cyber security Crossword Puzzles

Cyber bullying 2019-07-11

Cyber bullying crossword puzzle
Across
  1. Holt
  2. answer someones question
  3. being hurt constantly
  4. private to you
  5. not tell the truth
  6. like a cold
Down
  1. something you use to access messages and internet
  2. to hold up
  3. someone who is mean to someone else
  4. texting and communicating

10 Clues: Holtto hold uplike a coldprivate to younot tell the truthbeing hurt constantlyanswer someones questiontexting and communicatingsomeone who is mean to someone elsesomething you use to access messages and internet

Cyber Crossword 2024-05-24

Cyber Crossword crossword puzzle
Across
  1. A piece of software designed to update or fix problems with a computer program or its supporting data.
  2. Malicious software designed to block access to a computer system until a sum of money is paid.
  3. The process of converting information or data into a code to prevent unauthorized access.
  4. Software that enables a user to obtain covert information about another's computer activities.
Down
  1. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  2. A type of malware disguised as legitimate software.
  3. A secret word or phrase that must be used to gain admission to something.
  4. A network security system that monitors and controls incoming and outgoing network traffic.
  5. A network of private computers infected with malicious software and controlled as a group.
  6. A method of trying to distribute malware or steal information or money using deceptive e-mails and websites.

10 Clues: A type of malware disguised as legitimate software.A secret word or phrase that must be used to gain admission to something.Software designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code to prevent unauthorized access....

Cyber Etiquette 2023-04-02

Cyber Etiquette crossword puzzle
Across
  1. Do not participate in ______ conduct such as being an online troll, bully or hacker
  2. Do not consume or spread ______ inappropriate content
  3. Communicate and share ______ by posting positive content
  4. Do not ______ personal information
Down
  1. We can protect ourselves from online dangers by reaching out to police or trusted adult
  2. Could the person have any malicious intent
  3. Take _____ against cyberbullying
  4. Do you know the person or are they credible
  5. Keep personal information ______
  6. Did the person intimidate or rush you to do something

10 Clues: Take _____ against cyberbullyingKeep personal information ______Do not ______ personal informationCould the person have any malicious intentDo you know the person or are they credibleDo not consume or spread ______ inappropriate contentDid the person intimidate or rush you to do somethingCommunicate and share ______ by posting positive content...

Cyber Safety 2023-03-27

Cyber Safety crossword puzzle
Across
  1. Sites such as Snapchat, tiktok etc...
  2. simulation of the real thing
  3. To stop a computer from reaching something on the internet.
  4. An attempt to trick people into visiting malicious websites.
Down
  1. Measures taken to protect a computer
  2. When a child abuser tries to start a relationship online.
  3. Repeated behavior that is intended to cause psychological or emotional harm.
  4. A word or series of letters, numbers and characters.
  5. Computer program designed to damage files
  6. Person who uses computer to gain unauthorized access to data.

10 Clues: simulation of the real thingMeasures taken to protect a computerSites such as Snapchat, tiktok etc...Computer program designed to damage filesA word or series of letters, numbers and characters.When a child abuser tries to start a relationship online.To stop a computer from reaching something on the internet....

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. arguing or dissing someone online
  2. repeat rude messages
  3. pretending to be another person
  4. excluding a person from an activity
Down
  1. use of Internet and technologies to harm other people
  2. Presenting work or ideas from another source as your own, with or without consent of the original creator by using it in your work without acknowledgement.
  3. sharing someones secrets and other personal info without consent
  4. offensive and rude rumors and gossip
  5. harrasing or threatening someone online
  6. tricking someone into giving personal info

10 Clues: repeat rude messagespretending to be another personarguing or dissing someone onlineexcluding a person from an activityoffensive and rude rumors and gossipharrasing or threatening someone onlinetricking someone into giving personal infouse of Internet and technologies to harm other people...

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. into revealing secrets or embarrassing information, then sharing it online.
  2. someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
  3. nasty, mean, and insulting messages.
  4. is the use of the Internet and related technologies to harm other people in a deliberate, repeated, and hostile manner." - Wikipedia
  5. is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity" - Wikipedia
Down
  1. secrets or embarrassing information or images online.
  2. is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability."
  3. is the wrongful appropriation and purloining and publication of another author's language, thoughts, ideas, or expressions, and the representation of them as one's own original work."
  4. and cruelly excluding someone from an online group.
  5. using electronic messages with angry and vulgar language.

10 Clues: nasty, mean, and insulting messages.and cruelly excluding someone from an online group.secrets or embarrassing information or images online.using electronic messages with angry and vulgar language.into revealing secrets or embarrassing information, then sharing it online....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Sharing somebody else's secrets online.
  2. Stealing someone's identify to pretend to be them.
  3. A computer program that can replicate and spread over the computer.
  4. Repeatedly sending mean insulting messages.
  5. Cruely excluding someone online.
Down
  1. Someone stealing another authors own work.
  2. To harm peoples feelings on repeat online.
  3. Online fights send through message with anger.
  4. Repeated harassment on someone's page.
  5. Tricking someone into saying stuff about other people online.

10 Clues: Cruely excluding someone online.Repeated harassment on someone's page.Sharing somebody else's secrets online.Someone stealing another authors own work.To harm peoples feelings on repeat online.Repeatedly sending mean insulting messages.Online fights send through message with anger.Stealing someone's identify to pretend to be them....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. stalking repeated intense harrasment
  2. to share someone else secerets or information ofimages online
  3. pretending to be someone or posting vidoes online to get them introuble
  4. to trick someone to reveal secrets or embarrisingInfromation online
  5. means to diss someone or spread rumors.
Down
  1. intentionally and cruely exculuding someone froman online group
  2. theft means to stels someones identity
  3. means to send mean or insulting messages.
  4. means to use angry and vulgar launage online
  5. denigration that includes threats and significant fear

10 Clues: stalking repeated intense harrasmenttheft means to stels someones identitymeans to diss someone or spread rumors.means to send mean or insulting messages.means to use angry and vulgar launage onlinedenigration that includes threats and significant fearto share someone else secerets or information ofimages online...

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Pretending to be someone your not on the internet.
  2. Sharing another person's secrets online.
  3. Using Technology to hurt others.
  4. Repeated harassment on someone's page.
Down
  1. Pretending to be someone else and using their name and personal information.
  2. A disease in your PC.
  3. Not including another person.
  4. Repeatedly sending nasty and mean messages.
  5. Taking someone else's work or ideas and passing them as their own.
  6. Online fight and saying vulgar language.

10 Clues: A disease in your PC.Not including another person.Using Technology to hurt others.Repeated harassment on someone's page.Sharing another person's secrets online.Online fight and saying vulgar language.Repeatedly sending nasty and mean messages.Pretending to be someone your not on the internet....

Cyber Foundations 2022-04-07

Cyber Foundations crossword puzzle
Across
  1. The slide currrently selected or displayed
  2. The preset amount of time between slides as they advance automatically during a slide show
  3. The template will appear along with traditional information on how the template could be used
  4. A feature that allows you to create a show from scratch
Down
  1. Where you will find commands to perform common tasks in PowerPoint
  2. The visual appearance or images of something when looked at in a certain way
  3. an item of illustrative matter
  4. A graphic tool that allows you to create a visual representation of information and ideas
  5. A graphical computer display that can be superimposed on another
  6. The figure that appears when you are adding text to a slide

10 Clues: an item of illustrative matterThe slide currrently selected or displayedA feature that allows you to create a show from scratchThe figure that appears when you are adding text to a slideA graphical computer display that can be superimposed on anotherWhere you will find commands to perform common tasks in PowerPoint...

Cyber bulliyng 2025-03-11

Cyber bulliyng crossword puzzle
Across
  1. a secret word that you only know
  2. a global computer network providing a variety of information
  3. The repetitive, intentional hurting of one person
  4. not invitng some to there goup
Down
  1. a person who speaks or acts in support
  2. a computer program with a graphical user.
  3. posting unsults
  4. bullying someone online
  5. available on or performed using the internet or other computer network
  6. the willful and repeated following, watching or harassing

10 Clues: posting unsultsbullying someone onlinenot invitng some to there goupa secret word that you only knowa person who speaks or acts in supporta computer program with a graphical user.The repetitive, intentional hurting of one personthe willful and repeated following, watching or harassinga global computer network providing a variety of information...

cyber bullying 2025-03-11

cyber bullying crossword puzzle
Across
  1. loacating resourse on online
  2. getting bullied on online
  3. getting harast
  4. posting about someone else
  5. following someone
  6. a safe way of investigating
Down
  1. to get a fight on purpose
  2. a program on a computer
  3. how syberbulling tricks people
  4. to be safe on line

10 Clues: getting harastfollowing someoneto be safe on linea program on a computerto get a fight on purposegetting bullied on onlineposting about someone elsea safe way of investigatingloacating resourse on onlinehow syberbulling tricks people

travis cyber 2023-10-08

travis cyber crossword puzzle
Across
  1. Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
  2. Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
  3. Verifying the identity of users or systems to ensure secure access.
  4. Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
  1. Pertaining to the security challenges and measures for smartphones and tablets.
  2. A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
  3. Malware that encrypts files, demanding payment for their release.
  4. An update to fix vulnerabilities or improve security in software or systems.
  5. Converting data into a code to prevent unauthorized access, especially during transmission.
  6. A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.

10 Clues: Malware that encrypts files, demanding payment for their release.Verifying the identity of users or systems to ensure secure access.An update to fix vulnerabilities or improve security in software or systems.Pertaining to the security challenges and measures for smartphones and tablets....

CYBER BULLYING 2024-10-22

CYBER BULLYING crossword puzzle
Across
  1. group of platforms where people post their pictures
  2. a form of aggressive behavior which causes injury or discomfort to others
  3. demand something (undesirable) from someone
  4. avoid talking to ____ online
Down
  1. a search site
  2. this can be used to track what people post online(2 words)
  3. a connection on facebook
  4. restrict contact with someone on an online app
  5. a popular mobile device
  6. a secret text that only authorized users have access to

10 Clues: a search sitea popular mobile devicea connection on facebookavoid talking to ____ onlinedemand something (undesirable) from someonerestrict contact with someone on an online appgroup of platforms where people post their picturesa secret text that only authorized users have access tothis can be used to track what people post online(2 words)...

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. NEEDED TO SHOP ONLINE
  2. A PROMOTIONAL MESSAGE
  3. AVAILABILITY OF ITEMS
  4. THE COST OF AN ITEM
Down
  1. HOLDS YOUR CASH
  2. PLAN FOR SPENDING MONEY
  3. TO VERIFY ITEMS IN YOUR CART
  4. A DEAL OR DISCOUNT
  5. A WAITING GROUP
  6. TO GIVE MONEY FOR SOMETHING

10 Clues: HOLDS YOUR CASHA WAITING GROUPA DEAL OR DISCOUNTTHE COST OF AN ITEMNEEDED TO SHOP ONLINEA PROMOTIONAL MESSAGEAVAILABILITY OF ITEMSPLAN FOR SPENDING MONEYTO GIVE MONEY FOR SOMETHINGTO VERIFY ITEMS IN YOUR CART

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. MAXIMUM PURCHASE QUANTITY
  2. HOLDS YOUR SELECTED ITEMS
  3. WHAT YOU WANT TO ACHIEVE
  4. REMOVING ITEMS FROM STOCK
  5. BUYING MANY ITEMS
  6. TO LOOK THROUGH ITEMS
Down
  1. WHAT YOU MAKE TO ORGANIZE SHOPPING
  2. ACTION FOR SELECTING ONLINE
  3. WORTH OF AN ITEM
  4. TO KEEP MONEY UNSPENT

10 Clues: WORTH OF AN ITEMBUYING MANY ITEMSTO LOOK THROUGH ITEMSTO KEEP MONEY UNSPENTWHAT YOU WANT TO ACHIEVEMAXIMUM PURCHASE QUANTITYHOLDS YOUR SELECTED ITEMSREMOVING ITEMS FROM STOCKACTION FOR SELECTING ONLINEWHAT YOU MAKE TO ORGANIZE SHOPPING

Cyber Attackers 2025-03-24

Cyber Attackers crossword puzzle
Across
  1. Emails pretending to be from trusted sources to steal information.
  2. An attack where criminals demand money to restore access to data.
  3. Type of hacker paid to test security systems ethically.
  4. Attack that floods a system with traffic to bring it down.
Down
  1. A trick where a criminal looks over your shoulder to steal information.
  2. The unauthorised use of someone’s private information to pretend to be them.
  3. Software that replicates itself and can damage files or systems.
  4. Law passed in 1990 to deal with hacking offences.
  5. Security method requiring both a password and a text code.
  6. Personal facts and figures collected online.

