cyber security Crossword Puzzles
The Security & Exchange Acts Legacy 2025-02-13
Across
- regulates the exchanges on which securities are ____
- This act also helped regulate the ____ ______, enforce federal security laws, and required full disclosure of stock information.
- The Security & Exchange Acts Is still ____.
- this is about the _______ & exchange act
Down
- regulates secondary financial markets to ensure a transparent and fair _________ for investors. create transparency in the financial statements of corporations.
- The Security & Exchange Act was formed on ____ ___, 1934
- The Security & Exchange Act was considered a ______
- It is now one of many laws that control securities offerings in the ______.
- The Acts formation and purpose was to help prevent another Wall Street ____.
- register, regulate, and oversee brokerage firms, ______ agents, and clearing.
10 Clues: this is about the _______ & exchange act • The Security & Exchange Acts Is still ____. • The Security & Exchange Act was considered a ______ • regulates the exchanges on which securities are ____ • The Security & Exchange Act was formed on ____ ___, 1934 • It is now one of many laws that control securities offerings in the ______. • ...
Cyber Bullying 2020-03-08
Across
- recognize as being
- a person who pleads for a person, cause, or idea
- Interactive web journal or diary,the contents of which are posted online and which others can view
- an unfortunate person who suffers from adverse circumstances
- revenge
Down
- think about carefully; weigh
- The application of a set of criteria against which internet content is judged acceptable or not
- doctoring digital images so that the main subject is placed in a compromising or embarrassing situation.
- Someone who harms another through electronic devices
- to threaten, frighten, scare, coerce, terrify, and to alarm
10 Clues: revenge • recognize as being • think about carefully; weigh • a person who pleads for a person, cause, or idea • Someone who harms another through electronic devices • to threaten, frighten, scare, coerce, terrify, and to alarm • an unfortunate person who suffers from adverse circumstances • ...
Cyber-Bullying 2021-04-27
Across
- Something that no one should experience
- Do not share false ________ about someone
- Do not share any personal
- When online make sure you are _______ at all times
- Make sure you have _______ permission when online
- An individual that constantly bothers you in a repeated manner
Down
- Never accept or communicate with _______
- Social _______ has it's positives and negatives
- Cyberbullying can have a _______ affect on you
- If you view a form of cyberbullying make sure you _______ it
10 Clues: Do not share any personal • Something that no one should experience • Never accept or communicate with _______ • Do not share false ________ about someone • Cyberbullying can have a _______ affect on you • Social _______ has it's positives and negatives • Make sure you have _______ permission when online • When online make sure you are _______ at all times • ...
Cyber Crime 2021-05-19
Across
- a criminal activity conducted using computers and the internet. This includes fraud, internet scams, and identiy theft
- A technique used by hackers to redirect users to false websites without their knowledge.
- a scheme aimed at tricking you into providing sensitive information to scammers
- a type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return
- Computers that have been penetrated , compromised, and programmed to operate on the commands of an unauthorized remote user
Down
- theft When someone steals your personal information, like your Social Security number, and uses it to commit theft or fraud
- Software that compromises computers or networks with the intention of disrupting their intended functions or operations.
- A engineered attempt by malicious actors to deceive internet users into providing personal information such as usernames, passwords etc.
- The scrambling of information so that it is unreadable to those who do not have the code to unscramble.
- A verb meaning to gain unauthorized access into a computer system.
- pretending to be someone else to demand money, information or something of value
11 Clues: A verb meaning to gain unauthorized access into a computer system. • a scheme aimed at tricking you into providing sensitive information to scammers • pretending to be someone else to demand money, information or something of value • A technique used by hackers to redirect users to false websites without their knowledge. • ...
CYBER LAW 2021-09-03
Across
- the process of using Internet-based socializing and communication techniques to create, operate and manage activism of any type
- process of converting information into a digital
- Web page to summon different elements from diverse pages or servers to create a new Web page
- The communication via any electronic device of false data that damages a person's reputation
Down
- Using a computer to steal personal data
- the making, altering, use, or possession of a false writing in order to commit a fraud
- registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- when someone forcefully takes control of a website by cracking the password and later changing it
- Make sure a buyer and seller can identify themselves
- Business conducted electronically (buying/selling on web)
10 Clues: Using a computer to steal personal data • process of converting information into a digital • Make sure a buyer and seller can identify themselves • Business conducted electronically (buying/selling on web) • the making, altering, use, or possession of a false writing in order to commit a fraud • ...
Cyber Crimes 2022-03-24
Across
- Illegally preventing others to gain access to their personal accounts or websites
- Pretending to be someone else by using their personal information.
- Transferring money from one account to another without the permission of the account holder.
- Illegally copying and selling games or software.
Down
- Using a device to annoy, harass, intimidate or threaten a person online.
- Gaining unauthorized access into a computer network or someone's personal computer.
- Damaging information by deleting, adding false information or hiding it.
- using a device to intercept another person's device.
- Using the computer to create false documents such as cheques, legal documents and counterfeiting.
- Setting up fake websites to await unsuspecting persons to take the bait.
10 Clues: Illegally copying and selling games or software. • using a device to intercept another person's device. • Pretending to be someone else by using their personal information. • Using a device to annoy, harass, intimidate or threaten a person online. • Damaging information by deleting, adding false information or hiding it. • ...
Cyber Foundations 2022-04-07
Across
- The slide currrently selected or displayed
- The preset amount of time between slides as they advance automatically during a slide show
- The template will appear along with traditional information on how the template could be used
- A feature that allows you to create a show from scratch
Down
- Where you will find commands to perform common tasks in PowerPoint
- The visual appearance or images of something when looked at in a certain way
- an item of illustrative matter
- A graphic tool that allows you to create a visual representation of information and ideas
- A graphical computer display that can be superimposed on another
- The figure that appears when you are adding text to a slide
10 Clues: an item of illustrative matter • The slide currrently selected or displayed • A feature that allows you to create a show from scratch • The figure that appears when you are adding text to a slide • A graphical computer display that can be superimposed on another • Where you will find commands to perform common tasks in PowerPoint • ...
Cyber Safety 2022-04-12
Across
- A virus that modifies and deletes files
- A set of characters that grant admission
- To harm someone through the internet
- A virus that slows down your computer
- A virus that secretly damages your computer
Down
- A piece of code capable of a bad effects
- To copy from one computer system to another
- A virus that steals your information
- To scan through a website to gain info
- Software that is designed to disrupt
10 Clues: A virus that steals your information • To harm someone through the internet • Software that is designed to disrupt • A virus that slows down your computer • To scan through a website to gain info • A virus that modifies and deletes files • A piece of code capable of a bad effects • A set of characters that grant admission • To copy from one computer system to another • ...
Cyber Bullying 2013-02-12
Across
- Casual or unconstrained conversation or reports about other people, typically involving details that are not confirmed as being true.
- A widely held but fixed and oversimplified image or idea of a particular type of person or thing.
- social media site many people use.
- when someone wont leave you alone and says mean or hurtful things.
Down
- A statement of an intention to inflict pain, injury, damage, or other hostile action on someone.
- A secret word or phrase that must be used to gain admission to something.
- the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
- causing distress or injury: to say hurtful things.
- social media site that you "tweet" on.
- boldly assertive and forward; pushy.
10 Clues: social media site many people use. • boldly assertive and forward; pushy. • social media site that you "tweet" on. • causing distress or injury: to say hurtful things. • when someone wont leave you alone and says mean or hurtful things. • A secret word or phrase that must be used to gain admission to something. • ...
Cyber Bullying 2013-02-12
Across
- Casual or unconstrained conversation or reports about other people, typically involving details that are not confirmed as being true.
- A widely held but fixed and oversimplified image or idea of a particular type of person or thing.
- social media site many people use.
- when someone wont leave you alone and says mean or hurtful things.
Down
- A statement of an intention to inflict pain, injury, damage, or other hostile action on someone.
- A secret word or phrase that must be used to gain admission to something.
- the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
- causing distress or injury: to say hurtful things.
- social media site that you "tweet" on.
- boldly assertive and forward; pushy.
10 Clues: social media site many people use. • boldly assertive and forward; pushy. • social media site that you "tweet" on. • causing distress or injury: to say hurtful things. • when someone wont leave you alone and says mean or hurtful things. • A secret word or phrase that must be used to gain admission to something. • ...
Cyber safety 2024-05-02
Across
- the person making unkind comments
- places like instagram and snapchat
- where you go to get information from (not google)
- how you interact with a situation
- how you interact safely online
Down
- unkind or aggressive comments made over the internet
- the person who is being bullied
- given from other people to make you feel safe
- a good and fair action
- telling someone what is happening
10 Clues: a good and fair action • how you interact safely online • the person who is being bullied • the person making unkind comments • how you interact with a situation • telling someone what is happening • places like instagram and snapchat • given from other people to make you feel safe • where you go to get information from (not google) • ...
Cyber bullying 2024-06-14
Across
- Do you feel s
- a form of social media that makes the same sound as a clock
- What is it called when you speak to someone
- What is it called when you message people on your phone
- A safe person to go to
Down
- A device that you call on
- Someone that you t
- A big device that you do lots of gaming on
- A form of social media that starts with s
- A word you can say when your stuck somewhere and it starts with the letter h
10 Clues: Do you feel s • Someone that you t • A safe person to go to • A device that you call on • A form of social media that starts with s • A big device that you do lots of gaming on • What is it called when you speak to someone • What is it called when you message people on your phone • a form of social media that makes the same sound as a clock • ...
