cyber security Crossword Puzzles
Cyber bullying 2019-07-11
10 Clues: Holt • to hold up • like a cold • private to you • not tell the truth • being hurt constantly • answer someones question • texting and communicating • someone who is mean to someone else • something you use to access messages and internet
Cyber Crossword 2024-05-24
Across
- A piece of software designed to update or fix problems with a computer program or its supporting data.
- Malicious software designed to block access to a computer system until a sum of money is paid.
- The process of converting information or data into a code to prevent unauthorized access.
- Software that enables a user to obtain covert information about another's computer activities.
Down
- Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- A type of malware disguised as legitimate software.
- A secret word or phrase that must be used to gain admission to something.
- A network security system that monitors and controls incoming and outgoing network traffic.
- A network of private computers infected with malicious software and controlled as a group.
- A method of trying to distribute malware or steal information or money using deceptive e-mails and websites.
10 Clues: A type of malware disguised as legitimate software. • A secret word or phrase that must be used to gain admission to something. • Software designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code to prevent unauthorized access. • ...
Cyber Etiquette 2023-04-02
Across
- Do not participate in ______ conduct such as being an online troll, bully or hacker
- Do not consume or spread ______ inappropriate content
- Communicate and share ______ by posting positive content
- Do not ______ personal information
Down
- We can protect ourselves from online dangers by reaching out to police or trusted adult
- Could the person have any malicious intent
- Take _____ against cyberbullying
- Do you know the person or are they credible
- Keep personal information ______
- Did the person intimidate or rush you to do something
10 Clues: Take _____ against cyberbullying • Keep personal information ______ • Do not ______ personal information • Could the person have any malicious intent • Do you know the person or are they credible • Do not consume or spread ______ inappropriate content • Did the person intimidate or rush you to do something • Communicate and share ______ by posting positive content • ...
Cyber Safety 2023-03-27
Across
- Sites such as Snapchat, tiktok etc...
- simulation of the real thing
- To stop a computer from reaching something on the internet.
- An attempt to trick people into visiting malicious websites.
Down
- Measures taken to protect a computer
- When a child abuser tries to start a relationship online.
- Repeated behavior that is intended to cause psychological or emotional harm.
- A word or series of letters, numbers and characters.
- Computer program designed to damage files
- Person who uses computer to gain unauthorized access to data.
10 Clues: simulation of the real thing • Measures taken to protect a computer • Sites such as Snapchat, tiktok etc... • Computer program designed to damage files • A word or series of letters, numbers and characters. • When a child abuser tries to start a relationship online. • To stop a computer from reaching something on the internet. • ...
cyber safety 2023-05-22
Across
- arguing or dissing someone online
- repeat rude messages
- pretending to be another person
- excluding a person from an activity
Down
- use of Internet and technologies to harm other people
- Presenting work or ideas from another source as your own, with or without consent of the original creator by using it in your work without acknowledgement.
- sharing someones secrets and other personal info without consent
- offensive and rude rumors and gossip
- harrasing or threatening someone online
- tricking someone into giving personal info
10 Clues: repeat rude messages • pretending to be another person • arguing or dissing someone online • excluding a person from an activity • offensive and rude rumors and gossip • harrasing or threatening someone online • tricking someone into giving personal info • use of Internet and technologies to harm other people • ...
cyber safety 2023-05-22
Across
- into revealing secrets or embarrassing information, then sharing it online.
- someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
- nasty, mean, and insulting messages.
- is the use of the Internet and related technologies to harm other people in a deliberate, repeated, and hostile manner." - Wikipedia
- is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity" - Wikipedia
Down
- secrets or embarrassing information or images online.
- is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability."
- is the wrongful appropriation and purloining and publication of another author's language, thoughts, ideas, or expressions, and the representation of them as one's own original work."
- and cruelly excluding someone from an online group.
- using electronic messages with angry and vulgar language.
10 Clues: nasty, mean, and insulting messages. • and cruelly excluding someone from an online group. • secrets or embarrassing information or images online. • using electronic messages with angry and vulgar language. • into revealing secrets or embarrassing information, then sharing it online. • ...
Cyber Safety 2023-05-22
Across
- Sharing somebody else's secrets online.
- Stealing someone's identify to pretend to be them.
- A computer program that can replicate and spread over the computer.
- Repeatedly sending mean insulting messages.
- Cruely excluding someone online.
Down
- Someone stealing another authors own work.
- To harm peoples feelings on repeat online.
- Online fights send through message with anger.
- Repeated harassment on someone's page.
- Tricking someone into saying stuff about other people online.
10 Clues: Cruely excluding someone online. • Repeated harassment on someone's page. • Sharing somebody else's secrets online. • Someone stealing another authors own work. • To harm peoples feelings on repeat online. • Repeatedly sending mean insulting messages. • Online fights send through message with anger. • Stealing someone's identify to pretend to be them. • ...
Cyber Safety 2023-05-22
Across
- stalking repeated intense harrasment
- to share someone else secerets or information ofimages online
- pretending to be someone or posting vidoes online to get them introuble
- to trick someone to reveal secrets or embarrisingInfromation online
- means to diss someone or spread rumors.
Down
- intentionally and cruely exculuding someone froman online group
- theft means to stels someones identity
- means to send mean or insulting messages.
- means to use angry and vulgar launage online
- denigration that includes threats and significant fear
10 Clues: stalking repeated intense harrasment • theft means to stels someones identity • means to diss someone or spread rumors. • means to send mean or insulting messages. • means to use angry and vulgar launage online • denigration that includes threats and significant fear • to share someone else secerets or information ofimages online • ...
Cyber Safety 2023-05-22
Across
- Pretending to be someone your not on the internet.
- Sharing another person's secrets online.
- Using Technology to hurt others.
- Repeated harassment on someone's page.
Down
- Pretending to be someone else and using their name and personal information.
- A disease in your PC.
- Not including another person.
- Repeatedly sending nasty and mean messages.
- Taking someone else's work or ideas and passing them as their own.
- Online fight and saying vulgar language.
10 Clues: A disease in your PC. • Not including another person. • Using Technology to hurt others. • Repeated harassment on someone's page. • Sharing another person's secrets online. • Online fight and saying vulgar language. • Repeatedly sending nasty and mean messages. • Pretending to be someone your not on the internet. • ...
Cyber Foundations 2022-04-07
Across
- The slide currrently selected or displayed
- The preset amount of time between slides as they advance automatically during a slide show
- The template will appear along with traditional information on how the template could be used
- A feature that allows you to create a show from scratch
Down
- Where you will find commands to perform common tasks in PowerPoint
- The visual appearance or images of something when looked at in a certain way
- an item of illustrative matter
- A graphic tool that allows you to create a visual representation of information and ideas
- A graphical computer display that can be superimposed on another
- The figure that appears when you are adding text to a slide
10 Clues: an item of illustrative matter • The slide currrently selected or displayed • A feature that allows you to create a show from scratch • The figure that appears when you are adding text to a slide • A graphical computer display that can be superimposed on another • Where you will find commands to perform common tasks in PowerPoint • ...
Cyber bulliyng 2025-03-11
Across
- a secret word that you only know
- a global computer network providing a variety of information
- The repetitive, intentional hurting of one person
- not invitng some to there goup
Down
- a person who speaks or acts in support
- a computer program with a graphical user.
- posting unsults
- bullying someone online
- available on or performed using the internet or other computer network
- the willful and repeated following, watching or harassing
10 Clues: posting unsults • bullying someone online • not invitng some to there goup • a secret word that you only know • a person who speaks or acts in support • a computer program with a graphical user. • The repetitive, intentional hurting of one person • the willful and repeated following, watching or harassing • a global computer network providing a variety of information • ...
cyber bullying 2025-03-11
10 Clues: getting harast • following someone • to be safe on line • a program on a computer • to get a fight on purpose • getting bullied on online • posting about someone else • a safe way of investigating • loacating resourse on online • how syberbulling tricks people
travis cyber 2023-10-08
Across
- Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- Verifying the identity of users or systems to ensure secure access.
- Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
- Pertaining to the security challenges and measures for smartphones and tablets.
- A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
- Malware that encrypts files, demanding payment for their release.
- An update to fix vulnerabilities or improve security in software or systems.
- Converting data into a code to prevent unauthorized access, especially during transmission.
- A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
10 Clues: Malware that encrypts files, demanding payment for their release. • Verifying the identity of users or systems to ensure secure access. • An update to fix vulnerabilities or improve security in software or systems. • Pertaining to the security challenges and measures for smartphones and tablets. • ...
CYBER BULLYING 2024-10-22
Across
- group of platforms where people post their pictures
- a form of aggressive behavior which causes injury or discomfort to others
- demand something (undesirable) from someone
- avoid talking to ____ online
Down
- a search site
- this can be used to track what people post online(2 words)
- a connection on facebook
- restrict contact with someone on an online app
- a popular mobile device
- a secret text that only authorized users have access to
10 Clues: a search site • a popular mobile device • a connection on facebook • avoid talking to ____ online • demand something (undesirable) from someone • restrict contact with someone on an online app • group of platforms where people post their pictures • a secret text that only authorized users have access to • this can be used to track what people post online(2 words) • ...
Cyber monday 2024-11-28
10 Clues: HOLDS YOUR CASH • A WAITING GROUP • A DEAL OR DISCOUNT • THE COST OF AN ITEM • NEEDED TO SHOP ONLINE • A PROMOTIONAL MESSAGE • AVAILABILITY OF ITEMS • PLAN FOR SPENDING MONEY • TO GIVE MONEY FOR SOMETHING • TO VERIFY ITEMS IN YOUR CART
Cyber monday 2024-11-28
10 Clues: WORTH OF AN ITEM • BUYING MANY ITEMS • TO LOOK THROUGH ITEMS • TO KEEP MONEY UNSPENT • WHAT YOU WANT TO ACHIEVE • MAXIMUM PURCHASE QUANTITY • HOLDS YOUR SELECTED ITEMS • REMOVING ITEMS FROM STOCK • ACTION FOR SELECTING ONLINE • WHAT YOU MAKE TO ORGANIZE SHOPPING
Cyber Attackers 2025-03-24
Across
- Emails pretending to be from trusted sources to steal information.
- An attack where criminals demand money to restore access to data.
- Type of hacker paid to test security systems ethically.