10 Clues: Personal facts and figures collected online.Law passed in 1990 to deal with hacking offences.Type of hacker paid to test security systems ethically.Security method requiring both a password and a text code.Attack that floods a system with traffic to bring it down.Software that replicates itself and can damage files or systems....

CYBER CROSSWORD 2021-09-05

CYBER CROSSWORD crossword puzzle
Across
  1. The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  2. An individual who subscribes to a kind of ideology about new technologies, such as the Internet.
  3. A switching device for networks, which is able to route network packets, based on their addresses, to other networks or devices.
  4. Any piece of technology that connects people and machines with each other or with information.
  5. The conversion of text, pictures, or sound into a digital form that can be processed by a computer.
  6. The unauthorized use, copying or distribution of copyrighted software
Down
  1. The notional environment in which communication over computer networks occurs.
  2. The unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names.
  3. is the process of developing, promoting and possibly mandating standards-based and compatible technologies and processes within a given industry.
  4. This provides legal recognition for transactions that are carried out by means of electronic data interchange.

10 Clues: The unauthorized use, copying or distribution of copyrighted softwareThe notional environment in which communication over computer networks occurs.Any piece of technology that connects people and machines with each other or with information.An individual who subscribes to a kind of ideology about new technologies, such as the Internet....

Cyber Law 2021-09-04

Cyber Law crossword puzzle
Across
  1. It refers to the technologies, process and practices designed to protect networks, devices, app and data from any kind of cyber attack.
  2. regulatory arbitrage in Cyberspace (that is applying to the Internet) is a focal point for two opposing schools of thought, the Cyberlibertarians and
  3. 'citizen of the internet' can be called__
  4. which communication is a permanent telephone connection between two points set up by a telecommunication common carrier
  5. It refers to the adoption or increase in use of computer technology by an organization,Industry etc.
Down
  1. It can be thought of as a global electronic village with instantaneous communication and no geographical barriers
  2. The essence of this approach is that cyberspace is a distinct new space and that it can (or should) not be regulated by the state.
  3. you have your computer, you really don't need much additional hardware to connect to the internet. The primary piece of hardware you need is a
  4. it allows perfect freedom of expression, which in the physical world has been tempered by even the most liberal of regime
  5. It is a conversion of data,document and processes from analog to digital

10 Clues: 'citizen of the internet' can be called__It is a conversion of data,document and processes from analog to digitalIt refers to the adoption or increase in use of computer technology by an organization,Industry etc.It can be thought of as a global electronic village with instantaneous communication and no geographical barriers...

cyber ethicsc 2025-06-14

cyber ethicsc crossword puzzle
Across
  1. illegally accessing someone's computer
  2. moral rules to follow online and offline
  3. a secret code you should never share
  4. you need permission before using this kind of content
  5. antivirus software helps with this
  6. everyone has a right to this online and offline
Down
  1. stealing work and calling it your own
  2. fake emails asking for your passwords or bank info
  3. tell a trusted adult or click this option on social media
  4. always show this to people online too

10 Clues: antivirus software helps with thisa secret code you should never sharestealing work and calling it your ownalways show this to people online tooillegally accessing someone's computermoral rules to follow online and offlineeveryone has a right to this online and offlinefake emails asking for your passwords or bank info...

Cyber Puzzle 2022-09-20

Cyber Puzzle crossword puzzle
Across
  1. Special virus that moves from computer to computer without human interaction.
  2. An important process that verifies a user is really who they are; many different ways this can be done.
  3. unique address that identifies a device on the internet or a local network.
Down
  1. The form of encryption that requires a single key
  2. A social engineering technique that uses emails to impersonate others and gain access to unauthorised information.
  3. means that data is protected from unauthorized changes to ensure that it is reliable and correct.
  4. The coloured hat of hackers that are cybercriminals who uses hacking for malicious intent and personal gain
  5. a person who uses computers to gain unauthorized access to data.
  6. the primary purpose of _________ is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet.
  7. An ________ is a program or code that makes use of the vulnerability in an application or system.

10 Clues: The form of encryption that requires a single keya person who uses computers to gain unauthorized access to data.unique address that identifies a device on the internet or a local network.Special virus that moves from computer to computer without human interaction....

Cyber Crossword! 2025-05-23

Cyber Crossword! crossword puzzle
Across
  1. A popular operating system
  2. The company that makes windows
  3. The main menu with lots of options
  4. The common color of the screen of death
  5. What happens if you press ctrl-alt-del
Down
  1. A portable computer that folds
  2. The little arrow that the mouse controls
  3. A purple guy that "helps"
  4. Zeus is an example
  5. A fun game full of mines

10 Clues: Zeus is an exampleA fun game full of minesA purple guy that "helps"A popular operating systemA portable computer that foldsThe company that makes windowsThe main menu with lots of optionsWhat happens if you press ctrl-alt-delThe common color of the screen of deathThe little arrow that the mouse controls

CYBER BULLYING 2025-12-12

CYBER BULLYING crossword puzzle
Across
  1. Online messages meant to hurt or threaten someone
  2. Sending repeated threatening message
  3. A group targeting one individual online
  4. Sharing someone’s personal info without permission
Down
  1. Repeated aggressive behaviour using digital devices
  2. Pretending to be someone else online to cause harm
  3. Online platforms used for bullying (general term)
  4. Anonymous hateful comments on social media
  5. When someone is left out intentionally in online groups
  6. A harmful, untrue statement spread online

10 Clues: A group targeting one individual onlineA harmful, untrue statement spread onlineSending repeated threatening messageAnonymous hateful comments on social mediaOnline messages meant to hurt or threaten someoneOnline platforms used for bullying (general term)Pretending to be someone else online to cause harm...

Cyber bullying 2026-02-10

Cyber bullying crossword puzzle
Across
  1. dampak psikologis pada korban,seperti perasaan sedih mendalam.
  2. perilaku menyakitkan yang dilakukan melaluli media digital.
  3. sebutan untuk orang yang menjadi korban bullying.
  4. tindakan pencegahan awal cyberbullying.
  5. tindakan mengirim pesan kasar secara berulang.
Down
  1. langkah untuk melindungi dari cyberbullying.
  2. media yang sering digunakkan untuk cyberbullying.
  3. jenis cyberbullying dengan menyebarkan kabar bohong.
  4. tempat untuk melaporkan tindakan Cyber bullying.
  5. asasi hak yang dilanggar ketika seseorang mengalami cyberbullying.

10 Clues: tindakan pencegahan awal cyberbullying.langkah untuk melindungi dari cyberbullying.tindakan mengirim pesan kasar secara berulang.tempat untuk melaporkan tindakan Cyber bullying.media yang sering digunakkan untuk cyberbullying.sebutan untuk orang yang menjadi korban bullying.jenis cyberbullying dengan menyebarkan kabar bohong....

Crossword 1 2014-12-28

Crossword 1 crossword puzzle
Across
  1. When securing a crime scene, make note of any __________ conditions.
  2. “Find committing” is defined under the Criminal Code as meaning situations where a person is basically caught in the act of committing the __________.
  3. Designing the environment to reduce the possibility of crime is called?
  4. The steps to using an extinguisher can be explained using the acronym PASS. What action does the first S in this acronym refers to?
  5. Only the __________ government can create indictable offences.
  6. When handling evidence, you should wear gloves to avoid __________.
  7. The basic security role is implemented by observing, reporting, __________ and deterring.
  8. One of the recommendations from the Patrick Shand case was __________ licensing.
  9. An arrest is defined as getting control of someone with intent to __________.
Down
  1. Post orders are often called __________ orders.
  2. It is the responsibility of every security guard to be aware of __________ materials on the work site.
  3. The basic security role is to protect people, property and __________.
  4. One reason that we patrol is to deter people from __________ acts.
  5. Patrick Shand was arrested for __________ baby food.
  6. We can protect information by protecting computer screens from __________ eyes.
  7. When taking a witness statement, the facts should be in __________ order.
  8. If a crowd seems to be getting out of control, __________ from any communication.
  9. You will need a security license to work in loss __________.

18 Clues: Post orders are often called __________ orders.Patrick Shand was arrested for __________ baby food.You will need a security license to work in loss __________.Only the __________ government can create indictable offences.One reason that we patrol is to deter people from __________ acts....

Investment Strategies and Analysis - Jace 2021-02-06

Investment Strategies and Analysis - Jace crossword puzzle
Across
  1. the ratio used to evaluate return based on risk level
  2. cluster of protein filament currently found on Micheal's face
  3. portfolio theory that seeks for optimal returns at a given risk level and time horizon
  4. portfolio management type that adapts to a seasonal market trend
  5. more __
  6. __ hypothesis (of the Efficient Market Hypothesis) disregards past history and refute theories of technical analysis of any security
  7. passive investment technique that attempts to match a particular stock baseline
  8. private activity __ bonds would be taxable under the Alternative Minimum Tax (AMT)
Down
  1. the P/E ratio of a growth company
  2. Rob's favorite shirt design
  3. correlation at a (+1) coefficient
  4. term used when ensuring a portfolio does not overemphasize one or more asset categories
  5. by calculating a weighted average of various performance probabilities, the __ return is the amount an investor expects to receive from an investment
  6. rule of 72 determines the time it take an investment to do this
  7. the period an investor has actual ownership of the security
  8. the government agency security guaranteed by the US government
  9. the stepped up cost basis of an inherited security is determined as of the date of the owner's___
  10. portfolio turnover rate in a buy and hold strategy
  11. the P/E ratio of a value company

19 Clues: more __Rob's favorite shirt designthe P/E ratio of a value companythe P/E ratio of a growth companycorrelation at a (+1) coefficientportfolio turnover rate in a buy and hold strategythe ratio used to evaluate return based on risk levelthe period an investor has actual ownership of the security...

CS Unit 2 Vocab 2025-09-30

CS Unit 2 Vocab crossword puzzle
Across
  1. identity verification
  2. software that is programmed to detect, prevent, and remove viruses from devices
  3. a network that only uses cables to connect to devices or the internet
  4. a network that transmit data extremely fast through thin strands of plastic or glass fiber
  5. data stored on a device that is not connected to the internet or to a network
  6. open authorization and two-factor authentication
  7. security process that requires two different forms/factors of authentication to verify someone's identity
  8. the data is trustworthy and accurate (part of the CIA triad)
  9. the exposure something has to being in danger
Down
  1. to reduce the severity of something
  2. the accessibility of data to authorized users (part of the CIA triad)
  3. services that are useable
  4. the core fundamental concept of cybersecurity
  5. proof that someone/something has performed a digital action, so they can not deny involvement
  6. network security systems that monitor and control network trafficet, used as barriers between internal and external networks
  7. only people who are authorized have access to data (part of the CIA triad)
  8. network security tool that monitors system and network activity for threats and mitigates them immediately
  9. network security tool that monitors system and nwork activity for suspicious behavior

18 Clues: identity verificationservices that are useableto reduce the severity of somethingthe core fundamental concept of cybersecuritythe exposure something has to being in dangeropen authorization and two-factor authenticationthe data is trustworthy and accurate (part of the CIA triad)the accessibility of data to authorized users (part of the CIA triad)...

