cyber security Crossword Puzzles
Security Questions 2020-04-14
11 Clues: Crappy car • Summer treat • It's not FDIC • Macintosh or Fuji • window All clear sign • Where first aid kit is • 2nd evacuation location • 1st evacuation location • drawer Where robbery kit is • Top drawer limit (thousands) • Bottom drawer limit (thousands)
Security Training 2020-06-26
Across
- we have a plan! In the event we need to activiate our ______ plan, JQ and KR will tell you where to go and what to do.
- If you are held up outside, explain that you do not have _____ to cash
- who is CPR certified in our department?
- You should keep your cellphone volume on during an active shooter situation?
- The 4th floors color dot to report to for fire evactuation is _______
- In the event of an emergency situation with an employee or member requiring medical attention, you should _____ with the member and ask another employee to call an ambulance. Alert your manager.
Down
- what order of action should you take during an active shooter situation?
- if you recieve a bomb threat who do you transfer the call to ________
- If a robbery has been announced, you should ____ _____ and continue daily operation
- You can find instructions on ______ training under Departments>_______ Program
- Our second meeting location is ________
11 Clues: who is CPR certified in our department? • Our second meeting location is ________ • if you recieve a bomb threat who do you transfer the call to ________ • The 4th floors color dot to report to for fire evactuation is _______ • If you are held up outside, explain that you do not have _____ to cash • ...
Security Awareness 2017-05-10
Across
- ____ Hotline
- Requirements for safeguarding and handling classified information
- ______ Threat
- Refers to information gathered to protect against espionage
- Be Alert! Be _____
- You are required to ______ suspicious behavior
Down
- Highest level of classification (two words)
- Report change of name and __________
- ________ Classification Training
- Discuss classified information in an _________, classified area
- Last name of your FSO
11 Clues: ____ Hotline • ______ Threat • Be Alert! Be _____ • Last name of your FSO • ________ Classification Training • Report change of name and __________ • Highest level of classification (two words) • You are required to ______ suspicious behavior • Refers to information gathered to protect against espionage • Discuss classified information in an _________, classified area • ...
Information Security 2019-05-13
Across
- Technique for overwhelming a computer with requests
- A malicious software used by criminals to encrypt a victim's files
- A computer virus capable of spreading itself
- Using something you have and something you know to login
- Malicious messages used to trick people
- A form of ditigal currency that is often used for anonymous transactions
- The study of secret or encrypted messages
- Software that records keystrokes on a computer
Down
- Software used by criminals to extort money from a victim
- Manipulating people to do things
- Common term for malicious software
11 Clues: Manipulating people to do things • Common term for malicious software • Malicious messages used to trick people • The study of secret or encrypted messages • A computer virus capable of spreading itself • Software that records keystrokes on a computer • Technique for overwhelming a computer with requests • Software used by criminals to extort money from a victim • ...
1. Security 2023-06-22
Across
- Protecting networks, computers, and information from digital attacks, like viruses or hacking.
- Protecting your money and personal information from theft or fraud when using banks or making purchases.
- Actions you take to stay safe, like not sharing personal information with strangers or walking home with a buddy.
- Ensuring the foods we eat are clean, safe, and free from harmful things like bacteria or chemicals.
- Event Precautions taken to keep people safe at large gatherings like concerts or festivals, including crowd control and first aid.
Down
- Measures to protect cars, bikes, or other vehicles from theft or damage, like alarms, locks, or tracking devices.
- Measures employers take to keep employees safe while they work, including training, rules, and safety equipment.
- Protecting your computer and online accounts from people who want to steal your information or cause harm.
- Measures to keep students and teachers safe at school, like monitoring visitors and having rules for behavior.
- Systems at airports that check people and their belongings to prevent dangerous items or actions on airplanes.
- Measures to protect your living space from intruders, like locks on doors and windows, or alarms.
11 Clues: Protecting networks, computers, and information from digital attacks, like viruses or hacking. • Measures to protect your living space from intruders, like locks on doors and windows, or alarms. • Ensuring the foods we eat are clean, safe, and free from harmful things like bacteria or chemicals. • ...
Food Security 2024-12-18
Across
- The primary source of protein for many people, often derived from livestock.
- The global issue of insufficient food supply for a population.
- A method of farming that uses minimal tillage to preserve soil health.
- The term for the variety of crops and livestock in a given area.
- A method of farming that focuses on sustainability and environmental health.
- The practice of cultivating soil, growing crops, and raising animals for food.
- The term for the amount of food produced per unit of land.
Down
- The seasonal movement of farmers and their livestock to find fresh pastures.
- A nutrient-rich food that is often fortified to combat malnutrition.
- The phenomenon of climate change affecting agricultural productivity.
- A staple food grain that is a primary source of calories for many people.
11 Clues: The term for the amount of food produced per unit of land. • The global issue of insufficient food supply for a population. • The term for the variety of crops and livestock in a given area. • A nutrient-rich food that is often fortified to combat malnutrition. • The phenomenon of climate change affecting agricultural productivity. • ...
Network Security 2025-01-27
Across
- It is used to describe a hidden method of bypassing security to gain access to a restricted part of a computer system.
- It is slang commonly used to describe junk e-mail on the Internet.
- It is a process that ensures and confirms a user’s identity
- It is a malware computer program that replicates itself in order to spread to other computers.
- It is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
- It is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet
Down
- These are small files which are stored on a user’s computer. It provide a way for the website to recognize you and keep track of your preferences
- These refers to any video in which faces have been either swapped or digitally altered, with the help of AI
- It is a collection of internet-connected devices, which may include PCs, servers and mobile devices that are infected and controlled by a common type of malware
- It refers to a flaw in a system that can leave it open to attack.
- It refers to any piece of software or application that displays advertisements on your computer.
11 Clues: It is a process that ensures and confirms a user’s identity • It refers to a flaw in a system that can leave it open to attack. • It is slang commonly used to describe junk e-mail on the Internet. • It is a malware computer program that replicates itself in order to spread to other computers. • ...
Food Security 2024-11-28
Across
- The practice of growing crops and raising animals for food
- A type of food that helps build muscles
- A large area where food is grown
- A person who works in agriculture
- A type of food that provides energy
- A system that provides food to people in different regions
Down
- A food that is produced using sustainable farming methods
- The number of servings of fruits and vegetables recommended per day
- The process of keeping food fresh for longer periods
- The essential nutrient in fruits and vegetables
- The state of having enough food for all people
11 Clues: A large area where food is grown • A person who works in agriculture • A type of food that provides energy • A type of food that helps build muscles • The state of having enough food for all people • The essential nutrient in fruits and vegetables • The process of keeping food fresh for longer periods • A food that is produced using sustainable farming methods • ...
Food security 2024-11-28
Across
- What is the practice of growing crops and raising animals called?
- What term refers to the variety of living organisms in a specific habitat or ecosystem?
- What do we call facilities or methods used to preserve crops after harvest?
- What is the process of supplying water to crops through channels or pipes?
- What do we call facilities or methods used to preserve crops after harvest?
Down
- What term describes a lack of proper nutrients in a person’s diet?
- What is the term for substances like nitrogen or phosphate used to enhance soil fertility?
- What is the term for chemicals used to control pests and diseases in crops?
- What is the resource most essential for irrigation and crop growth?
- What is the term for growing only enough food for a farmer's family?
- What are organisms that harm crops and reduce yields called?
11 Clues: What are organisms that harm crops and reduce yields called? • What is the practice of growing crops and raising animals called? • What term describes a lack of proper nutrients in a person’s diet? • What is the resource most essential for irrigation and crop growth? • What is the term for growing only enough food for a farmer's family? • ...
Food security 2024-11-28
11 Clues: NAME TAG • END OF LIFE • OPPOSITE OF TIDY • OPPOSITE OF CLEAN • CAN BE FOUND IN CURD • SOURCE OF MULTIVITAMIN • MEDICINE TO REMOVE PESTS • GOOD FOR DIGESTIVE SYSTEM • MANDATORY ACTIVITY BEFORE EATING • PROCESS OF REMOVING INFECTIOUS THINGS • SIGNIFICATANT MEASURES TO PREVENT FROM HARM
Security Crossword 2022-11-29
Across
- Are passwords with no ‘L’ safe…
- Body measurements and calculations related to human characteristics
- a social engineering attack focussed on texts
- This word is added to the subject line of an email to send a secure message.
- A method of scrambling information, such as passwords, so they are not human-readable
- Who bypasses all security measures in your house once a year
- Using something in addition to your username and password
- Modify a device to remove some sort of restrictions
Down
- Web browsers use this to track your identity across websites.. Also Left out for Santa on Christmas eve
- The first part of the CIA…
- Malware that encrypts data, and payment must be made to decrypt
11 Clues: The first part of the CIA… • Are passwords with no ‘L’ safe… • a social engineering attack focussed on texts • Modify a device to remove some sort of restrictions • Using something in addition to your username and password • Who bypasses all security measures in your house once a year • Malware that encrypts data, and payment must be made to decrypt • ...
Social Security Principles 2013-12-10
Across
- A type of redistribution from rich to poor.
- Feeling safe and secure is known as social "what"?
- The principle of pooling collective resources.
- A type of redistribution from childless families to families with children.
- What is social security usually said to be relieving.
- This refers to provision against injury or illness.
- Social security is also used to alter how people act thus changing their "what"?
- Another term for social "bonds" which universal social security provision could foster.
Down
- Transferring money from one group to another.
- Spreading income over your own lifetime.
- Stopping someone from becoming poor is another key aspect of social security, what is it called?
11 Clues: Spreading income over your own lifetime. • A type of redistribution from rich to poor. • Transferring money from one group to another. • The principle of pooling collective resources. • Feeling safe and secure is known as social "what"? • This refers to provision against injury or illness. • What is social security usually said to be relieving. • ...
Safety online 2023-04-14
8 Clues: ..... bullying • always be .... online • becareful on social... • always stay ... online • ....anybad or abusive person • don't share your.... information • remember to have your.... settings on • if you are being bullied, tell a ... adult
CS UNIT-1 PUZZLE 2025-09-25
Across
- A security barrier that controls network traffic.
- The act of guaranteeing information is protected.
- Information safe from accidental or intentional disclosure.
- Exploit a vulnerability intentionally or accidentally.
- The process of converting data into a secret code.
- An electronic document used to prove identity online.
- The process of verifying who you are.
- A type of encryption using only one shared key.
Down
- Gaps in a security program.
- Ensuring data has not been altered or tampered with.
- Information is available to authorized users when needed.
- An object representing a user's security context in Windows.
- Act that uses vulnerability to do damage to systems.
- The process of a computer running a program's instructions.
- The art and science of secret communication.
15 Clues: Gaps in a security program. • The process of verifying who you are. • The art and science of secret communication. • A type of encryption using only one shared key. • A security barrier that controls network traffic. • The act of guaranteeing information is protected. • The process of converting data into a secret code. • ...
Once Upon a Time B 2021-09-30
Across
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- Nervously, the resident noticed the ? of a figure below the street light.
- The ? gardener was willing to travel to different places where there was work.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
- cherished red wagon with the supplies for phys. Ed.
Down
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- For their safety, they ? to the Neighbourhood Watch program.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
- Residents ? their fears of criminals by installing sophisticated security devices.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- When slicing bread or tomato, it is easier using a knife with ?.
- The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- After many false alarms, the family wondered about the ? of the security system.
