cyber security Crossword Puzzles

FMA 2024-08-25

FMA crossword puzzle
Across
  1. - A prolonged decline in the market
  2. - Long-term debt security issued by a corporation or government
  3. - When the market is on a prolonged rise
  4. - Where stocks are bought and sold
  5. - A contract that derives its value from an underlying asset
  6. - The profit made from selling a security above its purchase price
  7. - An agreement to buy or sell a specific commodity at a future date
  8. - An institution that facilitates the exchange of securities between buyers and sellers
Down
  1. - A share of ownership in a company
  2. - A market for buying and selling currencies
  3. - The income generated from an investment
  4. - A market where new securities are issued
  5. - A bond or share that can be traded
  6. - The difference between the highest and lowest prices in a trading day
  7. - The initial offering of a company's stock to the public
  8. - A percentage of a loan charged as interest

16 Clues: - Where stocks are bought and sold- A prolonged decline in the market- A share of ownership in a company- A bond or share that can be traded- When the market is on a prolonged rise- The income generated from an investment- A market where new securities are issued- A market for buying and selling currencies...

history structure of law enforcement 2025-01-13

history structure of law enforcement crossword puzzle
Across
  1. people who provide security services to those who don't have their own for $
  2. the model in which state police have powers such as local police but statewide
  3. the authority of an agency based on area subject matter
  4. the person in charge of early English towns
  5. the model in which state police focus on traffic accidents
  6. 12 principles invented by Robert Peel that helped London Police and still used today
Down
  1. people who provide security to those who employ them
  2. a system in which citizens were used to guard the city or pursue criminals
  3. police activity working with the community to prevent crime
  4. a group of people called by the sheriff or constable to help
  5. the chief law enforcement officer of an area
  6. 10 families band together to enforce laws

12 Clues: 10 families band together to enforce lawsthe person in charge of early English townsthe chief law enforcement officer of an areapeople who provide security to those who employ themthe authority of an agency based on area subject matterthe model in which state police focus on traffic accidents...

LSS- News letter 2014-06-09

LSS- News letter crossword puzzle
Across
  1. Acquired it more?, then burn it.
  2. Codes for genetic make up
  3. Got fever? Have a .....
  4. Thrives in conditions where no other life forms could exist and where nutrients come only from inorganic matter.
  5. an_ _ _,cat_ _ _
  6. Exists in Biological and cyber world,mostly harmful.
  7. A Life begins
  8. Fundamenta unit of life
  9. Sounds similar to a casual outfit
Down
  1. The SI unit of energy
  2. cross
  3. Incharge of Involuntary actions,Part of brain.
  4. Biological classification,Hollywood movie
  5. causes Cancer
  6. Nature's camera,Apple has it too.

15 Clues: crosscauses CancerA Life beginsan_ _ _,cat_ _ _The SI unit of energyGot fever? Have a .....Fundamenta unit of lifeCodes for genetic make upAcquired it more?, then burn it.Nature's camera,Apple has it too.Sounds similar to a casual outfitBiological classification,Hollywood movieIncharge of Involuntary actions,Part of brain....

Touring Eco System 2024-01-22

Touring Eco System crossword puzzle
Across
  1. department to hand all video
  2. artist party
  3. office set up and break down
  4. Oversee and guide every aspect of artist career
  5. oversees the touring entity
  6. department to hand all lighting
  7. crew party
  8. department to hand all special effects
Down
  1. handles all elements flown overhead
  2. band party
  3. handles all travel and logistic bookings for the tour
  4. techs all instruments on stage
  5. department to handle sound
  6. in charge of tour/artist logistics
  7. Responsible for booking performances
  8. oversees all security for the tour
  9. oversees all production to the tour

17 Clues: band partycrew partyartist partydepartment to handle soundoversees the touring entitydepartment to hand all videooffice set up and break downtechs all instruments on stagedepartment to hand all lightingin charge of tour/artist logisticsoversees all security for the tourhandles all elements flown overheadoversees all production to the tour...

Airport by: Madelyn Horner 2022-10-13

Airport by: Madelyn Horner crossword puzzle
Across
  1. buy
  2. screen
  3. passenger
  4. arrive
  5. airport
  6. security
  7. vacation
  8. customs
  9. confirm
Down
  1. flight
  2. call
  3. passport
  4. train
  5. suitcase
  6. board
  7. luggage
  8. station
  9. reclaim
  10. ticket
  11. to travel

20 Clues: buycalltrainboardflightscreenarriveticketairportluggagestationreclaimcustomsconfirmpassportsuitcasesecurityvacationpassengerto travel

Ir De Vacaciones 2022-10-13

Ir De Vacaciones crossword puzzle
Across
  1. luggage
  2. gate
  3. suitcase
  4. confirm
  5. departure
  6. travel
  7. itinerary
  8. ticket
  9. passport
  10. arrival
  11. board
  12. screen
Down
  1. flight
  2. ID
  3. agent
  4. Line
  5. airport
  6. passenger
  7. security
  8. call

20 Clues: IDgateLinecallagentboardflighttravelticketscreenluggageairportconfirmarrivalsuitcasepassportsecuritydeparturepassengeritinerary

profesions 2019-10-30

profesions crossword puzzle
Across
  1. ārsts
  2. skolotāja
  3. maiznieks
  4. inženieris
  5. agronoms
  6. grāmatvedis
  7. analītiķis
  8. audiologopēds
  9. arborists
Down
  1. policists
  2. medmāsa
  3. apsardze
  4. vetārsts
  5. mehatroniķis
  6. pilots
  7. kinologs
  8. kosmētiķis
  9. taksists
  10. mežcirtējs
  11. ugunsdzēsējs

20 Clues: ārstspilotsmedmāsaapsardzevetārstsagronomskinologstaksistspolicistsskolotājamaiznieksarboristsinženieriskosmētiķisanalītiķismežcirtējsgrāmatvedismehatroniķisugunsdzēsējsaudiologopēds

crossword 2017-04-21

crossword crossword puzzle
Across
  1. peaceful
  2. many_islands
  3. disorder
  4. misery
  5. control
  6. anger
  7. anticipate
  8. naval
  9. trembling
  10. threatening
  11. island
Down
  1. brave
  2. ordinary
  3. delay
  4. safety
  5. cry
  6. a_war_ship
  7. beam
  8. deep
  9. storm

20 Clues: crybeamdeepbravedelayangernavalstormsafetymiseryislandcontrolordinarypeacefuldisordertremblinga_war_shipanticipatethreateningmany_islands

Spanish Vocab 1.1 - Kyle McCormick 2018-09-13

Spanish Vocab 1.1 - Kyle McCormick crossword puzzle
Across
  1. trip
  2. pilot
  3. passenger
  4. identification
  5. security
  6. passport
  7. sign
  8. airline
  9. suitcase
  10. aisle
  11. arrival
Down
  1. ticket
  2. to board
  3. counter
  4. window
  5. customs
  6. flight
  7. seat
  8. luggage
  9. departure

20 Clues: tripseatsignpilotaisleticketwindowflightcountercustomsairlineluggagearrivalto boardsecuritypassportsuitcasepassengerdepartureidentification

NULL 2023-11-07

NULL crossword puzzle
Across
  1. e
  2. b
  3. p
  4. c
  5. q
  6. f
  7. o
  8. m
  9. h
  10. i
  11. j
Down
  1. d
  2. a
  3. k
  4. s
  5. n
  6. g
  7. r
  8. l
  9. t

20 Clues: dakebpsngrlcqftomhij

Sjdb 2025-10-01

Sjdb crossword puzzle
Across
  1. departure
  2. passenger
  3. suitcase
  4. itinerary
  5. ToGoOnVacasion
  6. GoThroughCustoms
  7. ToBoard
  8. arrival
  9. ToGetInLine
  10. airport
  11. passport
Down
  1. boardingpass
  2. ToCallSomeone
  3. TravelAgency
  4. security
  5. ticket
  6. moniter
  7. gate
  8. luggage
  9. Flight

20 Clues: gateticketFlightmoniterToBoardarrivalluggageairportsuitcasesecuritypassportdeparturepassengeritineraryToGetInLineboardingpassTravelAgencyToCallSomeoneToGoOnVacasionGoThroughCustoms

BIMBINGAN KONSELING 2023-10-27

BIMBINGAN KONSELING crossword puzzle
Across
  1. : ORANG YANG MEMBULLY
  2. STANDER : ORANG YANG MELIHAT KEJADIAN BULLYING
  3. : BULLYING YANG TERJADI DI MASYARAKAT
  4. : BULLYING YANG TERJADI DI DUNIA MAYA
  5. : TINDAKAN MENYAKITI ORANG LAIN SECARA BERULANG
Down
  1. : BULLYING MEMUKUL ORANG LAIN
  2. : BULLYING DENGAN MENGOLOK NAMA ORANG TUA
  3. : ORANG YANG DIBULLY
  4. : MELAPORKAN KE SIAPA BULLYING DI SEKOLAH

9 Clues: : ORANG YANG DIBULLY: ORANG YANG MEMBULLY: BULLYING MEMUKUL ORANG LAIN: BULLYING YANG TERJADI DI MASYARAKAT: BULLYING YANG TERJADI DI DUNIA MAYA: BULLYING DENGAN MENGOLOK NAMA ORANG TUA: MELAPORKAN KE SIAPA BULLYING DI SEKOLAHSTANDER : ORANG YANG MELIHAT KEJADIAN BULLYING: TINDAKAN MENYAKITI ORANG LAIN SECARA BERULANG

Security Awareness crossword puzzle 2018-05-07

Security Awareness crossword puzzle crossword puzzle
Across
  1. _______ your data regularly and periodically check that you are able to restore them.
  2. Do not provide your _______ email account to social networks.
  3. _______ your computer when left unattended.
  4. This can slow down your computer and watch everywhere you go on the Internet.
  5. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
  6. Always use _______ factor authentication where available.
  7. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  8. Use a _______ password different from the passwords you use to access other sites.
Down
  1. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  2. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  3. You should always keep your software and anti-virus definitions up-to-_______.
  4. Cybersecurity is _______'s responsibility.
  5. Information Security is a _______ issue.
  6. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  7. _______ before you click or forward.

15 Clues: _______ before you click or forward.Information Security is a _______ issue.Cybersecurity is _______'s responsibility._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks....