Cyber bullying 2024-06-11
Across
- Do you feel s
- a form of social media that makes the same sound as a clock
- A form of social media that starts with s
- What is it called when you message people on your phone
Down
- A device that you call on
- Whats it called when you speak to someone
- A big device that you do lots of gaming on
- A safe person to go to
- A word you can say when your stuck somewhere and it starts with the letter h
- Someone that you t
10 Clues: Do you feel s • Someone that you t • A safe person to go to • A device that you call on • Whats it called when you speak to someone • A form of social media that starts with s • A big device that you do lots of gaming on • What is it called when you message people on your phone • a form of social media that makes the same sound as a clock • ...
CYBER CLUES 2023-04-27
Across
- a type of programming language that is designed to create dynamic web content
- A type of database that stores data in a hierarchical structure
- computer network designed for communication between devices in close proximity
- A technology used for creating and storing digital currency in a decentralized manner
- a type of memory that stores frequently accessed data for quick access by the CPU
Down
- A type of programming language used for creating mobile applications for Apple's iOS platform
- A data structure that stores a collection of key-value pairs in no particular order.
- A type of database that stores data in tables
- cyber attack that disguises as a legitimate email to trick users.
- A keyword used to indicate that a method or variable belongs to the class itself, not an instance of the class
10 Clues: A type of database that stores data in tables • A type of database that stores data in a hierarchical structure • cyber attack that disguises as a legitimate email to trick users. • a type of programming language that is designed to create dynamic web content • computer network designed for communication between devices in close proximity • ...
Cyber Safety 2023-05-18
Across
- Online fights using electronic messages with angry and vulgar language.
- Repeatedly sending nasty, mean and insulting messages.
- People that bully others online, mean comments, pictures, sharing information.
- Talking to someone into give personal information or embarrassing secrets.
- Intentionally and cruelly excluding someone from an online group.
Down
- People that steal your information.
- Pretending other peoples work and things are yours.
- Sharing someone's secrets embarrassing information or images online.
- Something that comes up to stop you doing something or trying to make you do something.
- Repeated, intense harassment and denigration that include threats or creates significant fear.
10 Clues: People that steal your information. • Pretending other peoples work and things are yours. • Repeatedly sending nasty, mean and insulting messages. • Intentionally and cruelly excluding someone from an online group. • Sharing someone's secrets embarrassing information or images online. • Online fights using electronic messages with angry and vulgar language. • ...
Cyber Safety 2023-05-22
Across
- Something that infects and spreads through your compute
- Repeated harassment and denigration that includes threats
- Trying to steal someone's private info
- Purposely and cruelly excluding someone
Down
- Posting rumours about a person
- Online fights using vulgar language
- Someone who is mean or aggressive
- Stealing someone's work and not crediting them
- Talking someone into revealing secrets
- Sharing someone's embarrassing information or images online
10 Clues: Posting rumours about a person • Someone who is mean or aggressive • Online fights using vulgar language • Trying to steal someone's private info • Talking someone into revealing secrets • Purposely and cruelly excluding someone • Stealing someone's work and not crediting them • Something that infects and spreads through your compute • ...
cyber safety 2023-05-22
Across
- An illness for computers.
- Getting someone to reveal their secrets and personal information and sharing it online.
- The stealing of someone's personal information.
- Intentionally and cruelly excluding someone from an online group.
- A type of online fighting using angry and inappropriate language.
- Using somebody else's work as your own.
Down
- Repeated, intense threats and harassment that create fear.
- The repeated sending of mean, nasty and insulting online messages.
- When someone shares another person's secrets or images online.
- Bullying someone online.
10 Clues: Bullying someone online. • An illness for computers. • Using somebody else's work as your own. • The stealing of someone's personal information. • Repeated, intense threats and harassment that create fear. • When someone shares another person's secrets or images online. • Intentionally and cruelly excluding someone from an online group. • ...
Cyber Safety 2023-05-22
Across
- When someone or a group of people is bullying you online.
- When someone steals your work or ideas and makes it their own.
- Sharing someone's secrets or embarrassing information or images online.
- Repeatedly sending nasty, mean messages.
- Talking someone into revealing secrets or information and posting it online.
- A type of software that spreads between computers and causes damage yo data and software.
Down
- Pretending to be someone else and sending or posting material to get someone in trouble.
- Intentionally and cruelly excluding someone from an online group.
- Online fights using mean language.
- When someone steals your identity and pretends to be you.
10 Clues: Online fights using mean language. • Repeatedly sending nasty, mean messages. • When someone or a group of people is bullying you online. • When someone steals your identity and pretends to be you. • When someone steals your work or ideas and makes it their own. • Intentionally and cruelly excluding someone from an online group. • ...
cyber safety 2023-05-22
Across
- repeated, intense harassment denigration
- online fights using electronic messages
- it is a form of selling someone's identify online
- sending nasty, mean and insulting messages
- there will look for almost anyone to harass
Down
- intestinally and cruelly excluding someone from on online group
- "dissing" someone online
- talking someone into revealing secrets or embarrassing information
- pretending to be someone else online
- sharing someone's secrets or embarrassing information
10 Clues: "dissing" someone online • pretending to be someone else online • online fights using electronic messages • repeated, intense harassment denigration • sending nasty, mean and insulting messages • there will look for almost anyone to harass • it is a form of selling someone's identify online • sharing someone's secrets or embarrassing information • ...
cyber bullying 2025-03-11
10 Clues: Hacking • hurtful person • to help someone • something you go on • hurting someone online • looking out for someone • knowing your on a device • mentally attacking someone • someone hurting someone else • something you use in everyday life
Cyber Safety 2024-10-10
Across
- This involves the exchange of information through electronic channels, such as emails, instant messaging, or social media.
- _____________ means taking part in an online community safely, ethically and respectfully.
- It’s an obligation or duty which you have towards yourself and to others.
- Avoid connecting to ______________ public wifi networks.
- To fully participate in society which uses electronic devices and the internet.
Down
- It is the process of learning and teaching about technology and how to use it effectively.
- It refers to the buying and selling of goods using electronic means, like online shopping.
- Protect your personal information with strong _____________.
- ___________________ means being secure online.
- The continuing and spreading results of an event or an action.
10 Clues: ___________________ means being secure online. • Avoid connecting to ______________ public wifi networks. • Protect your personal information with strong _____________. • The continuing and spreading results of an event or an action. • It’s an obligation or duty which you have towards yourself and to others. • ...
Cyber monday 2024-11-28
10 Clues: PHYSICAL MONEY • PART OF A WEBSITE • A SHORT-TERM SALE • A METHOD OF PAYMENT • THE NAME OF A COMPANY • A PLACE ONLINE TO SHOP • SOMETHING WITH NO COST • WHERE YOUR MONEY IS KEPT • A LINE OR LIST OF WAITING ITEMS • WHAT YOU NEED TO ACCESS A WEBSITE
cyber bullying 2025-06-19
Across
- something from you
- is someone who stands up for you and saying stop
- is something that happens online like people saying hurtfull comments
- is someome getting bullied over and over again
- is telling the teacher or adult what happend
- is something that you get exculded from a group
- is somthing they pick on you about
Down
- is something online if you need help you can talk to them
- a person just standing and watching pointing and laughing
- say hurtfull things
10 Clues: something from you • say hurtfull things • is somthing they pick on you about • is telling the teacher or adult what happend • is someome getting bullied over and over again • is something that you get exculded from a group • is someone who stands up for you and saying stop • is something online if you need help you can talk to them • ...
Cyber Ethics 2025-06-06
Across
- Legal term for ownership of creative work.
- Legal rights over creations of the mind.
- Copying someone's work and calling it your own.
- Unwanted bulk emails from unknown sources.
Down
- The trace a person leaves online.
- Behaving responsibly and ethically on the internet.
- Moral principles for using computers and the internet.
- Copying and using software illegally.
- Right to control information about yourself.
- Illegally accessing a computer system.
10 Clues: The trace a person leaves online. • Copying and using software illegally. • Illegally accessing a computer system. • Legal rights over creations of the mind. • Legal term for ownership of creative work. • Unwanted bulk emails from unknown sources. • Right to control information about yourself. • Copying someone's work and calling it your own. • ...
Cyber ethics 2025-05-29
Across
- Scrambling data to protect it from unauthorized access.
- – Respecting personal data and not accessing others’ information.
- A cybercrime where someone is tricked into giving personal information.
- Legal protection for original work.
- Bullying someone online.
Down
- Malicious software like viruses or worms.
- Online etiquette or good behavior on the internet.
- A secret word or phrase used for authentication.
- Unauthorized access to data or systems.
- Unwanted or junk email.
10 Clues: Unwanted or junk email. • Bullying someone online. • Legal protection for original work. • Unauthorized access to data or systems. • Malicious software like viruses or worms. • A secret word or phrase used for authentication. • Online etiquette or good behavior on the internet. • Scrambling data to protect it from unauthorized access. • ...
cyber addiction 2025-10-19
Across
- The act of being compelled to check devices or social media, often without conscious intent.
- The state of being distracted or overwhelmed by too much information or stimuli.
- The gradual decline in cognitive function due to excessive screen time.
- The amount of time or frequency someone spends on digital devices or apps.
- The brain's ability to reorganize itself by forming new neural connections.
Down
- The fundamental units of the brain and nervous system, responsible for transmitting information.
- A type of reinforcement where rewards are given at unpredictable intervals, making behavior more resistant to extinction.
- The process of taking over or dominating someone's attention, often used in the context of digital platforms.
- A neurotransmitter associated with pleasure and reward, often linked to addictive behaviors.
- The feeling of wanting something strongly, especially something that is hard to resist.
10 Clues: The gradual decline in cognitive function due to excessive screen time. • The amount of time or frequency someone spends on digital devices or apps. • The brain's ability to reorganize itself by forming new neural connections. • The state of being distracted or overwhelmed by too much information or stimuli. • ...
