outside organizations to access internal information systems.
- a computer that uses the service of another program.
- The world's collection of interconnected commercial and government-owned voice-oriented systems.
- computer architecture in which all of the computers on a network are equal and there is no computer designated as the server.
- a junction where information arrives from connected computers or peripheral devices and is then forwarded in one or more directions to other computers and devices.
- an Internet connection technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines.
- computer network that covers a large geographical are. Most WANs are made up of several connected LANs
Down
- a device that uses coaxial cable to send and receive data.
- a type of fiber-optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitized voice channels.
- a device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination.
- An ISP that provides connection speeds more than 30 times faster than dial-up connection-from 384kbps to 2.0Mbps.
- communications hardware device that facilitates the transmission of data.
- a variation of a LAN that uses no physical wires.
- a combination of hardware and software that creates a buffer between an internal network and the Internet to prevent unauthorized access.
- a computer that handles requests for data, e-mail, file transfers, and other network services from other computers (clients).
- a device on the network.
- a series of connected personal computers, workstations, and other devices, such as printers or scanners, within a confined space, such as an office building.
- expert computer user who invades someone else's computer either for personal gain or simply for the satisfaction of being able to do it.
- The largest network used as a communication tool.
- a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside of the organization.
- a recent wireless technology that can deliver maximum speeds of up to 7Mbps to your cell phone, home computer, or car. Stands for Worldwide Interoperability for Microwave Access.
26 Clues: a device on the network. • a variation of a LAN that uses no physical wires. • The largest network used as a communication tool. • a computer that uses the service of another program. • a device that uses coaxial cable to send and receive data. • a server that acts as an intermediary between a user and the Internet. • ...
Internet 2014-11-26
Across
- A program that appears legitimate but which performs some harmful activity when it is run. It may be used to locate password information, or make the system more vulnerable to future entry, or simply destroy programs or data on the hard disk drive.it does not replicate.
- A standard method of connecting devices such as keyboards and printers to a computer.
- A software application for retrieving, presenting and navigating information resources on the World Wide Web.
- A compressed file format for emailing files or downloading.
- Transfer of a file, e.g. a video, from a central computer to your computer.
- Unwanted or junk email sent to lots of recipients at the same time.
- A high-speed connection to the Internet.
- For security, data is translated into a secret code according to a set of rules in a special 'key'.
- Provides information about the content of a digital item
- A venue that offers a WiFi Internet connection.
- A type of website that encourages collaboration by allowing users to add, edit and remove content.
- A form of Internet fraud that aims to steal valuable information such as credit card details, usernames and passwords.
- A system designed to prevent unauthorised access to your computer when connected to a network such as the Internet.
- Small text files that are sent to your computer from certain websites. They track your behaviour and transactions.
- Devices connected together to allow communication and exchange of data.
Down
- Working from home but staying in touch with others with the help of technology.
- A program designed to cause other programs on a computer to malfunction or stop working altogether.
- Transfer a file from your computer to a central computer
- Short for 'web log', a shared online journal where people can post diary entries about their personal experiences and hobbies.
- Gives the creator of an original work exclusive rights regarding that work for a certain period of time, including its publication, distribution and adaptation.
- Software that can be installed on your computer without your knowledge, which collects information about your logins and passwords and sends details to another computer on the Internet.
- The amount of data that can fit through an Internet connection.
- Allows the exchange of data over short distances from fixed and mobile devices.
- A miniature electronic circuit used to control computers and most other electronic devices.
- A type of password applied to a credit or debit card.
- Wireless fidelity.
- Programs that give instructions to a computer and which allow the user to carry out different tasks.
- Software that is designed to cause problems for users.
- Someone who gains unauthorised access to a computer in order to obtain data stored on it.
- Part of a program that helps the user to create a new document, chart, etc.
30 Clues: Wireless fidelity. • A high-speed connection to the Internet. • A venue that offers a WiFi Internet connection. • A type of password applied to a credit or debit card. • Software that is designed to cause problems for users. • Transfer a file from your computer to a central computer • Provides information about the content of a digital item • ...
My project crosword 2020-05-06
Across
- A learning program
- the Part of the computer that stores the data that alowsyou to read and accsess it
- the person that writes the code
- a structered set of data held in a computer
- inverse function to exponentiation.
- the form that electrons are in when there not measured
- It performs computions using qubits
Down
- an electronic device that stores or proceses information
- the link betwwen all the other compontents of the computer
- A set of things working together to get something done
- A repeted design
- A close reaction that can happen between two qubits
- A finite sequence with instructures.