New Deal Program 2024-02-22

New Deal Program crossword puzzle
Across
  1. security - provided low interest credits and other services to farmers
  2. and Crafts - create, promote, protect Indian arts.
  3. Housing Act - Got funding to build houses
  4. - Funding of the arts
  5. Relief - Funds New Deal work agencies
  6. Drug Cosmetics - Improves public safety
  7. of Prohibition - 21st amendment added to constitution
  8. Security - Unemployment insurance, social security taxes on tolls and paychecks
  9. reorganization - Giving Indians back land, gave them credit
Down
  1. Youth Dance - small performing arts
  2. Project - Planted trees to give work and protect plains from wind erosion
  3. Forum - Americans discuss problems
  4. of Justice - Investigates civil rights
  5. Deposit Insurance Corporation - Insured bank deposits when bank fails
  6. Bureau - Increased travel and tourism in U.S

15 Clues: - Funding of the artsForum - Americans discuss problemsYouth Dance - small performing artsRelief - Funds New Deal work agenciesof Justice - Investigates civil rightsDrug Cosmetics - Improves public safetyHousing Act - Got funding to build housesBureau - Increased travel and tourism in U.Sand Crafts - create, promote, protect Indian arts....

IFG Security Crossword Puzzle 2023-07-27

IFG Security Crossword Puzzle crossword puzzle
Across
  1. Security incident that results in the loss, suspected compromise of classified info
  2. Security incident involving unintentional or negligent violation of customer or company security requirements
  3. Focal point for overall security administration and management
  4. required for access to SAP
  5. SAP Accredited Area
Down
  1. Dedicated unclassified F-22 program area
  2. Replaced FOUO
  3. Displays unclassified program identifiers for all SAPs an employee possesses
  4. Prohibited Item
  5. Control information about mission capabilities, limitations, and intentions

10 Clues: Replaced FOUOProhibited ItemSAP Accredited Arearequired for access to SAPDedicated unclassified F-22 program areaFocal point for overall security administration and managementControl information about mission capabilities, limitations, and intentionsDisplays unclassified program identifiers for all SAPs an employee possesses...

IFG Security Crossword Puzzle 2023-07-27

IFG Security Crossword Puzzle crossword puzzle
Across
  1. Replaced FOUO
  2. Security incident that results in the loss, suspected compromise of classified info
  3. The practice of controlling information about mission capabilities, limitations, and intentions
  4. Prohibited Item
Down
  1. Security incident involving unintentional or negligent violation of customer or company security requirements
  2. Focal point for overall security administration and management
  3. Displays unclassified program identifiers for all SAPs an employee possesses
  4. Dedicated unclassified F-22 program area
  5. Required for access to SAP
  6. SAP Accredited Area

10 Clues: Replaced FOUOProhibited ItemSAP Accredited AreaRequired for access to SAPDedicated unclassified F-22 program areaFocal point for overall security administration and managementDisplays unclassified program identifiers for all SAPs an employee possessesSecurity incident that results in the loss, suspected compromise of classified info...

Security and Legislation 2022-02-25

Security and Legislation crossword puzzle
Across
  1. being honest and upright
  2. proving something to be genuine or valid
  3. the quality of being able to be used, reached or entered easily
  4. the standing of a person or organisation in the eyes of the public
  5. people who work for a company
  6. software that needs to be put on a newer version
  7. software that is no longer being maintained or updated
  8. programs on a computer
  9. for letter word for information that does not have a meaning to it
Down
  1. keeping something private
  2. being ready to use at any time
  3. having to pay for doing something wrong
  4. the physical components of a computer
  5. it belongs to an individual
  6. acting in accordance to something, obeying, following the rules
  7. a string of text that needs to be entered in order to access a system
  8. a dispute that has been brought to court
  9. permanent software programmed into a read-only memory

18 Clues: programs on a computerbeing honest and uprightkeeping something privateit belongs to an individualpeople who work for a companybeing ready to use at any timethe physical components of a computerhaving to pay for doing something wrongproving something to be genuine or valida dispute that has been brought to court...

Custody and Security 2024-08-28

Custody and Security crossword puzzle
Across
  1. _______ and procedure
  2. equipment used to communicate
  3. handcuffs, leg irons, belly chains
  4. opens doors, may have silver rivet
  5. fence surrounding the facility
  6. gang members or gang activity
  7. type of search looking for obvious contraband
  8. formal, informal, emergency, keep track of prisoners
Down
  1. card the item carried by prisoners to identify them
  2. you'd radio call to them during emergencies
  3. slang for contraband item usually made to inflict harm
  4. the people incarcerated
  5. paperwork that allows items to come through the gate
  6. the official name for a "ticket"
  7. custody staff
  8. prohibited items of property held by prisoners
  9. prisoners are moving units and must ____ their stuff
  10. the person who oversees the running of the facility

18 Clues: custody staff_______ and procedurethe people incarceratedequipment used to communicategang members or gang activityfence surrounding the facilitythe official name for a "ticket"handcuffs, leg irons, belly chainsopens doors, may have silver rivetyou'd radio call to them during emergenciestype of search looking for obvious contraband...

PERSONNEL SECURITY PROGRAM 2021-08-16

PERSONNEL SECURITY PROGRAM crossword puzzle
Across
  1. AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
  2. SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR?
  3. TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
  4. OFFICER WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
  5. TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
Down
  1. OF NCIS DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
  2. WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
  3. WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
  4. SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
  5. WHO IS USUALLY DESIGNATED AS IAM?
  6. AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?

11 Clues: WHO IS USUALLY DESIGNATED AS IAM?SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR?WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?...

PERSONNEL SECURITY PROGRAM 2021-08-16

PERSONNEL SECURITY PROGRAM crossword puzzle
Across
  1. AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
  2. SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR?
  3. TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
  4. OFFICER WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
  5. TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
Down
  1. OF NCIS DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
  2. WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
  3. WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
  4. SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
  5. WHO IS USUALLY DESIGNATED AS IAM?
  6. AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?

11 Clues: WHO IS USUALLY DESIGNATED AS IAM?SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR?WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?...

PERSONNEL SECURITY PROGRAM 2021-08-16

PERSONNEL SECURITY PROGRAM crossword puzzle
Across
  1. AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
  2. scope background investigation WHAT DOES SSBI STAND FOR?
  3. TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
  4. officer WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
  5. TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
Down
  1. of ncis DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
  2. WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
  3. WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
  4. SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
  5. WHO IS USUALLY DESIGNATED AS IAM?
  6. AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?

11 Clues: WHO IS USUALLY DESIGNATED AS IAM?SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?scope background investigation WHAT DOES SSBI STAND FOR?...

Compliance Champions League 2023 - Crossword 2023-11-28

Compliance Champions League 2023 - Crossword crossword puzzle
Across
  1. Attachments are made visible externally by setting the _ flag:
  2. Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance:
  3. Patch Day notes are released on 2nd _________ of every Month :
  4. Subscribe using the _ to receive email notifications on external updates for cases :
  5. Software with rating ___________ at SAP should not be installed:
  6. Business continuity plans must be documented, maintained, audited, and regularly tested in preparation for unforeseen risks to business operations. They can be found in the Portalusing the quicklink /go/ _______________ :
  7. _______ notes must be entered to put the case to status Resolved:
  8. The _____ feature enables SAP to secure the usage of any application specific function:
  9. _______ tool targets at providing missing functionality and enhancements to Agent Workspace:
  10. _______ field ensures that the action plan step documented will be visible to the customer:
Down
  1. We can find the latest SAP logo and word/ppt templates at www.______.com :
  2. If the security vulnerability doesn't affect any customers as the coding was never shipped to customers, ________________ flag should be set in the security incident.
  3. _____________ Maintenance Strategy is used by customers to request a quotation online in SMP:
  4. Which Board area does AIS belong to?
  5. To installl a software which is not listed in software center, we get it via go/ :
  6. What should be the status of a product security incident if you get a CVSS score of 0.0.:
  7. While working from home, If something is lost, or you suspect that SAP information has been disclosed without authorization - Make an appropriate report in the_____ :
  8. What should be the final status of a Security Incident:
  9. How is the priority of the security note calculated?
  10. You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com:

20 Clues: Which Board area does AIS belong to?How is the priority of the security note calculated?What should be the final status of a Security Incident:Attachments are made visible externally by setting the _ flag:Patch Day notes are released on 2nd _________ of every Month :Software with rating ___________ at SAP should not be installed:...

public saftey 2024-08-09

public saftey crossword puzzle
Across
  1. measures ensuring protection
  2. organized withdrawal from danger
  3. actions to avert potential threats
  4. occurrence of an unexpected event
  5. state of being ready for emergencies
  6. state of being shielded from harm
  7. vehicle for urgent medical aid
  8. act of extricating from peril
  9. critical situation requiring immediate action
  10. event causing significant destruction
Down
  1. continuous observation for security
  2. routine surveillance activity
  3. action taken during an emergency
  4. Aid, preliminary medical intervention
  5. enforcers of law and order
  6. potential risk or danger
  7. combatant of infernos
  8. emergency procedure for cardiac arrest
  9. refuge from adverse conditions
  10. device signaling danger

20 Clues: combatant of infernosdevice signaling dangerpotential risk or dangerenforcers of law and ordermeasures ensuring protectionroutine surveillance activityact of extricating from perilvehicle for urgent medical aidrefuge from adverse conditionsaction taken during an emergencyorganized withdrawal from dangeroccurrence of an unexpected event...

INTERNET TERMINOLOGIES 2023-12-09

INTERNET TERMINOLOGIES crossword puzzle
Across
  1. Internet Service Provider
  2. Malicious software
  3. Device for internet access
  4. Connection to another web page
  5. Data security through encoding
  6. Software for navigating the web
  7. Collection of online pages
  8. Transfer data from the internet
  9. Website data stored on a device
  10. Fraudulent information retrieval
  11. Unsolicited emails/messages
  12. Temporary storage for web data
Down
  1. Tool for finding information online
  2. Language for web page creation
  3. Webpage address
  4. Computer delivering data to users
  5. Network security system
  6. Device directing internet traffic
  7. Wireless internet connection
  8. Data transfer capacity
  9. Website's name/address
  10. Transfer data to the internet
  11. Internet Service Provider

23 Clues: Webpage addressMalicious softwareData transfer capacityWebsite's name/addressNetwork security systemInternet Service ProviderInternet Service ProviderDevice for internet accessCollection of online pagesUnsolicited emails/messagesWireless internet connectionTransfer data to the internetLanguage for web page creationConnection to another web page...

BCS reveiw noah seabolt 2015-11-11

BCS reveiw noah seabolt crossword puzzle
Across
  1. a group of computers
  2. something you can access the web on
  3. a message sender thing that send messages to people
  4. micro soft excel
  5. asdfjkl;'
  6. something that you move and click stuff with
  7. ware stuff that makes up a computer
  8. computer screen
Down
  1. bully bully on the internet
  2. being safe on thee interwebs
  3. web page maker
  4. a plan u pick that limits sertan thing
  5. publisher grating cards
  6. a small slip of buttons at the top of a Microsoft thing
  7. proper technique

15 Clues: asdfjkl;'web page makercomputer screenmicro soft excelproper techniquea group of computerspublisher grating cardsbully bully on the internetbeing safe on thee interwebssomething you can access the web onware stuff that makes up a computera plan u pick that limits sertan thingsomething that you move and click stuff with...