Ασφάλεια στο διαδύκτιο 2024-02-15
10 Clues: Κακόβουλο Λογισμικό • news Ψευδής Ειδήσεις • Διαδικτυακός Εκφοβισμός • Scams Ηλεκτρονικές Απάτες • Piracy Πειρατεία Λογισμικού • Reputation Διαδικτυακή Φήμη • Passwords Κωδικοί Πρόσβασης • gaming Παιχνίδια στο Διαδίκτυο • Addiction Εθισμόσ στο διαδιίκτυο • positive Εικόνεσ Σώματοσ , Κοινωνικά Δίκτυα
Cyber Safety 2022-10-27
Across
- Never give out personal ______ online
- It is important to not ____ fake news.
- A person who instigates conflict online.
- Bullying online is called?
Down
- ___ you visit are a part of your digital footprint.
- If you see cyberbullying you should ____ it right away.
- Trolling can be considered _____.
- Check the ___ in order to determine if the website is reliable
- Never tell anyone your ___, not even your friend's
- It is encouraged to only speak the ____ online.
10 Clues: Bullying online is called? • Trolling can be considered _____. • Never give out personal ______ online • It is important to not ____ fake news. • A person who instigates conflict online. • It is encouraged to only speak the ____ online. • Never tell anyone your ___, not even your friend's • ___ you visit are a part of your digital footprint. • ...
CYBER LAW 2021-09-05
Across
- stranger has broken into your computer systems without your knowledge and has tampered with confidential data.
- a form of malware that prevents you from accessing files on your computer.
- defensive technology designed to keep the hackers out.
- hacking attack that tricks victims into clicking on an unintended link.
Down
- data that is used to describe large amounts of other Internet data.
- lure individuals into revealing login information.
- hackers that break into the network to steal information that will be used to harm the owner.
- false ATM cards used by criminals for their monetary benefits.
- a malicious application that can be used to take advantage of a computer’s vulnerability.
- program that masks something harmful,that carries it into a device.
10 Clues: lure individuals into revealing login information. • defensive technology designed to keep the hackers out. • false ATM cards used by criminals for their monetary benefits. • data that is used to describe large amounts of other Internet data. • program that masks something harmful,that carries it into a device. • ...
CYBER LAW 2021-09-03
Across
- registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- Web page to summon different elements from diverse pages or servers to create a new Web page
- The communication via any electronic device of false data that damages a person's reputation
- Make sure a buyer and seller can identify themselves
- Business conducted electronically (buying/selling on web)
Down
- process of converting information into a digital
- Using a computer to steal personal data
- when someone forcefully takes control of a website by cracking the password and later changing it
- the process of using Internet-based socializing and communication techniques to create, operate and manage activism of any type
- the making, altering, use, or possession of a false writing in order to commit a fraud
10 Clues: Using a computer to steal personal data • process of converting information into a digital • Make sure a buyer and seller can identify themselves • Business conducted electronically (buying/selling on web) • the making, altering, use, or possession of a false writing in order to commit a fraud • ...
cyber safety 2023-05-22
Across
- like a sickness for a computer
- Repeatedly sending nasty, mean, and insulting messages.
- keep your things safe with a ________
- Repeated, intense harassment and denigration that includes threats or creates significant fear.
- Online fights using electronic messages with angry and vulgar language
Down
- bullying online
- Talking someone into revealing secrets or embarrassing information, then sharing it online.
- Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
- Intentionally and cruelly excluding someone from an online group.
- Sharing someone's secrets or embarrassing information or images online.
10 Clues: bullying online • like a sickness for a computer • keep your things safe with a ________ • Repeatedly sending nasty, mean, and insulting messages. • Intentionally and cruelly excluding someone from an online group. • Online fights using electronic messages with angry and vulgar language • Sharing someone's secrets or embarrassing information or images online. • ...
Cyber Safety 2023-05-22
Across
- Someone stealing an authors original work.
- Stealing others Identity's.
- Sending threats or going through their online accounts.
- Using technology to harm others.
Down
- A virus on a computer.
- On line fights using technology.
- The practice of following actionable guidlines on the internet.
- Geting private information about someone and sharing it with other people online.
- Intentionally keeping someone out of somthing.
- Sharing another persons secrets online.
10 Clues: A virus on a computer. • Stealing others Identity's. • On line fights using technology. • Using technology to harm others. • Sharing another persons secrets online. • Someone stealing an authors original work. • Intentionally keeping someone out of somthing. • Sending threats or going through their online accounts. • ...
cyber safety 2023-05-22
Across
- repeated, intense harassment denigration
- online fights using electronic messages
- it is a form of selling someone's identify online
- sending nasty, mean and insulting messages
- there will look for almost anyone to harass
Down
- intestinally and cruelly excluding someone from on online group
- "dissing" someone online
- talking someone into revealing secrets or embarrassing information
- pretending to be someone else online
- sharing someone's secrets or embarrassing information
10 Clues: "dissing" someone online • pretending to be someone else online • online fights using electronic messages • repeated, intense harassment denigration • sending nasty, mean and insulting messages • there will look for almost anyone to harass • it is a form of selling someone's identify online • sharing someone's secrets or embarrassing information • ...
Cyber Safety 2022-03-01
Across
- I can keep myself __________ online by not giving out my personal information.
- I should not use personal information such as __________ and birthdates as your password.
- I should __________ an adult if someone or something makes me feel uncomfortable.
- Do not write down or __________ your password with anyone.
- I should check if the information I find online is __________ before I believe it.
Down
- I should not meet up with __________ I have talked online to.
- You should include at least one __________ letter when you create a password.
- I should include numbers, letters and ___________ when creating a password.
- My password should include __________ characters or more.
- I should not __________ suspicious files or pictures online.
10 Clues: My password should include __________ characters or more. • Do not write down or __________ your password with anyone. • I should not __________ suspicious files or pictures online. • I should not meet up with __________ I have talked online to. • I should include numbers, letters and ___________ when creating a password. • ...
Cyber Foundations 2022-04-26
Across
- a short account of an incident
- anything that obstructs accurate communicate of a message
- key assertions made by a speaker to develop his or her central idea
Down
- the quality of which a speaker appears
- words that refer to ideas or concepts
- final statement of your speech
- adjusting one's materials and delivery to meet the needs of the listeners
- verbal and nonverbal responses provided by an audience to a speaker
- words that name persons and things that we can know by our five senses
- reasoning from specific to general
10 Clues: final statement of your speech • a short account of an incident • reasoning from specific to general • words that refer to ideas or concepts • the quality of which a speaker appears • anything that obstructs accurate communicate of a message • verbal and nonverbal responses provided by an audience to a speaker • ...
Cyber 2 2023-12-04
10 Clues: Disguised malware • Targeted email scam • Faking identity or data • Unauthorized access point • Captures typed keystrokes • Dual authentication method • Floods server with traffic • Network of infected devices • Updating software for security • Advertising-supported software
Cyber Safety 2024-03-27
Across
- bullying people online
- Mobile _ _ _ _
- people who use computers to gain unauthorised access to data
- a piece of code that is capable of copying itself and usually has a detrimental effect, like corrupting the system or destroying data.
- a global computer network providing a variety of information and communication facilities
Down
- When somebody pretends to be someone or something else to acquire personal information about you.
- networked computing facilities providing remote data storage and processing services via the internet.
- something that you enter to protect your information or accounts
- the abbreviation of the words malicious software
- a computer program with a graphical user interface for displaying and navigating between web pages.
10 Clues: Mobile _ _ _ _ • bullying people online • the abbreviation of the words malicious software • people who use computers to gain unauthorised access to data • something that you enter to protect your information or accounts • a global computer network providing a variety of information and communication facilities • ...
Cyber bullying 2023-10-26
Across
- , sending messages from a mobile phone
- , form of cyber bullying
- , worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
- , a social media app that lets you take and upload photos for people to like, comment on and share
- , social media website beginning with F
Down
- , intentional emotional harm through devices like computers and phones
- , a wireless handheld device used for calls and messaging
- , making a statement of intention to cause harm to someone
- , an image showing what is on a phone or computer screen
- , words or actions intended to annoy, or abuse others
10 Clues: , form of cyber bullying • , sending messages from a mobile phone • , social media website beginning with F • , words or actions intended to annoy, or abuse others • , an image showing what is on a phone or computer screen • , a wireless handheld device used for calls and messaging • ...