Nina Nunez 2013-03-27

Nina Nunez crossword puzzle
Across
  1. personl stuff.
  2. websitets that contains data
  3. aout a particular topic
  4. of the internet and thats ileagle.
Down
  1. is a person that gose into other
  2. when you copy
  3. bully- a bully that
  4. on line useing the internet.

8 Clues: when you copypersonl stuff.bully- a bully thataout a particular topicon line useing the internet.websitets that contains datais a person that gose into otherof the internet and thats ileagle.

Safety online 2023-04-20

Safety online crossword puzzle
Across
  1. always be .....online
  2. do not share your ..... information
  3. ........bullying
Down
  1. if you are being bullied, tell a ....adult
  2. always be safe on social ....
  3. stay .. online
  4. .... any bad or abusive person
  5. remember to always have your ....settings on

8 Clues: stay .. online........bullyingalways be .....onlinealways be safe on social ........ any bad or abusive persondo not share your ..... informationif you are being bullied, tell a ....adultremember to always have your ....settings on

computing comunications 2025-10-10

computing comunications crossword puzzle
Across
  1. a network has it
  2. is a slow transmission medium
  3. a large network of networks.
  4. a cyber crime.
  5. a message is split into...
Down
  1. fastest transmission medium.
  2. every computer has its own unique one.
  3. a phishing email may contain...

8 Clues: a cyber crime.a network has ita message is split into...fastest transmission medium.a large network of networks.is a slow transmission mediuma phishing email may contain...every computer has its own unique one.

Spanish Vacation Vocabulary 2024-07-16

Spanish Vacation Vocabulary crossword puzzle
Across
  1. viaje
  2. vuelo
  3. puerta
  4. identificación
  5. aeropuerto
  6. llamar
  7. pasajero(a)
  8. salida
  9. maleta
  10. pantalla
Down
  1. llegada
  2. aduana
  3. equipaje
  4. vacaciones
  5. turismo
  6. seguridad
  7. abordar
  8. itinerario
  9. boleto
  10. pasaporte

20 Clues: viajevueloaduanapuertaboletollamarsalidamaletallegadaturismoabordarequipajepantallaseguridadpasaportevacacionesitinerarioaeropuertopasajero(a)identificación

Laki ja yhteiskunta 2023-06-06

Laki ja yhteiskunta crossword puzzle
Across
  1. oikeudenkäynti
  2. tuomio
  3. todistaa
  4. syyttäjä
  5. syyttää
  6. ehdonalainen
  7. turvallisuus
  8. sakkorangaistus
Down
  1. pidättää
  2. varas
  3. todistaja
  4. varkaus
  5. taskuvaras
  6. murtovarkaus
  7. asianajaja
  8. tuomari
  9. salakuljettaa
  10. valamiehistö
  11. väärennös
  12. armahdus

20 Clues: varastuomiovarkaustuomarisyyttääpidättäätodistaasyyttäjäarmahdustodistajaväärennöstaskuvarasasianajajamurtovarkausvalamiehistöehdonalainenturvallisuussalakuljettaaoikeudenkäyntisakkorangaistus

Selfie Horror Story 2022-12-12

Selfie Horror Story crossword puzzle
Across
  1. ladda upp
  2. anonym
  3. säkerhet
  4. konto
  5. livlina
  6. allvarligt
  7. försök
  8. orolig
  9. omedelbart
Down
  1. kränkt
  2. spår
  3. lösenord
  4. direkt
  5. störa
  6. nyligen
  7. radera
  8. anta
  9. formulär
  10. trösta
  11. förbryllad

20 Clues: spårantastörakontokränktanonymdirektraderatröstaförsökorolignyligenlivlinalösenordsäkerhetformulärladda uppallvarligtförbrylladomedelbart

Jonathan M crssword 2023-09-07

Jonathan M crssword crossword puzzle
Across
  1. techsupport
  2. email
  3. investigating
  4. repair
  5. encryption
  6. strongpassword
  7. password
  8. databreach
  9. router
  10. alerting
Down
  1. access
  2. data breach
  3. systemlocation
  4. userleaked
  5. virtualprivatenetwork
  6. protection
  7. typeofmalware
  8. infectswithmalware
  9. securing
  10. copieddata

20 Clues: emailaccessrepairroutersecuringpasswordalertinguserleakedprotectionencryptioncopieddatadatabreachtechsupportdata breachinvestigatingtypeofmalwaresystemlocationstrongpasswordinfectswithmalwarevirtualprivatenetwork

UN 2023-05-04

UN crossword puzzle
Across
  1. 11
  2. 12
  3. 2
  4. 8
  5. 9
  6. 15
  7. 14
  8. 4
  9. 7
  10. 16
Down
  1. 1
  2. 18
  3. 19
  4. 5
  5. 3
  6. 13
  7. 17
  8. 6
  9. 10
  10. 20

20 Clues: 1258396471118191213171015201416

internet.01 2019-05-10

internet.01 crossword puzzle
Across
  1. verbreitete Lügen
  2. eine Art daten zu sichern
  3. gemeine Kommentare
Down
  1. man kann süchtig danach sein
  2. Belästigung im Internet
  3. eine Art beweise zu sichern
  4. auch Abhängigkeit genannt

7 Clues: verbreitete Lügengemeine KommentareBelästigung im Internetauch Abhängigkeit genannteine Art daten zu sicherneine Art beweise zu sichernman kann süchtig danach sein

Investing Cassie Marquis 2025-03-25

Investing Cassie Marquis crossword puzzle
Across
  1. The increase in value of an asset (2 words)
  2. A major cryptocurrency exchange that crashed in 2022 due to fund mismanagement and lack of liquidity
  3. When a private company offers shares to the public in a new stock issuance
  4. A collection of stocks, bonds or other assets that trades on a stock exchange
  5. Age you must be to invest
  6. The availability of cash or the ease in which an asset can be converted into cash
  7. A pool of money from a large group of investors to purchase a diverse portfolio of stocks, bonds and other securities (2 words)
  8. The distribution of some of a company’s earnings to a class of its shareholders as determined by the company’s board of directors
  9. Provides retirement, survivor and disability benefits. Predicted to collapse in the mid 2030’s. (2 words)
  10. Age that you can delay collecting social security security benefits to get more benefits
  11. Digital money generated by computers. It’s value comes from its limited supply
  12. A system of recording information in a way that makes it difficult to change, hack or cheat the system
  13. A plan managed by your employer that you, the state (sometimes) and your employer put money into.
  14. A type of bond issued by the government (2 words)
Down
  1. How much you’re paying for each dollar of the company’s earnings (2 words)
  2. Federal payroll tax deducted from each paycheck to pay for social security and medicare
  3. Currencies backed by the government that aren’t tied to a commodity (2 words)
  4. Companies that have shares typically less than 5 dollars (2 words)
  5. A type of mutual fund or ETF that follows a benchmark index or a particular segment of the market
  6. The total value of a company’s stock (2 words)
  7. CEO of Berkshire Hathaway (2 words)
  8. 3-4 letters that represent a publicly traded company (2 words)
  9. Age where you can collect full social security benefits
  10. A type of bond issued by a company
  11. A security that represents ownership of a portion of a company

25 Clues: Age you must be to investA type of bond issued by a companyCEO of Berkshire Hathaway (2 words)The increase in value of an asset (2 words)The total value of a company’s stock (2 words)A type of bond issued by the government (2 words)Age where you can collect full social security benefits3-4 letters that represent a publicly traded company (2 words)...

Investing - Dylan Abellera 2025-03-24

Investing - Dylan Abellera crossword puzzle
Across
  1. A unique series of letters or a combination of letters and numbers.
  2. Nationally or Internationally recognized, Financially Sound Company.
  3. An individual who buys and sells with the intention of profiting from short-term price fluctuations.
  4. A portion of a company’s earnings distributed to shareholders as a return on their investment, usually in cash.
  5. The profit realized from the sale of a capital asset like stocks or real estate.
  6. Taxes that fund Social Security and Medicare.
  7. A regular guaranteed payment to a person when they retire.
  8. Investing all the money you have available at that given time, and putting it into the market.
  9. CEO of Berkshire Hathaway. One of the greatest investors of all time.
  10. A collection of stocks, bonds, or other assets that trades on a stock exchange.
  11. The ease with which an asset or security can be converted into cash.
  12. A financial marketplace where investors can buy and sell shares of companies.
  13. A type of mutual fund, or ETF that follows a benchmark index, portion of the market.
  14. A type of security representing ownership in a company.
  15. Putting funds into a new investment account after leaving a company.
Down
  1. A unit of ownership in a company, dividing its ownership into equal parts.
  2. Pools money from a large group of investors to purchase a portfolio of stocks.
  3. Can contribute up to seven-thousand dollars in these kinds of retirement accounts each year.
  4. Spreading investments across different assets to reduce risk exposure.
  5. A market in which prices are falling and a pessimistic outlook overall.
  6. An individual who allocates capital into various financial assets with the expectation of generating long-term returns.
  7. the process of offering shares of a private corporation to the public in a new stock issuance.
  8. Worked for a certain amount of time with a company, to own all of the matched money from your employer.
  9. The age you can receive full social security retirement benefits.
  10. Security Provides retirement, survivor, and disability benefits to millions of Americans.

25 Clues: Taxes that fund Social Security and Medicare.A type of security representing ownership in a company.A regular guaranteed payment to a person when they retire.The age you can receive full social security retirement benefits.A unique series of letters or a combination of letters and numbers....

New Theme 2023-03-05

New Theme crossword puzzle
Across
  1. the application of scientific knowledge for practical purposes
  2. antonym of ineffective
  3. the exchange of information by speaking or writing or through another medium
  4. a condition that makes something better
Down
  1. antonym of advantages
  2. facts provided about something or someone
  3. the acquisition of knowledge
  4. an electronic device for storing and processing data
  5. relating to the present
  6. ready to give help
  7. relating to the culture of computers
  8. the means to enter a place

12 Clues: ready to give helpantonym of advantagesantonym of ineffectiverelating to the presentthe means to enter a placethe acquisition of knowledgerelating to the culture of computersa condition that makes something betterfacts provided about something or someonean electronic device for storing and processing data...