- Attack that floods a system with traffic to bring it down.
Down
- A trick where a criminal looks over your shoulder to steal information.
- The unauthorised use of someone’s private information to pretend to be them.
- Software that replicates itself and can damage files or systems.
- Law passed in 1990 to deal with hacking offences.
- Security method requiring both a password and a text code.
- Personal facts and figures collected online.
10 Clues: Personal facts and figures collected online. • Law passed in 1990 to deal with hacking offences. • Type of hacker paid to test security systems ethically. • Security method requiring both a password and a text code. • Attack that floods a system with traffic to bring it down. • Software that replicates itself and can damage files or systems. • ...
CYBER CROSSWORD 2021-09-05
Across
- The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- An individual who subscribes to a kind of ideology about new technologies, such as the Internet.
- A switching device for networks, which is able to route network packets, based on their addresses, to other networks or devices.
- Any piece of technology that connects people and machines with each other or with information.
- The conversion of text, pictures, or sound into a digital form that can be processed by a computer.
- The unauthorized use, copying or distribution of copyrighted software
Down
- The notional environment in which communication over computer networks occurs.
- The unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names.
- is the process of developing, promoting and possibly mandating standards-based and compatible technologies and processes within a given industry.
- This provides legal recognition for transactions that are carried out by means of electronic data interchange.
10 Clues: The unauthorized use, copying or distribution of copyrighted software • The notional environment in which communication over computer networks occurs. • Any piece of technology that connects people and machines with each other or with information. • An individual who subscribes to a kind of ideology about new technologies, such as the Internet. • ...
Cyber Law 2021-09-04
Across
- It refers to the technologies, process and practices designed to protect networks, devices, app and data from any kind of cyber attack.
- regulatory arbitrage in Cyberspace (that is applying to the Internet) is a focal point for two opposing schools of thought, the Cyberlibertarians and
- 'citizen of the internet' can be called__
- which communication is a permanent telephone connection between two points set up by a telecommunication common carrier
- It refers to the adoption or increase in use of computer technology by an organization,Industry etc.
Down
- It can be thought of as a global electronic village with instantaneous communication and no geographical barriers
- The essence of this approach is that cyberspace is a distinct new space and that it can (or should) not be regulated by the state.
- you have your computer, you really don't need much additional hardware to connect to the internet. The primary piece of hardware you need is a
- it allows perfect freedom of expression, which in the physical world has been tempered by even the most liberal of regime
- It is a conversion of data,document and processes from analog to digital
10 Clues: 'citizen of the internet' can be called__ • It is a conversion of data,document and processes from analog to digital • It refers to the adoption or increase in use of computer technology by an organization,Industry etc. • It can be thought of as a global electronic village with instantaneous communication and no geographical barriers • ...
cyber ethicsc 2025-06-14
Across
- illegally accessing someone's computer
- moral rules to follow online and offline
- a secret code you should never share
- you need permission before using this kind of content
- antivirus software helps with this
- everyone has a right to this online and offline
Down
- stealing work and calling it your own
- fake emails asking for your passwords or bank info
- tell a trusted adult or click this option on social media
- always show this to people online too
10 Clues: antivirus software helps with this • a secret code you should never share • stealing work and calling it your own • always show this to people online too • illegally accessing someone's computer • moral rules to follow online and offline • everyone has a right to this online and offline • fake emails asking for your passwords or bank info • ...
Cyber Puzzle 2022-09-20
Across
- Special virus that moves from computer to computer without human interaction.
- An important process that verifies a user is really who they are; many different ways this can be done.
- unique address that identifies a device on the internet or a local network.
Down
- The form of encryption that requires a single key
- A social engineering technique that uses emails to impersonate others and gain access to unauthorised information.
- means that data is protected from unauthorized changes to ensure that it is reliable and correct.
- The coloured hat of hackers that are cybercriminals who uses hacking for malicious intent and personal gain
- a person who uses computers to gain unauthorized access to data.
- the primary purpose of _________ is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet.
- An ________ is a program or code that makes use of the vulnerability in an application or system.
10 Clues: The form of encryption that requires a single key • a person who uses computers to gain unauthorized access to data. • unique address that identifies a device on the internet or a local network. • Special virus that moves from computer to computer without human interaction. • ...
Cyber Crossword! 2025-05-23
Across
- A popular operating system
- The company that makes windows
- The main menu with lots of options
- The common color of the screen of death
- What happens if you press ctrl-alt-del
Down
- A portable computer that folds
- The little arrow that the mouse controls
- A purple guy that "helps"
- Zeus is an example
- A fun game full of mines
10 Clues: Zeus is an example • A fun game full of mines • A purple guy that "helps" • A popular operating system • A portable computer that folds • The company that makes windows • The main menu with lots of options • What happens if you press ctrl-alt-del • The common color of the screen of death • The little arrow that the mouse controls
CYBER BULLYING 2025-12-12
Across
- Online messages meant to hurt or threaten someone
- Sending repeated threatening message
- A group targeting one individual online
- Sharing someone’s personal info without permission
Down
- Repeated aggressive behaviour using digital devices
- Pretending to be someone else online to cause harm
- Online platforms used for bullying (general term)
- Anonymous hateful comments on social media
- When someone is left out intentionally in online groups
- A harmful, untrue statement spread online
10 Clues: A group targeting one individual online • A harmful, untrue statement spread online • Sending repeated threatening message • Anonymous hateful comments on social media • Online messages meant to hurt or threaten someone • Online platforms used for bullying (general term) • Pretending to be someone else online to cause harm • ...
Cyber bullying 2026-02-10
Across
- dampak psikologis pada korban,seperti perasaan sedih mendalam.
- perilaku menyakitkan yang dilakukan melaluli media digital.
- sebutan untuk orang yang menjadi korban bullying.
- tindakan pencegahan awal cyberbullying.
- tindakan mengirim pesan kasar secara berulang.
Down
- langkah untuk melindungi dari cyberbullying.
- media yang sering digunakkan untuk cyberbullying.
- jenis cyberbullying dengan menyebarkan kabar bohong.
- tempat untuk melaporkan tindakan Cyber bullying.
- asasi hak yang dilanggar ketika seseorang mengalami cyberbullying.
10 Clues: tindakan pencegahan awal cyberbullying. • langkah untuk melindungi dari cyberbullying. • tindakan mengirim pesan kasar secara berulang. • tempat untuk melaporkan tindakan Cyber bullying. • media yang sering digunakkan untuk cyberbullying. • sebutan untuk orang yang menjadi korban bullying. • jenis cyberbullying dengan menyebarkan kabar bohong. • ...
Crossword 1 2014-12-28
Across
- When securing a crime scene, make note of any __________ conditions.
- “Find committing” is defined under the Criminal Code as meaning situations where a person is basically caught in the act of committing the __________.
- Designing the environment to reduce the possibility of crime is called?
- The steps to using an extinguisher can be explained using the acronym PASS. What action does the first S in this acronym refers to?
- Only the __________ government can create indictable offences.
- When handling evidence, you should wear gloves to avoid __________.
- The basic security role is implemented by observing, reporting, __________ and deterring.
- One of the recommendations from the Patrick Shand case was __________ licensing.
- An arrest is defined as getting control of someone with intent to __________.
Down
- Post orders are often called __________ orders.
- It is the responsibility of every security guard to be aware of __________ materials on the work site.
- The basic security role is to protect people, property and __________.
- One reason that we patrol is to deter people from __________ acts.
- Patrick Shand was arrested for __________ baby food.
- We can protect information by protecting computer screens from __________ eyes.
- When taking a witness statement, the facts should be in __________ order.
- If a crowd seems to be getting out of control, __________ from any communication.
- You will need a security license to work in loss __________.
18 Clues: Post orders are often called __________ orders. • Patrick Shand was arrested for __________ baby food. • You will need a security license to work in loss __________. • Only the __________ government can create indictable offences. • One reason that we patrol is to deter people from __________ acts. • ...
Investment Strategies and Analysis - Jace 2021-02-06
Across
- the ratio used to evaluate return based on risk level
- cluster of protein filament currently found on Micheal's face
- portfolio theory that seeks for optimal returns at a given risk level and time horizon
- portfolio management type that adapts to a seasonal market trend
- more __
- __ hypothesis (of the Efficient Market Hypothesis) disregards past history and refute theories of technical analysis of any security
- passive investment technique that attempts to match a particular stock baseline
- private activity __ bonds would be taxable under the Alternative Minimum Tax (AMT)
Down
- the P/E ratio of a growth company
- Rob's favorite shirt design
- correlation at a (+1) coefficient
- term used when ensuring a portfolio does not overemphasize one or more asset categories
- by calculating a weighted average of various performance probabilities, the __ return is the amount an investor expects to receive from an investment
- rule of 72 determines the time it take an investment to do this
- the period an investor has actual ownership of the security
- the government agency security guaranteed by the US government
- the stepped up cost basis of an inherited security is determined as of the date of the owner's___
- portfolio turnover rate in a buy and hold strategy
- the P/E ratio of a value company
19 Clues: more __ • Rob's favorite shirt design • the P/E ratio of a value company • the P/E ratio of a growth company • correlation at a (+1) coefficient • portfolio turnover rate in a buy and hold strategy • the ratio used to evaluate return based on risk level • the period an investor has actual ownership of the security • ...
CS Unit 2 Vocab 2025-09-30
Across
- identity verification
- software that is programmed to detect, prevent, and remove viruses from devices
- a network that only uses cables to connect to devices or the internet
- a network that transmit data extremely fast through thin strands of plastic or glass fiber
- data stored on a device that is not connected to the internet or to a network
- open authorization and two-factor authentication
- security process that requires two different forms/factors of authentication to verify someone's identity
- the data is trustworthy and accurate (part of the CIA triad)
- the exposure something has to being in danger
Down
- to reduce the severity of something
- the accessibility of data to authorized users (part of the CIA triad)
- services that are useable
- the core fundamental concept of cybersecurity
- proof that someone/something has performed a digital action, so they can not deny involvement
- network security systems that monitor and control network trafficet, used as barriers between internal and external networks
- only people who are authorized have access to data (part of the CIA triad)
- network security tool that monitors system and network activity for threats and mitigates them immediately
- network security tool that monitors system and nwork activity for suspicious behavior
18 Clues: identity verification • services that are useable • to reduce the severity of something • the core fundamental concept of cybersecurity • the exposure something has to being in danger • open authorization and two-factor authentication • the data is trustworthy and accurate (part of the CIA triad) • the accessibility of data to authorized users (part of the CIA triad) • ...