Cyber monday 2024-11-28
10 Clues: WORTH OF AN ITEM • BUYING MANY ITEMS • TO LOOK THROUGH ITEMS • TO KEEP MONEY UNSPENT • WHAT YOU WANT TO ACHIEVE • MAXIMUM PURCHASE QUANTITY • HOLDS YOUR SELECTED ITEMS • REMOVING ITEMS FROM STOCK • ACTION FOR SELECTING ONLINE • WHAT YOU MAKE TO ORGANIZE SHOPPING
Cyber monday 2024-11-28
10 Clues: HOLDS YOUR CASH • A WAITING GROUP • A DEAL OR DISCOUNT • THE COST OF AN ITEM • NEEDED TO SHOP ONLINE • A PROMOTIONAL MESSAGE • AVAILABILITY OF ITEMS • PLAN FOR SPENDING MONEY • TO GIVE MONEY FOR SOMETHING • TO VERIFY ITEMS IN YOUR CART
Cyber monday 2024-11-28
10 Clues: NO CHARGE • CURRENCY USED • MAKER OF ITEMS • TOTAL YOU SPEND • SHIPPING SERVICE • SPEED OF DELIVERY • WHAT YOU DO ONLINE • USED TO CARRY ITEMS • DISCOUNT IDENTIFIER • RECEIPT OR PAYMENT NOTE
Cyber monday 2024-11-28
10 Clues: WORTH OF AN ITEM • BUYING MANY ITEMS • TO LOOK THROUGH ITEMS • TO KEEP MONEY UNSPENT • WHAT YOU WANT TO ACHIEVE • MAXIMUM PURCHASE QUANTITY • HOLDS YOUR SELECTED ITEMS • REMOVING ITEMS FROM STOCK • ACTION FOR SELECTING ONLINE • WHAT YOU MAKE TO ORGANIZE SHOPPING
Cyber Monday 2024-11-28
10 Clues: Popular items • Additional cost • Part of a website • Picture of an item • Where you shop online • List of desired items • To arrange by category • Simple shopping experience • Symbol of a country on items • Price for travel or shipping
Cyber Safety 2024-07-25
10 Clues: WWW stands for • dot commercial • bulying+cybyer= • id for internet • gets bullyed by bully • how to be safe online • people who stand up for the victim • what to do about mean people or scammers • someone thats there when someone is being bullyed • leaking private info about someone online as a bullying tactic
CYBER-BULLYING 2024-07-25
Across
- - staying safe online from bullies and hackers
- - an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
- - careful investigation into a crime or mystery
- - a witness of the bullying
Down
- - an electronic communications network that connects computer networks and organizational computer facilities around the world
- - bullying but online
- - a secret word or phrase that must be used to gain admission to a place.
- - Someone who stands up to the bullies
- - a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
- - the address of a unique resource on the internet
10 Clues: - bullying but online • - a witness of the bullying • - Someone who stands up to the bullies • - staying safe online from bullies and hackers • - careful investigation into a crime or mystery • - the address of a unique resource on the internet • - a secret word or phrase that must be used to gain admission to a place. • ...
Cyber Safety 2024-11-05
Cyber Bullying 2025-03-11
Across
- abuse a hurtful person online
- a bad person
- acting like someone that is not the real person
- To protect something like its your life
- smart and online tech
Down
- to offend someone of their normalities
- hacking basically
- connected to the interenet
- make it atleast 8 characters long
- A person who helps a person being bullied
10 Clues: a bad person • hacking basically • smart and online tech • connected to the interenet • abuse a hurtful person online • make it atleast 8 characters long • to offend someone of their normalities • To protect something like its your life • A person who helps a person being bullied • acting like someone that is not the real person
cyber bullying 2025-03-11
Across
- someone who teases someone else online
- hurting someone on the internet
- someone doing something to hurt someone
- people that try to join the group to hurt others
- hacking
- something that you go on
Down
- something you use to help someone
- someone who is being mean to you
- hurting someone mentally
- looking out for someone
10 Clues: hacking • looking out for someone • hurting someone mentally • something that you go on • hurting someone on the internet • someone who is being mean to you • something you use to help someone • someone who teases someone else online • someone doing something to hurt someone • people that try to join the group to hurt others
CYBER BULLYING 2025-03-11
10 Clues: BULLYING • MAKING FUN OF • SAYING RUDE WORDS • CALLING PEOPLE NAMES • RAID A FORM OF ATTACK • SPREADING SOMETHING AROUND • TAKING ACTION AGAINST SOMEONE • SEND A MESSAGE INDISCRAMENTLY • TO HARRASS OR FRIGHTEN SOMEONE • PRETENDING TO BE A PERSON YOU ARENT
Cyber Bullying 2025-03-11
10 Clues: BEING VERY RUDE • HARMING SOMEONE • REPLYING TO SOMEONE • FAKE STORIES ABOUT SOMEONE • HURTING SOMEONE EMOTIONALY • BEING MEAN ON THE INTERNET • BEING ACTIVE ON THE INTERNET • PRETENDING TO BE SOMEONE YOU ARENT • A WAY TO NOT SEE UNWANTED MESSAGES • THE USE OF TECHNOLOGY TO HARRASS SOMEONE
Cyber Bullying 2025-03-11
Across
- To post things to bait emotions, mainly anger.
- A type of abuse which contains gained sexual content by force and discomfort.
- To abuse someone on the internet.
- Anything that involves messaging.
Down
- To defend something/someone.
- To publish info about someone on the web; usually with malicious intent.
- The internet.
- To repeatedly abuse someone.
- to do something bad to someone.
- to send an overload of messages to someone.
10 Clues: The internet. • To defend something/someone. • To repeatedly abuse someone. • to do something bad to someone. • To abuse someone on the internet. • Anything that involves messaging. • to send an overload of messages to someone. • To post things to bait emotions, mainly anger. • To publish info about someone on the web; usually with malicious intent. • ...
Cyber Crossword 2025-10-13
Across
- Use strong password or __________ to better protect your accounts and keep your information safe.
- Software______ boost security and performance
- One effective way to protect against impersonation scams, such as Business Email Compromise (BEC), is to ______ the identity of the email sender through an out-of-band channel—such as a trusted phone call—especially when financial transactions are involved.
- Be mindful of your 'digital _______' when post online.
Down
- Cybercriminals use AI to mimic images or videos to trick people into sharing money or personal data
- One of the follow-up actions to perform for suspicious emails after clicking the "Report Phishing" button in Outlook
- One of the common phishing signs.
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- One of the tips for stronger passwords
- Acronym for authentication method requiring two or more forms of verification.
10 Clues: One of the common phishing signs. • One of the tips for stronger passwords • Software______ boost security and performance • Be mindful of your 'digital _______' when post online. • Acronym for authentication method requiring two or more forms of verification. • Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity. • ...
Don't Travel Without 2022-01-21
Across
- the piece of paper that lets you on the plane
- the people who work in the plane with passengers
- when security checks your person
- what you pass through at security
- the official document that lets you travel
- the area you go to pick up your luggage
Down
- the person flying the airplane
- what your luggage goes through at security
- the luggage you take on a plane
- telling the airline you're here for your flight
- the area you pass through when traveling in a new country
- moving from one flight to another
- a square piece of luggage
- the cart used to carry luggage
14 Clues: a square piece of luggage • the person flying the airplane • the cart used to carry luggage • the luggage you take on a plane • when security checks your person • moving from one flight to another • what you pass through at security • the area you go to pick up your luggage • what your luggage goes through at security • the official document that lets you travel • ...
Tatler Crossword Week 6 2023-11-27
Across
- Popular girl scout cookie
- Journalist ___ B. Wells
- Shortest Grizzlies player(last name)
- Best time to buy online is ______ Monday,
- Woman's name that sounds like its first and third letters
Down
- The largest city in the world.
- Boy band with the 2000 hit "Bye Bye Bye"
- first animal in space
- Home to the Alhambra
- Knight's title
- Santa's workers
11 Clues: Knight's title • Santa's workers • Home to the Alhambra • first animal in space • Journalist ___ B. Wells • Popular girl scout cookie • The largest city in the world. • Shortest Grizzlies player(last name) • Boy band with the 2000 hit "Bye Bye Bye" • Best time to buy online is ______ Monday, • Woman's name that sounds like its first and third letters
KAREN'S RETIREMENT 2022-11-07
Across
- at Roller King
- next vacation spot
- seagoing travel
- financial security
- Friday supper
- baby ___
- retirement as known in Cancun
- you are getting old if they have your number
- November 18
- ten letter word for busier than ever
- holiday travel
- knitting, pickleball, beekeeping etc
Down
- spending time with ___ not coworkers
- Friday night hydration
- good wishes for retirement
- what you are now
- opportunity afforded by free time
- goodbye anxiety
- afternoon activity
- no longer needed
- related group
- work for fun
- escape from schedules
- previous contribution to medical security
- at Lake Tahoe
25 Clues: baby ___ • November 18 • work for fun • Friday supper • related group • at Lake Tahoe • at Roller King • holiday travel • seagoing travel • goodbye anxiety • what you are now • no longer needed • next vacation spot • financial security • afternoon activity • escape from schedules • Friday night hydration • good wishes for retirement • retirement as known in Cancun • opportunity afforded by free time • ...
Teneequas crossword 2021-02-11
Across
- longest runway in the world
- I’m not as close to the airport
- before security
- aircraft parking
- also known as aircraft Marshall
- is illegal
- makes your flight feel bumpy because of bad weather
- provides meals for the aircraft
- I charge more when you use me
- you need me and travel docs
Down
- fills aircraft with water
- moving the aircraft away from the gate
- sniffs drugs
- TBU
- where is JFK
- fills the aircraft with gas
- empties waste
- after security
- helps unload and load carago and baggage
- evacuates passengers
20 Clues: TBU • is illegal • sniffs drugs • where is JFK • empties waste • after security • before security • aircraft parking • evacuates passengers • fills aircraft with water • longest runway in the world • fills the aircraft with gas • you need me and travel docs • I charge more when you use me • I’m not as close to the airport • also known as aircraft Marshall • provides meals for the aircraft • ...