Digital Citizenship 2024-05-07

Digital Citizenship crossword puzzle
Across
  1. ____before you type
  2. the digital ____ includes texts,social media, and video games
  3. always get this before posting online
  4. type of bullying that happens online
Down
  1. if you see bullying online, you should ____ it
  2. ____ citizen
  3. ___ your time on and offline
  4. ____ yourself and others online
  5. the K in THINK

9 Clues: ____ citizenthe K in THINK____before you type___ your time on and offline____ yourself and others onlinetype of bullying that happens onlinealways get this before posting onlineif you see bullying online, you should ____ itthe digital ____ includes texts,social media, and video games

Billionaires 2025-01-10

Billionaires crossword puzzle
Across
  1. The Gulf of America
  2. "Beyonce had one of the best videos of all time"
  3. "Hes wired in" "My Prada's at the cleaners"
  4. In her billionaire era
Down
  1. Other word for fence
  2. Lip Kit queen
  3. Cyber truck inventor
  4. Prime members get "it" quick
  5. NBAs shark in the tank"

9 Clues: Lip Kit queenThe Gulf of AmericaOther word for fenceCyber truck inventorIn her billionaire eraNBAs shark in the tank"Prime members get "it" quick"Hes wired in" "My Prada's at the cleaners""Beyonce had one of the best videos of all time"

AVSEC QC Crossword #2 2025-04-09

AVSEC QC Crossword #2 crossword puzzle
Across
  1. The auditor should display __________ while conducting an interview
  2. _____________ consists of repeating in simple terms the answers provided by the interviewee. It is a method for clarifying information and a means of verifying what has been stated by the person
  3. Security _________ is an inquiry into any act or attempted act of unlawful interference against civil aviation and/or any alleged or suspected instance of non-compliance with a State’s National Civil Aviation Security Programme
  4. The Interim Findings Report will serve as a basis for the presentation during the post inspection debriefing and the final _________
  5. Any enforcement action taken by a State would require ________ Authority
  6. For practical purposes a __________ is a smaller document, one that is easy to handle, would make the inspectors’ job efficient. This kind of document will be complementary to the inspection guide
Down
  1. the _____________ Authority determines the categories of compliance to be used during inspections
  2. The pre-inspection _____________ is a document, which is sent to the airport authority or inspected entity prior to the inspection to collect current information
  3. Security ___________ evaluation of security needs including the identification of vulnerabilities which could be exploited to carry out an act of unlawful interference, and the recommendation of corrective actions.
  4. __________ is a phenomenon that will translate into a passive situation whereby the persons questioned withhold information; mask information; block communication
  5. Security ________ is a covert or overt trial of an aviation security measure, which simulates an attempt to commit an unlawful act
  6. Benchmark, _________ and auditor are the three components of the inspection concept
  7. The auditee must be provided with __________ regarding inspection findings during the post-inspection meeting

13 Clues: The auditor should display __________ while conducting an interviewAny enforcement action taken by a State would require ________ AuthorityBenchmark, _________ and auditor are the three components of the inspection conceptthe _____________ Authority determines the categories of compliance to be used during inspections...

Industrial Security Trivia 2024-04-24

Industrial Security Trivia crossword puzzle
Across
  1. Access to classified information requires Eligibility, Access and ________________
  2. who must have a Scale-related purpose for entering workspaces
  3. what must be displayed at all times while inside Scale workspaces
  4. what does CUI stand for
Down
  1. who must you inform regarding a potential or actual security incident
  2. a person with authorized access to any organization or government resource who uses their access wittingly or unwittingly to do harm
  3. Never take __________ and save sensitive task imagery on your computers
  4. _______ is everyone's responsibility
  5. _______ emails must be forwarded/reported to security@scale.com
  6. Unauthorized disclosure of this information would cause SERIOUS DAMAGE to national security

10 Clues: what does CUI stand for_______ is everyone's responsibilitywho must have a Scale-related purpose for entering workspaces_______ emails must be forwarded/reported to security@scale.comwhat must be displayed at all times while inside Scale workspaceswho must you inform regarding a potential or actual security incident...

safer internet day 2023-02-06

safer internet day crossword puzzle
Across
  1. _______ are not your friends
  2. ____ fun be nice
  3. internet
Down
  1. _____ police
  2. _____ internet day
  3. is
  4. ______ sharing is not allowed

7 Clues: isinternet_____ police____ fun be nice_____ internet day_______ are not your friends______ sharing is not allowed

Digital citizenship 2021-06-03

Digital citizenship crossword puzzle
Across
  1. being on a device
  2. someone witnessing a conflict
  3. everything you do online is you're .....
  4. treat people the way you want to be treated
  5. being mean to someone repeatedly online
Down
  1. a place you can go if being cyber bullied
  2. behaving
  3. pretending to be someone you're not
  4. being safe

9 Clues: behavingbeing safebeing on a devicesomeone witnessing a conflictpretending to be someone you're notbeing mean to someone repeatedly onlineeverything you do online is you're .....a place you can go if being cyber bulliedtreat people the way you want to be treated

Cyber - safety Thomas 2016-06-06

Cyber - safety Thomas crossword puzzle
Across
  1. - don't tell anyone your p.......
  2. - don't spend too much .... online (hint hours, and minutes)
  3. - to take care of your personal information
  4. - something mean people do to you online
  5. - bad language that you shouldn't use on the internet
  6. - types of bad emails that you get, that ask you to forward them on
  7. - don't play too many of these online
Down
  1. - types of sites that we are allowed to visit
  2. - sites on the Internet you visit
  3. - if you .... something is wrong, then tell mum or dad
  4. - to dob on someone to mum or dad if you think something isn't right
  5. - always ask your parents when it asks to spend money and ... Something
  6. - only talk to these people online, they are your .......
  7. - you go ...... To connect to the internet

14 Clues: - don't tell anyone your p.......- sites on the Internet you visit- don't play too many of these online- something mean people do to you online- to take care of your personal information- you go ...... To connect to the internet- types of sites that we are allowed to visit- bad language that you shouldn't use on the internet...

Cyber-bullying vocabulary 2019-07-23

Cyber-bullying vocabulary crossword puzzle
Across
  1. Publishing or making available personally-identifying information about another.
  2. The practice of forcing someone to do something, particularly to perform sexual acts, by threatening to publish naked pictures of them or sexual information about them
  3. When a person anonymously sends himself/herself instructions to self-harm or self-injure.
  4. Posting or publishing embarrassing or damaging photos or videos.
  5. A collection of behavioral suggestions and/or rules to make online interaction more pleasant for everyone
  6. Gossiping or spreading rumors about a person.
  7. Revealing private or embarrassing information about a person.
Down
  1. When a person sends electronic messages with angry and vulgar language.
  2. Or 'imping'. It means pretending to be someone else.
  3. Monitoring a person's activities or placing a person under surveillance to instill fear. Adult contact and attempt to meet with young people for sexual purposes.
  4. Repeatedly sending offensive messages to cause a person to fear for their safety.
  5. When somebody logs into your social networking account and impersonates you by posting inappropriate content in your name.
  6. Engaging in activities intentionally to exclude someone from a formal or informal group.
  7. Persuading a person to reveal secret or embarrassing information they would not otherwise reveal. The cyberbully then shares it publicly online.

14 Clues: Gossiping or spreading rumors about a person.Or 'imping'. It means pretending to be someone else.Revealing private or embarrassing information about a person.Posting or publishing embarrassing or damaging photos or videos.When a person sends electronic messages with angry and vulgar language....

Cyber Week 2025 2025-12-03

Cyber Week 2025 crossword puzzle
Across
  1. A covering used for warmth on a bed
  2. Get your photos printed on this
  3. A day for online shopping
  4. A fried pastry filled with ingredients like egg and tuna
  5. A celebratory public march
  6. Falls in flakes and is white
  7. Customer Love Team
  8. Our favorite place to work
Down
  1. What you do when a customer wants a promo honored
  2. The fourth product under Photo Gifts on ECP
  3. Busiest day of the year for retail
  4. What Texas is known for, a popular NFL team
  5. The colors of the flag is black, green, and gold
  6. Originally the 10th month, this is now the modern 12th month

14 Clues: Customer Love TeamA day for online shoppingA celebratory public marchOur favorite place to workFalls in flakes and is whiteGet your photos printed on thisBusiest day of the year for retailA covering used for warmth on a bedThe fourth product under Photo Gifts on ECPWhat Texas is known for, a popular NFL team...

BIMBINGAN KONSELING 2023-03-08

BIMBINGAN KONSELING crossword puzzle
Across
  1. Nama lain dari empati
  2. Gangguan kesehatan mental akibat tindakan bullying
  3. Gangguan kesehatan fisik akibat tindakan bullying
  4. Korban jebakan pemikiran orang yang berbeda
  5. Penindasan berupa julukan nama, celaan atau fitnah
  6. Penindasan dengan menggunakan kekerasan seperti memukul
Down
  1. Pelaku bullying
  2. Nama lain dari tindakan bullying
  3. Salah satu faktor penyebab terjadinya bullying
  4. Kemampuan memahami secara emosional perasaan orang lain
  5. Penindasan lewat jagat maya
  6. Reaksi fisik dalam menanggapi apa yang dialami orang lain
  7. Korban tindakan pembullian

13 Clues: Pelaku bullyingNama lain dari empatiKorban tindakan pembullianPenindasan lewat jagat mayaNama lain dari tindakan bullyingKorban jebakan pemikiran orang yang berbedaSalah satu faktor penyebab terjadinya bullyingGangguan kesehatan fisik akibat tindakan bullyingGangguan kesehatan mental akibat tindakan bullying...

IT Application and Emerging Technologies - crossword Puzzel 2025-09-15

IT Application and Emerging Technologies - crossword Puzzel crossword puzzle
Across
  1. Virtual environment for immersive experience
  2. A decentralized digital currency
  3. Machines simulating human intelligence
  4. Computers designed to mimic the human brain
  5. Smart devices connected via the internet (3)
  6. Technology enabling virtual meetings
  7. Protects against cyber threats
  8. Collection and analysis of huge data sets
  9. Ability of machines to learn from data
Down
  1. Tracking technology used in logistics and shopping
  2. Replacing paper-based systems with computers (11)
  3. Sharing resources over the internet
  4. 3D _________, used in manufacturing

13 Clues: Protects against cyber threatsA decentralized digital currencySharing resources over the internet3D _________, used in manufacturingTechnology enabling virtual meetingsMachines simulating human intelligenceAbility of machines to learn from dataCollection and analysis of huge data setsComputers designed to mimic the human brain...