29 Clues: cherished red wagon with the supplies for phys. Ed. • For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • ...
digital citizenship lucas buskirk 2017-09-07
Across
- safety on the internet
- copyright taking images from the internet
- Passwords to keep people out
Down
- Plagiarism taking stuff from the internet illegally
- search and research online research
- Danger people you don't know
- domain public information to the internet
- bullying hurting others on the internet
- media Instagram snap chat
- use using the internet fairly
10 Clues: safety on the internet • media Instagram snap chat • Danger people you don't know • Passwords to keep people out • use using the internet fairly • search and research online research • bullying hurting others on the internet • domain public information to the internet • copyright taking images from the internet • Plagiarism taking stuff from the internet illegally
Cybersecurity Hex Crossword 2023-11-03
10 Clues: 46 55 4E • 4D 41 54 48 • 54 45 53 54 • 4C 49 46 45 • 43 4C 41 53 53 • 43 59 42 45 52 • 50 48 4F 4E 45 • 53 43 48 4F 4F 4C • 4C 41 50 54 4F 50 0A • 43 52 4F 53 53 57 4F 52 44
Bullying dan emosional 2024-01-16
Across
- bullying dengan cacian dan umpatan kebencian merupakan bullying berupa...
- bullying adalah suatu tindakan...
- bagaimana cara mengendalikan emosi...
- pembullyan melalui teknologi, merupakan ..... Bullying
- pihak yang terlibat dalam bullying...
Down
- apa itu emosional...
- cara mengendalikan emosi pada diri sendiri...
- apa penyebab terjadinya emosional...
- tindakan kekerasan dengan memukul merupakan salah satu bentuk bullying....
- apa dampak emosional..
10 Clues: apa itu emosional... • apa dampak emosional.. • bullying adalah suatu tindakan... • apa penyebab terjadinya emosional... • bagaimana cara mengendalikan emosi... • pihak yang terlibat dalam bullying... • cara mengendalikan emosi pada diri sendiri... • pembullyan melalui teknologi, merupakan ..... Bullying • ...
Muchlis budi utomo 2025-07-24
Across
- Contoh konten digital
- Nama lain komputasi awan
- Siapa yg mencetuskan istilah big data
- Rapid elasticity disebut juga dengan
- Cyber physical system sering disebut juga dengan
Down
- kepanjangan dari AI
- Pengetahuan dan kemampuan untuk menggunakan teknologi digital
- Teknik komputasional untuk mengelola dan menganalisis informasi biologis
- kepanjangan loT
- salah satu contoh kegiatan literasi digital
10 Clues: kepanjangan loT • kepanjangan dari AI • Contoh konten digital • Nama lain komputasi awan • Rapid elasticity disebut juga dengan • Siapa yg mencetuskan istilah big data • salah satu contoh kegiatan literasi digital • Cyber physical system sering disebut juga dengan • Pengetahuan dan kemampuan untuk menggunakan teknologi digital • ...
Once Upon a Time D 2021-09-30
Across
- Residents ? their fears of criminals by installing sophisticated security devices.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- The ? gardener was willing to travel to different places where there was work.
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
- The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- After many false alarms, the family wondered about the ? of the security system.
Down
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
- When slicing bread or tomato, it is easier using a knife with ?.
- Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- cherished red wagon with the supplies for phys. Ed.
- Nervously, the resident noticed the ? of a figure below the street light.
- For their safety, they ? to the Neighbourhood Watch program.
29 Clues: cherished red wagon with the supplies for phys. Ed. • For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • ...
Once Upon a Time D 2021-10-01
Across
- Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- The ? gardener was willing to travel to different places where there was work.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
- The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
Down
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- When slicing bread or tomato, it is easier using a knife with ?.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. cornwell’s cherished red wagon with the supplies for phys. Ed.
- For their safety, they ? to the Neighbourhood Watch program.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- Nervously, the resident noticed the ? of a figure below the street light.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- After many false alarms, the family wondered about the ? of the security system.
- Residents ? their fears of criminals by installing sophisticated security devices.
28 Clues: For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • The ? gardener was willing to travel to different places where there was work. • ...
CAB 2021-03-04
Across
- saying mean thing online
- yo have been attacked
- spreading rumors
- abcds of bullying -c
- telling some one you are going to do somthing to them
- abcds of bullying -b
- abcds of bulling- a
Down
- getting people to say false information
- acting like a famous person even if you are not
- an isolated event
- punching hitting kicking
- abcds of bullying- d
- no one is having fun
- saying you are a certain age or a boy but you are a girl
14 Clues: spreading rumors • an isolated event • abcds of bulling- a • abcds of bullying- d • no one is having fun • abcds of bullying -c • abcds of bullying -b • yo have been attacked • punching hitting kicking • saying mean thing online • getting people to say false information • acting like a famous person even if you are not • telling some one you are going to do somthing to them • ...
Fall 2024-09-21
Across
- Black Friday and Cyber Monday are ...... days???
- Be cautious with sharp edges and candles around them
- Popular name for autumn celebrations
- Bill signed June of 1984
- The most and best sign in the world
- Children dread going back
- Length in months
- 2 week celebration in Germany
Down
- Fattest day of the year
- A staple poultry in November
- Most know for during this time
- Day before Saints day
- Important to do this before winter.
- Disney's movie of celebration
14 Clues: Length in months • Day before Saints day • Fattest day of the year • Bill signed June of 1984 • Children dread going back • A staple poultry in November • Disney's movie of celebration • 2 week celebration in Germany • Most know for during this time • The most and best sign in the world • Important to do this before winter. • Popular name for autumn celebrations • ...
Intro to the Mortgage Industry 2014-08-04
Across
- The transfer of an interest in real property, given as security for the payment of a loan
- The repayment of a debt from the proceeds of a new loan using the same property as security
- The borrower in a mortgage transaction
- A legal process of taking possession of a mortgaged property as a result of the borrower’s failure make payments
- The legal document conveying title to a real property
- Payment of a debt in regular, periodic installments of combined principal and interest
- A legal claim or attachment against property as security for payment of an obligation
- The portion of a property's value over and above the liens against it
Down
- Principal, interest, taxes & insurance
- Money paid to make up the difference between the purchase price and the mortgage amount
- A mortgage that has rights that are subordinate to the rights of the first mortgage
- Cost of credit on a yearly basis, expressed as a percentage
- A mortgage in which the interest rate is adjusted periodically according to a pre-selected index
- A form of revolving credit secured by a borrower’s home
- Property pledged as security for a debt
- The lender on a mortgage transaction
- Document signed by a borrower that is an acknowledgment of a debt and an agreement to repay that debt
17 Clues: The lender on a mortgage transaction • Principal, interest, taxes & insurance • The borrower in a mortgage transaction • Property pledged as security for a debt • The legal document conveying title to a real property • A form of revolving credit secured by a borrower’s home • Cost of credit on a yearly basis, expressed as a percentage • ...
Life Skill 2023-07-20
8 Clues: very useful • use time wisely • bad for your health • the way it is organised • involving computer networks • path in which a person going • manners respecting each other • exchanging information between two people
STOP BULLYING! 2021-10-06
Across
- Relating to computers, info technology and social media
- Include or become a part of
- The opposite of go
- Being peaceful and patient
- A person who stands by you
Down
- The opposite of being negative
- A person who hurts others
- Telling someone about something you saw or witnessed
- Being assertive if you're being bullied
- The opposite of mean
- The opposite of yes
11 Clues: The opposite of go • The opposite of yes • The opposite of mean • A person who hurts others • Being peaceful and patient • A person who stands by you • Include or become a part of • The opposite of being negative • Being assertive if you're being bullied • Telling someone about something you saw or witnessed • Relating to computers, info technology and social media
Actividad Jornada Mujer 2025-03-19
Across
- Related to internet
- The feeling of being alone
- Something that connects one thing to another
- A type of discrimination that occurs online
- Related to society
- A violent act towards an individual
Down
- The ability of taking your own decisions
- The obstacles in order to achieve something
- Related to establish relationships
- Prejudicial treatment of different categories of people
- Human beings
11 Clues: Human beings • Related to society • Related to internet • The feeling of being alone • Related to establish relationships • A violent act towards an individual • The ability of taking your own decisions • The obstacles in order to achieve something • A type of discrimination that occurs online • Something that connects one thing to another • ...
Eli-cyber safety 2016-06-07
Across
- the internet in living space at home. And also my parent have my passwords so they can look at my tablet when they want.
- media stuff
- its hard to control what i see and others see.
- programs that display adverts on the screen.Often installed without people realising.
- to get help from if your online and people do mean stuff to yo
- app online were you take funny pictures of your self and send it to a group of people and they look at it and look write back what they thought about it sometimes they write mean stuff.
- users share their music playlists on Facebook,Twitter and Google+friends.
Down
- privacy that you need to keep safe.
- cameras that are often attached to a computer so that a video image can be sent to another while communication.
- to keep them private (except from your parents)
- you use the internet to bully somebody
- bulling
- Stops people from hacking into your iPod,phone,iPad,and other stuff like thatched.Online
- like a password you need to keep it safe from hackers .a.
- when your with friends in a group of people on phones texting to people and putting pictures of you or something.
15 Clues: bulling • media stuff • privacy that you need to keep safe. • you use the internet to bully somebody • its hard to control what i see and others see. • to keep them private (except from your parents) • like a password you need to keep it safe from hackers .a. • to get help from if your online and people do mean stuff to yo • ...
Cyber Awareness Crossword 2023-11-27
Across
- A harmful program that can replicate itself and spread to other computers. (5 letters)
- An electronic message sent indiscriminately to large numbers of recipients. (4 letters)
- To copy files to a second medium (like a hard drive) as a precaution against loss or damage. (6 letters)
- The type of software used to protect your computer from viruses. (8 letters)
- A type of software that collects information about a computer user without their knowledge. (7 letters)
- The act of tricking someone into giving confidential information. (8 letters)
- A scam that tricks individuals into revealing sensitive personal information, often through deceptive emails. (8 letters)
- The act of monitoring someone's activities without their knowledge. (7 letters)
- An attempt to make someone reveal their password or other sensitive information under false pretenses. (8 letters)
Down
- A technique used to deceive users into thinking they are interacting with a trusted entity, commonly used in phishing attacks. (7 letters)
- The act of monitoring someone's activities without their knowledge. (7 letters)
- The process of converting information or data into a code to prevent unauthorized access. (11 letters)
- The act of making an unauthorized copy of data. (7 letters)
- The protective measure to keep your accounts safe; often a mix of letters, numbers, and symbols. (8 letters)
- An unauthorized attempt to gain access to someone's data or computer. (6 letters)
- The practice of using a computer to gain unauthorized access to data. (7 letters)
16 Clues: The act of making an unauthorized copy of data. (7 letters) • The type of software used to protect your computer from viruses. (8 letters) • The act of tricking someone into giving confidential information. (8 letters) • The act of monitoring someone's activities without their knowledge. (7 letters) • ...
Crossword Cyber Games 2024-07-29
Across
- Secure connection over the internet
- Program that provides unwanted ads
- Secure data transmission method
- Olympic gold medalist swimmer Michael
- Network of compromised computers
- Strong password storage method
- Unauthorized surveillance
- Unauthorized access
Down
- Athletic contest with track and field events
- Olympic sport with a vault event
- Malicious software
- Malware that demands ransom
- Fraudulent attempt to obtain sensitive info
- Olympic event with swords
- Protection of personal data
15 Clues: Malicious software • Unauthorized access • Olympic event with swords • Unauthorized surveillance • Malware that demands ransom • Protection of personal data • Strong password storage method • Secure data transmission method • Olympic sport with a vault event • Network of compromised computers • Program that provides unwanted ads • Secure connection over the internet • ...