Banking 2020-06-21
Across
- savings
- bill
- exchange
- advances
- share
- debt
- clearing
- allowance
- loan
- overdraft
- discount
- bond
- capital
- coupon
- funds
- equity
- broker
- agent
- charge
- cash
- clerk
- cheque
- audit
- retail
- debit
- mortgage
- ingot
- inflation
- currency
Down
- dividend
- signature
- cashier
- guinea
- credit
- balance
- branch
- crown
- insurance
- statement
- corporate
- deposit
- ledger
- cent
- income
- bankrupt
- receipt
- account
- security
- lending
- interest
- transfer
- note
52 Clues: bill • debt • loan • bond • cent • cash • note • share • crown • funds • agent • clerk • audit • debit • ingot • guinea • credit • branch • ledger • coupon • equity • income • broker • charge • cheque • retail • savings • cashier • balance • deposit • capital • receipt • account • lending • dividend • exchange • advances • clearing • discount • bankrupt • security • interest • transfer • mortgage • currency • signature • insurance • statement • allowance • overdraft • corporate • inflation
Cybersecurity Terms 2025-03-09
Across
- Encoding data for security reasons
- Harmful software that damages computers
- Unauthorized access to data
- Falsifying identity or source
- Software that monitors for malware
- Algorithm for encrypting data
- Network entry point for traffic
- Access granted to perform actions
- Ethical hacking to find vulnerabilities
- Malware locks files for money
- Network security barrier
Down
- Facial recognition to grant access
- Hidden entry for unauthorized access
- List of blocked entities
- Network of infected computers
- Converting ciphertext into plaintext
- Machine learning and thinking
- Verifying user identity
- Scam emails that trick users
- Software displaying unwanted ads
20 Clues: Verifying user identity • List of blocked entities • Network security barrier • Unauthorized access to data • Scam emails that trick users • Network of infected computers • Falsifying identity or source • Algorithm for encrypting data • Machine learning and thinking • Malware locks files for money • Network entry point for traffic • Software displaying unwanted ads • ...
cyberscurity puzzule 2024-01-29
Across
- - Copy of data stored separately for recovery in case of loss.
- - Process of converting data into a format that cannot be easily accessed by unauthorized users.
- - Device or node connected to a network.
- - Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- - Malware that encrypts files and demands payment for their release.
- - Vulnerability that is exploited before the vendor releases a patch.
- - Unforeseen event that disrupts normal operations and compromises security.
- - Fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- - Network security system that monitors and controls incoming and outgoing network traffic.
- - Set of rules and procedures governing how an organization manages and protects its data.
Down
- - Testing method used to identify security weaknesses in a system
- - Weakness in a system that can be exploited by threats to compromise security.
- - Authentication method requiring two forms of identification for access.
- - Software designed to detect and remove malicious software.
- - Segmentation - Dividing a network into smaller segments to reduce attack surface.
- - of Service (DoS) - Attack that disrupts services by overwhelming a system with traffic.
- - Update to a computer program or its supporting data designed to fix or improve it.
- - Process of verifying the identity of a user or system.
- - Engineering tactic that manipulates individuals into divulging confidential information.
- - Breach - Unauthorized access to sensitive or confidential information.
- - Unauthorized access to a computer system or network.
21 Clues: - Device or node connected to a network. • - Unauthorized access to a computer system or network. • - Process of verifying the identity of a user or system. • - Software designed to detect and remove malicious software. • - Copy of data stored separately for recovery in case of loss. • - Testing method used to identify security weaknesses in a system • ...
CASP Exercise 1.1 2024-05-21
Across
- Rogue access points can intercept data flowing through the network, including
- is a process that identifies a cellular phone or any other radio transmitter by the?
- uses rules and heuristics to identify suspicious patterns of network behavior.
- firewalls will need to actively support extension of security support and collaboration for selective user communities within an enterprise.
- has two security modes
- uses open protocols to control the virtual and physical devices responsible for routing the data packets.
- locks down DNS like a digital fortress, protecting you from fake websites and ensuring reliable domain lookups
- Rogue devices can spoof?
- allows good traffic and blocks all other.
- Evenly distributing tasks helps maintain high throughput, allowing systems to handle more requests simultaneously.
Down
- Wireless attack tool
- vulnerability where an attacker inserts malicious SQL code into an application’s input fields
- This security tool runs on Windows Server and can process packet capture files generated by Snort.
- analyzes network packets for attack signatures—unique characteristics or behaviors that are associated with a specific threat.
- monitors network traffic, analyzing packets to identify suspicious patterns or known attack signatures.
- It messes with Wi-Fi signals.
- allows all traffic and only blocks known bad traffic.
- It spies on nearby networks.
- Not only does it detect suspicious activity, but it also actively prevents attacks.
- ensures only authorized users and trusted devices can enter a network.
- Benefits are Privacy, Security, Access
21 Clues: Wireless attack tool • has two security modes • Rogue devices can spoof? • It spies on nearby networks. • It messes with Wi-Fi signals. • Benefits are Privacy, Security, Access • allows good traffic and blocks all other. • allows all traffic and only blocks known bad traffic. • ensures only authorized users and trusted devices can enter a network. • ...
Prem Thapa, 12/09/2024 2024-12-07
Across
- A method that uses hard drive space when your computer runs out of RAM
- A shared secret key used to securely connect devices on a network
- Rules set to track and record activities on a system to ensure security and compliance
- Converting data into a secure format to prevent unauthorized access
- A Linux tool that manages network traffic rules and firewall settings
- Rules that explain how a company collects, uses, and protects your personal information
- A framework of protocols used to secure data exchanged over an IP network by providing encryption, authentication, and data integrity
- Verifying identity using credentials
- An ethical hacker improving security
- The process of granting permission to access resources or perform actions
Down
- Unique mark left behind, often used to identify a person
- A security system that monitors and controls network traffic to block unauthorized access.
- Steps taken to keep your personal information safe from being stolen or lost
- A tool in Windows that secures data on a server by encrypting it
- A barrier on the OS that blocks harmful data from entering or leaving the computer
- A small unit of data that is monitored and filtered by the firewall to control network access
- Rules that define how passwords should be created, used, and updated for security
- Crating a copy of data for recovery
- A hacker with malicious intent
- Firewall rules that control data allowed into the server or device
- Malicious software designed to harm or exploit systems
21 Clues: A hacker with malicious intent • Crating a copy of data for recovery • Verifying identity using credentials • An ethical hacker improving security • Malicious software designed to harm or exploit systems • Unique mark left behind, often used to identify a person • A tool in Windows that secures data on a server by encrypting it • ...
Investing - Angelina Guzman Cardenas 2025-03-24
Across
- measures the price performance of a basket of securities
- Social security and medicare together are called…
- A sum of money saved or made available for a particular purpose.
- A digital ledger of transactions that is duplicated and distributed across a network.
- How old do you have to be to invest in crypto?
- Traditional IRA contributions are made…
- An example of fiat money is the…Bill
- Before investing in crypto only invest what you're willing to…
- Roth IRA contributions are made…
- Don't rely on … for retirement!
- Currencies that are created and backed by the government, but not tied to or backed by the value of any physical commodity.
- Investing all the money you have available at that given time, and putting it into the market
- If you leave your company you can… your funds to your new companies.
- Required Minimum Distributions must start at age…
- What category does crypto fall under?
- Before investing in crypto build a … fund.
Down
- Often times if you have one of these you don't pay social security tax.
- The biggest financial fraud in U.S history was the … scandal
- a strategy in which you invest your money in equal amounts, at regular intervals.
- Warren Buffets first rule…
- Social security is funded by…
- A pension is managed by…
- What president created social security…
- the availability of cash or the ease with which an asset can be converted to cash
- Crypto is a … risk Investment
25 Clues: A pension is managed by… • Warren Buffets first rule… • Social security is funded by… • Crypto is a … risk Investment • Don't rely on … for retirement! • Roth IRA contributions are made… • An example of fiat money is the…Bill • What category does crypto fall under? • Traditional IRA contributions are made… • What president created social security… • ...
Security Awareness Week- 2025 2025-09-10
Across
- Tool used for receiving C-Return shipments
- Annual Evaluation of site compliance
- Replaced HID
- Navigate sites via interactive maps and device placement.
- No details of the unit
- Name of Video Management System
- An official repository of critical information and resources with regard to a site
- Used for Flagging/Unflagging of ASINs as HRV/Non-HRV
- Provides External access to roof
- Application used to identify employees on site during an emergency.
- Shows Process Path Rollup and Employee details including permissions and activity
- Zone 5 area
- Tool used for salvaging Orphan shipments
- Access Management Tool used for addition and removal of access levels.
- Used to link security devices with the Milestone video system.
Down
- Entity Dealing with Customer Returns
- Web based replacement for Lenel OnGuard's Alarm Monitoring.
- Replacement of Lenel Security Access System
- Tool used to handle orphan shipments
- Allows addition and removal of badges, access levels and badge photos.
- Present at Reception and used to alert control room about emergency.
- Required for maintenance of Security equipments and done on quarterly cadence
- Device Arming/Disarming Tool
- Facilitating entry/exit to/from the site
- Portal for driver verification and yard pass generation
- Tool to fetch access control reports
- Replacement of Right Crowd
- This is in three colors
- Biometric Authentication for Associates
- Virtual Monitoring team
- Tool/interface used for processing C-Return shipments
- Audit/certification for verifying Facility Security Requirements
32 Clues: Zone 5 area • Replaced HID • No details of the unit • This is in three colors • Virtual Monitoring team • Replacement of Right Crowd • Device Arming/Disarming Tool • Name of Video Management System • Provides External access to roof • Entity Dealing with Customer Returns • Tool used to handle orphan shipments • Annual Evaluation of site compliance • ...