EATSS Crossword 2023-06-29

EATSS Crossword crossword puzzle
Across
  1. To request an ______ press F4 on the keyboard while on the TPQY screen.
  2. ______ of all accounts must be on file prior to completing a determination.
  3. Records that include all zeros on the screen.
  4. Supplemental Security Income (SSI) page.
  5. Used when making determination for coverage.
  6. 4 levels of an SSA ______.
  7. SSA Disability shows SSA payment status of "_____ payment".
Down
  1. Screen divided into SSA information and SSI information.
  2. A rep ______ is person/organization appointed to receive SS or SSI benefits for individuals.
  3. Error message: "Do not have _____ to access SSN."
  4. Screen listing information specific to SSA Benefits.
  5. Abbreviation for Electronic Access To Social Security.
  6. F12 is used to ______ the system.
  7. ______ began date. Date Social Security determined the consumer's _____ began.

14 Clues: 4 levels of an SSA ______.F12 is used to ______ the system.Supplemental Security Income (SSI) page.Used when making determination for coverage.Records that include all zeros on the screen.Error message: "Do not have _____ to access SSN."Screen listing information specific to SSA Benefits.Abbreviation for Electronic Access To Social Security....

Panther Cross Word 2022-04-29

Panther Cross Word crossword puzzle
Across
  1. The largest End Point Detection vendor on the market
  2. The fastest growing area to store company data
  3. A computer or system that mimics a target that a hacker would go after. It is used as a way to collect data on different attack patterns
  4. The word used to describe the adding of additional contextual data to alerts in order to cut down on noise. Greynoise helped us with this.
  5. The acronym used to describe a fully outsourced solution for threat detection
  6. A 3rd party vendor who acts as a middleman to distribute software
  7. Refers to data exiting a network
  8. Refers to data entering into a network
  9. A receipt of any action performed within a system
  10. A compliance-driven evaluation that reveals where you're susceptible to an attack
  11. The acronym used to describe a solution type that detections user behavior for anything malicious
Down
  1. This compliance is imposed on companies that do business in within the EMEA
  2. The most utilized cybersecurity framework in the world
  3. A phrase coined by Panther to describe one of our biggest differentiators
  4. This compliance is imposed on companies that collect health care data
  5. The practice of protecting systems, networks, and programs from cyber attacks
  6. The largest SIEM vendor in the world
  7. This compliance is imposed on companies that collect credit card data
  8. A solution that aggregates logs
  9. Acronym that describes Endpoint detection combined with Threat Detection
  10. This compliance is imposed on companies that collect other companies information
  11. Refers to different events being interconnected that paint a conclusion
  12. A 3rd party vendor who you can outsource your cybersecurity to
  13. This is typically the gatekeeper for your network and the first line of cyber defense

24 Clues: A solution that aggregates logsRefers to data exiting a networkThe largest SIEM vendor in the worldRefers to data entering into a networkThe fastest growing area to store company dataA receipt of any action performed within a systemThe largest End Point Detection vendor on the marketThe most utilized cybersecurity framework in the world...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  2. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  3. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  4. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  5. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  6. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  7. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  8. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
  9. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
  10. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
  11. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
  12. program kecil yang dapat merusak sistem komputer (5 huruf)
  13. perbuatan melanggar hukum didunia maya (10 huruf)
Down
  1. peraturan yang melindungi data pribadi (16 huruf)
  2. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  3. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  4. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  5. berbuat menyebar informasi yang merugikan orang lain (14 huruf)
  6. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
  7. aturan dan normal berperilaku baik di media sosial (11 huruf)
  8. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  9. pencurian hak cipta (11 huruf)
  10. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  11. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  12. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  13. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  14. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  15. penyebaran informasi palsu yang luas (4 huruf)
  16. perilaku tidak atau kasar di dunia maya (10 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)peraturan yang melindungi data pribadi (16 huruf)perbuatan melanggar hukum didunia maya (10 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  2. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  3. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  4. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
  5. peraturan yang melindungi data pribadi (16 huruf)
  6. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  7. perbuatan melanggar hukum didunia maya (10 huruf)
  8. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
  9. perilaku tidak atau kasar di dunia maya (10 huruf)
  10. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  11. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  12. pencurian hak cipta (11 huruf)
  13. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  14. aturan dan normal berperilaku baik di media sosial (11 huruf)
  15. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  16. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  17. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  18. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
Down
  1. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  2. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  3. program kecil yang dapat merusak sistem komputer (5 huruf)
  4. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  5. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  6. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  7. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  8. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
  9. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
  10. penyebaran informasi palsu yang luas (4 huruf)
  11. berbuat menyebar informasi yang merugikan orang lain (14 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)peraturan yang melindungi data pribadi (16 huruf)perbuatan melanggar hukum didunia maya (10 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

mass media 2022-10-26

mass media crossword puzzle
Across
  1. УНИЖЕНИЕ
  2. РЕКЛАМИРОВАТЬ
  3. ПЕРЕДАЧА, ТРАНСЛЯЦИЯ
  4. КАНАЛ
  5. СЕТЬ
  6. СООБЩЕНИЕ
  7. ОБСУЖДЕНИЕ
  8. УГРОЖАТЬ
  9. ГРУБЫЙ
  10. АКТУАЛЬНЫЙ
Down
  1. ГРАЖДАНИН
  2. ОБМЕНИВАТЬСЯ
  3. ИНФОРМАЦИЯ
  4. ОБЩАТЬСЯ
  5. СОЗДАВАТЬ
  6. НОВОСТИ
  7. ВМЕСТО
  8. ПОРТИТЬ
  9. СТЫД
  10. БЕЗОПАСНОСТЬ

20 Clues: СЕТЬСТЫДКАНАЛВМЕСТОГРУБЫЙНОВОСТИПОРТИТЬУНИЖЕНИЕОБЩАТЬСЯУГРОЖАТЬГРАЖДАНИНСОЗДАВАТЬСООБЩЕНИЕИНФОРМАЦИЯОБСУЖДЕНИЕАКТУАЛЬНЫЙОБМЕНИВАТЬСЯБЕЗОПАСНОСТЬРЕКЛАМИРОВАТЬПЕРЕДАЧА, ТРАНСЛЯЦИЯ

Ir De Vacaciones 2022-10-13

Ir De Vacaciones crossword puzzle
Across
  1. luggage
  2. gate
  3. suitcase
  4. confirm
  5. departure
  6. travel
  7. itinerary
  8. ticket
  9. passport
  10. arrival
  11. board
  12. screen
Down
  1. flight
  2. ID
  3. agent
  4. Line
  5. airport
  6. passenger
  7. security
  8. call

20 Clues: IDgateLinecallagentboardflighttravelticketscreenluggageairportconfirmarrivalsuitcasepassportsecuritydeparturepassengeritinerary

Selfie Horror Story 2024-11-25

Selfie Horror Story crossword puzzle
Across
  1. anonym
  2. livlina
  3. formulär
  4. direkt
  5. lösenord
  6. anta
  7. omedelbart
  8. nyligen
  9. förbryllad
  10. ladda upp
  11. störa
Down
  1. trösta
  2. orolig
  3. konto
  4. allvarligt
  5. spår
  6. kränkt
  7. radera
  8. försök
  9. säkerhet

20 Clues: spårantakontostöratröstaoroliganonymdirektkränktraderaförsöklivlinanyligenformulärlösenordsäkerhetladda uppallvarligtomedelbartförbryllad

chapter 10 2020-09-05

chapter 10 crossword puzzle
Across
  1. The percentages of customer deposits commercial banks must keep on reserve with a Federal Reserve Bank.2w
  2. A contract between a seller (vendor) and a buyer (vendee) of real estate, in which the seller retains legal title to the property while the buyer pays off the purchase price in installments.2w
  3. The Fed’s activities in buying and selling government securities.3w
  4. The document a mortgagee gives to the mortgagor when the mortgage debt is paid off, releasing the property from the lien. Also called a satisfaction piece.3w
  5. A two-party security instrument that gives the lender (mortgagee) the right to foreclose on the security property by judicial process if the borrower (mortgagor) defaults.
  6. A provision in loan documents that gives the lender the right to demand immediate payment in full if the borrower defaults.2w
  7. Two interest rates controlled by the Fed that have an effect on market interest rates.
  8. The local finance market, where individuals obtain loans from banks, savings and loans, and other types of mortgage lenders.2w
  9. The national finance market, where mortgages are bought and sold as investments.2w
  10. A provision in a security instrument that gives the lender the right to accelerate the loan if the borrower transfers the property; also called a due-on-sale-clause.2w
  11. The document the trustee gives the trustor when the debt secured by a deed of trust is paid off, releasing the property from the lien.3w
Down
  1. A provision giving the borrower the right to regain title to the security property when the debt is repaid.2w
  2. A three-party security instrument that includes a power of sale clause, allowing the trustee to foreclose non-judicially if the borrower (trustor) fails to pay the lender (beneficiary) or otherwise defaults.3w
  3. A written promise to repay a debt.2w
  4. The body that regulates commercial banks and sets and implements the federal government’s monetary policy; commonly called “the Fed”.3w
  5. When a borrower sells the security property to a buyer who agrees to take on personal liability for repayment of the existing mortgage or deed of trust.

16 Clues: A written promise to repay a debt.2wThe Fed’s activities in buying and selling government securities.3wThe national finance market, where mortgages are bought and sold as investments.2wTwo interest rates controlled by the Fed that have an effect on market interest rates....

Elle Severt- Types of bullying 2022-05-17

Elle Severt- Types of bullying crossword puzzle
Across
  1. Cyber bullying can be someone texting or posting something __ photos of people.
  2. Jake threatened to beat up Marc after school, what is this?
  3. Amy spreads a rumor about Lou to make everyone hate her, what type of bullying is this?
  4. Social bullying is spreading rumors,__ people from games and groups
Down
  1. Steven gets a message from Arthur that he's weak and bad at the game they're playing, what type of bullying is this?
  2. Layla spits on Jenny and laughs at her outfit, what is this?
  3. Verbal bullying contains someone ___ someone to do some kind of harm to them.

7 Clues: Jake threatened to beat up Marc after school, what is this?Layla spits on Jenny and laughs at her outfit, what is this?Social bullying is spreading rumors,__ people from games and groupsVerbal bullying contains someone ___ someone to do some kind of harm to them.Cyber bullying can be someone texting or posting something __ photos of people....