Match the Cards to the Duel Links Duelist Part 1 2023-04-06

Match the Cards to the Duel Links Duelist Part 1 crossword puzzle
Across
  1. Cyber Commander
  2. Infernity Doom Dragon
  3. Elemental HERO Flame Wingman & Elemental HERO Neos
  4. Number 39: Utopia, Number C39: Utopia Ray, & Ultimate Leo Utopia Ray
  5. Ancient Gear Golem
  6. Cyber Blader
  7. Hamon, Lord of Striking Thunder, Raviel, Lord of Phantasms, Uria, Lord of Searing Flames, & Yubel
  8. Dark Magician, Dark Magician Girl, Gandora the Dragon of Destruction, & Silent Magician LV8
  9. Armed Dragon LV7 & Ojama King
  10. Duza the Meteoric Cubic Vessel
  11. Number 6: Chronomaly Atlandis
  12. Blast Held by a Tribute
  13. Blue-Eyes Ultimate Dragon & Blue-Eyes White Dragon
  14. Meklord Emperor Wisel
  15. Dark Necrofear
  16. Orgoth the Relentless
  17. Ancient Fairy Dragon
  18. Chevalier de Fleur
  19. Fairy Cheer Girl
  20. Indiora Doom Volt the Cubic Emperor
  21. Tin Archduke
  22. Sephylon, the Ultimate Timelord
  23. Water Dragon
  24. Malefic Truth Dragon
  25. Humpty Grumpty
  26. Barrel Dragon
  27. Volcanic Doomfire
  28. Red-Eyes Black Dragon
  29. The Legendary Fisherman
  30. Life Stream Dragon & Power Tool Dragon
  31. T.G. Halberd Cannon
  32. Black-Winged Dragon
  33. Blue-Eyes White Dragon
  34. Embodiment of Apophis
  35. Goyo Guardian
  36. Number 106: Giant Hand
  37. Jinzo, Red-Eyes Black Dragon, & The Legendary Fisherman
  38. Earthbound Immortal Ccapac Apu
  39. Elemental HERO Divine Neos, Elemental HERO Flame Wingman, Elemental HERO Neos, & Yubel
  40. Arcana Force EX - The Light Ruler
  41. Fortune Fairy Chee
Down
  1. Red Dragon Archfiend
  2. Lava Golem & The Winged Dragon of Ra
  3. Earthbound Immortal Aslla Piscu
  4. Blue-Eyes Alternative White Dragon, Blue-Eyes Ultimate Dragon, Blue-Eyes White Dragon, Obelisk the Tormentor, & Vampire Lord
  5. Number 107: Galaxy-Eyes Tachyon Dragon
  6. Evil HERO Malicious Fiend
  7. Gate Guardian
  8. Black Rose Dragon
  9. Fossil Warrior Skull King
  10. Number 15: Gimmick Puppet Giant Grinder
  11. Jinzo
  12. Black Luster Soldier, Dark Magician, Dark Magician Girl, Obelisk the Tormentor, Slifer the Sky Dragon, & The Winged Dragon of Ra
  13. Rainbow Dragon
  14. Curse Necrofear
  15. Harpie Lady Sisters
  16. Number 32: Shark Drake
  17. Maiden in Love
  18. Dark Magician Girl
  19. Number 105: Battlin' Boxer Star Cestus
  20. Earthbound Immortal Wiraqocha Rasca
  21. Meklord Astro Mekanikle
  22. Cyber End Dragon
  23. Superdreadnought Rail Cannon Gustav Max
  24. Relinquished
  25. Destiny HERO - Plasma
  26. Masked Beast Des Gardius
  27. Insect Queen
  28. Number 9: Dyson Sphere
  29. Ultimate Tyranno
  30. Junk Warrior, Shooting Star Dragon, & Stardust Dragon
  31. Super Vehicroid Jumbo Drill
  32. Number 102: Star Seraph Sentry
  33. Ice Beast Zerofyne
  34. Pumpking the King of Ghosts
  35. Dark Magician
  36. Galaxy-Eyes Photon Dragon

77 Clues: JinzoCyber BladerTin ArchdukeWater DragonRelinquishedInsect QueenGate GuardianBarrel DragonDark MagicianGoyo GuardianRainbow DragonDark NecrofearMaiden in LoveHumpty GrumptyCyber CommanderCurse NecrofearFairy Cheer GirlCyber End DragonUltimate TyrannoBlack Rose DragonVolcanic DoomfireAncient Gear GolemDark Magician GirlChevalier de Fleur...

Cyber Safety-Archie Webb 2016-05-24

Cyber Safety-Archie Webb crossword puzzle
Across
  1. an Apple tablet
  2. a group of computers that are connected
  3. to protect your computer from viruses
  4. how you securely connect to a network or program
  5. this person about cyber safety
  6. a search engine
  7. way to check if your computer has a virus
  8. program instruction
  9. a large device
Down
  1. a program you can install on your device
  2. how to connect
  3. what a hacker tries to steal
  4. blocksvirus
  5. a small device
  6. you a virus
  7. a machine that allows you to use the Internet
  8. unhealthy for device
  9. someonewho breaks into your computer

18 Clues: blocksvirusyou a virushow to connecta small devicea large devicean Apple tableta search engineprogram instructionunhealthy for devicewhat a hacker tries to stealthis person about cyber safetysomeonewho breaks into your computerto protect your computer from virusesa group of computers that are connecteda program you can install on your device...

6B Crossword 2022-10-25

6B Crossword crossword puzzle
Across
  1. The deep-voice actor
  2. Tennis master
  3. The tallest, yet the youngest
  4. Marvel fan
  5. He deserves to be friends with everybody
  6. Always happy
  7. Black and white on a green field player
  8. Cooking Queen
  9. The only one that can buy highlighters for 500 rupees
  10. The class lawyer
  11. On the path to success
  12. The funny one-perhaps the funniest of all
Down
  1. She speaks with love
  2. His last name rhymes with his first.
  3. His name ends with a hero's name
  4. Cyber Master, Fitness Superstar
  5. A new member of 6B
  6. Artist
  7. She can paint pennywise on a white cloth
  8. Our habibi

20 Clues: ArtistMarvel fanOur habibiAlways happyTennis masterCooking QueenThe class lawyerA new member of 6BShe speaks with loveThe deep-voice actorOn the path to successThe tallest, yet the youngestCyber Master, Fitness SuperstarHis name ends with a hero's nameHis last name rhymes with his first.Black and white on a green field player...

parish test 2023-12-08

parish test crossword puzzle
Across
  1. website where visitors can make changes and edits to
  2. bullying Bullying in the digital form
  3. Object showing human workmanship
  4. related to hearing
  5. domain Creative work that anyone is free to use
  6. To annoy persistently
  7. To increase
  8. Unknown authorship
  9. someone who is present but does not take part in
  10. First full scale design
  11. Behavior of motivation
  12. research gathering info for customer
Down
  1. Being physically or emotionally wounded
  2. Your online image
  3. Being apart from company
  4. what an individual want to achieve in the future
  5. introduction to something new
  6. Someone who stands up for someone
  7. Deceptive act
  8. Legal right to reproduce others work

20 Clues: To increaseDeceptive actYour online imagerelated to hearingUnknown authorshipTo annoy persistentlyBehavior of motivationFirst full scale designBeing apart from companyintroduction to something newObject showing human workmanshipSomeone who stands up for someoneLegal right to reproduce others workresearch gathering info for customer...

Space Camp 2024-05-30

Space Camp crossword puzzle
Across
  1. simulators flown in Mach 3
  2. what will call coordinators and management
  3. last name of CEO
  4. kay taylor's job title
  5. General Admission plus a planetarium show for groups
  6. the first director of Space Camp
  7. the simulation floor
  8. the name of the shuttle outside
  9. general email inbox
Down
  1. First week of camp 2024
  2. customer insight analyst
  3. $105 item in the giftshop
  4. the sequel to robotics
  5. the name of our Apollo capsule
  6. filling in for Jennifer Bradford
  7. an invitaition only program
  8. Space Program for 12-14 year olds
  9. 1986 film
  10. camp director
  11. scholarship program for alabama residents

20 Clues: 1986 filmcamp directorlast name of CEOgeneral email inboxthe simulation floorkay taylor's job titlethe sequel to roboticsFirst week of camp 2024customer insight analyst$105 item in the giftshopsimulators flown in Mach 3an invitaition only programthe name of our Apollo capsulethe name of the shuttle outsidefilling in for Jennifer Bradford...

Arkansas School for Mathematics, Sciences, and the Arts 2020-06-24

Arkansas School for Mathematics, Sciences, and the Arts crossword puzzle
Across
  1. academic department
  2. by a sensei
  3. year project
  4. success coordinators/class schedulers and admissions gurus
  5. and Innovation Complex/CIC
  6. Muse/student arts publication
  7. of Arkansas/a campus of this system
  8. Dolphin/mascot
  9. Arkansas School for Mathematics, Sciences, and the Arts
  10. Bay Cafe/aquatic mammal eatery
  11. center/home away from home
Down
  1. sports competition against sister schools
  2. where arts and humanities students showcase their research and portfolios
  3. magazine
  4. and green/school colors
  5. fair/STEM students showcase their research here
  6. weeks before classes begin in August

17 Clues: magazineby a senseiyear projectDolphin/mascotacademic departmentand green/school colorsand Innovation Complex/CICcenter/home away from homeMuse/student arts publicationBay Cafe/aquatic mammal eateryof Arkansas/a campus of this systemweeks before classes begin in Augustsports competition against sister schools...

Cyberbezpieczeństwo 2025-04-09

Cyberbezpieczeństwo crossword puzzle
Across
  1. Podszywanie się pod inną osobę .
  2. Chroni tożsamość w internecie .
  3. Może zawierać litery, cyfry i znaki specjalne .
  4. Zabezpieczenie dostępu np.login.
  5. Sieć WI-FI bez hasła .
  6. Ogólna nazwa dla złośliwego orpogramowania .
Down
  1. Nazwa użytkownika potrzebna do zalogowania się .
  2. Fałszywa wiadomość podszywająca się pod zaufane żródłó.
  3. Program,który chroni komputer przed wirusami .
  4. Krótkie potwierdzenie logowania .
  5. Program lub urządzenie blokujące nieautoryzowany dostęp do sieci .
  6. Proces szyfrowania danych .
  7. forma złośliwego oprogramowania, które żąda okupu.
  8. Złośliwe oprogramowanie podszywające się pod coś użytycznego .
  9. Kopia zapasowa danych .
  10. DDoS Cyber atak polegający na zalaniu serwera.

16 Clues: Sieć WI-FI bez hasła .Kopia zapasowa danych .Proces szyfrowania danych .Chroni tożsamość w internecie .Podszywanie się pod inną osobę .Zabezpieczenie dostępu np.login.Krótkie potwierdzenie logowania .Ogólna nazwa dla złośliwego orpogramowania .Program,który chroni komputer przed wirusami .Może zawierać litery, cyfry i znaki specjalne ....