- A detielted examination of a structure of something
- the brain of the computer
- Visual images or designs on some suface
- the person that makes the software
17 Clues: A repeted design • A learning program • the brain of the computer • the person that writes the code • the person that makes the software • inverse function to exponentiation. • It performs computions using qubits • A finite sequence with instructures. • Visual images or designs on some suface • a structered set of data held in a computer • ...
ICT BASES 2017-10-06
Across
- de centrale chip die al het rekenwerk doet, het hart van de computer
- Geordende reeks instructies om een probleem op te lossen
- Alle apparatuur, die niet tot een computer behoort, maar daar wel mee is verbonden
- Het is een computerprogramma om webpagina’s mee te kunnen bekijken
- MS Word om te schrijven brieven
- Dit zijn mensen die zonder toestemming iemand zijn computer binnendringen en er gegevens inkijken stelen beschadigen of vernietigen
- Klein computerprogramma, dat zichzelf kopieert, zich in andere programma's nestelt en zich verspreidt via kopieën van programma's
- programmaatjes worden vervaardigd die onder meer in webpagina's kunnen worden opgenomen
Down
- Bestanden van eigen computer naar een andere computer kopiëren
- programma's die op een computer kunnen worden uitgevoerd
- het grootste onderdeel van uw computer, en in de meeste gevallen is het moederbord gemonteerd langs de zijkant van uw kast van de computer
- versturen pakketjes tussen twee computers
- zelfgekozen naam, een punt,3 letters die erachter komen
- apparaat dat plaatjes tekstfragmenten en driedimensionale afbeeldingen optisch aftast en omzet in een digitaal beeld dat met de computer bewerkt kan worden
- voor ongevraagde reclame via e-mail
- Tekst die door een tekstverwerkingsprogramma onderaan iedere pagina wordt afgedrukt
- Een verwijzing naar bijvoorbeeld een ander deel op de pagina van een website of een ander document op het world wide web
- Veelgebruikte extensie voor een afbeelding in JPEG-formaat
- een programma dat uw computer beschermt tegen de gevaren van buitenaf
19 Clues: MS Word om te schrijven brieven • voor ongevraagde reclame via e-mail • versturen pakketjes tussen twee computers • programma's die op een computer kunnen worden uitgevoerd • Geordende reeks instructies om een probleem op te lossen • zelfgekozen naam, een punt,3 letters die erachter komen • Veelgebruikte extensie voor een afbeelding in JPEG-formaat • ...
Input devices 2022-11-08
Across
- a pen-shaped device for direct interaction with a computer through a cathode-ray tube display.
- someone who delivers a speech or a device that makes sounds louder.
- a device that translates sound vibrations in the air into electronic signals and scribes them to a recording medium.
- a panel of keys that operate a computer or typewriter.
- a computer cursor control device used in many notebook and laptop computers.
- read barcodes on the products sold in shops and send the price to the computer in the cash register.
- an input device that can be used for controlling the movement of the cursor or a pointer in a computer device.
- a device for recording visual images in the form of photographs, film, or video signals.
- a device made for scanning photographic film directly into a computer without the use of any intermediate printmaking.
- Magnetic ink character recognition.
- small handheld device which is moved across a mat or flat surface to move the cursor on a computer screen.
Down
- this device connected to a computer, allowing its images to be seen by internet users.
- a device that captures images from photographic prints, posters, magazine pages and similar sources for computer editing and display.
- a device that is used to project rays of light, especially an apparatus with a system of lenses for projecting slides or film on to a screen.
- a summarizing visualization designed to provide a lot of information at one glance.
- this device used to capture lines of text, barcodes and numbers.
- a support framework with attached electronic devices that is worn on the head
- can capture text, colour images and even small 3D objects.
18 Clues: Magnetic ink character recognition. • a panel of keys that operate a computer or typewriter. • can capture text, colour images and even small 3D objects. • this device used to capture lines of text, barcodes and numbers. • someone who delivers a speech or a device that makes sounds louder. • ...
Ionic Bonding Review 2023-11-15
Across
- NaCl
- Manganese (II) Oxide
- K2S
- Barium Iodide
- Cations are these types of elements
- _____ give up their electrons to anions
- Copper (I) Oxide
- Be2N2
- MgSe
- CaTe
- SrBr2
Down
- Anions are these types of elements
- When naming ionic bonds, we use _________ _______ for transition and rare earth metals
- Chlorine has (word) _____ valence electrons
- Li3P
- Iron (III) Chloride
- ____ electrons are the electrons on the outermost ring of an element's Bohr Model
- Rb2O
- These elements have a full octet
- Cesium Fluoride
20 Clues: K2S • NaCl • Li3P • Rb2O • MgSe • CaTe • Be2N2 • SrBr2 • Barium Iodide • Cesium Fluoride • Copper (I) Oxide • Iron (III) Chloride • Manganese (II) Oxide • These elements have a full octet • Anions are these types of elements • Cations are these types of elements • _____ give up their electrons to anions • Chlorine has (word) _____ valence electrons • ...
digital citizenship/Naliya 2022-12-14
Across
- error in a program that keeps it from running as it should
- application that runs on a computer or workstation and relies on a server to perform some operations
- a global network connecting millions of computers
- small file that some websites attach to a user’s hard drive while the user is browsing that site; they can be used to track user preferences, speed loading times, and for advertising.