Investing Cassie Marquis 2025-03-25

Investing Cassie Marquis crossword puzzle
Across
  1. The increase in value of an asset (2 words)
  2. A major cryptocurrency exchange that crashed in 2022 due to fund mismanagement and lack of liquidity
  3. When a private company offers shares to the public in a new stock issuance
  4. A collection of stocks, bonds or other assets that trades on a stock exchange
  5. Age you must be to invest
  6. The availability of cash or the ease in which an asset can be converted into cash
  7. A pool of money from a large group of investors to purchase a diverse portfolio of stocks, bonds and other securities (2 words)
  8. The distribution of some of a company’s earnings to a class of its shareholders as determined by the company’s board of directors
  9. Provides retirement, survivor and disability benefits. Predicted to collapse in the mid 2030’s. (2 words)
  10. Age that you can delay collecting social security security benefits to get more benefits
  11. Digital money generated by computers. It’s value comes from its limited supply
  12. A system of recording information in a way that makes it difficult to change, hack or cheat the system
  13. A plan managed by your employer that you, the state (sometimes) and your employer put money into.
  14. A type of bond issued by the government (2 words)
Down
  1. How much you’re paying for each dollar of a company’s earnings (2 words)
  2. Federal payroll tax deducted from each paycheck to pay for social security and medicare
  3. Currencies backed by the government that aren’t tied to a commodity (2 words)
  4. Companies that have shares typically less than 5 dollars (2 words)
  5. A type of mutual fund or ETF that follows a benchmark index or a particular segment of the market
  6. The total value of a company’s stock (2 words)
  7. CEO of Berkshire Hathaway (2 words)
  8. 3-4 letters that represent a publicly traded company
  9. Age where you can collect full social security benefits
  10. A type of bond issued by a company
  11. A security that represents ownership of a portion of a company

25 Clues: Age you must be to investA type of bond issued by a companyCEO of Berkshire Hathaway (2 words)The increase in value of an asset (2 words)The total value of a company’s stock (2 words)A type of bond issued by the government (2 words)3-4 letters that represent a publicly traded companyAge where you can collect full social security benefits...

9 krossvord 2025-02-20

9 krossvord crossword puzzle
Across
  1. Ma’lumotlarning nusxasini yaratish
  2. Ma’lumotlarni saqlovchi markaziy qurilma
  3. Internet bilan bog‘liq texnologiyalar
Down
  1. Dastur yoki tizimni yangilash jarayoni
  2. Klaviatura bosishlarini kuzatuvchi dastur
  3. Foydalanuvchini aldash orqali ma’lumot olish usuli
  4. Tizimga zarar yetkazadigan dasturiy tahdid
  5. Axborot xavfsizligiga tahdid soluvchi omil

8 Clues: Ma’lumotlarning nusxasini yaratishInternet bilan bog‘liq texnologiyalarDastur yoki tizimni yangilash jarayoniMa’lumotlarni saqlovchi markaziy qurilmaKlaviatura bosishlarini kuzatuvchi dasturTizimga zarar yetkazadigan dasturiy tahdidAxborot xavfsizligiga tahdid soluvchi omilFoydalanuvchini aldash orqali ma’lumot olish usuli

Cyber Safety-Archie webb 2016-05-24

Cyber Safety-Archie webb crossword puzzle
Across
  1. to protect your computer from viruses
  2. way to check if your computer has a virus
  3. instruction
  4. this person about cyber safety
  5. to connect
  6. virus
  7. who breaks into your computer
  8. machine that allows you to use the Internet
  9. group of computers that are connected
Down
  1. search engine
  2. for device
  3. you securely connect to a network or program
  4. Apple tablet
  5. a hacker tries to steal
  6. small device
  7. program you can stall on your device
  8. thing that protects your device
  9. you a virus
  10. large device

19 Clues: virusfor deviceto connectinstructionyou a virusApple tabletsmall devicelarge devicesearch enginea hacker tries to stealwho breaks into your computerthis person about cyber safetything that protects your deviceprogram you can stall on your deviceto protect your computer from virusesgroup of computers that are connected...

It's a quiz!!! 2024-04-25

It's a quiz!!! crossword puzzle
Across
  1. A client needs to renew their ADAP coverage, who do you connect them to?
  2. What is the extension for the testing room?
  3. True or False, clients are welcome to use our phones
  4. The password for the cyber center
  5. How long may a client use the cyber center each day?
  6. Our outgoing mail is kept in the drawer with these small, commonly requested items?
  7. How many minutes does a client need to wait to for their HIV test results?
  8. You answered a call, where do you log that call?
  9. Which day of the week does Senior Drop in happen?
  10. What we do for every client who enters the building?
Down
  1. A client has been a victim of a hate crime, which staff do we connect them with?
  2. Which room do most Senior Services events happen in?
  3. How do we identify clients here for testing appointments?
  4. The only department with a paper calendar
  5. What is the code to the testing bathroom?
  6. How many snack packs may a client have per day?
  7. The Crisis Team can be reached at this extension
  8. Are we currently accepting book donations?
  9. A client asks if we have bus passes, which department do you contact?
  10. What is the code to the dumpster?
  11. A client walks in and you don't know why they are here, what do you do?
  12. A package has arrived, who do you email?
  13. The keys are kept in the large drawer with what common office item?
  14. On the 2nd and 4th day of this month we have a food in the parking lot
  15. Who is the Manager of Youth Housing Services?

25 Clues: The password for the cyber centerWhat is the code to the dumpster?A package has arrived, who do you email?The only department with a paper calendarWhat is the code to the testing bathroom?Are we currently accepting book donations?What is the extension for the testing room?Who is the Manager of Youth Housing Services?...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  2. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
  3. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  4. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  5. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  6. pencurian hak cipta (11 huruf)
  7. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
  8. berbuat menyebar informasi yang merugikan orang lain (14 huruf)
  9. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  10. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  11. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
  12. aturan dan normal berperilaku baik di media sosial (11 huruf)
  13. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  14. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
Down
  1. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  2. perbuatan melanggar hukum didunia maya (10 huruf)
  3. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  4. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  5. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  6. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  7. peraturan yang melindungi data pribadi (16 huruf)
  8. penyebaran informasi palsu yang luas (4 huruf)
  9. program kecil yang dapat merusak sistem komputer (5 huruf)
  10. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  11. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
  12. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  13. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  14. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  15. perilaku tidak atau kasar di dunia maya (10 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)peraturan yang melindungi data pribadi (16 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

Computer Vocabularies 2022-11-15

Computer Vocabularies crossword puzzle
Across
  1. faster, quieter, and more expensive than HDD
  2. copy others’ work
  3. it makes sure that no information will be lost
  4. a network that interconnects with other computers in a large area
  5. go into other’s personal data
  6. rules for the internet
  7. allows information when you search it
  8. Drive it contains memory for data storage
Down
  1. large, slow, and expensive
  2. intellectual property
  3. unwanted communication
  4. parts of a large item
  5. computer memory
  6. a security system
  7. powerhouse of a computer
  8. a network that interconnects with other computers in a certain area
  9. surface
  10. Security protection for networks
  11. used to connect computers

19 Clues: surfacecomputer memorya security systemcopy others’ workintellectual propertyparts of a large itemunwanted communicationrules for the internetpowerhouse of a computerused to connect computerslarge, slow, and expensivego into other’s personal dataSecurity protection for networksallows information when you search it...

What are Friends For? 2023-10-06

What are Friends For? crossword puzzle
Across
  1. something that is the same for people or things
  2. a brave and strong person who saves people
  3. someone you don't like
  4. thinking about other people's feelings and being kind
  5. related to the internet and computers
  6. feels cozy or nice
  7. someone you don't know
  8. something that can hurt you
Down
  1. things you do often
  2. apps and websites used to share information
  3. ask someone to join
  4. someone who listens will
  5. being comfortable, healthy and happy
  6. feeling sad because you're all by myself
  7. things you don't tell
  8. being truthful in what you say and do
  9. to disagree with someone
  10. people in one place together

18 Clues: feels cozy or nicethings you do oftenask someone to jointhings you don't tellsomeone you don't likesomeone you don't knowsomeone who listens willto disagree with someonesomething that can hurt youpeople in one place togetherbeing comfortable, healthy and happybeing truthful in what you say and dorelated to the internet and computers...

AI and Cybersecurity 2025-03-02

AI and Cybersecurity crossword puzzle
Across
  1. A technique that identifies anomalies by learning normal system behavior.
  2. A strategy that uses decoy systems to mislead potential attackers.
  3. A method that detects patterns without pre‐labelled data.
  4. A general term for software designed to damage or exploit systems.
  5. The process of converting unstructured text into structured threat intelligence.
  6. An algorithm that groups similar data points without prior labels.
  7. A process of embedding hidden messages within non-secret data.
  8. A generative model used in adversarial defense strategies.
  9. A decentralized ledger technology that records transactions securely.
  10. A deceptive email tactic aiming to steal sensitive information.
  11. A vulnerability exploited before any patch becomes available.
  12. A method used to scramble data so only authorised parties can read it.
  13. A process that identifies deviations from normal system behavior.
  14. A simulated attack conducted to assess a system’s security.
  15. An attack strategy that manipulates inputs to avoid detection.
  16. A computing paradigm with the potential to break current cryptographic systems.
  17. A short-lived digital key that grants temporary access to a system.
  18. The process of integrating security measures early in the development cycle.
  19. An autoencoder variant adept at detecting long-term attack patterns.
  20. A security barrier that filters incoming and outgoing network traffic.
  21. A security model that denies trust by default.
  22. A learning technique that uses labelled training data.
  23. Short abbreviation for a cyberattack that persists undetected.
  24. A technique that examines user actions to detect irregular behavior.
  25. A systematic method for testing systems to uncover vulnerabilities.
Down
  1. The standard established for normal system behavior to flag outliers.
  2. A type of malware that locks files until a ransom is paid.
  3. A learning approach where systems adapt through trial and error.
  4. A GAN-based framework that sanitizes adversarial inputs.
  5. A decoy system designed to lure attackers away from real assets.
  6. Coordinated automation of multi-step incident response workflows.
  7. Neural networks that automatically extract complex features from data.
  8. An approach combining CNN and RNN for enhanced threat detection.
  9. A neural network variant particularly effective at visual data analysis.
  10. The process of confirming a user’s or device’s identity.
  11. A practice that limits user rights to only what is necessary.
  12. A technique for extracting actionable intelligence from text.
  13. The practice of quantifying and managing potential security risks.
  14. A technique that maps adversarial inputs to a learned data manifold.
  15. The security centre challenged by overwhelming daily alerts.
  16. A sequence of operations used to process or secure data.
  17. A model that integrates spatial and temporal data for threat detection.
  18. A framework that maps tactics and techniques in cyberattacks.
  19. A tool that suggests security-focused improvements during code writing.
  20. The process of cleansing inputs by projecting them onto benign data.
  21. A software solution that detects and removes malicious programs.
  22. A network model that captures sequential dependencies in data.
  23. A device that directs data between networks while managing traffic.
  24. Abbreviation for analytics that monitor user behavior for anomalies.
  25. A system designed to monitor network traffic for suspicious activities.