New Deal Program 2024-02-22
Across
- security - provided low interest credits and other services to farmers
- and Crafts - create, promote, protect Indian arts.
- Housing Act - Got funding to build houses
- - Funding of the arts
- Relief - Funds New Deal work agencies
- Drug Cosmetics - Improves public safety
- of Prohibition - 21st amendment added to constitution
- Security - Unemployment insurance, social security taxes on tolls and paychecks
- reorganization - Giving Indians back land, gave them credit
Down
- Youth Dance - small performing arts
- Project - Planted trees to give work and protect plains from wind erosion
- Forum - Americans discuss problems
- of Justice - Investigates civil rights
- Deposit Insurance Corporation - Insured bank deposits when bank fails
- Bureau - Increased travel and tourism in U.S
15 Clues: - Funding of the arts • Forum - Americans discuss problems • Youth Dance - small performing arts • Relief - Funds New Deal work agencies • of Justice - Investigates civil rights • Drug Cosmetics - Improves public safety • Housing Act - Got funding to build houses • Bureau - Increased travel and tourism in U.S • and Crafts - create, promote, protect Indian arts. • ...
IFG Security Crossword Puzzle 2023-07-27
Across
- Security incident that results in the loss, suspected compromise of classified info
- Security incident involving unintentional or negligent violation of customer or company security requirements
- Focal point for overall security administration and management
- required for access to SAP
- SAP Accredited Area
Down
- Dedicated unclassified F-22 program area
- Replaced FOUO
- Displays unclassified program identifiers for all SAPs an employee possesses
- Prohibited Item
- Control information about mission capabilities, limitations, and intentions
10 Clues: Replaced FOUO • Prohibited Item • SAP Accredited Area • required for access to SAP • Dedicated unclassified F-22 program area • Focal point for overall security administration and management • Control information about mission capabilities, limitations, and intentions • Displays unclassified program identifiers for all SAPs an employee possesses • ...
IFG Security Crossword Puzzle 2023-07-27
Across
- Replaced FOUO
- Security incident that results in the loss, suspected compromise of classified info
- The practice of controlling information about mission capabilities, limitations, and intentions
- Prohibited Item
Down
- Security incident involving unintentional or negligent violation of customer or company security requirements
- Focal point for overall security administration and management
- Displays unclassified program identifiers for all SAPs an employee possesses
- Dedicated unclassified F-22 program area
- Required for access to SAP
- SAP Accredited Area
10 Clues: Replaced FOUO • Prohibited Item • SAP Accredited Area • Required for access to SAP • Dedicated unclassified F-22 program area • Focal point for overall security administration and management • Displays unclassified program identifiers for all SAPs an employee possesses • Security incident that results in the loss, suspected compromise of classified info • ...
Security and Legislation 2022-02-25
Across
- being honest and upright
- proving something to be genuine or valid
- the quality of being able to be used, reached or entered easily
- the standing of a person or organisation in the eyes of the public
- people who work for a company
- software that needs to be put on a newer version
- software that is no longer being maintained or updated
- programs on a computer
- for letter word for information that does not have a meaning to it
Down
- keeping something private
- being ready to use at any time
- having to pay for doing something wrong
- the physical components of a computer
- it belongs to an individual
- acting in accordance to something, obeying, following the rules
- a string of text that needs to be entered in order to access a system
- a dispute that has been brought to court
- permanent software programmed into a read-only memory
18 Clues: programs on a computer • being honest and upright • keeping something private • it belongs to an individual • people who work for a company • being ready to use at any time • the physical components of a computer • having to pay for doing something wrong • proving something to be genuine or valid • a dispute that has been brought to court • ...
Custody and Security 2024-08-28
Across
- _______ and procedure
- equipment used to communicate
- handcuffs, leg irons, belly chains
- opens doors, may have silver rivet
- fence surrounding the facility
- gang members or gang activity
- type of search looking for obvious contraband
- formal, informal, emergency, keep track of prisoners
Down
- card the item carried by prisoners to identify them
- you'd radio call to them during emergencies
- slang for contraband item usually made to inflict harm
- the people incarcerated
- paperwork that allows items to come through the gate
- the official name for a "ticket"
- custody staff
- prohibited items of property held by prisoners
- prisoners are moving units and must ____ their stuff
- the person who oversees the running of the facility
18 Clues: custody staff • _______ and procedure • the people incarcerated • equipment used to communicate • gang members or gang activity • fence surrounding the facility • the official name for a "ticket" • handcuffs, leg irons, belly chains • opens doors, may have silver rivet • you'd radio call to them during emergencies • type of search looking for obvious contraband • ...
PERSONNEL SECURITY PROGRAM 2021-08-16
Across
- AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
- SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR?
- TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
- OFFICER WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
- TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
Down
- OF NCIS DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
- WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
- WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
- SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
- WHO IS USUALLY DESIGNATED AS IAM?
- AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?
11 Clues: WHO IS USUALLY DESIGNATED AS IAM? • SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR? • WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY? • AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER? • SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR? • WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY? • ...
PERSONNEL SECURITY PROGRAM 2021-08-16
Across
- AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
- SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR?
- TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
- OFFICER WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
- TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
Down
- OF NCIS DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
- WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
- WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
- SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
- WHO IS USUALLY DESIGNATED AS IAM?
- AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?
11 Clues: WHO IS USUALLY DESIGNATED AS IAM? • SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR? • WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY? • AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER? • SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR? • WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY? • ...
PERSONNEL SECURITY PROGRAM 2021-08-16
Across
- AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
- scope background investigation WHAT DOES SSBI STAND FOR?
- TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
- officer WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
- TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
Down
- of ncis DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
- WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
- WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
- SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
- WHO IS USUALLY DESIGNATED AS IAM?
- AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?
11 Clues: WHO IS USUALLY DESIGNATED AS IAM? • SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR? • WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY? • AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER? • WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY? • scope background investigation WHAT DOES SSBI STAND FOR? • ...
Compliance Champions League 2023 - Crossword 2023-11-28
Across
- Attachments are made visible externally by setting the _ flag:
- Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance:
- Patch Day notes are released on 2nd _________ of every Month :
- Subscribe using the _ to receive email notifications on external updates for cases :
- Software with rating ___________ at SAP should not be installed:
- Business continuity plans must be documented, maintained, audited, and regularly tested in preparation for unforeseen risks to business operations. They can be found in the Portalusing the quicklink /go/ _______________ :
- _______ notes must be entered to put the case to status Resolved:
- The _____ feature enables SAP to secure the usage of any application specific function:
- _______ tool targets at providing missing functionality and enhancements to Agent Workspace:
- _______ field ensures that the action plan step documented will be visible to the customer:
Down
- We can find the latest SAP logo and word/ppt templates at www.______.com :
- If the security vulnerability doesn't affect any customers as the coding was never shipped to customers, ________________ flag should be set in the security incident.
- _____________ Maintenance Strategy is used by customers to request a quotation online in SMP:
- Which Board area does AIS belong to?
- To installl a software which is not listed in software center, we get it via go/ :
- What should be the status of a product security incident if you get a CVSS score of 0.0.:
- While working from home, If something is lost, or you suspect that SAP information has been disclosed without authorization - Make an appropriate report in the_____ :
- What should be the final status of a Security Incident:
- How is the priority of the security note calculated?
- You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com:
20 Clues: Which Board area does AIS belong to? • How is the priority of the security note calculated? • What should be the final status of a Security Incident: • Attachments are made visible externally by setting the _ flag: • Patch Day notes are released on 2nd _________ of every Month : • Software with rating ___________ at SAP should not be installed: • ...
public saftey 2024-08-09
Across
- measures ensuring protection
- organized withdrawal from danger
- actions to avert potential threats
- occurrence of an unexpected event
- state of being ready for emergencies
- state of being shielded from harm
- vehicle for urgent medical aid
- act of extricating from peril
- critical situation requiring immediate action
- event causing significant destruction
Down
- continuous observation for security
- routine surveillance activity
- action taken during an emergency
- Aid, preliminary medical intervention
- enforcers of law and order
- potential risk or danger
- combatant of infernos
- emergency procedure for cardiac arrest
- refuge from adverse conditions
- device signaling danger
20 Clues: combatant of infernos • device signaling danger • potential risk or danger • enforcers of law and order • measures ensuring protection • routine surveillance activity • act of extricating from peril • vehicle for urgent medical aid • refuge from adverse conditions • action taken during an emergency • organized withdrawal from danger • occurrence of an unexpected event • ...
INTERNET TERMINOLOGIES 2023-12-09
Across
- Internet Service Provider
- Malicious software
- Device for internet access
- Connection to another web page
- Data security through encoding
- Software for navigating the web
- Collection of online pages
- Transfer data from the internet
- Website data stored on a device
- Fraudulent information retrieval
- Unsolicited emails/messages
- Temporary storage for web data
Down
- Tool for finding information online
- Language for web page creation
- Webpage address
- Computer delivering data to users
- Network security system
- Device directing internet traffic
- Wireless internet connection
- Data transfer capacity
- Website's name/address
- Transfer data to the internet
- Internet Service Provider
23 Clues: Webpage address • Malicious software • Data transfer capacity • Website's name/address • Network security system • Internet Service Provider • Internet Service Provider • Device for internet access • Collection of online pages • Unsolicited emails/messages • Wireless internet connection • Transfer data to the internet • Language for web page creation • Connection to another web page • ...
BCS reveiw noah seabolt 2015-11-11
Across
- a group of computers
- something you can access the web on
- a message sender thing that send messages to people
- micro soft excel
- asdfjkl;'
- something that you move and click stuff with
- ware stuff that makes up a computer
- computer screen
Down
- bully bully on the internet
- being safe on thee interwebs
- web page maker
- a plan u pick that limits sertan thing
- publisher grating cards
- a small slip of buttons at the top of a Microsoft thing
- proper technique
15 Clues: asdfjkl;' • web page maker • computer screen • micro soft excel • proper technique • a group of computers • publisher grating cards • bully bully on the internet • being safe on thee interwebs • something you can access the web on • ware stuff that makes up a computer • a plan u pick that limits sertan thing • something that you move and click stuff with • ...