U11 Cyber Threats 2025-09-30
Across
- Malicious code that attaches to files and spreads when opened.
- Malware disguised as legitimate software.
- Deliberate destruction or disruption of systems.
- Tool that records every keystroke made by a user.
- Fake alerts designed to trick users into downloading malware.
- Software that hides the existence of malware.
- Intercepting data packets on a network.
- Publishing private information about someone online.
Down
- Fraudulent attempt to obtain sensitive information via email.
- Software that secretly monitors user activity.
- Network of infected devices controlled remotely.
- Malware that encrypts data and demands payment.
- Self-replicating malware that spreads across networks.
- Hidden method of bypassing normal authentication.
- Impersonating another device or user to gain access.
15 Clues: Intercepting data packets on a network. • Malware disguised as legitimate software. • Software that hides the existence of malware. • Software that secretly monitors user activity. • Malware that encrypts data and demands payment. • Network of infected devices controlled remotely. • Deliberate destruction or disruption of systems. • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
Cybersecurity Week! 2023-10-11
Across
- Software used to prevent, scan, detect and delete viruses from a computer.
- A type of cyber attack that exploits a vulnerability in software that no one is aware of yet.
- A piece of audio or video that has been altered and changed to make it seem authentic or credible.
- A type of malware designed to give hackers access to and control over a target device.
- A cyber-attack that targets individuals through SMS or text messages.
- Tools that can record every keystroke that you type into a computer or mobile keyboard.
Down
- A type of malware that disguises itself as legitimate code or software.
- Any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
- A technique through which a cybercriminal disguises themselves as a known or trusted source.
- A network of compromised computers used to carry out cyberattacks on other systems.
11 Clues: A cyber-attack that targets individuals through SMS or text messages. • A type of malware that disguises itself as legitimate code or software. • Software used to prevent, scan, detect and delete viruses from a computer. • A network of compromised computers used to carry out cyberattacks on other systems. • ...
Netiquet 2013-03-06
Across
- When you tag something relevent.
- Someone who you accept or like.
- A shortend word or phrase.
- To block or stop someone from seeing you.
- Space on the network.
- An internet mail message.
Down
- A short message that one sends to other or others.
- The most popular social networking.
- A special way of networking.
- Meeting others.
- An electronic book.
- A search engine.
- A place were you store messages or emails.
13 Clues: Meeting others. • A search engine. • An electronic book. • Space on the network. • An internet mail message. • A shortend word or phrase. • A special way of networking. • Someone who you accept or like. • When you tag something relevent. • The most popular social networking. • To block or stop someone from seeing you. • A place were you store messages or emails. • ...
Higher difficulty 2018-04-07
Across
- someone highly motivated
- to bring together
- something happening on the internet
- writing a letter without giving your name
- an animal that might become extinct soon
- a very profitable business
- something much faster than normal, could be very tiring
Down
- animals that live in the wild
- could be in danger
- makes something worse
- a person who illegally hunts or captures animals
- something very bad
- a huge piece of floating ice
13 Clues: to bring together • could be in danger • something very bad • makes something worse • someone highly motivated • a very profitable business • a huge piece of floating ice • animals that live in the wild • something happening on the internet • an animal that might become extinct soon • writing a letter without giving your name • a person who illegally hunts or captures animals • ...
Information Security Crossword 2017-02-17
Across
- When you receive an email with a link to a bogus website it is called _________
- This should only be installed on Society systems by approved administrators ______
- It should be changed immediately if suspected of being compromised
- Completion of Information Security and DPA annual training is ____________
- When you received unsolicited email from unknown sources this is called ______
- Media Society customers should not be contacted via _______
- A tidy desk is also known as a _________ desk
- Skipton may ______________ your internet usage
Down
- Information Security policies are published on it ___________
- These should never be shared __________
- A type of use that should be limited when using Society systems ________
- Personal information is protected by this act _______
- Something that can infect a PC/Laptop is known as a ________
- You should not allow others to do this when accessing Society premises ______
- Minimize the amount of documents taken offsite ___________
- This should be worn at all times when on Society premises __________
- Always ensure your _________ is locked when you are away from your computer.
17 Clues: These should never be shared __________ • A tidy desk is also known as a _________ desk • Skipton may ______________ your internet usage • Personal information is protected by this act _______ • Minimize the amount of documents taken offsite ___________ • Media Society customers should not be contacted via _______ • ...
Information Security Puzzle 2017-04-11
Across
- Never share your _________ with another person.
- The state of being free from danger or threat.
- Always ___________ your computer when you leave your desk
- Passwords should be _________ every month.
- __________ is a popular web search engine.
- Email scam or attempt to trick you into giving your password or personal information.
- Do not __________ your password or account with anyone.
- A password is stronger by using a combination of both upper and lower case ___________.
Down
- Your password is like a ________; use it regularly, change it often, and do not share it with anyone else.
- Use this tool to dispose of documents that contain personal or financial information.
- When someone sends an email with a link to a bogus website, it is called_________.
- Do not _______ your password down or attach it to your keyword or monitor.
- Choose a password that is easy for you to____________ but hard for someone to guess.
- Do not leave your laptop or computer ____________.
- A software that is designed to detect and destroy compute viruses.
- Also known as malicious software; any program or file that is harmful to a computer user.
- Passwords should always be at least this many characters long.
17 Clues: Passwords should be _________ every month. • __________ is a popular web search engine. • The state of being free from danger or threat. • Never share your _________ with another person. • Do not leave your laptop or computer ____________. • Do not __________ your password or account with anyone. • Always ___________ your computer when you leave your desk • ...
Unit 6 Security + 2022-04-07
Across
- uses labels for both subjects (users who need access) and objects (resources with controlled access, such as data, applications, systems, networks, and physical space)
- a list that identifies users or groups who have specific security assignments to an object.
- process of copying changes to Active Directory on the domain controllers.
- the verification of the issued identification credentials. It is usually the second step in the identification process and establishes that you are who you say you are.
- type of access that is allowed or denied for an object.
- a way to organize such things as users, groups, computers, etc. It is also referred to as a container object.
- group of related domains that share the same contiguous DNS namespace.
- Account policies help you control the composition and use of passwords.
- set of configuration settings applied to users or computers.
- can be your role, position, or current project. This information can be used to determine policy and permission.
Down
- The initial process of confirming the identity of a user requesting credentials. This occurs when a user enters a user ID at logon.
- collection of related domain trees.
- have limited permission
- The point at which the number of false positives matches the number of false negatives in a biometric system.
- developed by Microsoft, is a centralized database that contains user accounts and security information.
- have complete control of the system
- device or a file used to authenticate
17 Clues: have limited permission • collection of related domain trees. • have complete control of the system • device or a file used to authenticate • type of access that is allowed or denied for an object. • set of configuration settings applied to users or computers. • group of related domains that share the same contiguous DNS namespace. • ...
Compliance & Security Week 2023-11-16
Across
- It's like your underwear; don't share it with anyone and change it at least every 90 days
- Nasty software that can have a bad impact on your device or network
- What is HIPAA's (and DDID's) minimum training requirement for employees
- Unwanted emails or messages that usually try to sell you something
- What department (or Shane) should you report a suspected HIPAA breach to
- Universal Serial Bus, or a flash drive that you should never stick in a work computer
- What HIPAA rule protects individual rights
- A type of malicious software designed to block access until a sum of money is paid
Down
- Digital, audio, and video files cyber criminals manipulate to make seem that someone is saying or doing something they didn't
- The Health Act passed to protect individual's medical/dental records and other PHI
- A type of spearphishing attack directed at the top-level executives (CEO/Senior Executive Assistant)
- Every aspect of protecting an organization and its employees/assets against cyber threats
- How should you send an email to outside recipients that contains PHI
- What is the acronym that identifies individual's information such as name, birthdate, and SSN
- The additional ways DDID uses to stop hackers getting into our system, even if they know your password
- An email that tricks you into clicking on a link or opening an attachment
- Using a device to gain unauthorized access to data in a system
17 Clues: What HIPAA rule protects individual rights • Using a device to gain unauthorized access to data in a system • Unwanted emails or messages that usually try to sell you something • Nasty software that can have a bad impact on your device or network • How should you send an email to outside recipients that contains PHI • ...
Everyday Security Challenge 2020-10-05
Across
- expert data destruction
- not your pet's name, if strong
- not in the open
- your best response
- sneaky followers
- how much data you should see?
- what secrets should be
- when hacks happen
- secure neckware, sometimes
- scams in your email
- required for access
Down
- the digital threat
- electronic infection
- vitamins for software
- for your eyes only
- do this to your computer when you walk away
- criminals payday
17 Clues: not in the open • sneaky followers • criminals payday • when hacks happen • the digital threat • your best response • for your eyes only • scams in your email • required for access • electronic infection • vitamins for software • what secrets should be • expert data destruction • secure neckware, sometimes • how much data you should see? • not your pet's name, if strong • ...
3B macchina energia-3 2024-01-29
Across
- inventore della fotografia
- denominazione della 3 rivoluzione industriale
- principale innovazione 4 rivoluzione industriale
- inventore telegrafo
- anno creazione motore 2 tempi
Down
- undici anno dei maggiori cambiamenti 4 rivoluzione
- creatore martello a vapore
- energia 2 rivoluzione industriale
- anno creazione martello a vapore
9 Clues: inventore telegrafo • inventore della fotografia • creatore martello a vapore • anno creazione motore 2 tempi • anno creazione martello a vapore • energia 2 rivoluzione industriale • denominazione della 3 rivoluzione industriale • principale innovazione 4 rivoluzione industriale • undici anno dei maggiori cambiamenti 4 rivoluzione
3B macchine e energia-3 2024-01-29
Across
- anno creazione motore 2 tempi
- energia 2 rivoluzione industriale
- denominazione della 3 rivoluzione industriale
- creatore martello a vapore
Down
- principale innovazione 4 rivoluzione industriale
- anno creazione martello a vapore
- inventore telegrafo
- inventore della macchina fotografica
- anno dei maggiori cambiamenti 4 rivoluzione
9 Clues: inventore telegrafo • creatore martello a vapore • anno creazione motore 2 tempi • anno creazione martello a vapore • energia 2 rivoluzione industriale • inventore della macchina fotografica • anno dei maggiori cambiamenti 4 rivoluzione • denominazione della 3 rivoluzione industriale • principale innovazione 4 rivoluzione industriale
Security crossword 2022-07-21
Across
- Place to store high privilege passwords
- seamless integration of security testing and protection throughout the software development and deployment lifecycle
- Unplanned downtime of IT resources
- process sets out the stages of a possible cyberattack and allows organizations to identify and protect themselves against threats
Down
- Need to impart to everyone to protect the organization
- IT Governance framework from ISACA
- is a general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security
- is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features.
- is a nonprofit foundation dedicated to improving software security
- Information security triad
10 Clues: Information security triad • IT Governance framework from ISACA • Unplanned downtime of IT resources • Place to store high privilege passwords • Need to impart to everyone to protect the organization • is a nonprofit foundation dedicated to improving software security • ...
Mobile Security 2013-05-21
Across
- A piece of software designed to prevent viruses from entering a computer system or network.
- A string of numbers and/or letters used to unlock a device.
- Converting data or information into a code to be deciphered.
- A mobile operating system created by Google.
Down
- A method of connecting your device to the network wirelessly
- A copy of data that can be used if the original data is lost.
- A mobile operating system made by Apple for use on iphones, ipods, and ipads.
- A device that combines a cell phone with a handheld computer.
- An electronic system that uses satellites to determine the position of a vehicle, person, etc.