50 Clues: A security model that denies trust by default.A learning technique that uses labelled training data.A GAN-based framework that sanitizes adversarial inputs.The process of confirming a user’s or device’s identity.A sequence of operations used to process or secure data.A method that detects patterns without pre‐labelled data....

Disaster Preparedness 2022-02-07

Disaster Preparedness crossword puzzle
Across
  1. Security Device Review
  2. Where AED is Located
  3. What to do in Even of Power Outage
  4. What to do in Event of Live Shooter
  5. Secondary Evacuation Point
  6. Give to Members During Internet Outage
  7. Call Question for All Clear
  8. Head of Security
Down
  1. Who to Inform When There's a Threat
  2. Shelter in Place
  3. How to Prevent Spread of Disease/Chemicals
  4. Report Unethical Behavior
  5. Used for Heart Attacks
  6. Form for Suspicious Incidents
  7. February Distress Signal
  8. What to Do During Robbery/Hostage
  9. First Evacuation Point
  10. What to do During Bomb Threat

18 Clues: Shelter in PlaceHead of SecurityWhere AED is LocatedSecurity Device ReviewUsed for Heart AttacksFirst Evacuation PointFebruary Distress SignalReport Unethical BehaviorSecondary Evacuation PointCall Question for All ClearForm for Suspicious IncidentsWhat to do During Bomb ThreatWhat to Do During Robbery/HostageWhat to do in Even of Power Outage...

RU ITEC11 Chapter 5 2023-12-01

RU ITEC11 Chapter 5 crossword puzzle
Across
  1. to ask questions, research questions and to know about security measures
  2. using someone else identity without being authorized and using it for criminal activities
  3. obtain sensitive information as in text messages
  4. creating a fake website to get into personal information by creating a fake url into a domain Name servers
  5. use security tools and monitor networks to avoid attacks
  6. open access was first implemented to share study materials.
  7. obtain sensitive information as in e-mail
  8. is an extremely sophisticated worm
  9. monitor and block communication from unreliable websites.
  10. prohibited use of a computer unless authorized
  11. obtain sensitive information as in voice phishing
  12. techniques on how to steal personal and financial data
Down
  1. prioritize security in their advancements
  2. involves hacking for political purposes
  3. publishers must prevent access towards other nations when it is prohibited
  4. The cost of defending an attack is included in the definition of loss under the Act
  5. traits that are specific to an individual biologically
  6. using someone else identity without being authorized and using it for criminal activities
  7. Programming's excitement
  8. is the expansion of online and mobile technologies

20 Clues: Programming's excitementis an extremely sophisticated worminvolves hacking for political purposesprioritize security in their advancementsobtain sensitive information as in e-mailprohibited use of a computer unless authorizedobtain sensitive information as in text messagesobtain sensitive information as in voice phishing...

Fam 2021-07-11

Fam crossword puzzle
Across
  1. law
  2. hper
  3. two
  4. girl
  5. three
  6. science
  7. mom
  8. engine
  9. design
  10. cop
Down
  1. car
  2. animal
  3. Chad
  4. boy
  5. coffee
  6. dad
  7. security
  8. bot
  9. drive
  10. boy

20 Clues: lawcartwoboydadbotmomboycophperChadgirlthreedriveanimalcoffeeenginedesignsciencesecurity

AI Crossword 2023-12-11

AI Crossword crossword puzzle
Across
  1. uihiuh
  2. uhiuhuih
  3. uihuihuih
  4. uhuhuh
  5. giuguigiug
  6. uiiuhui
  7. iuhuih
  8. uuhuoh
Down
  1. uhuhu
  2. uhu
  3. uhuhui
  4. iuhuhuoh
  5. uihiuhui
  6. huhuhuhuhuhuh
  7. hhih
  8. uhiuh
  9. uihhiuhui
  10. iohoihoi
  11. huuhuhuh
  12. iuhuih

20 Clues: uhuhhihuhuhuuhiuhuihiuhuhuhuiuhuhuhiuhuihiuhuihuuhuohuiiuhuiuhiuhuihiuhuhuohuihiuhuiiohoihoihuuhuhuhuihuihuihuihhiuhuigiuguigiughuhuhuhuhuhuh

SWQuality 2024-01-17

SWQuality crossword puzzle
Across
  1. risk
  2. verify
  3. standards
  4. safety
Down
  1. SW
  2. document for sw quality
  3. traceability
  4. security
  5. rules

9 Clues: SWriskrulesverifysafetysecuritystandardstraceabilitydocument for sw quality

Biometrics 2025-04-03

Biometrics crossword puzzle
Across
  1. basic rights
  2. safety measures taken for protection
  3. to take full advantage of and benefit from
  4. something so easy that you cant mess it up
Down
  1. software programs that protect you while online
  2. following a trend just because everyone else is
  3. weaknesses in a security system
  4. to illegally enter into someone's computer
  5. to avoid or get around
  6. a gap in security

10 Clues: basic rightsa gap in securityto avoid or get aroundweaknesses in a security systemsafety measures taken for protectionto illegally enter into someone's computerto take full advantage of and benefit fromsomething so easy that you cant mess it upsoftware programs that protect you while onlinefollowing a trend just because everyone else is

Algo trading 2019-09-21

Algo trading crossword puzzle
Across
  1. One of the measures of central tendency
  2. a profit or loss on an investment
  3. ability and ease with which assets can be converted into cash
  4. simultaneous transactions in multiple financial markets to make profit
  5. a fixed-income security
  6. a measure of the sensitivity of the value (price) of an option
  7. a measure of minimum upward or downward movement in the price of a security
Down
  1. Difference between the value of assets and the cost of liabilities
  2. an investment strategy designed to offset a potential loss
  3. Can be American or exotic
  4. complete set of all possible observations
  5. a financial instrument
  6. measure of an investment's performance compared to a certain benchmark
  7. An instruction by an investor to the broker

14 Clues: a financial instrumenta fixed-income securityCan be American or exotica profit or loss on an investmentOne of the measures of central tendencycomplete set of all possible observationsAn instruction by an investor to the brokeran investment strategy designed to offset a potential lossability and ease with which assets can be converted into cash...

Cybersecurity Awareness month 2025-09-30

Cybersecurity Awareness month crossword puzzle
Across
  1. The process of converting information into a code for security
  2. A saved copy of data for recovery after loss or attack
  3. A software update that fixes security vulnerabilities
  4. Manipulating people into revealing confidential information
  5. Software that secretly monitors your computer activities
Down
  1. Malicious software that locks files until a payment is made
  2. A login method requiring two forms of verification
  3. A scam email or message tricking you into giving personal information
  4. A network of infected devices controlled remotely
  5. A program that detects and removes malicious software
  6. A secret string used to secure accounts
  7. Malicious software designed to damage or gain access to a system
  8. A network security system that blocks unauthorized access
  9. A service that creates a secure tunnel for internet traffic

14 Clues: A secret string used to secure accountsA network of infected devices controlled remotelyA login method requiring two forms of verificationA program that detects and removes malicious softwareA software update that fixes security vulnerabilitiesA saved copy of data for recovery after loss or attack...

Banking 15.1 JC 2024-05-09

Banking 15.1 JC crossword puzzle
Across
  1. is a security that pays interest over terms ranging from 2-10 years
  2. is a security that pays interest over terms of ten to thirty years
  3. is a type of financial investment issued by a corparation
  4. is a security that matures in a year or less
  5. is the process of transferring money from one individual or organization to another
Down
  1. money is used in exchange for goods and services
  2. is anything of value that is accepted in return for goods or services
  3. can be saved and used at a later date
  4. is the mechanism a nation uses to provide and manage money for itself
  5. allows customers to pay for purchases directly from their checking account
  6. is a plastic card that allows the holder to make credit purchases up to an authorized amount
  7. means that money is a common measure of the worth or price of a good service
  8. is a transfer of moneyfrom one bank account to another

13 Clues: can be saved and used at a later dateis a security that matures in a year or lessmoney is used in exchange for goods and servicesis a transfer of moneyfrom one bank account to anotheris a type of financial investment issued by a corparationis a security that pays interest over terms of ten to thirty years...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
  2. aturan dan normal berperilaku baik di media sosial (11 huruf)
  3. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  4. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
  5. program kecil yang dapat merusak sistem komputer (5 huruf)
  6. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  7. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  8. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  9. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  10. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  11. perbuatan melanggar hukum didunia maya (10 huruf)
  12. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  13. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  14. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
Down
  1. penyebaran informasi palsu yang luas (4 huruf)
  2. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  3. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  4. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  5. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
  6. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  7. berbuat menyebar informasi yang merugikan orang lain (14 huruf)
  8. peraturan yang melindungi data pribadi (16 huruf)
  9. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
  10. pencurian hak cipta (11 huruf)
  11. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  12. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  13. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  14. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  15. perilaku tidak atau kasar di dunia maya (10 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)peraturan yang melindungi data pribadi (16 huruf)perbuatan melanggar hukum didunia maya (10 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  2. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
  3. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  4. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  5. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  6. pencurian hak cipta (11 huruf)
  7. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
  8. berbuat menyebar informasi yang merugikan orang lain (14 huruf)
  9. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  10. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  11. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
  12. aturan dan normal berperilaku baik di media sosial (11 huruf)
  13. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  14. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
Down
  1. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  2. perbuatan melanggar hukum didunia maya (10 huruf)
  3. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  4. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  5. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  6. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  7. peraturan yang melindungi data pribadi (16 huruf)
  8. penyebaran informasi palsu yang luas (4 huruf)
  9. program kecil yang dapat merusak sistem komputer (5 huruf)
  10. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  11. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
  12. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  13. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  14. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  15. perilaku tidak atau kasar di dunia maya (10 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)peraturan yang melindungi data pribadi (16 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  2. perilaku tidak atau kasar di dunia maya (10 huruf)
  3. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  4. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  5. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  6. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
  7. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  8. berbuat menyebar informasi yang merugikan orang lain (14 huruf)
  9. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  10. peraturan yang melindungi data pribadi (16 huruf)
  11. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  12. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  13. perbuatan melanggar hukum didunia maya (10 huruf)
Down
  1. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
  2. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  3. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  4. aturan dan normal berperilaku baik di media sosial (11 huruf)
  5. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  6. pencurian hak cipta (11 huruf)
  7. program kecil yang dapat merusak sistem komputer (5 huruf)
  8. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  9. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  10. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  11. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  12. penyebaran informasi palsu yang luas (4 huruf)
  13. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
  14. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  15. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
  16. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)peraturan yang melindungi data pribadi (16 huruf)perbuatan melanggar hukum didunia maya (10 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