Match the Cards to the Duel Links Duelist Part 1 2023-04-06
Across
- Cyber Commander
- Infernity Doom Dragon
- Elemental HERO Flame Wingman & Elemental HERO Neos
- Number 39: Utopia, Number C39: Utopia Ray, & Ultimate Leo Utopia Ray
- Ancient Gear Golem
- Cyber Blader
- Hamon, Lord of Striking Thunder, Raviel, Lord of Phantasms, Uria, Lord of Searing Flames, & Yubel
- Dark Magician, Dark Magician Girl, Gandora the Dragon of Destruction, & Silent Magician LV8
- Armed Dragon LV7 & Ojama King
- Duza the Meteoric Cubic Vessel
- Number 6: Chronomaly Atlandis
- Blast Held by a Tribute
- Blue-Eyes Ultimate Dragon & Blue-Eyes White Dragon
- Meklord Emperor Wisel
- Dark Necrofear
- Orgoth the Relentless
- Ancient Fairy Dragon
- Chevalier de Fleur
- Fairy Cheer Girl
- Indiora Doom Volt the Cubic Emperor
- Tin Archduke
- Sephylon, the Ultimate Timelord
- Water Dragon
- Malefic Truth Dragon
- Humpty Grumpty
- Barrel Dragon
- Volcanic Doomfire
- Red-Eyes Black Dragon
- The Legendary Fisherman
- Life Stream Dragon & Power Tool Dragon
- T.G. Halberd Cannon
- Black-Winged Dragon
- Blue-Eyes White Dragon
- Embodiment of Apophis
- Goyo Guardian
- Number 106: Giant Hand
- Jinzo, Red-Eyes Black Dragon, & The Legendary Fisherman
- Earthbound Immortal Ccapac Apu
- Elemental HERO Divine Neos, Elemental HERO Flame Wingman, Elemental HERO Neos, & Yubel
- Arcana Force EX - The Light Ruler
- Fortune Fairy Chee
Down
- Red Dragon Archfiend
- Lava Golem & The Winged Dragon of Ra
- Earthbound Immortal Aslla Piscu
- Blue-Eyes Alternative White Dragon, Blue-Eyes Ultimate Dragon, Blue-Eyes White Dragon, Obelisk the Tormentor, & Vampire Lord
- Number 107: Galaxy-Eyes Tachyon Dragon
- Evil HERO Malicious Fiend
- Gate Guardian
- Black Rose Dragon
- Fossil Warrior Skull King
- Number 15: Gimmick Puppet Giant Grinder
- Jinzo
- Black Luster Soldier, Dark Magician, Dark Magician Girl, Obelisk the Tormentor, Slifer the Sky Dragon, & The Winged Dragon of Ra
- Rainbow Dragon
- Curse Necrofear
- Harpie Lady Sisters
- Number 32: Shark Drake
- Maiden in Love
- Dark Magician Girl
- Number 105: Battlin' Boxer Star Cestus
- Earthbound Immortal Wiraqocha Rasca
- Meklord Astro Mekanikle
- Cyber End Dragon
- Superdreadnought Rail Cannon Gustav Max
- Relinquished
- Destiny HERO - Plasma
- Masked Beast Des Gardius
- Insect Queen
- Number 9: Dyson Sphere
- Ultimate Tyranno
- Junk Warrior, Shooting Star Dragon, & Stardust Dragon
- Super Vehicroid Jumbo Drill
- Number 102: Star Seraph Sentry
- Ice Beast Zerofyne
- Pumpking the King of Ghosts
- Dark Magician
- Galaxy-Eyes Photon Dragon
77 Clues: Jinzo • Cyber Blader • Tin Archduke • Water Dragon • Relinquished • Insect Queen • Gate Guardian • Barrel Dragon • Dark Magician • Goyo Guardian • Rainbow Dragon • Dark Necrofear • Maiden in Love • Humpty Grumpty • Cyber Commander • Curse Necrofear • Fairy Cheer Girl • Cyber End Dragon • Ultimate Tyranno • Black Rose Dragon • Volcanic Doomfire • Ancient Gear Golem • Dark Magician Girl • Chevalier de Fleur • ...
Cyber Safety-Archie Webb 2016-05-24
Across
- an Apple tablet
- a group of computers that are connected
- to protect your computer from viruses
- how you securely connect to a network or program
- this person about cyber safety
- a search engine
- way to check if your computer has a virus
- program instruction
- a large device
Down
- a program you can install on your device
- how to connect
- what a hacker tries to steal
- blocksvirus
- a small device
- you a virus
- a machine that allows you to use the Internet
- unhealthy for device
- someonewho breaks into your computer
18 Clues: blocksvirus • you a virus • how to connect • a small device • a large device • an Apple tablet • a search engine • program instruction • unhealthy for device • what a hacker tries to steal • this person about cyber safety • someonewho breaks into your computer • to protect your computer from viruses • a group of computers that are connected • a program you can install on your device • ...
6B Crossword 2022-10-25
Across
- The deep-voice actor
- Tennis master
- The tallest, yet the youngest
- Marvel fan
- He deserves to be friends with everybody
- Always happy
- Black and white on a green field player
- Cooking Queen
- The only one that can buy highlighters for 500 rupees
- The class lawyer
- On the path to success
- The funny one-perhaps the funniest of all
Down
- She speaks with love
- His last name rhymes with his first.
- His name ends with a hero's name
- Cyber Master, Fitness Superstar
- A new member of 6B
- Artist
- She can paint pennywise on a white cloth
- Our habibi
20 Clues: Artist • Marvel fan • Our habibi • Always happy • Tennis master • Cooking Queen • The class lawyer • A new member of 6B • She speaks with love • The deep-voice actor • On the path to success • The tallest, yet the youngest • Cyber Master, Fitness Superstar • His name ends with a hero's name • His last name rhymes with his first. • Black and white on a green field player • ...
parish test 2023-12-08
Across
- website where visitors can make changes and edits to
- bullying Bullying in the digital form
- Object showing human workmanship
- related to hearing
- domain Creative work that anyone is free to use
- To annoy persistently
- To increase
- Unknown authorship
- someone who is present but does not take part in
- First full scale design
- Behavior of motivation
- research gathering info for customer
Down
- Being physically or emotionally wounded
- Your online image
- Being apart from company
- what an individual want to achieve in the future
- introduction to something new
- Someone who stands up for someone
- Deceptive act
- Legal right to reproduce others work
20 Clues: To increase • Deceptive act • Your online image • related to hearing • Unknown authorship • To annoy persistently • Behavior of motivation • First full scale design • Being apart from company • introduction to something new • Object showing human workmanship • Someone who stands up for someone • Legal right to reproduce others work • research gathering info for customer • ...
Space Camp 2024-05-30
Across
- simulators flown in Mach 3
- what will call coordinators and management
- last name of CEO
- kay taylor's job title
- General Admission plus a planetarium show for groups
- the first director of Space Camp
- the simulation floor
- the name of the shuttle outside
- general email inbox
Down
- First week of camp 2024
- customer insight analyst
- $105 item in the giftshop
- the sequel to robotics
- the name of our Apollo capsule
- filling in for Jennifer Bradford
- an invitaition only program
- Space Program for 12-14 year olds
- 1986 film
- camp director
- scholarship program for alabama residents
20 Clues: 1986 film • camp director • last name of CEO • general email inbox • the simulation floor • kay taylor's job title • the sequel to robotics • First week of camp 2024 • customer insight analyst • $105 item in the giftshop • simulators flown in Mach 3 • an invitaition only program • the name of our Apollo capsule • the name of the shuttle outside • filling in for Jennifer Bradford • ...
Arkansas School for Mathematics, Sciences, and the Arts 2020-06-24
Across
- academic department
- by a sensei
- year project
- success coordinators/class schedulers and admissions gurus
- and Innovation Complex/CIC
- Muse/student arts publication
- of Arkansas/a campus of this system
- Dolphin/mascot
- Arkansas School for Mathematics, Sciences, and the Arts
- Bay Cafe/aquatic mammal eatery
- center/home away from home
Down
- sports competition against sister schools
- where arts and humanities students showcase their research and portfolios
- magazine
- and green/school colors
- fair/STEM students showcase their research here
- weeks before classes begin in August
17 Clues: magazine • by a sensei • year project • Dolphin/mascot • academic department • and green/school colors • and Innovation Complex/CIC • center/home away from home • Muse/student arts publication • Bay Cafe/aquatic mammal eatery • of Arkansas/a campus of this system • weeks before classes begin in August • sports competition against sister schools • ...
Cyberbezpieczeństwo 2025-04-09
Across
- Podszywanie się pod inną osobę .
- Chroni tożsamość w internecie .
- Może zawierać litery, cyfry i znaki specjalne .
- Zabezpieczenie dostępu np.login.
- Sieć WI-FI bez hasła .
- Ogólna nazwa dla złośliwego orpogramowania .
Down
- Nazwa użytkownika potrzebna do zalogowania się .
- Fałszywa wiadomość podszywająca się pod zaufane żródłó.
- Program,który chroni komputer przed wirusami .
- Krótkie potwierdzenie logowania .
- Program lub urządzenie blokujące nieautoryzowany dostęp do sieci .
- Proces szyfrowania danych .
- forma złośliwego oprogramowania, które żąda okupu.
- Złośliwe oprogramowanie podszywające się pod coś użytycznego .
- Kopia zapasowa danych .
- DDoS Cyber atak polegający na zalaniu serwera.
16 Clues: Sieć WI-FI bez hasła . • Kopia zapasowa danych . • Proces szyfrowania danych . • Chroni tożsamość w internecie . • Podszywanie się pod inną osobę . • Zabezpieczenie dostępu np.login. • Krótkie potwierdzenie logowania . • Ogólna nazwa dla złośliwego orpogramowania . • Program,który chroni komputer przed wirusami . • Może zawierać litery, cyfry i znaki specjalne . • ...