- When each user is allowed to bring his/her own device and use it for work purposes.
- A person who uses computers to gain unauthorized access to data.
11 Clues: A mobile operating system created by Google. • A string of numbers and/or letters used to unlock a device. • A method of connecting your device to the network wirelessly • Converting data or information into a code to be deciphered. • A copy of data that can be used if the original data is lost. • A device that combines a cell phone with a handheld computer. • ...
Information Security 2021-07-12
Across
- it block the user to access his own data and give threats
- it is a network security system designed to protect a trusted private netswork from unauthorised access
- the main purpose of this to record the key pressed by user on the keyboard
- this creates unnecessary junk in receiver's email
- secretly listening to a conversation
Down
- the short term used for malacious software
- it is harassment and stalking through phones or the internet
- when user access certain website small files downloaded on to the computer
- it is the practice of sending fraudulent communication that appear to come from reputable source
- It is a malware that do damaging activity on an infected computer
- a piece of software code created to perform malacious activities
11 Clues: secretly listening to a conversation • the short term used for malacious software • this creates unnecessary junk in receiver's email • it block the user to access his own data and give threats • it is harassment and stalking through phones or the internet • a piece of software code created to perform malacious activities • ...
BSA / Security 2022-05-19
Across
- It is important to remain calm during a ____
- A Mexican Matricula Card is considered ____ Identification
- The teller should do this to all cash bought into their unit
- ____ is the number one deterrent for robberies
- Fill this out if you suspect a customer of structuring a deposit
- Never leave a teller ____ on the line
Down
- ____ is required in all vault rooms
- There should never be more than $10K in your
- The number of initials required on vault tickets
- Needed if a customer exchanges $5K in cash for larger bills
- Before leaving the branch, staff should do a ____
11 Clues: ____ is required in all vault rooms • Never leave a teller ____ on the line • There should never be more than $10K in your • It is important to remain calm during a ____ • ____ is the number one deterrent for robberies • The number of initials required on vault tickets • Before leaving the branch, staff should do a ____ • ...
IT SECURITY 2022-10-27
Across
- Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
- an open source and freely available software package for email security
- a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
- software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- the process of converting information or data into a code, especially to prevent unauthorized access.
Down
- network security device that monitors and filters incoming and outgoing network traffic
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- The conversion of encrypted data into its original form
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
11 Clues: The conversion of encrypted data into its original form • an open source and freely available software package for email security • network security device that monitors and filters incoming and outgoing network traffic • software that is designed to disrupt, damage, or gain unauthorized access to a computer system. • ...
System Security 2018-06-08
Across
- A suite of technologies that can identify unauthorised users of a computer system (7,9)
- Software whose purpose is to remove harmful software from your system (4-7)
- The process of scrambling data so it can be sent securely over networks (10)
- Checking for weaknesses in your own system before a hacker finds them (11,7)
- Repeatedly accessing a website in order to prevent genuine users from accessing it (6,2,7)
- A generic term to describe any piece of software that is harmful to your computer (7)
- A means of hacking that tries every possible password in quick succession (5,5)
Down
- Hardware- or software-based security which controls incoming and outgoing network traffic based on a set of rules (8)
- When used alongside passwords, these can control what individual users can see and do on a computer system (4,6,6)
- The act of gathering information by spoofing trustworthy websites for malicious intent (8)
- A set of rules that govern how a network is managed and used (7,8)
11 Clues: A set of rules that govern how a network is managed and used (7,8) • Software whose purpose is to remove harmful software from your system (4-7) • The process of scrambling data so it can be sent securely over networks (10) • Checking for weaknesses in your own system before a hacker finds them (11,7) • ...
INTERNET SECURITY 2024-12-11
Across
- GETTING PASSWORDS FOR ONLINE BANK ACCOUNTS BY FAKE BANK EMAIL
- IAN MURPHY ______ INTO THE WHITE HOUSE
- ONLINE HARASSMENT
- PROGRAM WRITTEN BY PHIL ZIMMERMAN
- THE MOST COMMON METHOD OF PROTECTION
- THE ILLEGAL COPY OF COPYRIGHTED SOFTWARE
Down
- PRETENDING THAT SOMEONE ELSE'S WORK IS YOUR OWN
- SMALL FILES PLACED ON YOUR HARD DRIVE
- WHO BREAKS INTO COMPUTER SYSTEMS JUST FOR FUN?
- PROGRAMS THAT DAMAGE YOUR COMPUTER?
- PROCESS OF CONVERTING INFORMATION OR DATA INTO A CODE
11 Clues: ONLINE HARASSMENT • PROGRAM WRITTEN BY PHIL ZIMMERMAN • PROGRAMS THAT DAMAGE YOUR COMPUTER? • THE MOST COMMON METHOD OF PROTECTION • SMALL FILES PLACED ON YOUR HARD DRIVE • IAN MURPHY ______ INTO THE WHITE HOUSE • THE ILLEGAL COPY OF COPYRIGHTED SOFTWARE • WHO BREAKS INTO COMPUTER SYSTEMS JUST FOR FUN? • PRETENDING THAT SOMEONE ELSE'S WORK IS YOUR OWN • ...
FOOD SECURITY 2024-12-17
Across
- A healthy food made from ground-up grains, commonly eaten for breakfast.
- A sweet treat that comes from the sugar cane or sugar beets
- this is a type of nut that is often used in baking or eaten as a snack
- this green vegetable is shaped like a small tree and is very good for you.
- this fruit is yellow on the outside, but red, green, or yellow on the inside.
- this food is made from crushed tomatoes and is often used as a base for pizza or pasta.
Down
- this fruit is round, orange, and full of vitamin C.
- this is a green vegetable that is often used in soups and stews, and is full of vitamins.
- this fruit is small, round, and often used in fruit salads. It can be red, green, or purple
- this is staple food made from corn that can be cooked and eaten with butter.
- this food is a yellow vegetable that can be eaten on the cob or as kernels.
11 Clues: this fruit is round, orange, and full of vitamin C. • A sweet treat that comes from the sugar cane or sugar beets • this is a type of nut that is often used in baking or eaten as a snack • A healthy food made from ground-up grains, commonly eaten for breakfast. • this green vegetable is shaped like a small tree and is very good for you. • ...
Cybersecurity Crossword 2023-02-15
Across
- A method cyber criminals use to lure you into giving away personal information by disguising as people you trust
- The practice of defending computers, mobile devices and IT systems against cyber criminals
- A series of letters, numbers and symbols to protect your device and online accounts
- The act of using more than one type of information to identify who you are in order to grant access to your online account
Down
- A type of malware that blocks access to computer file until a ransom is paid
- A type of code or programme that can cause your device to slow down or malfunction
- The act of ensuring your account/device is using the latest software
- An icon that suggests the website is safe
- A dishonest scheme to cheat you of your data or money
9 Clues: An icon that suggests the website is safe • A dishonest scheme to cheat you of your data or money • The act of ensuring your account/device is using the latest software • A type of malware that blocks access to computer file until a ransom is paid • A type of code or programme that can cause your device to slow down or malfunction • ...
15.1 Understanding Money C.S. 2024-05-09
Across
- Security that pays interest over terms of 10 to thirty years
- Plastic card that allows holders to make credit purchases up to an authorized account
- Money is used in exchange for goods and services needed by individuals, businesses, and governments.
- Transfer of money from one bank account to another
- Type of a document guaranteeing the payment of a specific amount of money
- Money is a common measure of the worth or price of a good or services
- Mechanism a nation uses to provide and manage money for itself
Down
- Security that pays interest over terms ranging from two to ten years
- Process of transferring money from one individual or organization to another
- Anything of value that is accepted in return for good and services
- Security that matures in a year or less
- Allows customers to pay for purchases directly from their checking account
- Type of financial invested issues by a corporation, government, or other organizations
- It can be saved and used at a later date
14 Clues: Security that matures in a year or less • It can be saved and used at a later date • Transfer of money from one bank account to another • Security that pays interest over terms of 10 to thirty years • Mechanism a nation uses to provide and manage money for itself • Anything of value that is accepted in return for good and services • ...
Cyberbullying 2021-10-29
Across
- Bullying online, is called .....
- If you are bullied, tell an ......
- Cyberbullying is against the law.
- A wireless handheld device to communicate.
- Denial of access to internet.
- Repeated or deliberate harassment.
Down
- An example of cyberbullying.
- You can report bullying on websites.
- An effect of cyberbullying.
- When bullied, stay .....
10 Clues: When bullied, stay ..... • An effect of cyberbullying. • An example of cyberbullying. • Denial of access to internet. • Bullying online, is called ..... • Cyberbullying is against the law. • If you are bullied, tell an ...... • Repeated or deliberate harassment. • You can report bullying on websites. • A wireless handheld device to communicate.
TYPHOON Patron Saints 2024-03-24
9 Clues: before today • Jay's jilting science pal • possible prom date for Jay • "-for survival" poem title • Jun acquired these adornments • mysterious business card locale • Jay tells aunts he has to do this • Jay starts reading this at Chato's • world where Jay's source originated
Securities 2025-01-14
Across
- form of bond issued by a government to support public spending.
- regulates the public offer and sale of securities.
- securities that are not registered with the SEC and cannot be sold publicly in the marketplace.
- where issuers can seek security listings and attract investors
- securities listed under a major financial exchange but are not actively traded.
- The entity that creates the securities for sale.
- a security that represents ownership in a corporation.
- a class of shares that give the holder a higher claim to dividends or asset distribution than common stockholders.
Down
- an unsecured promissory note with a fixed maturity.
- a certificate issued by a bank for depositing money for a specified length of time.
- a bond issued by a corporation in order to raise financing.
- a short-term U.S. government debt obligation backed by the U.S. Department of the Treasury.
- a fungible, negotiable financial instrument that represents some type of financial value.
- a security issued by or on behalf of a local authority.
- a bond issued by an international company in a country different from their own.
15 Clues: The entity that creates the securities for sale. • regulates the public offer and sale of securities. • an unsecured promissory note with a fixed maturity. • a security that represents ownership in a corporation. • a security issued by or on behalf of a local authority. • a bond issued by a corporation in order to raise financing. • ...
Digital Footprint-CCC 2018-09-21
9 Clues: hosted device • world of online • related to online • WiFi connected item • a trace of where we were. • thing marked with the print • Native- grew up with the internet • trail-What the footprints leave behind • citizenship-Learning about communication
Cyberbullying 2021-10-29
Across
- Bullying online, is called .....
- If you are bullied, tell an ......
- Cyberbullying is against the law (true/false)
- A wireless handheld device to communicate.
- Denial of access to internet.
- Repeated or deliberate harassment.
Down
- An example of cyberbullying.
- To report bullying on websites(true/false)
- An effect of cyberbullying.
- When bullied, stay .....
10 Clues: When bullied, stay ..... • An effect of cyberbullying. • An example of cyberbullying. • Denial of access to internet. • Bullying online, is called ..... • If you are bullied, tell an ...... • Repeated or deliberate harassment. • To report bullying on websites(true/false) • A wireless handheld device to communicate. • Cyberbullying is against the law (true/false)
Once Upon a Time B 2021-09-30
Across
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
- Residents ? their fears of criminals by installing sophisticated security devices.
- For their safety, they ? to the Neighbourhood Watch program.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
Down
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- Nervously, the resident noticed the ? of a figure below the street light.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- The ? gardener was willing to travel to different places where there was work.
- The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- When slicing bread or tomato, it is easier using a knife with ?.
- After many false alarms, the family wondered about the ? of the security system.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
28 Clues: For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • The ? gardener was willing to travel to different places where there was work. • ...