Cyber-bullying -Support 2014-11-05

Cyber-bullying -Support crossword puzzle
Across
  1. Governed by a country
  2. Bring to a standstill
  3. Provide assistance to someone to help them feel better
  4. Defender
  5. Therapy
  6. Pay no attention to
  7. Avoid doing
  8. keep track of something
Down
  1. Lend a help in hand
  2. Avoidance
  3. Supervise
  4. Honesty
  5. Give a statement of something
  6. Make Improvements

14 Clues: TherapyHonestyDefenderAvoidanceSuperviseAvoid doingMake ImprovementsLend a help in handPay no attention toGoverned by a countryBring to a standstillkeep track of somethingGive a statement of somethingProvide assistance to someone to help them feel better

E safety 2019-03-04

E safety crossword puzzle
Across
  1. bullying online bullying
  2. Block people if send rude stuff
  3. Talking weird to people
  4. Sending rude pictures
Down
  1. When you send rude pictures
  2. Going on your phone with people
  3. Stay safe

7 Clues: Stay safeSending rude picturesTalking weird to peoplebullying online bullyingWhen you send rude picturesBlock people if send rude stuffGoing on your phone with people

Internet Safety, Cyber Security and Encryption: Digital Footprint 2024-01-16

Internet Safety, Cyber Security and Encryption: Digital Footprint crossword puzzle
Across
  1. is when you tricking someone into giving their password.
  2. is when a hacker uses a program that tries every possible combination to identify your password.
  3. the email if you are not sure whether the email is genuine.
  4. is the term use for unauthorize access
Down
  1. is the common method to login to your account
  2. greeting is one of the common features of phishing email
  3. is an example of social media
  4. is used to navigate user to another page.
  5. is a term call for a profile picture
  6. surfing is when someone look over your shoulder as you enter password.

10 Clues: is an example of social mediais a term call for a profile pictureis the term use for unauthorize accessis used to navigate user to another page.is the common method to login to your accountis when you tricking someone into giving their password.greeting is one of the common features of phishing email...

LA NETIQUETTE 2021-11-11

LA NETIQUETTE crossword puzzle
Across
  1. diritto alla riservatezza delle
  2. bullismo bullismo online
  3. news informazioni false sul web
  4. o per acquisire
Down
  1. codice segreto per accedere ad un
  2. riservate
  3. violare un sistema informatico per

7 Clues: riservateo per acquisirediritto alla riservatezza dellebullismo bullismo onlinecodice segreto per accedere ad unviolare un sistema informatico pernews informazioni false sul web

Cybersecurity Terminology Puzzle (participation 3) 2023-01-27

Cybersecurity Terminology Puzzle (participation 3) crossword puzzle
Across
  1. software that is harmful
  2. software that checks for malware
  3. internet access at starbucks
  4. scrambling data in unreadable
  5. attacks seeking out personal info
  6. software that tracks you
  7. shield for data
  8. tech savy criminals stealing private information
  9. improving security tools for cloud infrastructure
  10. multiple attackers preventing legitimate users
Down
  1. tricking users to click an image
  2. altered image creating false reality
  3. malware that makes you pay
  4. malware pretending to be useful
  5. designs, builds, and tests security systems
  6. malware that displays adverts
  7. network pro learning hacking techniques
  8. online harassment that intimidates victims

18 Clues: shield for datasoftware that is harmfulsoftware that tracks youmalware that makes you payinternet access at starbucksscrambling data in unreadablemalware that displays advertsmalware pretending to be usefultricking users to click an imagesoftware that checks for malwareattacks seeking out personal infoaltered image creating false reality...

Unit 4 2022-03-02

Unit 4 crossword puzzle
Across
  1. A quick fix for a specific software problem.
  2. A fix that is more thoroughly tested than a hotfix and designed for a wider deployment.
  3. A collection of patches, hotfixes, and system enhancements that have been tested by the manufacturer for wide deployment.
  4. a standalone storage device or appliance that acts as a file server.
  5. this chain is used for packets leaving the system.
  6. a firewall command line utility for Linux operation systems that uses three policy chains to allow or block network traffic.
  7. provides no authentication, encryption, or error detection.
Down
  1. this chain controls the behavior for incoming connections.
  2. an operating system that comes hardened and validated to a specific security level as defined in the Common Criteria for Information Technology Security Evaluation (CC).
  3. The process of securing devices and software by reducing the security exposure and tightening security controls.
  4. can provide information about which operating system a computer uses.
  5. A component of a manageable network plan that indicates an action or event.
  6. A special network composed of high-speed storage that is shared by multiple servers.
  7. this chain is used for outgoing connections.

14 Clues: A quick fix for a specific software problem.this chain is used for outgoing connections.this chain is used for packets leaving the system.this chain controls the behavior for incoming connections.provides no authentication, encryption, or error detection.a standalone storage device or appliance that acts as a file server....

IC3 Lesson 30 Vocab 2015-05-18

IC3 Lesson 30 Vocab crossword puzzle
Across
  1. a security system.
  2. Certificates for e-commerce sites, sites that process sensitive data, and sites that
  3. security feature used for larger networks that controls computers from one point.
  4. A program that hackers use to capture IDs and passwords on a network.
  5. A malicious program that records keystrokes.
  6. Using a script or program to log on to an account using hundreds of words or
  7. Encrypts the information in an SSL Certificate.
  8. privacy and security requirements.
Down
  1. information.
  2. number, and one special character.
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that
  4. Deciphers the information in an SSL Certificate.
  5. Chronic physical malady that can result when a person makes too many of the
  6. Hackers using spyware to control your browser.
  7. Complex and secure, containing at least eight characters and at least one letter,
  8. information about the user, the user's browsing habits, and other
  9. motions over a long period of time.
  10. privacy and security requirements.
  11. Invading someone else's computer, usually for personal gain or the satisfaction of
  12. Software installed surreptitiously on a personal computer with the goal of
  13. stored in a dictionary file.

21 Clues: information.a security system.stored in a dictionary file.number, and one special character.privacy and security requirements.privacy and security requirements.motions over a long period of time.A malicious program that records keystrokes.Hackers using spyware to control your browser.Encrypts the information in an SSL Certificate....

Security Awareness crossword puzzle 2018-05-07

Security Awareness crossword puzzle crossword puzzle
Across
  1. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  2. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  3. _______ your data regularly and periodically check that you are able to restore them.
  4. _______ before you click or forward.
  5. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  6. Cybersecurity is _______'s responsibility.
  7. Always use _______ factor authentication where available.
  8. This can slow down your computer and watch everywhere you go on the Internet.
  9. _______ your computer when left unattended.
Down
  1. You should always keep your software and anti-virus definitions up-to-_______.
  2. Use a _______ password different from the passwords you use to access other sites.
  3. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
  4. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  5. Information Security is a _______ issue.
  6. Do not provide your _______ email account to social networks.

15 Clues: _______ before you click or forward.Information Security is a _______ issue.Cybersecurity is _______'s responsibility._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks....

Cybersecurity Awareness Crossword (2018) 2018-07-29

Cybersecurity Awareness Crossword (2018) crossword puzzle
Across
  1. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  2. Information Security is a _______ issue.
  3. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
  4. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  5. This can slow down your computer and watch everywhere you go on the Internet.
  6. _______ your computer when left unattended.
  7. _______ before you click or forward.
Down
  1. _______ your data regularly and periodically check that you are able to restore them.
  2. Use a _______ password different from the passwords you use to access other sites.
  3. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  4. Cybersecurity is _______'s responsibility.
  5. You should always keep your software and anti-virus definitions up-to-_______.
  6. Do not provide your _______ email account to social networks.
  7. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  8. Always use _______ factor authentication where available.

15 Clues: _______ before you click or forward.Information Security is a _______ issue.Cybersecurity is _______'s responsibility._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks....

Understanding Money 2024-05-09

Understanding Money crossword puzzle
Across
  1. A transfer of money from one bank account to another
  2. Money is a common measure of the worth or price of a good or service
  3. A security that matures in a year or less
  4. A security that pays interest over terms of ten to thirty years
  5. A security that pays interest over terms ranging from two to ten years
  6. Anything of value that is accepted in return for goods and services
  7. Money used in exchange for goods and services needed by individuals, businesses, and governments
  8. A type of a document guaranteeing the payment of a specific amount of money, either on demand or at a set time, with the payers name
  9. Money is worth more now, Money received now can be invested or deposited in the bank to earn interest
  10. A plastic card that allows the holder to make credit purchases up to an authorized amount
  11. A type of financial investment issued by a corporation, government, or other organization
Down
  1. The process of transferring money from one individual or organization to another
  2. It can be saved and used at a later date
  3. Banks that are part of the Federal Reserve System
  4. Must be accepted "for all debts, public and private."
  5. The mechanism a nation uses to provide and manage money for itself
  6. Allows customers to pay for purchases directly from their checking account
  7. An action taken to manage the supply of money and interest rates in an economy

18 Clues: It can be saved and used at a later dateA security that matures in a year or lessBanks that are part of the Federal Reserve SystemA transfer of money from one bank account to anotherMust be accepted "for all debts, public and private."A security that pays interest over terms of ten to thirty years...