Ασφάλεια στο διαδύκτιο 2024-02-15
10 Clues: Κακόβουλο Λογισμικό • news Ψευδής Ειδήσεις • Διαδικτυακός Εκφοβισμός • Scams Ηλεκτρονικές Απάτες • Reputation Διαδικτυακή Φήμη • Passwords Κωδικοί Πρόσβασης • Piracy Πειρατεία Λογισμικού • gaming Παιχνίδια στο Διαδίκτυο • Addiction Εθισμόσ στο διαδιίκτυο • positive Εικόνεσ Σώματοσ , Κοινωνικά Δίκτυα
Investing Crossword Puzzle 2025-03-25
Across
- Investing all the money you have available at a given time, and putting it into the market
- Considered one of the world’s most successful investors
- Guaranteed payment by employer after retirement
- Created by President Roosevelt in 1935
- Spreading investments across different assets instead of all into one asset
- An investor's ability and willingness to endure fluctuations in the value of their investments
- The process of offering shares of a private corporation to the public in a new stock issuance
- A market in which prices are falling and a pessimistic outlook overall
- This measures the price performance of a basket of securities
- Created and backed by the government but not tied to any physical commodity
- A portion of a company's earnings distributed to shareholders as a return on their investment usually in cash
Down
- A person who buys and sells stocks with the intention of gaining a profit
- The age where you can receive full social security
- Someone who allocates capital into various financial assets with the expectations to generate long term returns and building wealth over time
- Social Security and Medicare Taxes
- A unique series of letters or a combination of letters and numbers that represents a particular publicly traded company's stock or security
- The ease with which an asset or security can be converted into cash without affecting its market price
- A unit of ownership in a company, dividing its ownership into equal parts
- Government Medical Health Plan
- A financial marketplace where investors can buy and sell shares of publicly traded companies
- Contribute money post tax. Money grows tax free
- Putting funds into a new investment account after leaving a company
- A type of security representing ownership of a company
- A sum of money saved or made available for a particular purpose
- Pools money from a large group of investors to purchase a diversified portfolio of stocks, bonds and other securities
25 Clues: Government Medical Health Plan • Social Security and Medicare Taxes • Created by President Roosevelt in 1935 • Guaranteed payment by employer after retirement • Contribute money post tax. Money grows tax free • The age where you can receive full social security • A type of security representing ownership of a company • ...
Investing - Kaleb Wayman 2025-03-25
Across
- A person who buys and sells stocks with the intention of gaining a profit
- Social Security and Medicare Taxes
- A market in which prices are falling and a pessimistic outlook overall
- A sum of money saved or made available for a particular purpose
- Contribute money post tax. Money grows tax free
- Created by President Roosevelt in 1935
- Created and backed by the government but not tied to any physical commodity
- A financial marketplace where investors can buy and sell shares of publicly traded companies
- A portion of a company's earnings distributed to shareholders as a return on their investment usually in cash
- This measures the price performance of a basket of securities
- Putting funds into a new investment account after leaving a company
- The age where you can receive full social security
- The ease with which an asset or security can be converted into cash without affecting its market price
Down
- A type of security representing ownership of a company
- Spreading investments across different assets instead of all into one asset
- An investor's ability and willingness to endure fluctuations in the value of their investments
- Investing all the money you have available at a given time, and putting it into the market
- Considered one of the world’s most successful investors
- Pools money from a large group of investors to purchase a diversified portfolio of stocks, bonds and other securities
- Someone who allocates capital into various financial assets with the expectations to generate long term returns and building wealth over time
- The process of offering shares of a private corporation to the public in a new stock issuance
- Government Medical Health Plan
- A unit of ownership in a company, dividing its ownership into equal parts
- A unique series of letters or a combination of letters and numbers that represents a particular publicly traded company's stock or security
- Guaranteed payment by employer after retirement
25 Clues: Government Medical Health Plan • Social Security and Medicare Taxes • Created by President Roosevelt in 1935 • Contribute money post tax. Money grows tax free • Guaranteed payment by employer after retirement • The age where you can receive full social security • A type of security representing ownership of a company • ...
Tatler Crossword Week 6 2023-11-27
Across
- Popular girl scout cookie
- Journalist ___ B. Wells
- Shortest Grizzlies player(last name)
- Best time to buy online is ______ Monday,
- Woman's name that sounds like its first and third letters
Down
- The largest city in the world.
- Boy band with the 2000 hit "Bye Bye Bye"
- first animal in space
- Home to the Alhambra
- Knight's title
- Santa's workers
11 Clues: Knight's title • Santa's workers • Home to the Alhambra • first animal in space • Journalist ___ B. Wells • Popular girl scout cookie • The largest city in the world. • Shortest Grizzlies player(last name) • Boy band with the 2000 hit "Bye Bye Bye" • Best time to buy online is ______ Monday, • Woman's name that sounds like its first and third letters
T-VISTARA 2022-11-11
10 Clues: Our former CEO • Tool to say thanks • The force in sales • Type of cyber attack • Telstra's idea store • Program for Women in SE • FY Starts from this month • Mobile infra arm of Telstra • Kaught in Berlin (I am a language) • All APIs in one place, sit back and relax.
Energy Crossword Puzzle 2025-04-18
10 Clues: Found in mines • Runs though houses • Cyber trucks cousin • Something you drive in • something fans work with • Powers everything on here • Fuel Used to power cars • Using cars to to make them move • So you can play games on your phone • Power Something that is Powered by the sun
Frontier Familiarity 2012-04-04
Across
- Frontier online television service
- deferred payment arrangment
- Intranet site for call center consultants
- Internet Only
- Fiber Optic Service
- 768K Internet
- $2.99 Feature Pack
- Simply
- Federal Discount Program
- Security with Parental Controls and Firewall
- assuming the sale
- seasonal service called stay...
Down
- monthly charge
- DSL Line Conditioner
- Basic Phone Package
- Free service for customers moving out of area
- EA, LF, US, CA, AZ, PA, etc.
- DISH order entry tool
- credit agency used by Frontier
- DP Silver, Bronze, Freedom, Choices
- switching number to different provider
- Security with AntiVirus and AntiSpam
22 Clues: Simply • Internet Only • 768K Internet • monthly charge • assuming the sale • $2.99 Feature Pack • Basic Phone Package • Fiber Optic Service • DSL Line Conditioner • DISH order entry tool • Federal Discount Program • deferred payment arrangment • EA, LF, US, CA, AZ, PA, etc. • credit agency used by Frontier • seasonal service called stay... • Frontier online television service • ...
Networking concepts and cyber ethics 2025-05-18
Across
- : Used to access accounts securely.
- : Maximum data transfer rate.
- : Security system that controls traffic.
- : Online bullying.
- : Rules for communication between devices.
- : Secure remote access method.
- : Fake emails to steal data.
Down
- : Secretly collects data.
- : Wireless network technology.
- : A device that forwards data packets between networks.
- : Wired networking method.
- : Unwanted email.
- : Harmful software.
- : Protects creative work.
- : Scrambling data for security.
- : Local Area Network.
- : Right to keep data secure.
- Address : Unique identifier for a device on a network.
- : Unauthorized system access.
- : A computer that provides services or data.
20 Clues: : Unwanted email. • : Online bullying. • : Harmful software. • : Local Area Network. • : Secretly collects data. • : Protects creative work. • : Wired networking method. • : Right to keep data secure. • : Fake emails to steal data. • : Maximum data transfer rate. • : Unauthorized system access. • : Wireless network technology. • : Secure remote access method. • ...
Cyber Bullying 2020-03-08
Across
- recognize as being
- a person who pleads for a person, cause, or idea
- Interactive web journal or diary,the contents of which are posted online and which others can view
- an unfortunate person who suffers from adverse circumstances
- revenge
Down
- think about carefully; weigh
- The application of a set of criteria against which internet content is judged acceptable or not
- doctoring digital images so that the main subject is placed in a compromising or embarrassing situation.
- Someone who harms another through electronic devices
- to threaten, frighten, scare, coerce, terrify, and to alarm
10 Clues: revenge • recognize as being • think about carefully; weigh • a person who pleads for a person, cause, or idea • Someone who harms another through electronic devices • to threaten, frighten, scare, coerce, terrify, and to alarm • an unfortunate person who suffers from adverse circumstances • ...
Cyber-Bullying 2021-04-27
Across
- Something that no one should experience
- Do not share false ________ about someone
- Do not share any personal
- When online make sure you are _______ at all times
- Make sure you have _______ permission when online
- An individual that constantly bothers you in a repeated manner
Down
- Never accept or communicate with _______
- Social _______ has it's positives and negatives
- Cyberbullying can have a _______ affect on you
- If you view a form of cyberbullying make sure you _______ it
10 Clues: Do not share any personal • Something that no one should experience • Never accept or communicate with _______ • Do not share false ________ about someone • Cyberbullying can have a _______ affect on you • Social _______ has it's positives and negatives • Make sure you have _______ permission when online • When online make sure you are _______ at all times • ...
Cyber Crime 2021-05-19
Across
- a criminal activity conducted using computers and the internet. This includes fraud, internet scams, and identiy theft
- A technique used by hackers to redirect users to false websites without their knowledge.
- a scheme aimed at tricking you into providing sensitive information to scammers
- a type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return
- Computers that have been penetrated , compromised, and programmed to operate on the commands of an unauthorized remote user
Down
- theft When someone steals your personal information, like your Social Security number, and uses it to commit theft or fraud
- Software that compromises computers or networks with the intention of disrupting their intended functions or operations.
- A engineered attempt by malicious actors to deceive internet users into providing personal information such as usernames, passwords etc.
- The scrambling of information so that it is unreadable to those who do not have the code to unscramble.
- A verb meaning to gain unauthorized access into a computer system.
- pretending to be someone else to demand money, information or something of value
11 Clues: A verb meaning to gain unauthorized access into a computer system. • a scheme aimed at tricking you into providing sensitive information to scammers • pretending to be someone else to demand money, information or something of value • A technique used by hackers to redirect users to false websites without their knowledge. • ...
CYBER LAW 2021-09-03
Across
- the process of using Internet-based socializing and communication techniques to create, operate and manage activism of any type
- process of converting information into a digital
- Web page to summon different elements from diverse pages or servers to create a new Web page
- The communication via any electronic device of false data that damages a person's reputation
Down
- Using a computer to steal personal data
- the making, altering, use, or possession of a false writing in order to commit a fraud
- registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- when someone forcefully takes control of a website by cracking the password and later changing it
- Make sure a buyer and seller can identify themselves
- Business conducted electronically (buying/selling on web)
10 Clues: Using a computer to steal personal data • process of converting information into a digital • Make sure a buyer and seller can identify themselves • Business conducted electronically (buying/selling on web) • the making, altering, use, or possession of a false writing in order to commit a fraud • ...