Once Upon a Time C 2021-09-30
Across
- Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- cherished red wagon with the supplies for phys. Ed.
- When slicing bread or tomato, it is easier using a knife with ?.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- For their safety, they ? to the Neighbourhood Watch program.
Down
- The ? gardener was willing to travel to different places where there was work.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- Residents ? their fears of criminals by installing sophisticated security devices.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- After many false alarms, the family wondered about the ? of the security system.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- Nervously, the resident noticed the ? of a figure below the street light.
29 Clues: cherished red wagon with the supplies for phys. Ed. • For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • ...
Security Newsletter 2015-02-17
11 Clues: Funny money • $5 President • $2 President • $1 President • $10 Treasurer • $20 President • $50 President • $100 President • Taking of items • Unusual Behavior • Opens many doors
Data Security 2025-03-07
Across
- a massive network of webpages, programs, and files that are accessible via URLs
- with _______ encryption, the sender and receiver use different encryption keys
- an attempt to trick a user into divulging their private information
- a _____ horse is a harmful program that masquerades as a legitimate program
- a service that allows you to hide your browsing from your ISP
- a small amount of text that helps a website track information about a user across multiple pages of the website and personalize the user's experience on the website.
Down
- holds a computer hostage by encrypting user data or blocking access to applications, and it demands the user pay a ransom
- technology or services that allow tracking of a users location
- cookies that allow tracking of user behavior across websites
- scrambling a message so it can't be read without a key
- includes things that can identify you directly, such as your social security number, to things that may help identify you indirectly, such as your phone number or birthday.
11 Clues: scrambling a message so it can't be read without a key • cookies that allow tracking of user behavior across websites • a service that allows you to hide your browsing from your ISP • technology or services that allow tracking of a users location • an attempt to trick a user into divulging their private information • ...
Security Measures 2025-05-14
Across
- software that secretly watches what you do
- scrambling data so only the right person can read it
- a strong secret word that is hard to guess (2 words)
- allows or blocks devices based on their ID (2 words)
- checking who you are before letting you in
- blocks unwanted network traffic from getting in or out
Down
- program that finds and removes harmful software
- keeps your programs safe with the latest fixes (2 words)
- Someone trying to access a network without permission.
- protecting a network from hackers and threats (2 words)
- a trick to steal your login or personal details
11 Clues: software that secretly watches what you do • checking who you are before letting you in • program that finds and removes harmful software • a trick to steal your login or personal details • scrambling data so only the right person can read it • a strong secret word that is hard to guess (2 words) • allows or blocks devices based on their ID (2 words) • ...
TEJ2O1 - Security and Ethics - D. French 2024-07-26
Across
- You should regularly make a ____ of your data/photos.
- Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
- If you download software, ____ it before running it.
- Emails can spread malware, most often when you click links or open ____.
- People might feel more comfortable committing crimes on a computer because they feel like they are ____.
- Blocks your access to your computer and files, asking you to pay a ransom to get it back.
- Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
- Keep your operating system secure by running all the latest.
- Malware that damages files on your computer or stops your computer from running properly.
- If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
Down
- Avoid making financial transactions on ____ networks or computers.
- Tries to open security holes in your computer so a hacker can gain access.
- When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
- To protect your device from malware, you should install reputable ____ software and run frequent scans.
- Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
- Make sure you use a different ____ for different sites and keep them long and complex.
- Computer activities often leave a digital ____ that leads back to the offender.
- When you copy sections of someone else's work and claim it is your own.
- When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
- A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
20 Clues: If you download software, ____ it before running it. • You should regularly make a ____ of your data/photos. • Keep your operating system secure by running all the latest. • Avoid making financial transactions on ____ networks or computers. • When you copy sections of someone else's work and claim it is your own. • ...
Environmental, Ethical, and Legal issues in Computer Science 2025-02-01
Across
- The process of substituting old devices with new ones.
- The process of planning and creating a system or product.
- A formal authorization to use software under certain conditions.
- A rule or directive made and maintained by an authority.
- Software that is owned and restricted by its creator.
- A type of intellectual property protection for original inventions.
- The improper or unethical use of technology.
- An abbreviation for the law that prevents unauthorized modification of computer material.
- A person or group with an interest in an issue or project.
- A collection of programs and data used to operate computers.
- A formal decision or law enacted by a government.
- A type of cyber threat that locks data and demands payment.
- The unauthorized access of computer systems.
- A term for materials and substances used in electronics.
- The process of converting data into a secure format.
Down
- Software that harms or disrupts systems.
- The power consumption required to run electronic devices.
- The ability to protect data from unauthorized access.
- The name of outdated electronics being discarded.
- The ethical concern of ensuring fair access to technology.
- A law that governs data protection in the UK and EU.
- The physical parts of a computer system.
- The practice of reusing materials to reduce waste.
- Harmful substances found in electronic waste that can damage the environment and human health.
- A law related to the protection of intellectual property.
- Measures taken to protect users and systems from harm.
- The process of creating software to perform tasks automatically.
- A type of software license that allows users to modify and share freely.
- Laws that protect personal information online.
- A material commonly used in electronic device casings.
- Information that is processed or stored by a computer.
31 Clues: Software that harms or disrupts systems. • The physical parts of a computer system. • The improper or unethical use of technology. • The unauthorized access of computer systems. • Laws that protect personal information online. • The name of outdated electronics being discarded. • A formal decision or law enacted by a government. • ...
NATO Crossword 2025-07-23
Across
- This country is NATO’s newest member.
- This Italian city is home to NATO military command.
- Allies contribute money to fund NATO programs. This is known as ___ funding.
- NATO's largest partnership group is known as the Partnership for ___
- US General Alexus Grynkewich currently holds this position, the highest military position within NATO
- This year’s NATO Summit took place in this city.
- This kind of threat typically does not involve weapons but can include hostile information operations, political interference, and cyber operations
- The lengthy statement released at Summits is often called this.
- This Virginia city is home to Allied Command Transformation (ACT)
- PermReps sit on the NAC, or North Atlantic ___
- The overall guiding document for NATO, revised about once a decade, is known as the Strategic ___
- NATO is the North ___ Treaty Organization
- All 32 Allies must agree for NATO to do anything. This is known as ___ decision making.
- NATO's founding treaty is known as the North Atlantic Treaty or the ___ Treaty
Down
- NATO's maritime security operation in the Mediterranean is called Operation Sea___
- NATO Air Base Geilenkirchen, Germany, is home to 14 of these aircraft, known as NATO's eyes in the sky
- This was the first SACEUR, and was later the 34th President of the United States
- This ability enables Allied forces from different countries to operate together.
- This is one of NATO's closest partners, and its headquarters are right downtown
- NATO's current Secretary General is from this country
- NATO's military headquarters in Mons, Belgium
- This is the part of the founding treaty that explains how new members can join
- Countries that wish to join NATO usually, but not always, use a MAP, or Membership ___ Plan
- Allies pledged to devote this much of their GDP to defense spending
- The principle that if one Ally is attacked, all Allies are attacked, is also known as ___ defense
- NATO has been leading a peace-support operation in this country since June 1999
26 Clues: This country is NATO’s newest member. • NATO is the North ___ Treaty Organization • NATO's military headquarters in Mons, Belgium • PermReps sit on the NAC, or North Atlantic ___ • This year’s NATO Summit took place in this city. • This Italian city is home to NATO military command. • NATO's current Secretary General is from this country • ...
25230 2025-11-04
Across
- Dividing a broader customer base into smaller groups based on similar traits.
- Implementing measures to safeguard data from breaches and cyber-attacks.
- Actionable, valuable information derived from data analysis.
- A type of data source like social media or third-party providers.
- Insight and understanding gained from information.
- One of the 5Vs, referring to the different types of data.
- Analytics used to assess performance and forecast outcomes in money matters.
- Proper handling of sensitive data, especially PII, to protect from unauthorized access.
- The type of analytics that examines causes of past outcomes.
- The type of analytics that provides recommendations for future actions.
- A type of data source like CRM or ERP systems.
- Predicted net profit a company expects from a customer over their relationship.
- Ethical consideration concerning openness about how data is used.
- One of the 5Vs, referring to the speed of data generation and processing.
- Using data and statistical methods to uncover insights and trends.
Down
- Processed, organized data that has meaning.
- Planning, executing, and monitoring marketing efforts across channels.
- Analysis to understand why customers are leaving and develop retention strategies.
- Major regulation governing data privacy in the EU.
- Selecting specific customer segments for tailored marketing efforts.
- The type of analytics that summarizes past data.
- One of the 5Vs, referring to the amount of data generated.
- Raw, unprocessed facts and figures.
- Analytics used to measure and optimize campaign performance.
- Crafting a unique value proposition in the mind of the target audience.
- Models that identify which marketing channels contributed to a conversion.
- Scoring model used to evaluate the trustworthiness of individuals or businesses for loans.
- The type of analytics that forecasts future events.
- One of the 5Vs, referring to the worth of data in deriving insights.
- One of the 5Vs, referring to the accuracy and trustworthiness of data.
- A characteristic of high-quality data; correctness.
31 Clues: Raw, unprocessed facts and figures. • Processed, organized data that has meaning. • A type of data source like CRM or ERP systems. • The type of analytics that summarizes past data. • Major regulation governing data privacy in the EU. • Insight and understanding gained from information. • The type of analytics that forecasts future events. • ...
Ασφαλής χρήση διαδικτύου 2024-02-12
10 Clues: Κακόβουλο λογισμικό • News Ψευδείς ειδήσεις • Διαδικτυακός εκφοβισμός • Scams Ηλεκτρονικές απάτες • piracy πειρατεία λογισμικού • passwords κωδικοί πρόσβασης • Gaming Παιχνίδια στο διαδίκτυο • addiction εθισμός στο διαδίκτυο • gaming παιχνίδια στο διαδ'ικτυο • positive εικόνα σωματος και κοινωνικα δικτυα
Das Internet 2024-03-18
5 Clues: Wo kriegt man anonyme Hilfe • Was soll man mit Kettenbriefen machen • Media Wo ist Cyber-Mobbing am meisten verbreitet • Wie viele Personen passen in eine WhatsApp Gruppe • Wie lange muss dich jemand Belästigen damit man von Cyber-Mobbing spricht
Eli-cyber safety 2016-06-07
Across
- the internet in living space at home. And also my parent have my passwords so they can look at my tablet when they want.
- media stuff
- its hard to control what i see and others see.
- programs that display adverts on the screen.Often installed without people realising.
- to get help from if your online and people do mean stuff to yo
- app online were you take funny pictures of your self and send it to a group of people and they look at it and look write back what they thought about it sometimes they write mean stuff.
- users share their music playlists on Facebook,Twitter and Google+friends.
Down
- privacy that you need to keep safe.
- cameras that are often attached to a computer so that a video image can be sent to another while communication.
- to keep them private (except from your parents)
- you use the internet to bully somebody
- bulling
- Stops people from hacking into your iPod,phone,iPad,and other stuff like thatched.Online
- like a password you need to keep it safe from hackers .a.
- when your with friends in a group of people on phones texting to people and putting pictures of you or something.
15 Clues: bulling • media stuff • privacy that you need to keep safe. • you use the internet to bully somebody • its hard to control what i see and others see. • to keep them private (except from your parents) • like a password you need to keep it safe from hackers .a. • to get help from if your online and people do mean stuff to yo • ...