Ασφάλεια στο διαδύκτιο 2024-02-15

Ασφάλεια στο διαδύκτιο crossword puzzle
Across
  1. positive Εικόνεσ Σώματοσ , Κοινωνικά Δίκτυα
  2. Κακόβουλο Λογισμικό
  3. gaming Παιχνίδια στο Διαδίκτυο
  4. Scams Ηλεκτρονικές Απάτες
  5. Addiction Εθισμόσ στο διαδιίκτυο
  6. Piracy Πειρατεία Λογισμικού
Down
  1. Διαδικτυακός Εκφοβισμός
  2. Reputation Διαδικτυακή Φήμη
  3. news Ψευδής Ειδήσεις
  4. Passwords Κωδικοί Πρόσβασης

10 Clues: Κακόβουλο Λογισμικόnews Ψευδής ΕιδήσειςΔιαδικτυακός ΕκφοβισμόςScams Ηλεκτρονικές ΑπάτεςReputation Διαδικτυακή ΦήμηPasswords Κωδικοί ΠρόσβασηςPiracy Πειρατεία Λογισμικούgaming Παιχνίδια στο ΔιαδίκτυοAddiction Εθισμόσ στο διαδιίκτυοpositive Εικόνεσ Σώματοσ , Κοινωνικά Δίκτυα

Investing Crossword Puzzle 2025-03-25

Investing Crossword Puzzle crossword puzzle
Across
  1. Investing all the money you have available at a given time, and putting it into the market
  2. Considered one of the world’s most successful investors
  3. Guaranteed payment by employer after retirement
  4. Created by President Roosevelt in 1935
  5. Spreading investments across different assets instead of all into one asset
  6. An investor's ability and willingness to endure fluctuations in the value of their investments
  7. The process of offering shares of a private corporation to the public in a new stock issuance
  8. A market in which prices are falling and a pessimistic outlook overall
  9. This measures the price performance of a basket of securities
  10. Created and backed by the government but not tied to any physical commodity
  11. A portion of a company's earnings distributed to shareholders as a return on their investment usually in cash
Down
  1. A person who buys and sells stocks with the intention of gaining a profit
  2. The age where you can receive full social security
  3. Someone who allocates capital into various financial assets with the expectations to generate long term returns and building wealth over time
  4. Social Security and Medicare Taxes
  5. A unique series of letters or a combination of letters and numbers that represents a particular publicly traded company's stock or security
  6. The ease with which an asset or security can be converted into cash without affecting its market price
  7. A unit of ownership in a company, dividing its ownership into equal parts
  8. Government Medical Health Plan
  9. A financial marketplace where investors can buy and sell shares of publicly traded companies
  10. Contribute money post tax. Money grows tax free
  11. Putting funds into a new investment account after leaving a company
  12. A type of security representing ownership of a company
  13. A sum of money saved or made available for a particular purpose
  14. Pools money from a large group of investors to purchase a diversified portfolio of stocks, bonds and other securities

25 Clues: Government Medical Health PlanSocial Security and Medicare TaxesCreated by President Roosevelt in 1935Guaranteed payment by employer after retirementContribute money post tax. Money grows tax freeThe age where you can receive full social securityA type of security representing ownership of a company...

Investing - Kaleb Wayman 2025-03-25

Investing - Kaleb Wayman crossword puzzle
Across
  1. A person who buys and sells stocks with the intention of gaining a profit
  2. Social Security and Medicare Taxes
  3. A market in which prices are falling and a pessimistic outlook overall
  4. A sum of money saved or made available for a particular purpose
  5. Contribute money post tax. Money grows tax free
  6. Created by President Roosevelt in 1935
  7. Created and backed by the government but not tied to any physical commodity
  8. A financial marketplace where investors can buy and sell shares of publicly traded companies
  9. A portion of a company's earnings distributed to shareholders as a return on their investment usually in cash
  10. This measures the price performance of a basket of securities
  11. Putting funds into a new investment account after leaving a company
  12. The age where you can receive full social security
  13. The ease with which an asset or security can be converted into cash without affecting its market price
Down
  1. A type of security representing ownership of a company
  2. Spreading investments across different assets instead of all into one asset
  3. An investor's ability and willingness to endure fluctuations in the value of their investments
  4. Investing all the money you have available at a given time, and putting it into the market
  5. Considered one of the world’s most successful investors
  6. Pools money from a large group of investors to purchase a diversified portfolio of stocks, bonds and other securities
  7. Someone who allocates capital into various financial assets with the expectations to generate long term returns and building wealth over time
  8. The process of offering shares of a private corporation to the public in a new stock issuance
  9. Government Medical Health Plan
  10. A unit of ownership in a company, dividing its ownership into equal parts
  11. A unique series of letters or a combination of letters and numbers that represents a particular publicly traded company's stock or security
  12. Guaranteed payment by employer after retirement

25 Clues: Government Medical Health PlanSocial Security and Medicare TaxesCreated by President Roosevelt in 1935Contribute money post tax. Money grows tax freeGuaranteed payment by employer after retirementThe age where you can receive full social securityA type of security representing ownership of a company...

Tatler Crossword Week 6 2023-11-27

Tatler Crossword Week 6 crossword puzzle
Across
  1. Popular girl scout cookie
  2. Journalist ___ B. Wells
  3. Shortest Grizzlies player(last name)
  4. Best time to buy online is ______ Monday,
  5. Woman's name that sounds like its first and third letters
Down
  1. The largest city in the world.
  2. Boy band with the 2000 hit "Bye Bye Bye"
  3. first animal in space
  4. Home to the Alhambra
  5. Knight's title
  6. Santa's workers

11 Clues: Knight's titleSanta's workersHome to the Alhambrafirst animal in spaceJournalist ___ B. WellsPopular girl scout cookieThe largest city in the world.Shortest Grizzlies player(last name)Boy band with the 2000 hit "Bye Bye Bye"Best time to buy online is ______ Monday,Woman's name that sounds like its first and third letters

T-VISTARA 2022-11-11

T-VISTARA crossword puzzle
Across
  1. Mobile infra arm of Telstra
  2. The force in sales
  3. Kaught in Berlin (I am a language)
  4. All APIs in one place, sit back and relax.
  5. Our former CEO
Down
  1. FY Starts from this month
  2. Type of cyber attack
  3. Tool to say thanks
  4. Program for Women in SE
  5. Telstra's idea store

10 Clues: Our former CEOTool to say thanksThe force in salesType of cyber attackTelstra's idea storeProgram for Women in SEFY Starts from this monthMobile infra arm of TelstraKaught in Berlin (I am a language)All APIs in one place, sit back and relax.

Energy Crossword Puzzle 2025-04-18

Energy Crossword Puzzle crossword puzzle
Across
  1. something fans work with
  2. Using cars to to make them move
  3. Something you drive in
  4. Runs though houses
  5. Fuel Used to power cars
  6. Power Something that is Powered by the sun
Down
  1. Powers everything on here
  2. Found in mines
  3. So you can play games on your phone
  4. Cyber trucks cousin

10 Clues: Found in minesRuns though housesCyber trucks cousinSomething you drive insomething fans work withPowers everything on hereFuel Used to power carsUsing cars to to make them moveSo you can play games on your phonePower Something that is Powered by the sun

Frontier Familiarity 2012-04-04

Frontier Familiarity crossword puzzle
Across
  1. Frontier online television service
  2. deferred payment arrangment
  3. Intranet site for call center consultants
  4. Internet Only
  5. Fiber Optic Service
  6. 768K Internet
  7. $2.99 Feature Pack
  8. Simply
  9. Federal Discount Program
  10. Security with Parental Controls and Firewall
  11. assuming the sale
  12. seasonal service called stay...
Down
  1. monthly charge
  2. DSL Line Conditioner
  3. Basic Phone Package
  4. Free service for customers moving out of area
  5. EA, LF, US, CA, AZ, PA, etc.
  6. DISH order entry tool
  7. credit agency used by Frontier
  8. DP Silver, Bronze, Freedom, Choices
  9. switching number to different provider
  10. Security with AntiVirus and AntiSpam

22 Clues: SimplyInternet Only768K Internetmonthly chargeassuming the sale$2.99 Feature PackBasic Phone PackageFiber Optic ServiceDSL Line ConditionerDISH order entry toolFederal Discount Programdeferred payment arrangmentEA, LF, US, CA, AZ, PA, etc.credit agency used by Frontierseasonal service called stay...Frontier online television service...

Networking concepts and cyber ethics 2025-05-18

Networking concepts and cyber ethics crossword puzzle
Across
  1. : Used to access accounts securely.
  2. : Maximum data transfer rate.
  3. : Security system that controls traffic.
  4. : Online bullying.
  5. : Rules for communication between devices.
  6. : Secure remote access method.
  7. : Fake emails to steal data.
Down
  1. : Secretly collects data.
  2. : Wireless network technology.
  3. : A device that forwards data packets between networks.
  4. : Wired networking method.
  5. : Unwanted email.
  6. : Harmful software.
  7. : Protects creative work.
  8. : Scrambling data for security.
  9. : Local Area Network.
  10. : Right to keep data secure.
  11. Address : Unique identifier for a device on a network.
  12. : Unauthorized system access.
  13. : A computer that provides services or data.

20 Clues: : Unwanted email.: Online bullying.: Harmful software.: Local Area Network.: Secretly collects data.: Protects creative work.: Wired networking method.: Right to keep data secure.: Fake emails to steal data.: Maximum data transfer rate.: Unauthorized system access.: Wireless network technology.: Secure remote access method....

Cyber Bullying 2020-03-08

Cyber Bullying crossword puzzle
Across
  1. recognize as being
  2. a person who pleads for a person, cause, or idea
  3. Interactive web journal or diary,the contents of which are posted online and which others can view
  4. an unfortunate person who suffers from adverse circumstances
  5. revenge
Down
  1. think about carefully; weigh
  2. The application of a set of criteria against which internet content is judged acceptable or not
  3. doctoring digital images so that the main subject is placed in a compromising or embarrassing situation.
  4. Someone who harms another through electronic devices
  5. to threaten, frighten, scare, coerce, terrify, and to alarm

10 Clues: revengerecognize as beingthink about carefully; weigha person who pleads for a person, cause, or ideaSomeone who harms another through electronic devicesto threaten, frighten, scare, coerce, terrify, and to alarman unfortunate person who suffers from adverse circumstances...

Cyber-Bullying 2021-04-27

Cyber-Bullying crossword puzzle
Across
  1. Something that no one should experience
  2. Do not share false ________ about someone
  3. Do not share any personal
  4. When online make sure you are _______ at all times
  5. Make sure you have _______ permission when online
  6. An individual that constantly bothers you in a repeated manner
Down
  1. Never accept or communicate with _______
  2. Social _______ has it's positives and negatives
  3. Cyberbullying can have a _______ affect on you
  4. If you view a form of cyberbullying make sure you _______ it

10 Clues: Do not share any personalSomething that no one should experienceNever accept or communicate with _______Do not share false ________ about someoneCyberbullying can have a _______ affect on youSocial _______ has it's positives and negativesMake sure you have _______ permission when onlineWhen online make sure you are _______ at all times...

Cyber Crime 2021-05-19

Cyber Crime crossword puzzle
Across
  1. a criminal activity conducted using computers and the internet. This includes fraud, internet scams, and identiy theft
  2. A technique used by hackers to redirect users to false websites without their knowledge.
  3. a scheme aimed at tricking you into providing sensitive information to scammers
  4. a type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return
  5. Computers that have been penetrated , compromised, and programmed to operate on the commands of an unauthorized remote user
Down
  1. theft When someone steals your personal information, like your Social Security number, and uses it to commit theft or fraud
  2. Software that compromises computers or networks with the intention of disrupting their intended functions or operations.
  3. A engineered attempt by malicious actors to deceive internet users into providing personal information such as usernames, passwords etc.
  4. The scrambling of information so that it is unreadable to those who do not have the code to unscramble.
  5. A verb meaning to gain unauthorized access into a computer system.
  6. pretending to be someone else to demand money, information or something of value

11 Clues: A verb meaning to gain unauthorized access into a computer system.a scheme aimed at tricking you into providing sensitive information to scammerspretending to be someone else to demand money, information or something of valueA technique used by hackers to redirect users to false websites without their knowledge....

CYBER LAW 2021-09-03

CYBER LAW crossword puzzle
Across
  1. the process of using Internet-based socializing and communication techniques to create, operate and manage activism of any type
  2. process of converting information into a digital
  3. Web page to summon different elements from diverse pages or servers to create a new Web page
  4. The communication via any electronic device of false data that damages a person's reputation
Down
  1. Using a computer to steal personal data
  2. the making, altering, use, or possession of a false writing in order to commit a fraud
  3. registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
  4. when someone forcefully takes control of a website by cracking the password and later changing it
  5. Make sure a buyer and seller can identify themselves
  6. Business conducted electronically (buying/selling on web)

10 Clues: Using a computer to steal personal dataprocess of converting information into a digitalMake sure a buyer and seller can identify themselvesBusiness conducted electronically (buying/selling on web)the making, altering, use, or possession of a false writing in order to commit a fraud...