Cyber Crimes 2022-03-24
Across
- Illegally preventing others to gain access to their personal accounts or websites
- Pretending to be someone else by using their personal information.
- Transferring money from one account to another without the permission of the account holder.
- Illegally copying and selling games or software.
Down
- Using a device to annoy, harass, intimidate or threaten a person online.
- Gaining unauthorized access into a computer network or someone's personal computer.
- Damaging information by deleting, adding false information or hiding it.
- using a device to intercept another person's device.
- Using the computer to create false documents such as cheques, legal documents and counterfeiting.
- Setting up fake websites to await unsuspecting persons to take the bait.
10 Clues: Illegally copying and selling games or software. • using a device to intercept another person's device. • Pretending to be someone else by using their personal information. • Using a device to annoy, harass, intimidate or threaten a person online. • Damaging information by deleting, adding false information or hiding it. • ...
Cyber Foundations 2022-04-07
Across
- The slide currrently selected or displayed
- The preset amount of time between slides as they advance automatically during a slide show
- The template will appear along with traditional information on how the template could be used
- A feature that allows you to create a show from scratch
Down
- Where you will find commands to perform common tasks in PowerPoint
- The visual appearance or images of something when looked at in a certain way
- an item of illustrative matter
- A graphic tool that allows you to create a visual representation of information and ideas
- A graphical computer display that can be superimposed on another
- The figure that appears when you are adding text to a slide
10 Clues: an item of illustrative matter • The slide currrently selected or displayed • A feature that allows you to create a show from scratch • The figure that appears when you are adding text to a slide • A graphical computer display that can be superimposed on another • Where you will find commands to perform common tasks in PowerPoint • ...
Cyber Safety 2022-04-12
Across
- A virus that modifies and deletes files
- A set of characters that grant admission
- To harm someone through the internet
- A virus that slows down your computer
- A virus that secretly damages your computer
Down
- A piece of code capable of a bad effects
- To copy from one computer system to another
- A virus that steals your information
- To scan through a website to gain info
- Software that is designed to disrupt
10 Clues: A virus that steals your information • To harm someone through the internet • Software that is designed to disrupt • A virus that slows down your computer • To scan through a website to gain info • A virus that modifies and deletes files • A piece of code capable of a bad effects • A set of characters that grant admission • To copy from one computer system to another • ...
Cyber Bullying 2013-02-12
Across
- Casual or unconstrained conversation or reports about other people, typically involving details that are not confirmed as being true.
- A widely held but fixed and oversimplified image or idea of a particular type of person or thing.
- social media site many people use.
- when someone wont leave you alone and says mean or hurtful things.
Down
- A statement of an intention to inflict pain, injury, damage, or other hostile action on someone.
- A secret word or phrase that must be used to gain admission to something.
- the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
- causing distress or injury: to say hurtful things.
- social media site that you "tweet" on.
- boldly assertive and forward; pushy.
10 Clues: social media site many people use. • boldly assertive and forward; pushy. • social media site that you "tweet" on. • causing distress or injury: to say hurtful things. • when someone wont leave you alone and says mean or hurtful things. • A secret word or phrase that must be used to gain admission to something. • ...
Cyber Bullying 2013-02-12
Across
- Casual or unconstrained conversation or reports about other people, typically involving details that are not confirmed as being true.
- A widely held but fixed and oversimplified image or idea of a particular type of person or thing.
- social media site many people use.
- when someone wont leave you alone and says mean or hurtful things.
Down
- A statement of an intention to inflict pain, injury, damage, or other hostile action on someone.
- A secret word or phrase that must be used to gain admission to something.
- the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
- causing distress or injury: to say hurtful things.
- social media site that you "tweet" on.
- boldly assertive and forward; pushy.
10 Clues: social media site many people use. • boldly assertive and forward; pushy. • social media site that you "tweet" on. • causing distress or injury: to say hurtful things. • when someone wont leave you alone and says mean or hurtful things. • A secret word or phrase that must be used to gain admission to something. • ...
Cyber safety 2024-05-02
Across
- the person making unkind comments
- places like instagram and snapchat
- where you go to get information from (not google)
- how you interact with a situation
- how you interact safely online
Down
- unkind or aggressive comments made over the internet
- the person who is being bullied
- given from other people to make you feel safe
- a good and fair action
- telling someone what is happening
10 Clues: a good and fair action • how you interact safely online • the person who is being bullied • the person making unkind comments • how you interact with a situation • telling someone what is happening • places like instagram and snapchat • given from other people to make you feel safe • where you go to get information from (not google) • ...
Cyber bullying 2024-06-14
Across
- Do you feel s
- a form of social media that makes the same sound as a clock
- What is it called when you speak to someone
- What is it called when you message people on your phone
- A safe person to go to
Down
- A device that you call on
- Someone that you t
- A big device that you do lots of gaming on
- A form of social media that starts with s
- A word you can say when your stuck somewhere and it starts with the letter h
10 Clues: Do you feel s • Someone that you t • A safe person to go to • A device that you call on • A form of social media that starts with s • A big device that you do lots of gaming on • What is it called when you speak to someone • What is it called when you message people on your phone • a form of social media that makes the same sound as a clock • ...
Cyber bullying 2024-06-11
Across
- Do you feel s
- a form of social media that makes the same sound as a clock
- A form of social media that starts with s
- What is it called when you message people on your phone
Down
- A device that you call on
- Whats it called when you speak to someone
- A big device that you do lots of gaming on
- A safe person to go to
- A word you can say when your stuck somewhere and it starts with the letter h
- Someone that you t
10 Clues: Do you feel s • Someone that you t • A safe person to go to • A device that you call on • Whats it called when you speak to someone • A form of social media that starts with s • A big device that you do lots of gaming on • What is it called when you message people on your phone • a form of social media that makes the same sound as a clock • ...
CYBER CLUES 2023-04-27
Across
- a type of programming language that is designed to create dynamic web content
- A type of database that stores data in a hierarchical structure
- computer network designed for communication between devices in close proximity
- A technology used for creating and storing digital currency in a decentralized manner
- a type of memory that stores frequently accessed data for quick access by the CPU
Down
- A type of programming language used for creating mobile applications for Apple's iOS platform
- A data structure that stores a collection of key-value pairs in no particular order.
- A type of database that stores data in tables
- cyber attack that disguises as a legitimate email to trick users.
- A keyword used to indicate that a method or variable belongs to the class itself, not an instance of the class
10 Clues: A type of database that stores data in tables • A type of database that stores data in a hierarchical structure • cyber attack that disguises as a legitimate email to trick users. • a type of programming language that is designed to create dynamic web content • computer network designed for communication between devices in close proximity • ...
Cyber Safety 2023-05-18
Across
- Online fights using electronic messages with angry and vulgar language.
- Repeatedly sending nasty, mean and insulting messages.
- People that bully others online, mean comments, pictures, sharing information.
- Talking to someone into give personal information or embarrassing secrets.
- Intentionally and cruelly excluding someone from an online group.
Down
- People that steal your information.
- Pretending other peoples work and things are yours.
- Sharing someone's secrets embarrassing information or images online.
- Something that comes up to stop you doing something or trying to make you do something.
- Repeated, intense harassment and denigration that include threats or creates significant fear.
10 Clues: People that steal your information. • Pretending other peoples work and things are yours. • Repeatedly sending nasty, mean and insulting messages. • Intentionally and cruelly excluding someone from an online group. • Sharing someone's secrets embarrassing information or images online. • Online fights using electronic messages with angry and vulgar language. • ...
Cyber Safety 2023-05-22
Across
- Something that infects and spreads through your compute
- Repeated harassment and denigration that includes threats
- Trying to steal someone's private info
- Purposely and cruelly excluding someone
Down
- Posting rumours about a person
- Online fights using vulgar language
- Someone who is mean or aggressive
- Stealing someone's work and not crediting them
- Talking someone into revealing secrets
- Sharing someone's embarrassing information or images online
10 Clues: Posting rumours about a person • Someone who is mean or aggressive • Online fights using vulgar language • Trying to steal someone's private info • Talking someone into revealing secrets • Purposely and cruelly excluding someone • Stealing someone's work and not crediting them • Something that infects and spreads through your compute • ...
cyber safety 2023-05-22
Across
- An illness for computers.
- Getting someone to reveal their secrets and personal information and sharing it online.
- The stealing of someone's personal information.
- Intentionally and cruelly excluding someone from an online group.
- A type of online fighting using angry and inappropriate language.
- Using somebody else's work as your own.
Down
- Repeated, intense threats and harassment that create fear.
- The repeated sending of mean, nasty and insulting online messages.
- When someone shares another person's secrets or images online.
- Bullying someone online.
10 Clues: Bullying someone online. • An illness for computers. • Using somebody else's work as your own. • The stealing of someone's personal information. • Repeated, intense threats and harassment that create fear. • When someone shares another person's secrets or images online. • Intentionally and cruelly excluding someone from an online group. • ...
Cyber Safety 2023-05-22
Across
- When someone or a group of people is bullying you online.
- When someone steals your work or ideas and makes it their own.
- Sharing someone's secrets or embarrassing information or images online.
- Repeatedly sending nasty, mean messages.
- Talking someone into revealing secrets or information and posting it online.
- A type of software that spreads between computers and causes damage yo data and software.
Down
- Pretending to be someone else and sending or posting material to get someone in trouble.
- Intentionally and cruelly excluding someone from an online group.
- Online fights using mean language.
- When someone steals your identity and pretends to be you.