- people who have subscribed to an account’s updates on social media
- direct message, on Twitter or other social media platform. DMs allow a user to directly contact another user, without the messages being seen in a public forum
- online commenter whose intent is to attack views expressed online; these attacks are often personal
- news false information published as being authentic
- used to describe online harassment, which can be in the form of flames, comments made in chat rooms, the sending of offensive or cruel e-mail, or even harassing others by posting on blogs, Web pages or social networking sites
- short for “robot,” a program, or sequence of computer code, that runs on the Internet; bots can be created to accomplish a specific task more quickly than a human
- short for “application,” a computer program that performs a specific set of functions
- machine or external component that runs independently of a computer
Down
- being believed or accepted as true, real, or honest
- having a secret identity
- An alert that notifies a blog poster of a response to their post
- a way to get information out of a computer
- sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads.
- program ist of instructions that causes a computer to behave in a certain way
- online discussion group.
- instruction to a computer or device to perform a specific task
- repeating code
- to write computer instructions
- an attitude or prejudice that favors a way of feeling or acting over another
23 Clues: repeating code • having a secret identity • online discussion group. • to write computer instructions • a way to get information out of a computer • a global network connecting millions of computers • being believed or accepted as true, real, or honest • news false information published as being authentic • error in a program that keeps it from running as it should • ...
charvey/4th 2020-09-10
Across
- website that brings people together to talk, share ideas and interests, or make new friends
- a metaphysical space created by networked computers where users may shop chat or learn
- discussion groups over the Internet that links a group of people together with common interests via e-mail
- points to a location where data maybe located
- a location for storing files on a computer
- a text based communication that is live or in real time
- an icon, graphic, or text that links to another file or object
- the name given to a user on a computer or computer network
- a method of saving a web pages address
- a name email or other personal information that enables others to get a hold of someone
- locations with information on frequently asked
- an area where users share thoughts, ideas, or help by posting text messages
- another way of describing reloading or updating what is being displayed or stored
- a computer or another device connected to a computer network
- the act of browsing the Internet by going from one web page to another web page
Down
- a software or hardware device that accepts and responds to requests made over a network
- a small set of instructions designed to be scheduled and executed by the CPU independently of the parent process
- when a user, computer, or another device connects to the Internet.
- information placed in front of other data known
- a term used to describe computer storage
- the body or payload.
- the location of a website
- a term used to describe the unwritten rules of Internet courtesy.
- sending a file to another computer through a modem or network.
- the act of moving the visual portions of a window up, down, left, or right, to see additional information on the window
25 Clues: the body or payload. • the location of a website • a method of saving a web pages address • a term used to describe computer storage • a location for storing files on a computer • points to a location where data maybe located • locations with information on frequently asked • information placed in front of other data known • ...
Week 8 Review 2020-10-29
Across
- To move up and down through a document or screen to reveal more information.
- When held down and another key is hit, that letter becomes a capital
- A part of a program that usually causes the computer to malfunction; often fixed with a patch or update.
- A movable/blinking marker that shows the position of where the next letter will be placed.
- Bar at the bottom of the screen that shows different information about the application.
- A picture placed inside of a document.
- Transferring data from your computer to a different computer.
- A list of options.
- A way of communicating wirelessly over short distances between devices.
- The small dots of color that make up all images on a computer screen.
- A small picture used to represent a file or program.
- The hardware device used to enter letters into the computer.
- To make text or pictures appear the way you wish by changing font, font color, size, etc.
Down
- Transforming data into different code so only people with the secret key can read it.
- The digital environment where communication over computer networks occurs.
- A program that searches for and identifies items in a database that match keywords specified by the user.
- Unwanted emails that mostly consist of promotional materials, also known as spam.
- A small flexible disk used for storing computer data.
- A group of characters used to verify a user into a system.
- Random access memory; type of storage that changes.
- A person who uses computers to gain unauthorized access to information.
- Read-only memory; the type of storage that is not changed even when the computer is turned off.
- To remove the previous keystroke or formatting.