Cyber Crimes 2022-03-24

Cyber Crimes crossword puzzle
Across
  1. Illegally preventing others to gain access to their personal accounts or websites
  2. Pretending to be someone else by using their personal information.
  3. Transferring money from one account to another without the permission of the account holder.
  4. Illegally copying and selling games or software.
Down
  1. Using a device to annoy, harass, intimidate or threaten a person online.
  2. Gaining unauthorized access into a computer network or someone's personal computer.
  3. Damaging information by deleting, adding false information or hiding it.
  4. using a device to intercept another person's device.
  5. Using the computer to create false documents such as cheques, legal documents and counterfeiting.
  6. Setting up fake websites to await unsuspecting persons to take the bait.

10 Clues: Illegally copying and selling games or software.using a device to intercept another person's device.Pretending to be someone else by using their personal information.Using a device to annoy, harass, intimidate or threaten a person online.Damaging information by deleting, adding false information or hiding it....

Cyber Foundations 2022-04-07

Cyber Foundations crossword puzzle
Across
  1. The slide currrently selected or displayed
  2. The preset amount of time between slides as they advance automatically during a slide show
  3. The template will appear along with traditional information on how the template could be used
  4. A feature that allows you to create a show from scratch
Down
  1. Where you will find commands to perform common tasks in PowerPoint
  2. The visual appearance or images of something when looked at in a certain way
  3. an item of illustrative matter
  4. A graphic tool that allows you to create a visual representation of information and ideas
  5. A graphical computer display that can be superimposed on another
  6. The figure that appears when you are adding text to a slide

10 Clues: an item of illustrative matterThe slide currrently selected or displayedA feature that allows you to create a show from scratchThe figure that appears when you are adding text to a slideA graphical computer display that can be superimposed on anotherWhere you will find commands to perform common tasks in PowerPoint...

Cyber Safety 2022-04-12

Cyber Safety crossword puzzle
Across
  1. A virus that modifies and deletes files
  2. A set of characters that grant admission
  3. To harm someone through the internet
  4. A virus that slows down your computer
  5. A virus that secretly damages your computer
Down
  1. A piece of code capable of a bad effects
  2. To copy from one computer system to another
  3. A virus that steals your information
  4. To scan through a website to gain info
  5. Software that is designed to disrupt

10 Clues: A virus that steals your informationTo harm someone through the internetSoftware that is designed to disruptA virus that slows down your computerTo scan through a website to gain infoA virus that modifies and deletes filesA piece of code capable of a bad effectsA set of characters that grant admissionTo copy from one computer system to another...

Cyber Bullying 2013-02-12

Cyber Bullying crossword puzzle
Across
  1. Casual or unconstrained conversation or reports about other people, typically involving details that are not confirmed as being true.
  2. A widely held but fixed and oversimplified image or idea of a particular type of person or thing.
  3. social media site many people use.
  4. when someone wont leave you alone and says mean or hurtful things.
Down
  1. A statement of an intention to inflict pain, injury, damage, or other hostile action on someone.
  2. A secret word or phrase that must be used to gain admission to something.
  3. the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
  4. causing distress or injury: to say hurtful things.
  5. social media site that you "tweet" on.
  6. boldly assertive and forward; pushy.

10 Clues: social media site many people use.boldly assertive and forward; pushy.social media site that you "tweet" on.causing distress or injury: to say hurtful things.when someone wont leave you alone and says mean or hurtful things.A secret word or phrase that must be used to gain admission to something....

Cyber Bullying 2013-02-12

Cyber Bullying crossword puzzle
Across
  1. Casual or unconstrained conversation or reports about other people, typically involving details that are not confirmed as being true.
  2. A widely held but fixed and oversimplified image or idea of a particular type of person or thing.
  3. social media site many people use.
  4. when someone wont leave you alone and says mean or hurtful things.
Down
  1. A statement of an intention to inflict pain, injury, damage, or other hostile action on someone.
  2. A secret word or phrase that must be used to gain admission to something.
  3. the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
  4. causing distress or injury: to say hurtful things.
  5. social media site that you "tweet" on.
  6. boldly assertive and forward; pushy.

10 Clues: social media site many people use.boldly assertive and forward; pushy.social media site that you "tweet" on.causing distress or injury: to say hurtful things.when someone wont leave you alone and says mean or hurtful things.A secret word or phrase that must be used to gain admission to something....

Cyber safety 2024-05-02

Cyber safety crossword puzzle
Across
  1. the person making unkind comments
  2. places like instagram and snapchat
  3. where you go to get information from (not google)
  4. how you interact with a situation
  5. how you interact safely online
Down
  1. unkind or aggressive comments made over the internet
  2. the person who is being bullied
  3. given from other people to make you feel safe
  4. a good and fair action
  5. telling someone what is happening

10 Clues: a good and fair actionhow you interact safely onlinethe person who is being bulliedthe person making unkind commentshow you interact with a situationtelling someone what is happeningplaces like instagram and snapchatgiven from other people to make you feel safewhere you go to get information from (not google)...

Cyber bullying 2024-06-14

Cyber bullying crossword puzzle
Across
  1. Do you feel s
  2. a form of social media that makes the same sound as a clock
  3. What is it called when you speak to someone
  4. What is it called when you message people on your phone
  5. A safe person to go to
Down
  1. A device that you call on
  2. Someone that you t
  3. A big device that you do lots of gaming on
  4. A form of social media that starts with s
  5. A word you can say when your stuck somewhere and it starts with the letter h

10 Clues: Do you feel sSomeone that you tA safe person to go toA device that you call onA form of social media that starts with sA big device that you do lots of gaming onWhat is it called when you speak to someoneWhat is it called when you message people on your phonea form of social media that makes the same sound as a clock...

Cyber bullying 2024-06-11

Cyber bullying crossword puzzle
Across
  1. Do you feel s
  2. a form of social media that makes the same sound as a clock
  3. A form of social media that starts with s
  4. What is it called when you message people on your phone
Down
  1. A device that you call on
  2. Whats it called when you speak to someone
  3. A big device that you do lots of gaming on
  4. A safe person to go to
  5. A word you can say when your stuck somewhere and it starts with the letter h
  6. Someone that you t

10 Clues: Do you feel sSomeone that you tA safe person to go toA device that you call onWhats it called when you speak to someoneA form of social media that starts with sA big device that you do lots of gaming onWhat is it called when you message people on your phonea form of social media that makes the same sound as a clock...

CYBER CLUES 2023-04-27

CYBER CLUES crossword puzzle
Across
  1. a type of programming language that is designed to create dynamic web content
  2. A type of database that stores data in a hierarchical structure
  3. computer network designed for communication between devices in close proximity
  4. A technology used for creating and storing digital currency in a decentralized manner
  5. a type of memory that stores frequently accessed data for quick access by the CPU
Down
  1. A type of programming language used for creating mobile applications for Apple's iOS platform
  2. A data structure that stores a collection of key-value pairs in no particular order.
  3. A type of database that stores data in tables
  4. cyber attack that disguises as a legitimate email to trick users.
  5. A keyword used to indicate that a method or variable belongs to the class itself, not an instance of the class

10 Clues: A type of database that stores data in tablesA type of database that stores data in a hierarchical structurecyber attack that disguises as a legitimate email to trick users.a type of programming language that is designed to create dynamic web contentcomputer network designed for communication between devices in close proximity...

Cyber Safety 2023-05-18

Cyber Safety crossword puzzle
Across
  1. Online fights using electronic messages with angry and vulgar language.
  2. Repeatedly sending nasty, mean and insulting messages.
  3. People that bully others online, mean comments, pictures, sharing information.
  4. Talking to someone into give personal information or embarrassing secrets.
  5. Intentionally and cruelly excluding someone from an online group.
Down
  1. People that steal your information.
  2. Pretending other peoples work and things are yours.
  3. Sharing someone's secrets embarrassing information or images online.
  4. Something that comes up to stop you doing something or trying to make you do something.
  5. Repeated, intense harassment and denigration that include threats or creates significant fear.

10 Clues: People that steal your information.Pretending other peoples work and things are yours.Repeatedly sending nasty, mean and insulting messages.Intentionally and cruelly excluding someone from an online group.Sharing someone's secrets embarrassing information or images online.Online fights using electronic messages with angry and vulgar language....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Something that infects and spreads through your compute
  2. Repeated harassment and denigration that includes threats
  3. Trying to steal someone's private info
  4. Purposely and cruelly excluding someone
Down
  1. Posting rumours about a person
  2. Online fights using vulgar language
  3. Someone who is mean or aggressive
  4. Stealing someone's work and not crediting them
  5. Talking someone into revealing secrets
  6. Sharing someone's embarrassing information or images online

10 Clues: Posting rumours about a personSomeone who is mean or aggressiveOnline fights using vulgar languageTrying to steal someone's private infoTalking someone into revealing secretsPurposely and cruelly excluding someoneStealing someone's work and not crediting themSomething that infects and spreads through your compute...

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. An illness for computers.
  2. Getting someone to reveal their secrets and personal information and sharing it online.
  3. The stealing of someone's personal information.
  4. Intentionally and cruelly excluding someone from an online group.
  5. A type of online fighting using angry and inappropriate language.
  6. Using somebody else's work as your own.
Down
  1. Repeated, intense threats and harassment that create fear.
  2. The repeated sending of mean, nasty and insulting online messages.
  3. When someone shares another person's secrets or images online.
  4. Bullying someone online.

10 Clues: Bullying someone online.An illness for computers.Using somebody else's work as your own.The stealing of someone's personal information.Repeated, intense threats and harassment that create fear.When someone shares another person's secrets or images online.Intentionally and cruelly excluding someone from an online group....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. When someone or a group of people is bullying you online.
  2. When someone steals your work or ideas and makes it their own.
  3. Sharing someone's secrets or embarrassing information or images online.
  4. Repeatedly sending nasty, mean messages.
  5. Talking someone into revealing secrets or information and posting it online.
  6. A type of software that spreads between computers and causes damage yo data and software.
Down
  1. Pretending to be someone else and sending or posting material to get someone in trouble.
  2. Intentionally and cruelly excluding someone from an online group.
  3. Online fights using mean language.
  4. When someone steals your identity and pretends to be you.

10 Clues: Online fights using mean language.Repeatedly sending nasty, mean messages.When someone or a group of people is bullying you online.When someone steals your identity and pretends to be you.When someone steals your work or ideas and makes it their own.Intentionally and cruelly excluding someone from an online group....

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. repeated, intense harassment denigration
  2. online fights using electronic messages
  3. it is a form of selling someone's identify online
  4. sending nasty, mean and insulting messages
  5. there will look for almost anyone to harass
Down
  1. intestinally and cruelly excluding someone from on online group
  2. "dissing" someone online
  3. talking someone into revealing secrets or embarrassing information
  4. pretending to be someone else online
  5. sharing someone's secrets or embarrassing information

10 Clues: "dissing" someone onlinepretending to be someone else onlineonline fights using electronic messagesrepeated, intense harassment denigrationsending nasty, mean and insulting messagesthere will look for almost anyone to harassit is a form of selling someone's identify onlinesharing someone's secrets or embarrassing information...

cyber bullying 2025-03-11

cyber bullying crossword puzzle
Across
  1. to help someone
  2. someone hurting someone else
  3. hurtful person
  4. something you go on
  5. Hacking
  6. looking out for someone
Down
  1. something you use in everyday life
  2. knowing your on a device
  3. hurting someone online
  4. mentally attacking someone

10 Clues: Hackinghurtful personto help someonesomething you go onhurting someone onlinelooking out for someoneknowing your on a devicementally attacking someonesomeone hurting someone elsesomething you use in everyday life

Cyber Safety 2024-10-10

Cyber Safety crossword puzzle
Across
  1. This involves the exchange of information through electronic channels, such as emails, instant messaging, or social media.
  2. _____________ means taking part in an online community safely, ethically and respectfully.
  3. It’s an obligation or duty which you have towards yourself and to others.
  4. Avoid connecting to ______________ public wifi networks.
  5. To fully participate in society which uses electronic devices and the internet.
Down
  1. It is the process of learning and teaching about technology and how to use it effectively.
  2. It refers to the buying and selling of goods using electronic means, like online shopping.
  3. Protect your personal information with strong _____________.
  4. ___________________ means being secure online.
  5. The continuing and spreading results of an event or an action.