Cyber Ethics Crossword 2025-06-13
Across
- : Protection of data and devices from online harm
- : Harmful software meant to damage or steal data
- : A program that harms or slows down your computer
- : Software that blocks unauthorized access to your system
- : Online harassment or bullying
- : Illegally accessing someone else's computer
- : A trick to cheat someone online
- : A secret code used to log in safely
- : The process of securing data using codes
Down
- : Polite and responsible behavior on the internet
- : The right to control your personal information online
- : A program that protects your computer from threats
- : Moral rules about what is right and wrong
- : Fake emails trying to steal personal information
- : Who you are; must be protected online
15 Clues: : Online harassment or bullying • : A trick to cheat someone online • : A secret code used to log in safely • : Who you are; must be protected online • : The process of securing data using codes • : Moral rules about what is right and wrong • : Illegally accessing someone else's computer • : Harmful software meant to damage or steal data • ...
Chapter 15 2013-04-25
Across
- this type of fire extinguisher can be class A, B, C, D, or K
- the safeguarding of personnel's rights
- this act helps protect the privacy of your social security number
- helps protect cable from EMI and RFI
- agreement between an organization and a vendor
- a dry pipe fire suppression system with special features
- individual well-known for social engineering
- assuring that risks are known and managed
Down
- documentation about evidence location and usage
- this system helps remove heat from a server room
- this act governs the disclosure of financial and accounting information
- an event that affects the security of an organization
- a targeted social engineering attack
- scavenging for private data in trash
- more than one person is required to complete a task
- a violation of physical security
- wiping or purging data
- a formal process for managing changes to the IT environment
- this act governs the disclosure and protection of health information
- this type of fire suppression system can be wet pipe or dry pipe
20 Clues: wiping or purging data • a violation of physical security • a targeted social engineering attack • scavenging for private data in trash • helps protect cable from EMI and RFI • the safeguarding of personnel's rights • assuring that risks are known and managed • individual well-known for social engineering • agreement between an organization and a vendor • ...
Maria's favourite words. 2015-12-11
Across
- / A person with a role to promote, display or advertise commercial products.
- / Antonym: vague.
- / Formal request to an authority for something (e.g., job).
- / Security building blocks
- / Associated with, able to, or designed for performing one or more practical activities.
- / Synonym: sketch, blueprint, outline.
- / Useful or valuable thing.
- / Dealing with the nature of being.
- / Existing or firmly attached within something or under a surface.
- / A series of actions or steps taken in order to achieve a particular end.
- / Put, lay, or stand (something) in a specified place or position.
- / Area or territory controlled by a ruler or government.
Down
- / A person’s bodily shape.
- / Security-Enhanced Embedded system Design.
- / Detailed examination of the elements or structure of something, typically as a basis for discussion or interpretation.
- / Judgement.
- / Action against someone or something.
- / Maria’s main concern in the thesis.
- / A thing or things belonging to someone; possessions collectively.
- / A raised level surface on which people or things can stand.
- / A set of connected things or parts forming a complex whole, in particular.
- / A part of a whole.
- / Information.
23 Clues: / Judgement. • / Information. • / Antonym: vague. • / A part of a whole. • / A person’s bodily shape. • / Security building blocks • / Useful or valuable thing. • / Dealing with the nature of being. • / Maria’s main concern in the thesis. • / Action against someone or something. • / Synonym: sketch, blueprint, outline. • / Security-Enhanced Embedded system Design. • ...
Deterring home break-ins and vehicle theft 2023-02-17
Across
- Man's best friend
- Used to lock your steering wheel
- Available with wireless video recording to monitor the entry to your home
- Make sure these are closed and locked
- Don't leave your running vehicle _____.
- Store your keyless entry fob in this type of bag to prevent a thief from cloning your key
- Don't allow this to overflow while you are away on vacation
- A GPS device that can be used to locate your vehicle
- Posted to advertise your home security company
Down
- Mount this on the exterior of your home for added security
- Can be stuck on a windshield as a security warning
- If you see ______, say ______!
- Type of lighting used to deter break-ins
- Secondary and more secure locking mechanism to deter home entry
- Thieves may attach this magnetic Apple product to your vehicle to track it
- Keep these locked to deter unwanted entry
- In-vehicle video recorder
- An audible anti-theft deterrent
- Never leave these in your vehicle
- Etch this onto your vehicle windows or catalytic converter to deter theft
20 Clues: Man's best friend • In-vehicle video recorder • If you see ______, say ______! • An audible anti-theft deterrent • Used to lock your steering wheel • Never leave these in your vehicle • Make sure these are closed and locked • Don't leave your running vehicle _____. • Type of lighting used to deter break-ins • Keep these locked to deter unwanted entry • ...
Volunteers 2023-05-01
Across
- 2nd grade assist
- Preschool helper
- Crafts
- Registrar
- Missions
- Snacks
- Crafts three
- Music assist
- Adults
- 4th grade lead
- first grade assist
- 5/6 Girls too
- Security lead
- Security helper/floater
- Adult assist
- Anderson Army
- Co leader
- Audio
- Crafts also
- 5th and 6th boys assist
- Rec lead
- 5th and 6th boys lead
- Rec second
- 4th grade also
- KDG assist
- Tech
- Preschool
- 5/6 assist
- Greet
- Music Lead
Down
- 5/6 girls
- Registration
- 2nd grade too
- H. Helper
- childcare MW
- prek missions
- 1st grade
- Rec Follower
- Leader
- Preschool Assist
- Visual
- 1st grade too
- Home
- Rec shadow
- 3rd grade lead
- Greeter
- Rec assist
- Worship help
- 2nd grade
- childcare T,R,F
- 3rd grade
- kdg
- 3rd grade also
- childcare MW too
- Crafts lead
- Security
- Kdg lead
- 5th and 6th boys
- Childcare
- Secretary
60 Clues: kdg • Home • Tech • Audio • Greet • Crafts • Snacks • Leader • Visual • Adults • Greeter • Missions • Rec lead • Security • Kdg lead • 5/6 girls • H. Helper • Registrar • 1st grade • Co leader • 2nd grade • 3rd grade • Preschool • Childcare • Secretary • Rec shadow • Rec assist • Rec second • KDG assist • 5/6 assist • Music Lead • Crafts also • Crafts lead • Registration • childcare MW • Rec Follower • Crafts three • Music assist • Adult assist • Worship help • ...
WIGLEY WORK 2021-09-16
Across
- working a specific number of hours per week
- the lowest hourly rate
- where social security was established
- a rate that pieceworkers are paid
- what you pay when your job is covered by social security
- workers paid according to the amount of items they produce
- HOURS working more hours than their regular hours
- whats paid for by FICA taxes
- insured program available through the US government
- a percentage of each workers salary is taken out of each paycheck up to a certain amount
- sum of your hourly and overtime pay
- getting paid every other week
- 1 1/2 the hourly rate
Down
- 2x the hourly rate
- unique for each individual, used to track Social Security benefits and for other identification purposes
- set amount for each hour the work
- 3x the hourly rate
- getting paid twice a month
- paycheck amount are automatically deposited electronically into their bank account
- a percentage of sales paid to an author,musician or artist
- whats paid for by FICA taxes
- percentage of total sales
- 1.5 times your hourly rate
23 Clues: 2x the hourly rate • 3x the hourly rate • 1 1/2 the hourly rate • the lowest hourly rate • percentage of total sales • getting paid twice a month • 1.5 times your hourly rate • whats paid for by FICA taxes • whats paid for by FICA taxes • getting paid every other week • set amount for each hour the work • a rate that pieceworkers are paid • sum of your hourly and overtime pay • ...
021-1 2024-07-12
Across
- Term for when security is breached
- Malicious code used in the attack
- Joint groups formed to improve cybersecurity
- Efforts to reduce the impact of the attack
- Tech giant also affected by the attack
- Public and private sectors working together
- Russian state-sponsored group behind the attack
- U.S. Department of Homeland Security's response
- Type of actor behind the attack
- Another name for the attackers
- Key focus in the aftermath of the attack
- Type of analysis conducted to investigate the attack
- Weaknesses exploited by the attackers
Down
- Techniques used by attackers to avoid detection
- Another term for the security incident
- Process of uncovering the details of the attack
- U.S. response to the attack
- IT company at the center of the attack
- The effect of the attack on organizations
- Cybersecurity firm that discovered the breach
- Software updates released by SolarWinds
- Actions pursued against the attackers
- U.S. department that was compromised
- U.S. body that held hearings on the attack
- SolarWinds product that was compromised
25 Clues: U.S. response to the attack • Another name for the attackers • Type of actor behind the attack • Malicious code used in the attack • Term for when security is breached • U.S. department that was compromised • Actions pursued against the attackers • Weaknesses exploited by the attackers • Another term for the security incident • IT company at the center of the attack • ...
Safety Week 2024 2024-10-01
Across
- See something ___ something
- Emergency coordinators wear these brightly colored items
- DMU encourages annual vaccines to prevent this common infection
- A kit of supplies and equipment for use in giving medical treatment
- A practice exercise to prepare for a potential emergency situation
- type of ppe for eyes
- Action to take for a rapid, orderly process to exit building
- A symbol indicating dangerous biological substances
- A portable device used to treat sudden cardiac arrest
- DMUs emergency notification system
- a safe, indoor location in an emergency
Down
- Practice of following others through security checkpoint without access badge
- Animal to emulate when walking on icy ground
- One should always be _____ of their surroundings
- DMU's avatar for emergency messaging
- Being ready and able to deal with emergencies
- Campus department to contact if you witness suspicious activity
- Tornado _______ indicates a tornado has been sighted or identified by National Weather Service radar
- A service providing emergency medical care and transportation
- Homeland Security model for active threat response: run, hide, _____
- DMU's Chief Compliance Officer is highly ____ averse
21 Clues: type of ppe for eyes • See something ___ something • DMUs emergency notification system • DMU's avatar for emergency messaging • a safe, indoor location in an emergency • Animal to emulate when walking on icy ground • Being ready and able to deal with emergencies • One should always be _____ of their surroundings • A symbol indicating dangerous biological substances • ...
Investing Crossword Puzzle 2025-03-25
Across
- how the government ensures you'll eventually be taxed
- Government Medical Health Plan
- When the market is up
- The biggest financial fraud in US history.
- A system of recording info that’s impossible to override
- Worked a certain amount of time to match your retirement account
- holding company that owns subsidiaries in many different business sectors
- Contributions made before tax
- Contributions made after tax
- Transfer retirement account from old employer to another
- Social Security and Medicare tax
- Money Currencies that are created and backed by the Government
- When the market is down
Down
- Fund to have before investing in crypto
- A company that is owned by a larger company
- Strategy for nervous investors that are low risk
- No longer working
- How much did Tom Brady lose with FTX
- Aggressive risk tolerance investors use this strategy
- Security Conceived by President Roosevelt in 1935
- How old you have to be to collect full social security benefit
- Retirement benefit offered by some employers
- High risk investment
- Berkshire Hathaway
- The more popular it is, the more valuable
25 Clues: No longer working • Berkshire Hathaway • High risk investment • When the market is up • When the market is down • Contributions made after tax • Contributions made before tax • Government Medical Health Plan • Social Security and Medicare tax • How much did Tom Brady lose with FTX • Fund to have before investing in crypto • The more popular it is, the more valuable • ...