10 Clues: Online fights using mean language. • Repeatedly sending nasty, mean messages. • When someone or a group of people is bullying you online. • When someone steals your identity and pretends to be you. • When someone steals your work or ideas and makes it their own. • Intentionally and cruelly excluding someone from an online group. • ...
cyber safety 2023-05-22
Across
- repeated, intense harassment denigration
- online fights using electronic messages
- it is a form of selling someone's identify online
- sending nasty, mean and insulting messages
- there will look for almost anyone to harass
Down
- intestinally and cruelly excluding someone from on online group
- "dissing" someone online
- talking someone into revealing secrets or embarrassing information
- pretending to be someone else online
- sharing someone's secrets or embarrassing information
10 Clues: "dissing" someone online • pretending to be someone else online • online fights using electronic messages • repeated, intense harassment denigration • sending nasty, mean and insulting messages • there will look for almost anyone to harass • it is a form of selling someone's identify online • sharing someone's secrets or embarrassing information • ...
cyber bullying 2025-03-11
10 Clues: Hacking • hurtful person • to help someone • something you go on • hurting someone online • looking out for someone • knowing your on a device • mentally attacking someone • someone hurting someone else • something you use in everyday life
Cyber Safety 2024-10-10
Across
- This involves the exchange of information through electronic channels, such as emails, instant messaging, or social media.
- _____________ means taking part in an online community safely, ethically and respectfully.
- It’s an obligation or duty which you have towards yourself and to others.
- Avoid connecting to ______________ public wifi networks.
- To fully participate in society which uses electronic devices and the internet.
Down
- It is the process of learning and teaching about technology and how to use it effectively.
- It refers to the buying and selling of goods using electronic means, like online shopping.
- Protect your personal information with strong _____________.
- ___________________ means being secure online.
- The continuing and spreading results of an event or an action.
10 Clues: ___________________ means being secure online. • Avoid connecting to ______________ public wifi networks. • Protect your personal information with strong _____________. • The continuing and spreading results of an event or an action. • It’s an obligation or duty which you have towards yourself and to others. • ...
Cyber monday 2024-11-28
10 Clues: PHYSICAL MONEY • PART OF A WEBSITE • A SHORT-TERM SALE • A METHOD OF PAYMENT • THE NAME OF A COMPANY • A PLACE ONLINE TO SHOP • SOMETHING WITH NO COST • WHERE YOUR MONEY IS KEPT • A LINE OR LIST OF WAITING ITEMS • WHAT YOU NEED TO ACCESS A WEBSITE
cyber bullying 2025-06-19
Across
- something from you
- is someone who stands up for you and saying stop
- is something that happens online like people saying hurtfull comments
- is someome getting bullied over and over again
- is telling the teacher or adult what happend
- is something that you get exculded from a group
- is somthing they pick on you about
Down
- is something online if you need help you can talk to them
- a person just standing and watching pointing and laughing
- say hurtfull things
10 Clues: something from you • say hurtfull things • is somthing they pick on you about • is telling the teacher or adult what happend • is someome getting bullied over and over again • is something that you get exculded from a group • is someone who stands up for you and saying stop • is something online if you need help you can talk to them • ...
Cyber Ethics 2025-06-06
Across
- Legal term for ownership of creative work.
- Legal rights over creations of the mind.
- Copying someone's work and calling it your own.
- Unwanted bulk emails from unknown sources.
Down
- The trace a person leaves online.
- Behaving responsibly and ethically on the internet.
- Moral principles for using computers and the internet.
- Copying and using software illegally.
- Right to control information about yourself.
- Illegally accessing a computer system.
10 Clues: The trace a person leaves online. • Copying and using software illegally. • Illegally accessing a computer system. • Legal rights over creations of the mind. • Legal term for ownership of creative work. • Unwanted bulk emails from unknown sources. • Right to control information about yourself. • Copying someone's work and calling it your own. • ...
Cyber ethics 2025-05-29
Across
- Scrambling data to protect it from unauthorized access.
- – Respecting personal data and not accessing others’ information.
- A cybercrime where someone is tricked into giving personal information.
- Legal protection for original work.
- Bullying someone online.
Down
- Malicious software like viruses or worms.
- Online etiquette or good behavior on the internet.
- A secret word or phrase used for authentication.
- Unauthorized access to data or systems.
- Unwanted or junk email.
10 Clues: Unwanted or junk email. • Bullying someone online. • Legal protection for original work. • Unauthorized access to data or systems. • Malicious software like viruses or worms. • A secret word or phrase used for authentication. • Online etiquette or good behavior on the internet. • Scrambling data to protect it from unauthorized access. • ...
cyber addiction 2025-10-19
Across
- The act of being compelled to check devices or social media, often without conscious intent.
- The state of being distracted or overwhelmed by too much information or stimuli.
- The gradual decline in cognitive function due to excessive screen time.
- The amount of time or frequency someone spends on digital devices or apps.
- The brain's ability to reorganize itself by forming new neural connections.
Down
- The fundamental units of the brain and nervous system, responsible for transmitting information.
- A type of reinforcement where rewards are given at unpredictable intervals, making behavior more resistant to extinction.
- The process of taking over or dominating someone's attention, often used in the context of digital platforms.
- A neurotransmitter associated with pleasure and reward, often linked to addictive behaviors.
- The feeling of wanting something strongly, especially something that is hard to resist.
10 Clues: The gradual decline in cognitive function due to excessive screen time. • The amount of time or frequency someone spends on digital devices or apps. • The brain's ability to reorganize itself by forming new neural connections. • The state of being distracted or overwhelmed by too much information or stimuli. • ...
Cybersecurity 2025-01-09
Across
- malware that collect data
- an extra copy of data from a computer
- protects data by scrambling it
- an attack that wants ransom
- a value with a unique length to identify data
- being bullied using the internet
- malware that reproduces itself
Down
- "UI redress attack"
- short for malicious malware
- applications that direct computers
- cyber attack that is disguised
- filters network traffic
- using your own device
- someone who breaks into a computer's system
- network of computers for attack
- where users store data
- protects your location
- connected items that represent one
18 Clues: "UI redress attack" • using your own device • where users store data • protects your location • filters network traffic • malware that collect data • short for malicious malware • an attack that wants ransom • cyber attack that is disguised • protects data by scrambling it • malware that reproduces itself • network of computers for attack • being bullied using the internet • ...
2016 Responsible Care Certification Audit 2016-08-29
Across
- independent, unbiased inspector to assure a structure and system in place to measure, manage and verify performance in the Responsible Care Program.
- text, sometimes referred to SHE&S, Safety or Responsible Care, which outlines company's committment to SHE&S; found on corporate website
- The Responsible Care ____________ is the program by which Odyssey manages its business and operations with regard to Safety, Health, Environment & Security (SHE&S) issues.
- pre-designated gathering point for all personnel during evacuations
- established by senior management as guidance to ensure Odyssey maintains a leading SHE&S position throughout the company
- the chemical industry's voluntary SHE&S initiative
- Risk of coming into contact with chemicals during
- a danger or risk
- Employees should maintain an awareness of the policy, risks/hazards, and their work environment
- ___________ should maintain an awareness of the policy, risks/hazards, and their work environment
Down
- Responsible Care Awareness, HM & Security, HAZCOM, Forklift, First Aid/CPR
- Safety, Health, Environment & Security
- We all have responsibility for Safety, Health, Environment & Security (SHE&S) in our __________
- an industry trade association for American chemical companies
- Establishes goals and provides resources
- A key part of the Responsible Care Management System process is mandatory __________ by an independent, accredited auditor
- Provides ________ as evidence as management support
- prioritized based on frequency and severity
- SHE&S Special Thanks And Recognition Awards Program
19 Clues: a danger or risk • Safety, Health, Environment & Security • Establishes goals and provides resources • prioritized based on frequency and severity • Risk of coming into contact with chemicals during • the chemical industry's voluntary SHE&S initiative • Provides ________ as evidence as management support • SHE&S Special Thanks And Recognition Awards Program • ...
3B macchine e energia-3 2024-01-29
Across
- creatore martello a vapore
- anno dei maggiori cambiamenti 4 rivoluzione
- anno creazione motore 2 tempi
- principale innovazione 4 rivoluzione industriale
- inventore della fotografia
Down
- inventore telegrafo
- anno creazione martello a vapore
- energia 2 rivoluzione industriale
- denominazione della 3 rivoluzione industriale
9 Clues: inventore telegrafo • creatore martello a vapore • inventore della fotografia • anno creazione motore 2 tempi • anno creazione martello a vapore • energia 2 rivoluzione industriale • anno dei maggiori cambiamenti 4 rivoluzione • denominazione della 3 rivoluzione industriale • principale innovazione 4 rivoluzione industriale
Children vs. The Cyberspace 2024-10-15
9 Clues: Bullying,Threats • Type of addiction • Online threats are _____ • Online Behavior and _____ • Is always changing and growing • Spreading _____ promotes change • Most children access this on the daily • Overly active _____ laws can cause danger • Can shape a children's perspective about the internet
Security 2024-09-11
9 Clues: Test, test • test, text • text, Test • Head of a team • Used to secure doors • Used to complete IRS work • Uniformed security officers • Very important to IRS success • Should be worn at all times within IRS facility
Security 2025-10-22
fshapdsafybasd112fdjf 2023-03-03
Across
- A nonprofit org known for publishing a "top 10" of critical risks
- A 3-word term for applying multiple layers of security
- A flaw that weakens the overall security of a program or system
- ______ mantis
- Codename for a recent RT operation
Down
- Randomly terminates production apps to ensure they're resilient
- New feature that emulates sitting in an open office
- FY24 Security Goal: ______ security efforts according to risk and adopt risk-driven decision making
- Research project for enumerating our environment
- This involves sending invalid, unexpected, or random input to a program
- Team that emulates real-world attacks
11 Clues: ______ mantis • Codename for a recent RT operation • Team that emulates real-world attacks • Research project for enumerating our environment • New feature that emulates sitting in an open office • A 3-word term for applying multiple layers of security • Randomly terminates production apps to ensure they're resilient • ...
Mobile Security Crossword 2025-09-11
Across
- Network Network type often targeted in mobile security risks (2 words)
- Malicious software targeting mobile devices
- Authentication Security measure involving password plus an extra step (2 words)
- Patches Software updates to fix vulnerabilities (2 words)
- Encryption The process of converting data to prevent unauthorized access
Down
- Security Protection of the mobile device itself
- Method to confirm identity beyond password (abbreviation)
- Kind of phishing specific to SMS messages (1 word)
- Permissions Safety measure for apps to limit access (2 words)
- Store Where trusted mobile apps should be downloaded from (2 words)
- Detection Detecting unauthorized software or behavior on mobile
- Management system for securing mobile devices (3 letters)
12 Clues: Malicious software targeting mobile devices • Security Protection of the mobile device itself • Kind of phishing specific to SMS messages (1 word) • Method to confirm identity beyond password (abbreviation) • Patches Software updates to fix vulnerabilities (2 words) • Management system for securing mobile devices (3 letters) • ...