- A self contained program or piece of software; typically downloaded to devices.
- To remove something typed, a picture, or other item.
25 Clues: A list of options. • A picture placed inside of a document. • To remove the previous keystroke or formatting. • Random access memory; type of storage that changes. • A small picture used to represent a file or program. • To remove something typed, a picture, or other item. • A small flexible disk used for storing computer data. • ...
Technology 2026-02-16
Across
- A machine for printing text or pictures onto paper.
- A person with the ability to influence potential buyers by promoting items on social media.
- A pair of small speakers worn over or in the ears.
- A device used to take photographs or record video.
- A self-contained program or piece of software designed for a mobile device.
- A small handheld device used to control the cursor on a computer screen.
- A portable computer small enough to use on your lap.
- A wireless technology used for exchanging data over short distances.
- A set of related web pages located under a single domain name.
- A photograph that one has taken of oneself, typically with a smartphone.
- A network of remote servers used to store and manage data online.
- A panel of keys used to type text into a computer.
- The process of listening to or watching content directly from the internet without downloading.
- A set of rules or processes to be followed by a computer to solve a problem.
Down
- A mobile phone that performs many of the functions of a computer.
- An image or video that is circulated rapidly and widely from one user to another.
- Facts and statistics collected together for reference or analysis.
- A word or phrase preceded by a hash sign used to identify a specific topic.
- The flat surface on a television or computer directly showing images and data.
- A global computer network providing a variety of information and communication facilities.
- People who subscribe to or track an account on a social media platform.
- A message or alert that appears on your device to give you information.
- A secret word or phrase used to gain access to a computer system or page.
- A container consisting of cells that provides electrical power to a device.
- Messages distributed by electronic means from one system user to another.
25 Clues: A pair of small speakers worn over or in the ears. • A device used to take photographs or record video. • A panel of keys used to type text into a computer. • A machine for printing text or pictures onto paper. • A portable computer small enough to use on your lap. • A set of related web pages located under a single domain name. • ...
Chapter 11: Distributing and Marketing 2014-12-01
Across
- offering a product for sale in a small area for a limited period of time to see how well it sells before offering it nationally
- business transactions conducted over computer networks, in particular the World Wide Web
- the role of the consumer as ruler of the market when determining the types of goods and services produced
- practice of setting prices close to those charged by other companies selling similar products
- selling a new product at a low price to attract customers away from an established product
- use of advertising to inform consumers that a new or improved product or service is available and to persuade them to purchase it
- type of promotion using a mailer that usually includes a letter describing the product or service and an order blank or application form
- amount of satisfaction one gets from a good or service
Down
- businesses that purchase large quantities of goods from producers for resale to other businesses
- gatering, recording, and analyzing data about the types of goods and services that people want
- info gathered by researchers about possible users of a product based on such characteristics as age, gender, income, education, and location
- routes by which goods are moved from producers to consumers
- series of stages that a product goes through from first introduction to complete withdrawal from the market
- businesses that sell consumer goods directly to the public
- all activities needed to move goods & services from producers to consumer
15 Clues: amount of satisfaction one gets from a good or service • businesses that sell consumer goods directly to the public • routes by which goods are moved from producers to consumers • all activities needed to move goods & services from producers to consumer • business transactions conducted over computer networks, in particular the World Wide Web • ...
NOVA Cybersecurity Lab Glossary 2022-10-03
Across
- a fictional virus modeled after the Stuxnet virus that is able to damage physical infrastructure.
- extra copies of computer files that can be used to restore files that are lost or damaged.
- a computer program that can copy itself and cause harm in various ways, such as stealing private
- the amount of data that can pass through a network or part of a network per second.
- or destroying data.
- a computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
- a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
- someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
- a company or organization that gives users and devices access to the Internet.
- two or more interconnected devices that can exchange data.
Down
- a type of malware that holds victims’ computer files hostage by locking access to them or encrypting them.
- a distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
- attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
- code written in a programming language that instructs computers to perform specific tasks.
- a type of connection between devices that can exchange information and power supply.
- a data storage device that is used to store, back up, and transfer computer files.
- multiple computers on a network that are infected with a program that can be controlled remotely.
- software designed to block malware from entering protected networks.
- programs that harm computers, networks, or people.
- viruses, worms, ransomware, and other
- unsolicited emails sent to many addresses in order to make money through advertising or identity theft.
- a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
- the process of using codes to make readable information unreadable.
23 Clues: or destroying data. • viruses, worms, ransomware, and other • programs that harm computers, networks, or people. • two or more interconnected devices that can exchange data. • the process of using codes to make readable information unreadable. • software designed to block malware from entering protected networks. • ...