Airport 2025-06-04
Across
- A delay in a flight`s departure or arrival
- The area where luggage is collected after a flight
- A person traveling on a plane
- The process of getting off a plane
- A machine that carries passengers and cargo through the air
- A persone who helps passengers on a flight
- the process of registering for a flight and getting a boarding pass
- A bag used to pack clothes for a trip
- A place where planes take off and land
Down
- A ticket that allows you to board a plane
- A device that detects metal objects during security checks
- A document needed to travel to another country
- The act of getting on a plane
- A vehicle that transport passengers between the terminal and the aircraft
- The persone who flies the plane
- A security check where passengers walk through a scanner
- Place where passengers wait to board their flight
- The area where passengers go after leaving the plane
- A place where planes are kept and repaired
- A small bag used to carry personal items on a flight
20 Clues: The act of getting on a plane • A person traveling on a plane • The persone who flies the plane • The process of getting off a plane • A bag used to pack clothes for a trip • A place where planes take off and land • A ticket that allows you to board a plane • A delay in a flight`s departure or arrival • A place where planes are kept and repaired • ...
Cybersecurity 2025-06-04
Across
- Software that secretly collects user information
- Verifying the identity of a user or device
- A small file stored on your device by websites you visit
- A type of malware that replicates and spreads to other programs
- A secret string of characters used to access a system
- A person who gains unauthorized access to systems
- A type of scam where attackers trick users into revealing information
- A type of malware disguised as legitimate software
- Software designed to detect and remove malicious programs
- A program that records keystrokes to steal data
Down
- A security process requiring two different authentication methods
- A software update that fixes security vulnerabilities
- ENGINEERING Manipulating people into revealing confidential information
- Software designed to harm or exploit any device or network
- The process of converting data into a coded form
- An incident where data is accessed without authorization
- A network security system that monitors and controls traffic
- A copy of data stored to prevent loss
- A network of infected computers under a hacker’s control
- A secure connection over the internet to protect data
20 Clues: A copy of data stored to prevent loss • Verifying the identity of a user or device • A program that records keystrokes to steal data • Software that secretly collects user information • The process of converting data into a coded form • A person who gains unauthorized access to systems • A type of malware disguised as legitimate software • ...
crossword about Cybersecurity 2025-06-07
Across
- Malware that encrypts files for ransom
- Network of infected devices
- Small data file stored by websites
- Software that secretly monitors activity
- Scrambling data for security
- Person who exploits system vulnerabilities
- Remote data storage and computing
Down
- Fraudulent attempts to steal info
- Harmful software like viruses
- Authentication using fingerprints
- Directs internet traffic
- Decentralized ledger technology
- Malware disguised as legitimate software
- Secures internet connections
- Network security barrier
15 Clues: Directs internet traffic • Network security barrier • Network of infected devices • Secures internet connections • Scrambling data for security • Harmful software like viruses • Decentralized ledger technology • Fraudulent attempts to steal info • Authentication using fingerprints • Remote data storage and computing • Small data file stored by websites • ...
EUTS Crossword 2025-09-22
Across
- Captain America is a Super .....
- Famous 1930's Film - .....with the wind.
- Form or public transport typically seen in City Centres
- Macronutrient essential for life
- Lets you walk or run inside
- Moisturising soap, also the name of a bird
- Apple Computer
- 1000 Grams
- Red Fruit
Down
- To purposely fall out an aircraft
- Single Floor house
- Type of attack which includes malware, phishing etc.
- Protects you from the sun
- Four legged family friend
- Popular Video Doorbell
- Surname of US President
- Wrench used for tightening by Newton Metres
- Used for connecting monitors, peripherals etc.
- Equal Opportunities for all
19 Clues: Red Fruit • 1000 Grams • Apple Computer • Single Floor house • Popular Video Doorbell • Surname of US President • Protects you from the sun • Four legged family friend • Lets you walk or run inside • Equal Opportunities for all • Captain America is a Super ..... • Macronutrient essential for life • To purposely fall out an aircraft • Famous 1930's Film - .....with the wind. • ...
Cyber Cross-Word 2023-04-12
Across
- interaction between snmp agent manager
- packet analyzer
- memory that lose its data when device is off
- SIEM tool that enable to search, analyze...
- type of XSS (non-persistent)
- software/hardware that creates/runs VM
- attract attackers
- transmission media with cables
Down
- process in TCP/IP networks to establish a working connection between a server and a compute
- software that displays unwanted ad
- this hash cb5ceb103977f1271d0763ac75fcd8e9 = secret
- 8e8c92b1c360cbe3cd2b40d6b29278d5
- an open-source EDR
- type of attack that uses voice and telephony technologies to trick people
- secure communications techniques
15 Clues: packet analyzer • attract attackers • an open-source EDR • type of XSS (non-persistent) • transmission media with cables • 8e8c92b1c360cbe3cd2b40d6b29278d5 • secure communications techniques • software that displays unwanted ad • interaction between snmp agent manager • software/hardware that creates/runs VM • SIEM tool that enable to search, analyze... • ...
Cyber Safety Crossword 2013-11-03
Across
- Small text files that websites save in your web browser to store information like your username and password.
- Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
- The last part of a URL eg;.gov .com
- The internet version of Junk mail
- Rules for acting respectful and polite in cyberspace. These rules help keep the Internet safe and friendly.
- Short for Random Access Memory
- Without a name. If someone is being anonymous in cyberspace, they never use their real name and might not even use an Alias.
- Free software that can be downloaded from the internet.
Down
- A computer that has been hacked into and is used to launch malicious attacks
- Buying products on the Internet using credit cards or other electronic payments
- When a computer calls out to another computer to see if it is active.
- From the word "plagiarius," meaning "to plunder," copying someone else's written or creative work without their permission and pretending that it is your own.
- A name you use to identify yourself on a computer or website.
- A type of malware that spies on what you do on the internet and can steal information about you
- Marking something or someone as suspicious or inappropriate.
15 Clues: Short for Random Access Memory • The internet version of Junk mail • The last part of a URL eg;.gov .com • Free software that can be downloaded from the internet. • Marking something or someone as suspicious or inappropriate. • A name you use to identify yourself on a computer or website. • When a computer calls out to another computer to see if it is active. • ...
Eli-cyber safety 2016-06-07
Across
- the internet in living space at home. And also my parent have my passwords so they can look at my tablet when they want.
- media stuff
- its hard to control what i see and others see.
- programs that display adverts on the screen.Often installed without people realising.
- to get help from if your online and people do mean stuff to yo
- app online were you take funny pictures of your self and send it to a group of people and they look at it and look write back what they thought about it sometimes they write mean stuff.
- users share their music playlists on Facebook,Twitter and Google+friends.
Down
- privacy that you need to keep safe.
- cameras that are often attached to a computer so that a video image can be sent to another while communication.
- to keep them private (except from your parents)
- you use the internet to bully somebody
- bulling
- Stops people from hacking into your iPod,phone,iPad,and other stuff like thatched.Online
- like a password you need to keep it safe from hackers .a.
- when your with friends in a group of people on phones texting to people and putting pictures of you or something.
15 Clues: bulling • media stuff • privacy that you need to keep safe. • you use the internet to bully somebody • its hard to control what i see and others see. • to keep them private (except from your parents) • like a password you need to keep it safe from hackers .a. • to get help from if your online and people do mean stuff to yo • ...
cyber tut-4 2018-09-12
Across
- Control signals to be activated at any time
- Finite sequential machine
- A sequence of micro instructions
- A type of hazard in pipeline
- Enables the host system to run software
- Provides a separate signal line for each step or time slot
- a network of functional and storage unit
- Next address generator
Down
- When performance level reaches greater than instruction per cycle
- A program used to translate microprogram into executable program
- Control signal embedded in a kind of low level software
- Many type of instructions are executed in a single clock cycle
- Permits a single microinstruction to specify a short sequence
- Control memory address system
- Task initiation diagram
15 Clues: Next address generator • Task initiation diagram • Finite sequential machine • A type of hazard in pipeline • Control memory address system • A sequence of micro instructions • Enables the host system to run software • a network of functional and storage unit • Control signals to be activated at any time • Control signal embedded in a kind of low level software • ...
Cyber Laws & Ethics 2025-05-31
Across
- protect brands, logos, and symbols that distinguish goods or services
- private browsing mode
- the act of using someone else’s work or ideas without proper acknowledgment
- Sending bulk emails
- someone gains unauthorized access to a computer system or network
- refers to safe and responsible use of ICT
- protect new inventions or discoveries
- scammers send fake emails or messages pretending to be someone trustworthy
Down
- Internet etiquette
- involves secretly listening to or intercepting private communications
- remember our visits on website
- a type of malicious software that locks or encrypts a victim’s data, demanding payment
- data that is left behind when users have been online
- illegal activities conducted through computers or the internet
- people who deliberately post inflammatory or offensive comments online to provoke others
15 Clues: Internet etiquette • Sending bulk emails • private browsing mode • remember our visits on website • protect new inventions or discoveries • refers to safe and responsible use of ICT • data that is left behind when users have been online • illegal activities conducted through computers or the internet • someone gains unauthorized access to a computer system or network • ...
AI in Cybersecurity 2025-10-20
Across
- – What cybersecurity teams do.
- – What deepfakes can break online.
- – Helps detect or block fake content.
- – Something that looks real but isn’t.
- – A short video that can be altered.
Down
- – What happens when AI misidentifies something.
- – A warning about possible threats.
- – What cybersecurity helps us stay.
- – A harmful cyber action.
- – Used by AI to learn patterns.
- – The technology behind deepfakes.
- – Deepfakes can also be made from this.
12 Clues: – A harmful cyber action. • – What cybersecurity teams do. • – Used by AI to learn patterns. • – What deepfakes can break online. • – The technology behind deepfakes. • – A warning about possible threats. • – What cybersecurity helps us stay. • – A short video that can be altered. • – Helps detect or block fake content. • – Something that looks real but isn’t. • ...
Chapter 15 2013-04-25
Across
- Chain of ___________ documentation about evidence location and usage
- this act governs the disclosure of financial and accounting information
- Due __________ is assuring that risks are known and managed
- an event that affects the security of an organization
- a violation of physical security
- this act governs the disclosure and protection of health information
- this system helps remove heat from a server room
- Due ________ is the safeguarding of personnel's rights
- ______ phishing is a targeted social engineering attack
- wiping or purging data
- this type of fire extinguisher can be class A, B, C, D, or K
Down
- ________ diving is scavenging for private data in trash
- individual well-known for social engineering
- helps protect cable from EMI and RFI
- Separation Of ______ means more than one person is required to complete a task
- a dry pipe fire suppression system with special features
- ________ management is a formal process for managing changes to the IT environment
- this type of fire suppression system can be wet pipe or dry pipe
- this act helps protect the privacy of your social security number
- agreement between an organization and a vendor
20 Clues: wiping or purging data • a violation of physical security • helps protect cable from EMI and RFI • individual well-known for social engineering • agreement between an organization and a vendor • this system helps remove heat from a server room • an event that affects the security of an organization • Due ________ is the safeguarding of personnel's rights • ...
Maria's favourite words 2015-12-11
Across
- Put, lay, or stand (something) in a specified place or position.
- Synonym: sketch, blueprint, outline.
- existing or firmly attached within something or under a surface:
- A set of connected things or parts forming a complex whole, in particular.
- Dealing with the nature of being.
- detailed examination of the elements or structure of something, typically as a basis for discussion or interpretation.
- a thing or things belonging to someone; possessions collectively.
- formal request to an authority for something (e.g., job).
- Useful or valuable thing.
- Antonym of vague.
- Information.
Down
- Security-Enhanced Embedded system Design.
- A person’s bodily shape.
- a series of actions or steps taken in order to achieve a particular end.
- Action against someone or something.
- associated with, able to, or designed for performing one or more practical activities.
- Judgement.
- A person with a role to promote, display or advertise commercial products.
- A part of a whole.
- Maria’s main concern in the thesis.
- a raised level surface on which people or things can stand.