Chapter 11 CIS 25 2024-10-26
Across
- Controls user and computer settings in domains
- Secure network authentication protocol for encrypted connections
- Encryption tool for protecting drive data security
- Application set to open specific file types
- Navigates and manages files and folders
- Command-line tool for task automation and scripting
- Enables file access without network connectivity
- Displays open applications, shortcuts, and notifications
- Security prompt for administrative privilege actions
- Monitors applications, processes, and system performance
- Web-based platform for collaboration and document management
- Database of system and application configuration settings
- Properties defining file characteristics and access permissions
- Hierarchical arrangement of files and folders
- Diagnoses DirectX issues and system hardware specifications
- Logs failed security events, unauthorized access attempts
- Remote access protocols
Down
- Hosts management tools for system administration tasks
- Analyzes real-time system performance and resource usage
- Logs, reviews system and application event information
- Caches files locally, reducing WAN bandwidth usage
- Manages installed hardware devices and driver software
- Identifiers for file types and associated programs
- Directory service managing users, computers, network resources
- Graphical interface for interacting with Windows system
- Peer-to-peer network without centralized authentication control
- Network structure grouping computers, users, security policies
- Text-based interface for executing system commands
- Encrypts files, ensuring only authorized access
- Tool for viewing, editing Windows registry settings database
- Hidden network share for system management purposes
- Configuration hub for Windows system settings customization
- Combines multiple drives for redundancy, speed improvements
33 Clues: Remote access protocols • Navigates and manages files and folders • Application set to open specific file types • Hierarchical arrangement of files and folders • Controls user and computer settings in domains • Encrypts files, ensuring only authorized access • Enables file access without network connectivity • Encryption tool for protecting drive data security • ...
INFANT SAFETY/ABDUTION 2023-03-02
12 Clues: Gender • Watch out • Mom & Dad • Tiniest Patient • Mom's loving hug • #still not found • Baby ID band spot • Check the contents • Call Security STAT • Opposite of pro-active • Infant Security Measure • Emergency formerly known as
Law, Public Safety, Corrections & Safety 2023-01-25
Across
- Having higher education may give you a higher --.
- Pathways of this career cluster are Correction Services, Emergency and Fire -- Services, Security and Protective Services, Law Enforcement Services, and Legal Services.
- About -- million people are employed in this career cluster.
- Depending on how serious the career is, a -- degree may be needed in order to practice.
- Police officers, firefighters, and EMTs respond to -- situations, risking their lives.
- Being a good -- speaker is an important skill to have in this cluster.
- -- degree or certificate programs qualify workers for work as firefighters, police patrol officers, and many more.
- An attorney needs this many years of law school.
- There are -- thousand police agencies in the U.S.
Down
- A -- degree is needed to qualify as a game warden and private detective.
- This career cluster focuses on --, managing, and providing public safety, legal, protective services, and homeland security.
- -- Bar Association is a degree needed to be a lawyer or judge.
- Only -- percent of police officers are women.
- Careers associated with this cluster often require specialized skills and ---.
- Careers in this cluster may have -- hours.
- Knowing multiple -- is a good skill to have in this career cluster.
- Security -- require a high school diploma or equivalent.
- This career cluster has a lot of --, and being able to overcome them is very important.
- The fastest growing occupation in this career cluster is this type of guard.
19 Clues: Careers in this cluster may have -- hours. • Only -- percent of police officers are women. • An attorney needs this many years of law school. • Having higher education may give you a higher --. • There are -- thousand police agencies in the U.S. • Security -- require a high school diploma or equivalent. • About -- million people are employed in this career cluster. • ...
3B macchine e energia-3 2024-01-29
Across
- creatore martello a vapore
- anno dei maggiori cambiamenti 4 rivoluzione
- anno creazione motore 2 tempi
- principale innovazione 4 rivoluzione industriale
- inventore della fotografia
Down
- inventore telegrafo
- anno creazione martello a vapore
- energia 2 rivoluzione industriale
- denominazione della 3 rivoluzione industriale
9 Clues: inventore telegrafo • creatore martello a vapore • inventore della fotografia • anno creazione motore 2 tempi • anno creazione martello a vapore • energia 2 rivoluzione industriale • anno dei maggiori cambiamenti 4 rivoluzione • denominazione della 3 rivoluzione industriale • principale innovazione 4 rivoluzione industriale
Children vs. The Cyberspace 2024-10-15
9 Clues: Bullying,Threats • Type of addiction • Online threats are _____ • Online Behavior and _____ • Is always changing and growing • Spreading _____ promotes change • Most children access this on the daily • Overly active _____ laws can cause danger • Can shape a children's perspective about the internet
WCG&R Trivia Crossword Puzzle 2021-06-09
Across
- 3rd Line of Defense
- Type of risk that can potentially harm the Bank's Brand
- New __ Product Approval
- Third Party _ Risk Management
Down
- _Risk Event
- __ Identification program
- Process Risk __ Self Assessment
- _ Anti-Money Laundering
- Risk of having insufficient cash or collateral to meet financial obligations
- Type of Risk Assessment
10 Clues: _Risk Event • 3rd Line of Defense • _ Anti-Money Laundering • Type of Risk Assessment • New __ Product Approval • __ Identification program • Third Party _ Risk Management • Process Risk __ Self Assessment • Type of risk that can potentially harm the Bank's Brand • Risk of having insufficient cash or collateral to meet financial obligations
Periodisasi Sastra 2022-10-10
10 Clues: Karya Ayu Utami • Sastra di Internet • Ada 6 seri supernova • Buku ini bertema pendidikan • Mengandung makna "zaman rusak" • Lahir pada tanggal 26 April 1982 • Jatuhnya rezim Presiden Soeharto • Namanya dimulai dengan huruf "K" • Zaman sekarang itu zaman yang apa? • Sastrawan yang hidup di abad ke-17
Crossword-2 2019-06-30
Across
- initiative for Multi-lingual Internet
- smarter banking alternatives
- Regional Internet Registry
- reason for being
- ISOC Palestine initiative on online sexual harassment
Down
- UNICEF Report on IG and Child rights
- Cyber Hygiene initiative by ISOC...Chapter?
- Key ICANN focus area
- category of top level domains
- Internet Governance Academy
10 Clues: reason for being • Key ICANN focus area • Regional Internet Registry • Internet Governance Academy • smarter banking alternatives • category of top level domains • UNICEF Report on IG and Child rights • initiative for Multi-lingual Internet • Cyber Hygiene initiative by ISOC...Chapter? • ISOC Palestine initiative on online sexual harassment
Cyberbullying 2019-12-03
11 Clues: MEAN TO DO • HAS A KEYBORD • adults HAVE THIS APP • you CAN SNAP PITHURES • THIS IS WHAT GETS BULLIED • its A MOTHER BOARD OF APPS • GETS BULLIED ON THE INTERNET • little KIDS HAS THIS ELETRONIC • A ELECTRONIC THAT TENNAGERS HAVE • TO PUT SOMETHING ON THE INTERNET • presedent DONALD TRUMP HAS A ACCOUNT ON THIS APP
Security 2024-09-11
9 Clues: Test, test • test, text • text, Test • Head of a team • Used to secure doors • Used to complete IRS work • Uniformed security officers • Very important to IRS success • Should be worn at all times within IRS facility
Security 2025-10-22
Safety Week 2024 2024-10-01
Across
- Animal to emulate when walking on icy ground
- A symbol indicating dangerous biological substances
- A practice exercise to prepare for a potential emergency situation
- A collection of supplies and equipment for use in giving medical treatment
- See something ___ something
- A service providing emergency medical care and transportation
- Being ready and able to deal with emergencies
- Practice of following others through security checkpoint without access badge
- DMU's Chief Compliance Officer is highly ____ averse
- Tornado _______ indicates a tornado has been sighted or identified by National Weather Service radar
- Action to take for a rapid, orderly process to exit building
- A portable device used to treat sudden cardiac arrest
Down
- Homeland Security model used by DMU for active threat response
- DMU encourages annual vaccines to prevent this common infection
- Document required by Clery Act to inform community on safety statistics
- DMUs emergency notification system
- Something one should always be aware of
- Campus department to contact if you witness suspicious activity
- DMU's avatar for emergency messaging
19 Clues: See something ___ something • DMUs emergency notification system • DMU's avatar for emergency messaging • Something one should always be aware of • Animal to emulate when walking on icy ground • Being ready and able to deal with emergencies • A symbol indicating dangerous biological substances • DMU's Chief Compliance Officer is highly ____ averse • ...
Arciniegas 2022-02-10
Across
- officer: he commands the duty officer
- officer: He is in charge of intelligence at the school
- the camp: school garden manager
Down
- Security of people
- technical officer: school weapon manager
- police: martiality
- commander: Security school
- no duty: service of company
- soldiers Security
- officer: send to school services
10 Clues: soldiers Security • Security of people • police: martiality • commander: Security school • no duty: service of company • the camp: school garden manager • officer: send to school services • officer: he commands the duty officer • technical officer: school weapon manager • officer: He is in charge of intelligence at the school
Meraki IDE Bundle Crossword Puzzle 2020-03-26
Across
- Reliable _______________ connection up to 400 mbps
- ___________ path control networking
- Type of firewall protection included with Meraki IDE bundle
- ______________ based security
Down
- Connectivity backup for critical applications
- High Availability ________________
- Technical Support & Concierge “White Glove” Service
- Type of software and security updates delivered from the cloud
- __________ prevention security
- Cisco __________ IDE Bundle
10 Clues: Cisco __________ IDE Bundle • ______________ based security • __________ prevention security • High Availability ________________ • ___________ path control networking • Connectivity backup for critical applications • Reliable _______________ connection up to 400 mbps • Technical Support & Concierge “White Glove” Service • ...
Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27
Across
- the right to _____
- food and ______ for all
- Social security
- The right to seek a _____ place to live
- no one can take away your ______ rights
- The right to ____
- don't ___________
- we are all ____ free and equal
Down
- Your human rights are _________ by the law
- we're always ________ till proven guilty
- we're all ______ before the law
- the right to ________
- a _____ and free world
- ______ to move
- marriage and _______
- the right to ______
16 Clues: ______ to move • Social security • The right to ____ • don't ___________ • the right to _____ • the right to ______ • marriage and _______ • the right to ________ • a _____ and free world • food and ______ for all • we are all ____ free and equal • we're all ______ before the law • The right to seek a _____ place to live • no one can take away your ______ rights • ...
life skills 1 2023-03-22
Across
- bullying Sharing mean pictures
- to speak or talk
- a person you know and like
- relaxed state
- settings hiding your profile
- a planned meeting
- to talk with someone
- paper to be filled out
- things that you like
- copy, when you can't see the copy
Down
- copy, an exact copy of the original
- a person you don't know well
- coming off the street with no appointment
- mail that is not junk
- good at something
- when someone gets into your accounts
- not talking or using words
- to save a time and a place for something
18 Clues: relaxed state • to speak or talk • a planned meeting • good at something • to talk with someone • things that you like • mail that is not junk • paper to be filled out • a person you know and like • not talking or using words • a person you don't know well • settings hiding your profile • bullying Sharing mean pictures • copy, when you can't see the copy • ...
ΠΕΙΡΑΤΕΙΑ ΛΟΓΙΣΜΙΚΟΥ 2024-02-12
10 Clues: κακόβουλο λογισμικό • News ψευδείς ειδήσεις • διαδικτυακός εκφοβισμός • Scams ηλεκτρονικές απάτες • Passwords κωδικοί πρόσβασης • Piracy πειρατεία λογισμικού • Reputation διαδικτυακή φήμη • Gaming παιχνίδια στο διαδίκτυο • Addiction εθισμός στο διαδίκτυο • Positive εικόνα σώματος και κοινωνικά δίκτυα
TTS 2022-02-10
8 Clues: menyoraki, dan menjuluki. • , menjambak dan menginjak. • mengucilkan, mengabaikan dan • Bullying : Menyebarkan video, • mencubit, mencakar, melempar, • Fisik : memukul, menampar, memalak, • Verbal : memaki, memfitnah, mengejek, • Psikologis (Mental) : Memandang sinis,
Secure Your Universe 2025-09-09
Across
- A software update that fixes security flaws
- Worn to identify employees and grant access
- Cameras or monitoring systems for physical security
- A secure tunnel for your internet traffic
- A login method that uses a password and a code
- Verifying your identity before granting access
- A security measure to restrict movement during a threat
- Software that detects and removes harmful programs
Down
- A secret word or phrase used to access something
- When unauthorized access to data occurs
- Software designed to harm or exploit a system
- Scrambles data so only authorized users can read it
- Uses fingerprints or facial recognition for access
- A fake email that tricks you into giving up personal info
- A digital barrier that blocks unauthorized access
- Engineering Tricking people into revealing confidential information
16 Clues: When unauthorized access to data occurs • A secure tunnel for your internet traffic • A software update that fixes security flaws • Worn to identify employees and grant access • Software designed to harm or exploit a system • A login method that uses a password and a code • Verifying your identity before granting access • ...
Cyber safety- Claire Williams 2016-06-08
9 Clues: . Helps you learn • Being mean online • . Something you do • .don't tell people it • When someone is trick you • . something you need too be • . When you right on your iPad • important member in your family • . A family member that is a female
TEKA-TEKI silang 2025-06-03
Across
- pencurian hak cipta (11 h)
- serang Cyber yang bertujuan untuk mencari data pribadi (14h)
- kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
- penyebaran informasi palsu yang meluas (4 huruf)
- informasi yang mengidentifikasi seseorang secara unik (12h)
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
- peraturan yang melindungi data pribadi (16h)
- pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
- menjaga keamanan data pribadi di internet (13h)
- jenis pinjaman yang dilakuakan melalui platfrom online (14h)
- perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- pelindungan hukum terhadap pencemaran nama baik (15 huruf)
- internet tindakan kriminal yang dilakukan melalui internet (14h)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
- infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
- perbuatan melanggar hukum didunia maya (10 huruf)
- informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
Down
- praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
- yang melibatkan pengungkapan konfirmasi pribadi (18h)
- aturan dan norma berperilaku baik di media sosial (11 h)
- sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
- perilaku tidak sopan/kasar didunia maya (10 h)
- jejak digital yang tercipta tanpa disadari penggunaan (10 h)
- penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
- perbuatan menyebar informasi yang merugikan orang lain (18h)
- ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
- jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
- tindakan menyebar informasi yang salah secara sengaja (14h)
30 Clues: pencurian hak cipta (11 h) • peraturan yang melindungi data pribadi (16h) • perilaku tidak sopan/kasar didunia maya (10 h) • menjaga keamanan data pribadi di internet (13h) • penyebaran informasi palsu yang meluas (4 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • yang melibatkan pengungkapan konfirmasi pribadi (18h) • ...
Siloviki 2025-06-03
Across
- Secretary of the Security Council, a key Siloviki ideologue
- A primary goal of the Siloviki, maintaining stability
- Russia's military intelligence directorate
- Abbreviation for the Security Council of Russia
- Current President, whose background is in the KGB
- The main domestic security and counter-intelligence agency
- A core value and source of cohesion for this elite group
- CEO of Rosneft, a prominent "Silogarch"
Down
- Russia's foreign intelligence service
- Governor of Tula, ex-FSO/GRU, often tipped as successor
- State-owned oil giant often linked to Siloviki interests
- Soviet predecessor to the FSB and SVR
- Ideology prioritizing a strong, centralized state
- The "men of force" faction in Russian politics
14 Clues: Russia's foreign intelligence service • Soviet predecessor to the FSB and SVR • CEO of Rosneft, a prominent "Silogarch" • Russia's military intelligence directorate • The "men of force" faction in Russian politics • Abbreviation for the Security Council of Russia • Ideology prioritizing a strong, centralized state • Current President, whose background is in the KGB • ...
Fraud Crossword 2018-11-08
Across
- A man who cheats or tricks someone by gaining their trust and persuading them to believe something that is not true.
- A not-for-profit organisation working to reduce and prevent fraud and financial crime
- The action or offence of giving a false or misleading account of the nature of something.
- Something that is offered to a customer to protect them.
- Wrongful or criminal deception intended to result in financial or personal gain.
Down
- An act of pretending to be another person for the purpose of entertainment or fraud.
- Someone who has been defrauded or become a.....
- A system we use within Experian
- The UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime in England, Wales and Northern Ireland.
9 Clues: A system we use within Experian • Someone who has been defrauded or become a..... • Something that is offered to a customer to protect them. • Wrongful or criminal deception intended to result in financial or personal gain. • An act of pretending to be another person for the purpose of entertainment or fraud. • ...
Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27
Across
- the right to _____
- food and ______ for all
- Social security
- The right to seek a _____ place to live
- no one can take away your ______ rights
- The right to ____
- don't ___________
- we are all ____ free and equal
Down
- Your human rights are _________ by the law
- we're always ________ till proven guilty
- we're all ______ before the law
- the right to ________
- a _____ and free world
- ______ to move
- marriage and _______
- the right to ______
16 Clues: ______ to move • Social security • The right to ____ • don't ___________ • the right to _____ • the right to ______ • marriage and _______ • the right to ________ • a _____ and free world • food and ______ for all • we are all ____ free and equal • we're all ______ before the law • The right to seek a _____ place to live • no one can take away your ______ rights • ...
Casino 2024-02-29
Across
- Coin counter
- provides an escort
- one of four service drivers
- what color is a 10's strap
- Card for veterans
- eyes in the sky
- 21
- who's portrait is on a 20 dollar bill
Down
- Finance Director
- Fake currency
- Highest Card Status
- one arm bandit
- Another name for ATM
- What color is the security thread in a 100
- currency is made of linen and
- who fills Kiosk
16 Clues: 21 • Coin counter • Fake currency • one arm bandit • eyes in the sky • who fills Kiosk • Finance Director • Card for veterans • provides an escort • Highest Card Status • Another name for ATM • what color is a 10's strap • one of four service drivers • currency is made of linen and • who's portrait is on a 20 dollar bill • What color is the security thread in a 100
Cyber Ethics,Class 8 2025-06-14
Across
- When someone lies or tricks others to get money, property, or an unfair advantage.
- A set of rules and proper behavior expected from individuals when interacting with other users online.
- Tye act of using someone else's words, ideas, or work without giving proper credit.
- Harmful software designed to damage, disrupt, or gain unauthorized access to computers, networks, or data.
- A cyber attack that tricks people into sharing personal information by pretending to be a trusted source.
- When someone takes a website name that belongs to someone else.
- Any illegal activity that involves a digital device to harm, steal, or disrupt.
Down
- The act of using digital platforms to harass, threaten, or intentionally harm someone emotionally or socially.
- Individual pieces of information.
- A cyber attack that takes users to fake websites to steal personal information.
- Keeping digital systems, data, and online activities safe from threats like hacking, viruses, or theft.
- When someone uses technical skills to get into a system or network without permission, often to control, steal, or disrupt data.
- The right to keep your personal information, actions, or space protected from others' access or interference.
- A type of malicious software that spreads itself through networks without needing to attach to other programs.
- A global network that connects computers and allows people to share information and communicate.
15 Clues: Individual pieces of information. • When someone takes a website name that belongs to someone else. • A cyber attack that takes users to fake websites to steal personal information. • Any illegal activity that involves a digital device to harm, steal, or disrupt. • When someone lies or tricks others to get money, property, or an unfair advantage. • ...
security 2022-05-05
Across
- is the use of messaging systems to send multiple unsolicited messages to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose of phishing), or simply sending the same message over and over to the same user.
- is a cyberattack intended to redirect a website's traffic to another, fake site by installing a malicious program on the computer.
- is a computer program used to prevent, detect, and remove malware.
Down
- is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
- is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes with the user's computer security and privacy.