10 Clues: ___________________ means being secure online.Avoid connecting to ______________ public wifi networks.Protect your personal information with strong _____________.The continuing and spreading results of an event or an action.It’s an obligation or duty which you have towards yourself and to others....

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. WHERE YOUR MONEY IS KEPT
  2. A METHOD OF PAYMENT
  3. A PLACE ONLINE TO SHOP
  4. A SHORT-TERM SALE
  5. A LINE OR LIST OF WAITING ITEMS
Down
  1. WHAT YOU NEED TO ACCESS A WEBSITE
  2. THE NAME OF A COMPANY
  3. PHYSICAL MONEY
  4. PART OF A WEBSITE
  5. SOMETHING WITH NO COST

10 Clues: PHYSICAL MONEYPART OF A WEBSITEA SHORT-TERM SALEA METHOD OF PAYMENTTHE NAME OF A COMPANYA PLACE ONLINE TO SHOPSOMETHING WITH NO COSTWHERE YOUR MONEY IS KEPTA LINE OR LIST OF WAITING ITEMSWHAT YOU NEED TO ACCESS A WEBSITE

cyber bullying 2025-06-19

cyber bullying crossword puzzle
Across
  1. something from you
  2. is someone who stands up for you and saying stop
  3. is something that happens online like people saying hurtfull comments
  4. is someome getting bullied over and over again
  5. is telling the teacher or adult what happend
  6. is something that you get exculded from a group
  7. is somthing they pick on you about
Down
  1. is something online if you need help you can talk to them
  2. a person just standing and watching pointing and laughing
  3. say hurtfull things

10 Clues: something from yousay hurtfull thingsis somthing they pick on you aboutis telling the teacher or adult what happendis someome getting bullied over and over againis something that you get exculded from a groupis someone who stands up for you and saying stopis something online if you need help you can talk to them...

Cyber Ethics 2025-06-06

Cyber Ethics crossword puzzle
Across
  1. Legal term for ownership of creative work.
  2. Legal rights over creations of the mind.
  3. Copying someone's work and calling it your own.
  4. Unwanted bulk emails from unknown sources.
Down
  1. The trace a person leaves online.
  2. Behaving responsibly and ethically on the internet.
  3. Moral principles for using computers and the internet.
  4. Copying and using software illegally.
  5. Right to control information about yourself.
  6. Illegally accessing a computer system.

10 Clues: The trace a person leaves online.Copying and using software illegally.Illegally accessing a computer system.Legal rights over creations of the mind.Legal term for ownership of creative work.Unwanted bulk emails from unknown sources.Right to control information about yourself.Copying someone's work and calling it your own....

Cyber ethics 2025-05-29

Cyber ethics crossword puzzle
Across
  1. Scrambling data to protect it from unauthorized access.
  2. – Respecting personal data and not accessing others’ information.
  3. A cybercrime where someone is tricked into giving personal information.
  4. Legal protection for original work.
  5. Bullying someone online.
Down
  1. Malicious software like viruses or worms.
  2. Online etiquette or good behavior on the internet.
  3. A secret word or phrase used for authentication.
  4. Unauthorized access to data or systems.
  5. Unwanted or junk email.

10 Clues: Unwanted or junk email.Bullying someone online.Legal protection for original work.Unauthorized access to data or systems.Malicious software like viruses or worms.A secret word or phrase used for authentication.Online etiquette or good behavior on the internet.Scrambling data to protect it from unauthorized access....

cyber addiction 2025-10-19

cyber addiction crossword puzzle
Across
  1. The act of being compelled to check devices or social media, often without conscious intent.
  2. The state of being distracted or overwhelmed by too much information or stimuli.
  3. The gradual decline in cognitive function due to excessive screen time.
  4. The amount of time or frequency someone spends on digital devices or apps.
  5. The brain's ability to reorganize itself by forming new neural connections.
Down
  1. The fundamental units of the brain and nervous system, responsible for transmitting information.
  2. A type of reinforcement where rewards are given at unpredictable intervals, making behavior more resistant to extinction.
  3. The process of taking over or dominating someone's attention, often used in the context of digital platforms.
  4. A neurotransmitter associated with pleasure and reward, often linked to addictive behaviors.
  5. The feeling of wanting something strongly, especially something that is hard to resist.

10 Clues: The gradual decline in cognitive function due to excessive screen time.The amount of time or frequency someone spends on digital devices or apps.The brain's ability to reorganize itself by forming new neural connections.The state of being distracted or overwhelmed by too much information or stimuli....

Cybersecurity 2025-01-09

Cybersecurity crossword puzzle
Across
  1. malware that collect data
  2. an extra copy of data from a computer
  3. protects data by scrambling it
  4. an attack that wants ransom
  5. a value with a unique length to identify data
  6. being bullied using the internet
  7. malware that reproduces itself
Down
  1. "UI redress attack"
  2. short for malicious malware
  3. applications that direct computers
  4. cyber attack that is disguised
  5. filters network traffic
  6. using your own device
  7. someone who breaks into a computer's system
  8. network of computers for attack
  9. where users store data
  10. protects your location
  11. connected items that represent one

18 Clues: "UI redress attack"using your own devicewhere users store dataprotects your locationfilters network trafficmalware that collect datashort for malicious malwarean attack that wants ransomcyber attack that is disguisedprotects data by scrambling itmalware that reproduces itselfnetwork of computers for attackbeing bullied using the internet...

2016 Responsible Care Certification Audit 2016-08-29

2016 Responsible Care Certification Audit crossword puzzle
Across
  1. independent, unbiased inspector to assure a structure and system in place to measure, manage and verify performance in the Responsible Care Program.
  2. text, sometimes referred to SHE&S, Safety or Responsible Care, which outlines company's committment to SHE&S; found on corporate website
  3. The Responsible Care ____________ is the program by which Odyssey manages its business and operations with regard to Safety, Health, Environment & Security (SHE&S) issues.
  4. pre-designated gathering point for all personnel during evacuations
  5. established by senior management as guidance to ensure Odyssey maintains a leading SHE&S position throughout the company
  6. the chemical industry's voluntary SHE&S initiative
  7. Risk of coming into contact with chemicals during
  8. a danger or risk
  9. Employees should maintain an awareness of the policy, risks/hazards, and their work environment
  10. ___________ should maintain an awareness of the policy, risks/hazards, and their work environment
Down
  1. Responsible Care Awareness, HM & Security, HAZCOM, Forklift, First Aid/CPR
  2. Safety, Health, Environment & Security
  3. We all have responsibility for Safety, Health, Environment & Security (SHE&S) in our __________
  4. an industry trade association for American chemical companies
  5. Establishes goals and provides resources
  6. A key part of the Responsible Care Management System process is mandatory __________ by an independent, accredited auditor
  7. Provides ________ as evidence as management support
  8. prioritized based on frequency and severity
  9. SHE&S Special Thanks And Recognition Awards Program

19 Clues: a danger or riskSafety, Health, Environment & SecurityEstablishes goals and provides resourcesprioritized based on frequency and severityRisk of coming into contact with chemicals duringthe chemical industry's voluntary SHE&S initiativeProvides ________ as evidence as management supportSHE&S Special Thanks And Recognition Awards Program...

3B macchine e energia-3 2024-01-29

3B macchine e energia-3 crossword puzzle
Across
  1. creatore martello a vapore
  2. anno dei maggiori cambiamenti 4 rivoluzione
  3. anno creazione motore 2 tempi
  4. principale innovazione 4 rivoluzione industriale
  5. inventore della fotografia
Down
  1. inventore telegrafo
  2. anno creazione martello a vapore
  3. energia 2 rivoluzione industriale
  4. denominazione della 3 rivoluzione industriale

9 Clues: inventore telegrafocreatore martello a vaporeinventore della fotografiaanno creazione motore 2 tempianno creazione martello a vaporeenergia 2 rivoluzione industrialeanno dei maggiori cambiamenti 4 rivoluzionedenominazione della 3 rivoluzione industrialeprincipale innovazione 4 rivoluzione industriale

Children vs. The Cyberspace 2024-10-15

Children vs. The Cyberspace crossword puzzle
Across
  1. Overly active _____ laws can cause danger
  2. Can shape a children's perspective about the internet
  3. Online threats are _____
  4. Is always changing and growing
  5. Spreading _____ promotes change
Down
  1. Online Behavior and _____
  2. Bullying,Threats
  3. Most children access this on the daily
  4. Type of addiction

9 Clues: Bullying,ThreatsType of addictionOnline threats are _____Online Behavior and _____Is always changing and growingSpreading _____ promotes changeMost children access this on the dailyOverly active _____ laws can cause dangerCan shape a children's perspective about the internet

Security 2024-09-11

Security crossword puzzle
Across
  1. Used to secure doors
  2. Head of a team
  3. Test, test
  4. Uniformed security officers
  5. text, Test
Down
  1. Should be worn at all times within IRS facility
  2. Used to complete IRS work
  3. Very important to IRS success
  4. test, text

9 Clues: Test, testtest, texttext, TestHead of a teamUsed to secure doorsUsed to complete IRS workUniformed security officersVery important to IRS successShould be worn at all times within IRS facility

Security 2025-10-22

Security crossword puzzle
Across
  1. korrupciyag'a qarsi
  2. jasirin elonomika
  3. zulimliq
  4. indikator
Down
  1. soc/q-ek/q qawip qaterler
  2. alip keliw ha'm alip
  3. xaliqaraliq organ

7 Clues: zulimliqindikatorxaliqaraliq organjasirin elonomikakorrupciyag'a qarsialip keliw ha'm alipsoc/q-ek/q qawip qaterler

fshapdsafybasd112fdjf 2023-03-03

fshapdsafybasd112fdjf crossword puzzle
Across
  1. A nonprofit org known for publishing a "top 10" of critical risks
  2. A 3-word term for applying multiple layers of security
  3. A flaw that weakens the overall security of a program or system
  4. ______ mantis
  5. Codename for a recent RT operation
Down
  1. Randomly terminates production apps to ensure they're resilient
  2. New feature that emulates sitting in an open office
  3. FY24 Security Goal: ______ security efforts according to risk and adopt risk-driven decision making
  4. Research project for enumerating our environment
  5. This involves sending invalid, unexpected, or random input to a program
  6. Team that emulates real-world attacks

11 Clues: ______ mantisCodename for a recent RT operationTeam that emulates real-world attacksResearch project for enumerating our environmentNew feature that emulates sitting in an open officeA 3-word term for applying multiple layers of securityRandomly terminates production apps to ensure they're resilient...

Mobile Security Crossword 2025-09-11

Mobile Security Crossword crossword puzzle
Across
  1. Network Network type often targeted in mobile security risks (2 words)
  2. Malicious software targeting mobile devices
  3. Authentication Security measure involving password plus an extra step (2 words)
  4. Patches Software updates to fix vulnerabilities (2 words)
  5. Encryption The process of converting data to prevent unauthorized access
Down
  1. Security Protection of the mobile device itself
  2. Method to confirm identity beyond password (abbreviation)
  3. Kind of phishing specific to SMS messages (1 word)
  4. Permissions Safety measure for apps to limit access (2 words)
  5. Store Where trusted mobile apps should be downloaded from (2 words)
  6. Detection Detecting unauthorized software or behavior on mobile
  7. Management system for securing mobile devices (3 letters)

12 Clues: Malicious software targeting mobile devicesSecurity Protection of the mobile device itselfKind of phishing specific to SMS messages (1 word)Method to confirm identity beyond password (abbreviation)Patches Software updates to fix vulnerabilities (2 words)Management system for securing mobile devices (3 letters)...