- Security building blocks
- Area or territory controlled by a ruler or government.
23 Clues: Judgement. • Information. • Antonym of vague. • A part of a whole. • A person’s bodily shape. • Security building blocks • Useful or valuable thing. • Dealing with the nature of being. • Maria’s main concern in the thesis. • Synonym: sketch, blueprint, outline. • Action against someone or something. • Security-Enhanced Embedded system Design. • ...
Airport Crossword 2019-02-12
Across
- Secure baggage storage and luggage wrapping is available at SmartCarte
- Available for emergancy use
- Go there to eat/drink
- Responsibility for aviation security should be shared between the NZ Police and the Military of transport
- Provided as a quiet place for contemplation to all travellers
- Available for transit passengers. Can buy supplies from vending machine
- Located on top floor of the terminal. Provides a view of airfield
- Changing currency types
- Can access smoking lounge after security
- Available throughout terminals to assist passengers
Down
- Where you can buy items cheaper and non-taxed
- Located throughout international airport terminal to communicate. Have to pay to use
- Available to help transfer luggage
- Centre provides comprehensive ... and booking service
- Passengers first contact with airport to book a space. Can be long term or short term
- Where you can buy small goods for yourself or as a gift
- Rooms with cots and changing tables are available.
- You can access this for computer or mobile usage
- Will check you to ensure no transporting of any dangerous goods
- Getting cash out
20 Clues: Getting cash out • Go there to eat/drink • Changing currency types • Available for emergancy use • Available to help transfer luggage • Can access smoking lounge after security • Where you can buy items cheaper and non-taxed • You can access this for computer or mobile usage • Rooms with cots and changing tables are available. • ...
Homefront 2021-06-15
Across
- roles, Women were invited to join the war effort their roles were limited.
- National Act introduced in 1939 to restrict freedom.
- American men brought these for the Australian women.
- All information wasn't always given for security purposes.
- Clothes were never wasted.
- Voted against in WW1 but was legalised in WW2.
- People placed here for concern over national security.
- Needed to buy everyday necessities like clothes, food, and petrol.
- Common to hinder accurate bombings.
- A large role in the war but weren't considered personnel.
- The government wanted to keep this high.
- Major players in both wars - central and axis powers.
Down
- Women were now allowed to work in this male-dominated place.
- Aboriginal and Torres Strait Islanders were not conscripted.
- Weren't allowed to be drawn to save resources.
- There was jealousy in Australia over the American visitors.
- Placed on Australians to ensure there were enough resources.
- Trenches and shelters were made out of fear of air raids.
- Women were encouraged to take up work that was more physical.
- Bombed many times by the Japanese.
20 Clues: Clothes were never wasted. • Bombed many times by the Japanese. • Common to hinder accurate bombings. • The government wanted to keep this high. • Weren't allowed to be drawn to save resources. • Voted against in WW1 but was legalised in WW2. • National Act introduced in 1939 to restrict freedom. • American men brought these for the Australian women. • ...
WWII--Academic Vocabulary 2024-02-20
Across
- Setting someone free from oppression.
- security: Measures for country protection.
- fronts: Engaging in combat in multiple areas.
- Official ban on trade with a country.
- Converting information into code for security.
- genocide: Government-led extermination of a group.
- shortages: Insufficient goods for purchase.
- state: Government with complete control over public and private life.
- Controlling resource distribution in scarcity.
- raid: Aerial attack with bombs.
- Preparing troops and supplies for war.
- Offering time for charitable activities.
- Purchasers of goods and services.
Down
- enlistment: Joining armed forces voluntarily or through draft.
- effort: Mobilization to support armed forces.
- supply: Availability of food, especially in tough times.
- weapons: Non-mass destruction military arms.
- base: Military installation for navy operations.
- opportunities: Available work chances.
- front: Civilian population during war.
- goods: Limited supply products.
- levels: Amount of goods or services made.
- treaties: Formal agreements between countries.
- shortage: Scarcity of agricultural workers.
- Love for one's country.
- Confinement, especially during wartime.
- units: Organized military groups.
- effects: Impact on regional economy.
- transmission: Ensuring information security.
- involvement: Participation of the United States in a conflict.
30 Clues: Love for one's country. • goods: Limited supply products. • raid: Aerial attack with bombs. • units: Organized military groups. • Purchasers of goods and services. • effects: Impact on regional economy. • Setting someone free from oppression. • Official ban on trade with a country. • opportunities: Available work chances. • front: Civilian population during war. • ...
United Nations 2024-09-19
Across
- Number of members of Security Council and judges in International Court of Justice
- Number of countries represented on the Economic and Social Council.
- Location of International Court of Justice
- City where Charter was signed San __________.
- ______________ Development or actions that can be maintained over time without damaging the environment.
- Most powerful organ of the UN
- UN agency that care for education and children.
- First goal of the UN: maintain __________ and security.
- The UN was created after the scourge of _________ ________ ____.
- Current Secretary General of the UN: Antonio __________ of Portugal.
- Name for a gathering of people to talk about issues.
- Founding document of the United Nations
Down
- American who led effort to create Universal Declaration of Human Rights
- Group of all member states General __________.
- The number of principal organs of the UN
- Location of the UN Headquarters
- The number of official languages of the UN
- Initials for the World Health Organization
- Permanent members of the Security Council are United Kingdom, China, France, US and _________.
- Proposals or recommendations of the UN
- Office of the Secretary General or leader of the UN
21 Clues: Most powerful organ of the UN • Location of the UN Headquarters • Proposals or recommendations of the UN • Founding document of the United Nations • The number of principal organs of the UN • The number of official languages of the UN • Initials for the World Health Organization • Location of International Court of Justice • City where Charter was signed San __________. • ...
Investing Crossword Puzzle 2025-03-25
Across
- Contributions made before tax
- Transfer retirement account from old employer to another
- Berkshire Hathaway
- Security Conceived by President Roosevelt in 1935
- The more popular it is, the more valuable
- Worked a certain amount of time to match your retirement account
- No longer working
- Currencies that are created and backed by the Government
- A system of recording info that’s impossible to override
- Retirement benefit offered by some employers
Down
- holding company that owns subsidiaries in many different business sectors
- Social Security and Medicare tax
- how the government ensures you'll eventually be taxed
- How much did Tom Brady lose with FTX
- High risk investment
- Strategy for nervous investors that are low risk
- When the market is up
- How old you have to be to collect full social security benefit
- Contributions made after tax
- Fund to have before investing in crypto
- When the market is down
- A company that is owned by a larger company
- Government Medical Health Plan
- The biggest financial fraud in US history.
- Aggressive risk tolerance investors use this strategy
25 Clues: No longer working • Berkshire Hathaway • High risk investment • When the market is up • When the market is down • Contributions made after tax • Contributions made before tax • Government Medical Health Plan • Social Security and Medicare tax • How much did Tom Brady lose with FTX • Fund to have before investing in crypto • The more popular it is, the more valuable • ...
Four Purposes of Government 2021-01-13
Across
- In a _______, the creation and enforcement of laws is closely tied to the wants and needs of citizens.
- ________threats include physical attacks, such as the terrorist attacks of September 11, 2001, and invisible attacks, such as cyber espionage.
- In this sense of the word, ______means a state of happiness and well-being within a society.
- Freedom of speech and the press, as well as _______liberties, are constitutionally protected by the Bill of Rights.
- The government also institutes the ____ justice system as a mechanism citizens can use to settle disputes.
- A democracy embraces the principle of the rule of law, which ensures that no person in the state is above the law.
- All ________ have the purposes of establishing laws, providing order and security, protecting their people from external threats, and providing for the general welfare.
- In a monarchy or ______the focus is more on maintaining the regime
- The US has a strong emphasis on individualism, liberty, and ____markets.
Down
- In a democracy, laws are made by the _____ or their representatives.
- In a __________, laws may be administered in a method that benefits the leader or the central government more than those being governed.
- Governments provide a range of services from public education, financial support to the _____ and aged, bridges and water.
- Governments are responsible for preventing attacks on their people from persons or groups outside its _____
- In a ___________ or dictatorship, laws are promulgated by the ruler.
- The U.S. _____________ declared that the government was to establish Justice, insure domestic Tranquility, provide for the common defence, promote the general Welfare ...
- Laws must be publicly recorded, enforced equally, and interpreted by an independent ______ branch.
- Social welfare states, such as those found in much of _______, provide extensive government services, including free public education, income support, and government-supplied health care.
17 Clues: In a monarchy or ______the focus is more on maintaining the regime • In a democracy, laws are made by the _____ or their representatives. • In a ___________ or dictatorship, laws are promulgated by the ruler. • The US has a strong emphasis on individualism, liberty, and ____markets. • ...
Q1 Safety & Security 2021-03-04
Across
- A Shelter-in-Place will usually be announced by ____ communication.
- This will provide more traction across icy surfaces.
- If the fire alarm goes off during a lockdown, do not do this unless you have first hand knowledge of a fire or if told by emergency personnel.
- Make sure your cell phone is always this when leaving the house in case of emergency.
- To help maintain balance, walk like one of these – short steps and as flat-footed as possible.
- This many inches of water can become dangerous.
- When it comes to gloves vs mittens, these may save your life.
- When a lockdown is ordered, immediately stop all ______.
- This may happen because of hostile intruder or hazardous release outside.
- Make sure these are available when walking over potentially icy surfaces.
Down
- This is the best sort of clothing to wear during the winter.
- Have one of these in car in case you get stranded while traveling in cold weather.
- Increase your following distance to this many seconds when roads could be icy.
- Avoid having this before you start shoveling your driveway.
- Emergency kits should be stocked with flashlights, a first aid kit, water, extra medicine, and a few extra of these.
- Stay out of _____ when in a lockdown.
- Avoid carrying these while walking across potentially slippery surfaces.
17 Clues: Stay out of _____ when in a lockdown. • This many inches of water can become dangerous. • This will provide more traction across icy surfaces. • When a lockdown is ordered, immediately stop all ______. • Avoid having this before you start shoveling your driveway. • This is the best sort of clothing to wear during the winter. • ...
FPPS Security Crossword 2020-04-01
Across
- Type of route path that acts as a "catch all"
- What the 'S' in SPOC stands for
- User who has no signature authority in the Requesting Office
- User who can sign Part C of the SF-52 who is not in the SPO: ____ Official
- Decentralized Security Administrative ____
- Another name for FPPS ID: _____ ID
- Type of route path with specific data access criteria
Down
- Command you can use when someone gets locked out of FPPS
- Someone with SC2 signature authority has access to these two commands: LGAP and ____
- User who signs block A6 of the SF-52: _____ Official
- Where you can find the order in which route paths are built
- User who signs block A5 of the SF-52: _____ Official
- Determines what department, bureau, etc. a user can see
- Office where HR processes actions: Servicing _____ Office
- Command you can use to build centers where employees can request and process personnel actions
- Command you can use to build paths for personnel actions
- Command you can use to add employees to offices
17 Clues: What the 'S' in SPOC stands for • Another name for FPPS ID: _____ ID • Decentralized Security Administrative ____ • Type of route path that acts as a "catch all" • Command you can use to add employees to offices • User who signs block A6 of the SF-52: _____ Official • User who signs block A5 of the SF-52: _____ Official • ...
High Security Estate 2017-01-31
17 Clues: Hands on • Wireless • Part of me • Spikey steel • Silver stripe • To come and go • Above standard • Stop drop roll • After a shampoo • More then a scan • fixteen in a room • To pay for company • Untidy place to eat • Party after a wedding • American word for phone • Provide relevant information • Location to catch a plane from