- is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means.
7 Clues: is a computer program used to prevent, detect, and remove malware. • is a cyberattack intended to redirect a website's traffic to another, fake site by installing a malicious program on the computer. • ...
Cybersecurity 2022-07-08
Across
- A basic security feature that protects your network by acting as an intermediary between your internal network and outside traffic. It monitors attempts to gain access to your operating system and blocks unwanted incoming traffic and unrecognized sources
- Type of assessments that are the cornerstone of every program for cybersecurity
- A basic security software used to prevent, scan, detect and delete viruses from a computer
- Protecting information is vital for the normal functioning of organizations
- Is an advanced security control that reduces the chance of it being stolen
Down
- Systems that are no longer supported by the manufacturer
- is a significant threat to the confidentiality, integrity and availability of information
- A key stakeholder that may not recognize how to securely communicate with their provider
- The abbreviation of a federal requirement restricting electronic transmission of health information
- Type of phishing email specific employee within an organization
- Most significant security incident
- This stakeholder may have lax security policies compromising your system
12 Clues: Most significant security incident • Systems that are no longer supported by the manufacturer • Type of phishing email specific employee within an organization • This stakeholder may have lax security policies compromising your system • Is an advanced security control that reduces the chance of it being stolen • ...
Investment Course Lesson 11 Investment Trusts 2023-03-03
Across
- The amount that a derivative moves, per $1 movement in the underlying asset
- A type of security based on the ownership of real estate rental properties
- when a security price and moving average crossover each other on the chart, indicating strong or weak investor confidence
- having a number of assets that are different enough from each other that sudden changes in one asset will have little effect on the others
- The rise and fall of markets on a repeated basis
- a narrow or defined classification of a company’s profile
- shows how two moving averages in a particular security are related
Down
- strategies designed to reduce short term impact on the price of securities
- A type of investment trust with more than one type of share.
- when the price of a security moves contrary to other data
- a large section of the overall economy used to identify a company’s profile
- The average selling price of a security over a time period
12 Clues: The rise and fall of markets on a repeated basis • when the price of a security moves contrary to other data • a narrow or defined classification of a company’s profile • The average selling price of a security over a time period • A type of investment trust with more than one type of share. • shows how two moving averages in a particular security are related • ...
technology 2021-12-06
10 Clues: a cyber criminal • a foldable computer • screen with sensors • another word for device • a device made by Apple • a computer part that clicks • the picture for your background • the long button on your keyboard • helps you keep your device running • for example, Google Chrome, Opera, Safari
Aiden Dominko 2021-06-24
10 Clues: a boy grown up • a girl grown up • to be feeling a way • repeatedly being mean • to be a bad way to someone • to harm someone with strength • to be smiling and feeling _____ • to be unhappy and feeling _____ • watching someone getting bullied • to use the internet to bully someone
2022 Employee Appreciation Week Crossword Puzzle 2022-06-07
Across
- Customer ____ Program
- Leaf of TD Framework
- Example of Second Line of Defense
- Legal ___ Compliance & Conduct Risk (LRCC)
- Privacy ____ Assessment
- Third Party ___ Risk Management
- Mission is to protect investors; maintain fair, orderly, and efficient markets; and facilitate capital formation.
Down
- Enterprise Data ___ Office
- Third Line of Defense
- New ___ Product Approval (NBPA)
10 Clues: Leaf of TD Framework • Customer ____ Program • Third Line of Defense • Privacy ____ Assessment • Enterprise Data ___ Office • New ___ Product Approval (NBPA) • Third Party ___ Risk Management • Example of Second Line of Defense • Legal ___ Compliance & Conduct Risk (LRCC) • ...
Crossword-2 2019-06-30
Across
- Regional Internet Registry
- reason for being
- initiative for Multi-lingual Internet
- smarter banking alternatives
Down
- UNICEF Report on IG and Child rights
- Internet Governance Academy
- Cyber Hygiene initiative by ISOC...Chapter?
- ISOC Palestine initiative on online sexual harassment
- Key ICANN focus area
- category of top level domains
10 Clues: reason for being • Key ICANN focus area • Regional Internet Registry • Internet Governance Academy • smarter banking alternatives • category of top level domains • UNICEF Report on IG and Child rights • initiative for Multi-lingual Internet • Cyber Hygiene initiative by ISOC...Chapter? • ISOC Palestine initiative on online sexual harassment
Security Cat's Easy Crossword 2016-08-29
Across
- You can always ask them questions or talk to them when you don’t understand something. They are here to help you.
- Emails or messages that try to trick you into giving away personal information or clicking on something you shouldn’t. Often they use bad grammar and spelling, or look like they come from a real person.
- Treat your passwords like your __________: never share them with anyone and change them often!
- Be careful what you ________ online. When in doubt, it’s best to say less.
- You should always know where your _________ devices are, and make sure you have a lockscreen with a password on it. Some examples of these devices include iPhones, tablets, and laptops.
- Think before you _______! You don’t want to download malware by accident!
Down
- Ask your parents for _______ whenever you need it.
- This protects your online accounts from the bad guys. It should be long and hard to guess.
- Never talk to these people in real life or online!
- What happens here, stays here, so be careful about what you share! Once you post something here it stays here forever!
- Security ____ is your online buddy who helps keep humas safe and secure on the internet!
- Don’t be a cyber _______! This means you shouldn’t say mean things about or to anyone online. If you see someone being one of these, be sure to tell a parent or teacher right away.
12 Clues: Ask your parents for _______ whenever you need it. • Never talk to these people in real life or online! • Think before you _______! You don’t want to download malware by accident! • Be careful what you ________ online. When in doubt, it’s best to say less. • Security ____ is your online buddy who helps keep humas safe and secure on the internet! • ...
TEKA-TEKI silang 2025-06-03
Across
- pencurian hak cipta (11 h)
- infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
- perbuatan menyebar informasi yang merugikan orang lain (18h)
- yang melibatkan pengungkapan konfirmasi pribadi (18h)
- kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
- penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
- pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
- menjaga keamanan data pribadi di internet (13h)
- penyebaran informasi palsu yang meluas (4 huruf)
- praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
- pelindungan hukum terhadap pencemaran nama baik (15 huruf)
- perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- informasi yang mengidentifikasi seseorang secara unik (12h)
- jejak digital yang tercipta tanpa disadari penggunaan (10 h)
Down
- aturan dan norma berperilaku baik di media sosial (11 h)
- jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
- perbuatan melanggar hukum didunia maya (10 huruf)
- jenis pinjaman yang dilakuakan melalui platfrom online (14h)
- sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
- serang Cyber yang bertujuan untuk mencari data pribadi (14h)
- perilaku tidak sopan/kasar didunia maya (10 h)
- ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
- peraturan yang melindungi data pribadi (16h)
- informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
- internet tindakan kriminal yang dilakukan melalui internet (14h)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
- tindakan menyebar informasi yang salah secara sengaja (14h)
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
30 Clues: pencurian hak cipta (11 h) • peraturan yang melindungi data pribadi (16h) • perilaku tidak sopan/kasar didunia maya (10 h) • menjaga keamanan data pribadi di internet (13h) • penyebaran informasi palsu yang meluas (4 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • yang melibatkan pengungkapan konfirmasi pribadi (18h) • ...
TEKA-TEKI silang 2025-06-03
Across
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
- penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
- informasi yang mengidentifikasi seseorang secara unik (12h)
- pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
- perbuatan melanggar hukum didunia maya (10 huruf)
- peraturan yang melindungi data pribadi (16h)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
- pelindungan hukum terhadap pencemaran nama baik (15 huruf)
- jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
- yang melibatkan pengungkapan konfirmasi pribadi (18h)
- aturan dan norma berperilaku baik di media sosial (11 h)
- serang Cyber yang bertujuan untuk mencari data pribadi (14h)
Down
- menjaga keamanan data pribadi di internet (13h)
- praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
- internet tindakan kriminal yang dilakukan melalui internet (14h)
- jenis pinjaman yang dilakuakan melalui platfrom online (14h)
- perbuatan menyebar informasi yang merugikan orang lain (18h)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
- informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
- tindakan menyebar informasi yang salah secara sengaja (14h)
- kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
- perilaku tidak sopan/kasar didunia maya (10 h)
- sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
- penyebaran informasi palsu yang meluas (4 huruf)
- pencurian hak cipta (11 h)
- ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
- jejak digital yang tercipta tanpa disadari penggunaan (10 h)
- infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
30 Clues: pencurian hak cipta (11 h) • peraturan yang melindungi data pribadi (16h) • perilaku tidak sopan/kasar didunia maya (10 h) • menjaga keamanan data pribadi di internet (13h) • penyebaran informasi palsu yang meluas (4 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • yang melibatkan pengungkapan konfirmasi pribadi (18h) • ...
noun 2021-03-23
Across
- He takes great _____.
- The plural of bacterium
- Sit on the ______ ______(Chair/office).
- In the cyber are a lot of _______.
- The plural of fungus
Down
- Today he has his first ______ ______(interview/job).
- Plural of woman.
- The ______ met after the court.
- In the desert are a lot of ______.
- They built a _____ _____(house/bricks).
- Pass me the ____ ______(spoon/soup).
- Mister beast ______ has a lot of views.
- The plural of fry
- I used to watch super hero _____.
14 Clues: Plural of woman. • The plural of fry • The plural of fungus • He takes great _____. • The plural of bacterium • The ______ met after the court. • I used to watch super hero _____. • In the desert are a lot of ______. • In the cyber are a lot of _______. • Pass me the ____ ______(spoon/soup). • They built a _____ _____(house/bricks). • Mister beast ______ has a lot of views. • ...