Ασφάλεια στο διαδύκτιο 2024-02-15

Ασφάλεια στο διαδύκτιο crossword puzzle
Across
  1. positive Εικόνεσ Σώματοσ , Κοινωνικά Δίκτυα
  2. Reputation Διαδικτυακή Φήμη
  3. Κακόβουλο Λογισμικό
  4. Passwords Κωδικοί Πρόσβασης
  5. Addiction Εθισμόσ στο διαδιίκτυο
  6. Scams Ηλεκτρονικές Απάτες
Down
  1. Piracy Πειρατεία Λογισμικού
  2. Διαδικτυακός Εκφοβισμός
  3. news Ψευδής Ειδήσεις
  4. gaming Παιχνίδια στο Διαδίκτυο

10 Clues: Κακόβουλο Λογισμικόnews Ψευδής ΕιδήσειςΔιαδικτυακός ΕκφοβισμόςScams Ηλεκτρονικές ΑπάτεςPiracy Πειρατεία ΛογισμικούReputation Διαδικτυακή ΦήμηPasswords Κωδικοί Πρόσβασηςgaming Παιχνίδια στο ΔιαδίκτυοAddiction Εθισμόσ στο διαδιίκτυοpositive Εικόνεσ Σώματοσ , Κοινωνικά Δίκτυα

PERSONNEL SECURITY PROGRAM 2021-08-16

PERSONNEL SECURITY PROGRAM crossword puzzle
Across
  1. WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
  2. SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
  3. of ncis DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
  4. AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?
  5. WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
  6. WHO IS USUALLY DESIGNATED AS IAM?
Down
  1. TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
  2. TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
  3. scope background investigation WHAT DOES SSBI STAND FOR?
  4. AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
  5. officer WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?

11 Clues: WHO IS USUALLY DESIGNATED AS IAM?SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM....

Auckland High Court 2026-01-08

Auckland High Court crossword puzzle
Across
  1. Court Security Manager
  2. with this power i can ask for, name address and reason of being in court
  3. I only have a fork for lunch
  4. I have intel for a major gang trial at the high court next week
  5. i need urgent help
  6. Threat,exposure,necessity,response
  7. Ask, Why, Options, Confirm, Act
  8. I opened up a box of my favorite beers and have court
  9. clear the radio comms
Down
  1. When Searching you need the persons
  2. I used my powers today as a incident unfolded i now have to do a
  3. Senior Court Security Officer
  4. Court Security Officer
  5. my reason for carrying the knife is self defense
  6. any persons disrespectful to a Judge could be held in
  7. a highly intoxicated person is

16 Clues: i need urgent helpclear the radio commsCourt Security ManagerCourt Security OfficerI only have a fork for lunchSenior Court Security Officera highly intoxicated person isAsk, Why, Options, Confirm, ActThreat,exposure,necessity,responseWhen Searching you need the personsmy reason for carrying the knife is self defense...

TEKA-TEKI silang 2025-06-03

TEKA-TEKI silang crossword puzzle
Across
  1. pencurian hak cipta (11 h)
  2. serang Cyber yang bertujuan untuk mencari data pribadi (14h)
  3. kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
  4. penyebaran informasi palsu yang meluas (4 huruf)
  5. informasi yang mengidentifikasi seseorang secara unik (12h)
  6. serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
  7. peraturan yang melindungi data pribadi (16h)
  8. pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
  9. menjaga keamanan data pribadi di internet (13h)
  10. jenis pinjaman yang dilakuakan melalui platfrom online (14h)
  11. perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
  12. program kecil yang dapat merusak sistem komputer (5 huruf)
  13. pelindungan hukum terhadap pencemaran nama baik (15 huruf)
  14. internet tindakan kriminal yang dilakukan melalui internet (14h)
  15. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
  16. infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
  17. perbuatan melanggar hukum didunia maya (10 huruf)
  18. informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
  19. undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
Down
  1. praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
  2. yang melibatkan pengungkapan konfirmasi pribadi (18h)
  3. aturan dan norma berperilaku baik di media sosial (11 h)
  4. sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
  5. perilaku tidak sopan/kasar didunia maya (10 h)
  6. jejak digital yang tercipta tanpa disadari penggunaan (10 h)
  7. penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
  8. perbuatan menyebar informasi yang merugikan orang lain (18h)
  9. ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
  10. jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
  11. tindakan menyebar informasi yang salah secara sengaja (14h)

30 Clues: pencurian hak cipta (11 h)peraturan yang melindungi data pribadi (16h)perilaku tidak sopan/kasar didunia maya (10 h)menjaga keamanan data pribadi di internet (13h)penyebaran informasi palsu yang meluas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)yang melibatkan pengungkapan konfirmasi pribadi (18h)...

Cyberbullying 2019-12-03

Cyberbullying crossword puzzle
Across
  1. GETS BULLIED ON THE INTERNET
  2. A ELECTRONIC THAT TENNAGERS HAVE
  3. presedent DONALD TRUMP HAS A ACCOUNT ON THIS APP
  4. little KIDS HAS THIS ELETRONIC
  5. TO PUT SOMETHING ON THE INTERNET
Down
  1. adults HAVE THIS APP
  2. its A MOTHER BOARD OF APPS
  3. HAS A KEYBORD
  4. MEAN TO DO
  5. you CAN SNAP PITHURES
  6. THIS IS WHAT GETS BULLIED

11 Clues: MEAN TO DOHAS A KEYBORDadults HAVE THIS APPyou CAN SNAP PITHURESTHIS IS WHAT GETS BULLIEDits A MOTHER BOARD OF APPSGETS BULLIED ON THE INTERNETlittle KIDS HAS THIS ELETRONICA ELECTRONIC THAT TENNAGERS HAVETO PUT SOMETHING ON THE INTERNETpresedent DONALD TRUMP HAS A ACCOUNT ON THIS APP

Cyber Safety 2022-10-27

Cyber Safety crossword puzzle
Across
  1. Never give out personal ______ online
  2. It is important to not ____ fake news.
  3. A person who instigates conflict online.
  4. Bullying online is called?
Down
  1. ___ you visit are a part of your digital footprint.
  2. If you see cyberbullying you should ____ it right away.
  3. Trolling can be considered _____.
  4. Check the ___ in order to determine if the website is reliable
  5. Never tell anyone your ___, not even your friend's
  6. It is encouraged to only speak the ____ online.

10 Clues: Bullying online is called?Trolling can be considered _____.Never give out personal ______ onlineIt is important to not ____ fake news.A person who instigates conflict online.It is encouraged to only speak the ____ online.Never tell anyone your ___, not even your friend's___ you visit are a part of your digital footprint....

CYBER LAW 2021-09-05

CYBER LAW crossword puzzle
Across
  1. stranger has broken into your computer systems without your knowledge and has tampered with confidential data.
  2. a form of malware that prevents you from accessing files on your computer.
  3. defensive technology designed to keep the hackers out.
  4. hacking attack that tricks victims into clicking on an unintended link.
Down
  1. data that is used to describe large amounts of other Internet data.
  2. lure individuals into revealing login information.
  3. hackers that break into the network to steal information that will be used to harm the owner.
  4. false ATM cards used by criminals for their monetary benefits.
  5. a malicious application that can be used to take advantage of a computer’s vulnerability.
  6. program that masks something harmful,that carries it into a device.

10 Clues: lure individuals into revealing login information.defensive technology designed to keep the hackers out.false ATM cards used by criminals for their monetary benefits.data that is used to describe large amounts of other Internet data.program that masks something harmful,that carries it into a device....

CYBER LAW 2021-09-03

CYBER LAW crossword puzzle
Across
  1. registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
  2. Web page to summon different elements from diverse pages or servers to create a new Web page
  3. The communication via any electronic device of false data that damages a person's reputation
  4. Make sure a buyer and seller can identify themselves
  5. Business conducted electronically (buying/selling on web)
Down
  1. process of converting information into a digital
  2. Using a computer to steal personal data
  3. when someone forcefully takes control of a website by cracking the password and later changing it
  4. the process of using Internet-based socializing and communication techniques to create, operate and manage activism of any type
  5. the making, altering, use, or possession of a false writing in order to commit a fraud

10 Clues: Using a computer to steal personal dataprocess of converting information into a digitalMake sure a buyer and seller can identify themselvesBusiness conducted electronically (buying/selling on web)the making, altering, use, or possession of a false writing in order to commit a fraud...

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. like a sickness for a computer
  2. Repeatedly sending nasty, mean, and insulting messages.
  3. keep your things safe with a ________
  4. Repeated, intense harassment and denigration that includes threats or creates significant fear.
  5. Online fights using electronic messages with angry and vulgar language
Down
  1. bullying online
  2. Talking someone into revealing secrets or embarrassing information, then sharing it online.
  3. Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
  4. Intentionally and cruelly excluding someone from an online group.
  5. Sharing someone's secrets or embarrassing information or images online.

10 Clues: bullying onlinelike a sickness for a computerkeep your things safe with a ________Repeatedly sending nasty, mean, and insulting messages.Intentionally and cruelly excluding someone from an online group.Online fights using electronic messages with angry and vulgar languageSharing someone's secrets or embarrassing information or images online....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Someone stealing an authors original work.
  2. Stealing others Identity's.
  3. Sending threats or going through their online accounts.
  4. Using technology to harm others.
Down
  1. A virus on a computer.
  2. On line fights using technology.
  3. The practice of following actionable guidlines on the internet.
  4. Geting private information about someone and sharing it with other people online.
  5. Intentionally keeping someone out of somthing.
  6. Sharing another persons secrets online.

10 Clues: A virus on a computer.Stealing others Identity's.On line fights using technology.Using technology to harm others.Sharing another persons secrets online.Someone stealing an authors original work.Intentionally keeping someone out of somthing.Sending threats or going through their online accounts....

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. repeated, intense harassment denigration
  2. online fights using electronic messages
  3. it is a form of selling someone's identify online
  4. sending nasty, mean and insulting messages
  5. there will look for almost anyone to harass
Down
  1. intestinally and cruelly excluding someone from on online group
  2. "dissing" someone online
  3. talking someone into revealing secrets or embarrassing information
  4. pretending to be someone else online
  5. sharing someone's secrets or embarrassing information

10 Clues: "dissing" someone onlinepretending to be someone else onlineonline fights using electronic messagesrepeated, intense harassment denigrationsending nasty, mean and insulting messagesthere will look for almost anyone to harassit is a form of selling someone's identify onlinesharing someone's secrets or embarrassing information...

Cyber Safety 2022-03-01

Cyber Safety crossword puzzle
Across
  1. I can keep myself __________ online by not giving out my personal information.
  2. I should not use personal information such as __________ and birthdates as your password.
  3. I should __________ an adult if someone or something makes me feel uncomfortable.
  4. Do not write down or __________ your password with anyone.
  5. I should check if the information I find online is __________ before I believe it.
Down
  1. I should not meet up with __________ I have talked online to.
  2. You should include at least one __________ letter when you create a password.
  3. I should include numbers, letters and ___________ when creating a password.
  4. My password should include __________ characters or more.
  5. I should not __________ suspicious files or pictures online.

10 Clues: My password should include __________ characters or more.Do not write down or __________ your password with anyone.I should not __________ suspicious files or pictures online.I should not meet up with __________ I have talked online to.I should include numbers, letters and ___________ when creating a password....

Cyber Foundations 2022-04-26

Cyber Foundations crossword puzzle
Across
  1. a short account of an incident
  2. anything that obstructs accurate communicate of a message
  3. key assertions made by a speaker to develop his or her central idea
Down
  1. the quality of which a speaker appears
  2. words that refer to ideas or concepts
  3. final statement of your speech
  4. adjusting one's materials and delivery to meet the needs of the listeners
  5. verbal and nonverbal responses provided by an audience to a speaker
  6. words that name persons and things that we can know by our five senses
  7. reasoning from specific to general

10 Clues: final statement of your speecha short account of an incidentreasoning from specific to generalwords that refer to ideas or conceptsthe quality of which a speaker appearsanything that obstructs accurate communicate of a messageverbal and nonverbal responses provided by an audience to a speaker...