| 100% | LAGS | 4 | Runs slowly, as a computer with weak Internet |
| 46% | IDLE | 4 | Like a computer with a running screensaver |
| 41% | LOSESTIME | 9 | Runs too slowly, as a watch (2 wds.) |
| 40% | SYNC | 4 | Match up, as a phone with a computer |
| 40% | COHOST | 6 | Run with someone, as a show |
| 38% | BOOT | 4 | Start, as a computer |
| 38% | BOOTUP | 6 | Start, as a computer |
| 38% | USES | 4 | Operates, as a computer |
| 38% | CRASHED | 7 | Froze, as a computer |
| 38% | INOPERATIVE | 11 | DOWN, as a computer |
| 37% | ERASE | 5 | Clean, as a computer disk |
| 37% | RERAN | 5 | Checked, as a computer program |
| 37% | RESCAN | 6 | Correct, as a computer image |
| 37% | DEBUG | 5 | Fix, as a computer program |
| 37% | UPLOAD | 6 | Transfer, as a computer file |
| 37% | HACK | 4 | Break into, as a computer |
| 37% | CONFIGURE | 9 | Assemble, as a computer system |
| 37% | HACKS | 5 | Accesses illegally, as a computer |
| 37% | ERASABLE | 8 | Unlocked, as a computer file |
| 37% | FATAL | 5 | Unrecoverable, as a computer error |
| 37% | ZIP | 3 | Compress, as a computer file |
| 37% | HACKS | 5 | Breaks into, as a computer |
| 37% | HACK | 4 | Access illegally, as a computer |
| 37% | UNZIP | 5 | Decompress, as a computer file |
| 37% | UNDO | 4 | Reverse, as a computer operation |
| 37% | ERASE | 5 | Wipe, as a computer drive |
| 37% | RAN | 3 | Executed, as a computer program |
| 37% | HACKED | 6 | Broke into, as a computer |
| 37% | OTNIGOL | 7 | Access, as a computer network |
| 37% | BOOT | 4 | Start (up), as a computer |