Ασφάλεια στο διαδύκτιο 2024-02-15
10 Clues: Κακόβουλο Λογισμικό • news Ψευδής Ειδήσεις • Διαδικτυακός Εκφοβισμός • Scams Ηλεκτρονικές Απάτες • Piracy Πειρατεία Λογισμικού • Reputation Διαδικτυακή Φήμη • Passwords Κωδικοί Πρόσβασης • gaming Παιχνίδια στο Διαδίκτυο • Addiction Εθισμόσ στο διαδιίκτυο • positive Εικόνεσ Σώματοσ , Κοινωνικά Δίκτυα
PERSONNEL SECURITY PROGRAM 2021-08-16
Across
- WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
- SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
- of ncis DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
- AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?
- WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
- WHO IS USUALLY DESIGNATED AS IAM?
Down
- TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
- TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
- scope background investigation WHAT DOES SSBI STAND FOR?
- AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
- officer WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
11 Clues: WHO IS USUALLY DESIGNATED AS IAM? • SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR? • WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY? • AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER? • WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY? • TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM. • ...
Auckland High Court 2026-01-08
Across
- Court Security Manager
- with this power i can ask for, name address and reason of being in court
- I only have a fork for lunch
- I have intel for a major gang trial at the high court next week
- i need urgent help
- Threat,exposure,necessity,response
- Ask, Why, Options, Confirm, Act
- I opened up a box of my favorite beers and have court
- clear the radio comms
Down
- When Searching you need the persons
- I used my powers today as a incident unfolded i now have to do a
- Senior Court Security Officer
- Court Security Officer
- my reason for carrying the knife is self defense
- any persons disrespectful to a Judge could be held in
- a highly intoxicated person is
16 Clues: i need urgent help • clear the radio comms • Court Security Manager • Court Security Officer • I only have a fork for lunch • Senior Court Security Officer • a highly intoxicated person is • Ask, Why, Options, Confirm, Act • Threat,exposure,necessity,response • When Searching you need the persons • my reason for carrying the knife is self defense • ...
TEKA-TEKI silang 2025-06-03
Across
- pencurian hak cipta (11 h)
- serang Cyber yang bertujuan untuk mencari data pribadi (14h)
- kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
- penyebaran informasi palsu yang meluas (4 huruf)
- informasi yang mengidentifikasi seseorang secara unik (12h)
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
- peraturan yang melindungi data pribadi (16h)
- pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
- menjaga keamanan data pribadi di internet (13h)
- jenis pinjaman yang dilakuakan melalui platfrom online (14h)
- perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- pelindungan hukum terhadap pencemaran nama baik (15 huruf)
- internet tindakan kriminal yang dilakukan melalui internet (14h)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
- infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
- perbuatan melanggar hukum didunia maya (10 huruf)
- informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
Down
- praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
- yang melibatkan pengungkapan konfirmasi pribadi (18h)
- aturan dan norma berperilaku baik di media sosial (11 h)
- sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
- perilaku tidak sopan/kasar didunia maya (10 h)
- jejak digital yang tercipta tanpa disadari penggunaan (10 h)
- penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
- perbuatan menyebar informasi yang merugikan orang lain (18h)
- ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
- jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
- tindakan menyebar informasi yang salah secara sengaja (14h)
30 Clues: pencurian hak cipta (11 h) • peraturan yang melindungi data pribadi (16h) • perilaku tidak sopan/kasar didunia maya (10 h) • menjaga keamanan data pribadi di internet (13h) • penyebaran informasi palsu yang meluas (4 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • yang melibatkan pengungkapan konfirmasi pribadi (18h) • ...
Cyberbullying 2019-12-03
11 Clues: MEAN TO DO • HAS A KEYBORD • adults HAVE THIS APP • you CAN SNAP PITHURES • THIS IS WHAT GETS BULLIED • its A MOTHER BOARD OF APPS • GETS BULLIED ON THE INTERNET • little KIDS HAS THIS ELETRONIC • A ELECTRONIC THAT TENNAGERS HAVE • TO PUT SOMETHING ON THE INTERNET • presedent DONALD TRUMP HAS A ACCOUNT ON THIS APP
Cyber Safety 2022-10-27
Across
- Never give out personal ______ online
- It is important to not ____ fake news.
- A person who instigates conflict online.
- Bullying online is called?
Down
- ___ you visit are a part of your digital footprint.
- If you see cyberbullying you should ____ it right away.
- Trolling can be considered _____.
- Check the ___ in order to determine if the website is reliable
- Never tell anyone your ___, not even your friend's
- It is encouraged to only speak the ____ online.
10 Clues: Bullying online is called? • Trolling can be considered _____. • Never give out personal ______ online • It is important to not ____ fake news. • A person who instigates conflict online. • It is encouraged to only speak the ____ online. • Never tell anyone your ___, not even your friend's • ___ you visit are a part of your digital footprint. • ...
CYBER LAW 2021-09-05
Across
- stranger has broken into your computer systems without your knowledge and has tampered with confidential data.
- a form of malware that prevents you from accessing files on your computer.
- defensive technology designed to keep the hackers out.
- hacking attack that tricks victims into clicking on an unintended link.
Down
- data that is used to describe large amounts of other Internet data.
- lure individuals into revealing login information.
- hackers that break into the network to steal information that will be used to harm the owner.
- false ATM cards used by criminals for their monetary benefits.
- a malicious application that can be used to take advantage of a computer’s vulnerability.
- program that masks something harmful,that carries it into a device.
10 Clues: lure individuals into revealing login information. • defensive technology designed to keep the hackers out. • false ATM cards used by criminals for their monetary benefits. • data that is used to describe large amounts of other Internet data. • program that masks something harmful,that carries it into a device. • ...
CYBER LAW 2021-09-03
Across
- registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- Web page to summon different elements from diverse pages or servers to create a new Web page
- The communication via any electronic device of false data that damages a person's reputation
- Make sure a buyer and seller can identify themselves
- Business conducted electronically (buying/selling on web)
Down
- process of converting information into a digital
- Using a computer to steal personal data
- when someone forcefully takes control of a website by cracking the password and later changing it
- the process of using Internet-based socializing and communication techniques to create, operate and manage activism of any type
- the making, altering, use, or possession of a false writing in order to commit a fraud
10 Clues: Using a computer to steal personal data • process of converting information into a digital • Make sure a buyer and seller can identify themselves • Business conducted electronically (buying/selling on web) • the making, altering, use, or possession of a false writing in order to commit a fraud • ...
cyber safety 2023-05-22
Across
- like a sickness for a computer
- Repeatedly sending nasty, mean, and insulting messages.
- keep your things safe with a ________
- Repeated, intense harassment and denigration that includes threats or creates significant fear.
- Online fights using electronic messages with angry and vulgar language
Down
- bullying online
- Talking someone into revealing secrets or embarrassing information, then sharing it online.
- Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
- Intentionally and cruelly excluding someone from an online group.
- Sharing someone's secrets or embarrassing information or images online.
10 Clues: bullying online • like a sickness for a computer • keep your things safe with a ________ • Repeatedly sending nasty, mean, and insulting messages. • Intentionally and cruelly excluding someone from an online group. • Online fights using electronic messages with angry and vulgar language • Sharing someone's secrets or embarrassing information or images online. • ...
Cyber Safety 2023-05-22
Across
- Someone stealing an authors original work.
- Stealing others Identity's.
- Sending threats or going through their online accounts.
- Using technology to harm others.
Down
- A virus on a computer.
- On line fights using technology.
- The practice of following actionable guidlines on the internet.
- Geting private information about someone and sharing it with other people online.
- Intentionally keeping someone out of somthing.
- Sharing another persons secrets online.
10 Clues: A virus on a computer. • Stealing others Identity's. • On line fights using technology. • Using technology to harm others. • Sharing another persons secrets online. • Someone stealing an authors original work. • Intentionally keeping someone out of somthing. • Sending threats or going through their online accounts. • ...
cyber safety 2023-05-22
Across
- repeated, intense harassment denigration
- online fights using electronic messages
- it is a form of selling someone's identify online
- sending nasty, mean and insulting messages
- there will look for almost anyone to harass
Down
- intestinally and cruelly excluding someone from on online group
- "dissing" someone online
- talking someone into revealing secrets or embarrassing information
- pretending to be someone else online
- sharing someone's secrets or embarrassing information
10 Clues: "dissing" someone online • pretending to be someone else online • online fights using electronic messages • repeated, intense harassment denigration • sending nasty, mean and insulting messages • there will look for almost anyone to harass • it is a form of selling someone's identify online • sharing someone's secrets or embarrassing information • ...
Cyber Safety 2022-03-01
Across
- I can keep myself __________ online by not giving out my personal information.
- I should not use personal information such as __________ and birthdates as your password.
- I should __________ an adult if someone or something makes me feel uncomfortable.
- Do not write down or __________ your password with anyone.
- I should check if the information I find online is __________ before I believe it.
Down
- I should not meet up with __________ I have talked online to.
- You should include at least one __________ letter when you create a password.
- I should include numbers, letters and ___________ when creating a password.
- My password should include __________ characters or more.
- I should not __________ suspicious files or pictures online.
10 Clues: My password should include __________ characters or more. • Do not write down or __________ your password with anyone. • I should not __________ suspicious files or pictures online. • I should not meet up with __________ I have talked online to. • I should include numbers, letters and ___________ when creating a password. • ...
Cyber Foundations 2022-04-26
Across
- a short account of an incident
- anything that obstructs accurate communicate of a message
- key assertions made by a speaker to develop his or her central idea
Down
- the quality of which a speaker appears
- words that refer to ideas or concepts
- final statement of your speech
- adjusting one's materials and delivery to meet the needs of the listeners
- verbal and nonverbal responses provided by an audience to a speaker
- words that name persons and things that we can know by our five senses
- reasoning from specific to general
10 Clues: final statement of your speech • a short account of an incident • reasoning from specific to general • words that refer to ideas or concepts • the quality of which a speaker appears • anything that obstructs accurate communicate of a message • verbal and nonverbal responses provided by an audience to a speaker • ...