1 2023-03-01

1 crossword puzzle
Across
  1. A security measure used to protect IoT devices from malicious software
  2. SENSOR A device that can measure the concentration of gases or pollutants in the environment
  3. SENSOR A device that can measure the amount of light in the environment
  4. A device that can measure the temperature and humidity of the environment
  5. A device that can control the flow of electricity to other devices
  6. A security measure used to protect IoT devices from unauthorized access
  7. SECURITY A security measure used to protect IoT devices from physical tampering
  8. A technology that allows IoT devices to operate with minimal human intervention
  9. MONITOR A device that can measure the amount of electricity being used by other devices
  10. SENSOR A device that can detect the presence of objects or people
  11. ENERGY BLUETOOTH A typical wireless transmission protocol for low-power Internet of Things devices
Down
  1. SENSOR A device that can measure the pressure of gases or liquids
  2. LEVEL SENSOR A device that can measure the level of water in a tank or container
  3. SWITCH A device that can control the lighting in a room or building
  4. A device that can control the temperature of a room or building
  5. SENSOR A device that can detect motion and trigger other devices or actions
  6. SENSOR A device that can detect the location of other devices or objects]
  7. NETWORK A technology that uses sensors to collect data about the environment and sends it to a central system for analysis
  8. MONITOR A device that can monitor the quality of air or water in a specific area

19 Clues: A device that can control the temperature of a room or buildingSENSOR A device that can measure the pressure of gases or liquidsSENSOR A device that can detect the presence of objects or peopleA device that can control the flow of electricity to other devicesSWITCH A device that can control the lighting in a room or building...

Software Development Security 2021-02-03

Software Development Security crossword puzzle
Across
  1. A communication to or input of an object
  2. A life cycle model that allows for multiple iterations of a waterfall-style process
  3. In this type of networks the chains of computational units are used in an attempt to imitate the biological reasoning process of the human mind.
  4. Internal code that defines the actions an object performs in response to a message
  5. A level of interaction between objects.
  6. A state that allows users to bypass failed security controls, erring on the side of permissiveness.
  7. A characteristics of a database transactions that follows an “all-or-nothing” affair.
  8. Describes the strength of the relationship between the purposes of the methods within the same class.
Down
  1. The formalized processes by which trust is built into the life cycle of a system.
  2. A phase of IDEAL model, in which engineers analyze the current state of the organization and make general recommendations for change.
  3. A characteristic of an object that allows it to respond with different behaviors to the same message or method because of changes in external conditions.
  4. A preventive security mechanism that endeavors to make certain that the information stored in the database is always correct or at least has its integrity and availability protected.
  5. The ...-based methods analyze the behavior of software, looking for the telltale signs of virus activity, such as attempts to elevate privilege level, cover their electronic tracks, and alter unrelated or operating system fi les.
  6. A highly sophisticated worm widely spread in mid-2010 which uses a variety of advanced techniques to spread, including multiple previously undocumented vulnerabilities
  7. A database feature that allows applications to communicate with different types of databases without having to be directly programmed for interaction with each type.
  8. A tool that converts the higher-level language into an executable file designed for use on a specific operating system

16 Clues: A level of interaction between objects.A communication to or input of an objectThe formalized processes by which trust is built into the life cycle of a system.Internal code that defines the actions an object performs in response to a messageA life cycle model that allows for multiple iterations of a waterfall-style process...

Information Security crossword 2021-07-05

Information Security crossword crossword puzzle
Across
  1. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  2. ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
  3. ______ of any organizational security policy can result in disciplinary actions
  4. ISMS is a set of policies and procedures for managing an organization’s _______ data
  5. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
  6. A formal process for training and educating employees about IT protection
  7. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
  1. An asset that is essential to an organization and must be suitably protected
  2. A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
  3. A set of rules that limits access to information
  4. Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
  5. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  6. Guarantee of reliable access to the information by authorized people
  7. Protecting the accuracy and completeness of information and processing methods
  8. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
  9. Effect of Uncertainty on objectives

16 Clues: Effect of Uncertainty on objectivesA set of rules that limits access to informationGuarantee of reliable access to the information by authorized peopleA formal process for training and educating employees about IT protectionAn asset that is essential to an organization and must be suitably protected...

2021 Q4 Security 2021-12-15

2021 Q4 Security crossword puzzle
Across
  1. The company that monitors our alarms
  2. ___ with all demands of the robber
  3. Number of people that are emailed when we call 911
  4. Never write down or share _____
  5. Packet in vault room with specific instructions
  6. Great ___ is our best robbery deterrent
Down
  1. Remain _____ during a robbery
  2. To call 911 dial _-911
  3. When safe to do so press your ____ buttons
  4. ____ have more than $5k in your cash drawer
  5. Use the ____ button when you receive a 'sus'email
  6. Always leave the building in ____
  7. ___ parking lot is our Secondary Meeting Spot
  8. ____, hide, neutralize in an active shooter situation
  9. In the event of a fire, ____ mbr sensitive info
  10. Packet under the phone

16 Clues: To call 911 dial _-911Packet under the phoneRemain _____ during a robberyNever write down or share _____Always leave the building in _______ with all demands of the robberThe company that monitors our alarmsGreat ___ is our best robbery deterrentWhen safe to do so press your ____ buttons____ have more than $5k in your cash drawer...

Cybersecurity Best Practices 2024-11-08

Cybersecurity Best Practices crossword puzzle
Across
  1. A security practice of regularly backing up important data.
  2. A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock.
  3. A security measure that protects against unauthorized access to a network.
  4. A security practice of regularly updating software and systems.
  5. A piece of audio or video that has been altered and changed to make it seem authentic or credible
Down
  1. A malicious software.
  2. A technique used to trick someone into revealing sensitive information.
  3. A security measure that prevents unauthorized access to data & systems.
  4. A security measure that hides data to make it unreadable.

9 Clues: A malicious software.A security measure that hides data to make it unreadable.A security practice of regularly backing up important data.A security practice of regularly updating software and systems.A technique used to trick someone into revealing sensitive information.A security measure that prevents unauthorized access to data & systems....

test 2019-09-21

test crossword puzzle
Across
  1. use of section 26
  2. filled out at site
  3. section 25 of criminal code
  4. Section 35 of security and related activities(control) act 1996
  5. you must wear this
  6. you need to complete this is you have an incident
  7. You cannot use this in Western Australia
Down
  1. if you are posted outside a store
  2. If you use a car for your duties
  3. Section 12 of security and related activities(control) act 1996
  4. you need one of these to work in the security industry

11 Clues: use of section 26filled out at siteyou must wear thissection 25 of criminal codeIf you use a car for your dutiesif you are posted outside a storeYou cannot use this in Western Australiayou need to complete this is you have an incidentyou need one of these to work in the security industry...

brainriddle 2025-02-09

brainriddle crossword puzzle
Across
  1. A cyberattack where fake QR codes trick users into visiting malicious sites.
  2. A cyberattack that tricks users into clicking hidden elements.
  3. A tool that protects a network by blocking suspicious traffic.
  4. A method used to avoid security restrictions.
  5. When private data is exposed to unauthorized people.
  6. An attack where a hacker takes control of an active user session.
  7. A weakness in software that hackers can exploit.
Down
  1. A method of guessing passwords by trying many combinations.
  2. A small software update that fixes security flaws.
  3. A cybersecurity event that may cause harm to systems.
  4. A physical or digital device used for secure authentication.
  5. Files that store records of activity on a system.
  6. A username and password used for authentication.
  7. A type of malware that bombards users with unwanted ads.
  8. A security method that requires two types of authentication.

15 Clues: A method used to avoid security restrictions.A username and password used for authentication.A weakness in software that hackers can exploit.Files that store records of activity on a system.A small software update that fixes security flaws.When private data is exposed to unauthorized people.A cybersecurity event that may cause harm to systems....

Beware of Cyber Attacks 2025-03-13

Beware of Cyber Attacks crossword puzzle
Across
  1. software that secretly monitors users
  2. malicious software designed to harm
  3. malicious code attached to programs
  4. fakes identity to deceive targets
  5. fraudulent emails to steal information
  6. network of compromised devices remotely controlled
  7. gains unauthorized access to systems
  8. takes advantage of system vulnerabilities
  9. malware that tricks users into running
  10. testing system defenses for weaknesses
  11. secret way to bypass security
  12. converts data into secret code
Down
  1. records keystrokes for stealing data
  2. displays unwanted advertisements to users
  3. hides malicious software from detection
  4. network protection from unauthorized access
  5. self-replicating malware spreading automatically
  6. malware disguised as legitimate software
  7. demands payment to restore access
  8. fixes security vulnerabilities in software

20 Clues: secret way to bypass securityconverts data into secret codefakes identity to deceive targetsdemands payment to restore accessmalicious software designed to harmmalicious code attached to programsrecords keystrokes for stealing datagains unauthorized access to systemssoftware that secretly monitors usersfraudulent emails to steal information...

CNSSINST 4009 (2005) 2022-11-30

CNSSINST 4009 (2005) crossword puzzle
Across
  1. Principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.
  2. A hostile action to spread malicious code via multiple methods.
  3. A contraction of the term Binary Digit. The smallest unit of information in a binary system of notation
  4. The process of granting or denying specefic request:1) for obtaining and using information and related information processing services.
  5. Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
  6. The process of verifying the identity or other attributes claimed by or assumed of an entity (user, process, or device), or to verify the source and integrity of data.
  7. Measure of confidence that the security features, practices, procedures, and architecture of an information system accurately mediates and enforces the security policy.
  8. Office of a federal department or agency that keeps records of accountable COMSEC material held by elements subject to its oversight. (COR)
  9. Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of boundary protection devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).
  10. What is the PUB CNSSINT 4009 (2015)?
Down
  1. Notification that a specific attack has been directed at an organization’s information systems.
  2. The process of the system invalidating a user ID based on the user’s inappropriate actions. A blacklisted user ID cannot be used to log on to the system, even with the correct authenticator. Blacklisting and lifting of a blacklisting are both security-relevant events. Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of internet resources.
  3. Countermeasures ensuring that transmitted information can be received despite deliberate jamming attempts
  4. A major application, general support system, high impact program, physical plant, mission critical system, personnel, equipment, or a logically related group of systems.
  5. A category within a given security classification limiting entry or system connectivity to only authorized persons.
  6. Typically unauthorized hidden software or hardware mechanism used to circumvent security controls.
  7. The official management decision given by a senior organizational official to authorize operation of an information system and to explicitly accept the risk to organizational operations (including mission, functions, image, or reputation),organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security controls.
  8. The official management decision issued by a DAA or PAA to authorize operation of an information system and to explicitly accept the residual risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals.
  9. The property of being accessible and useable upon demand by an authorized entity
  10. Software program that performs a specific function directly for a user and can be executed without access to system control, monitoring, or administrative privileges.

20 Clues: What is the PUB CNSSINT 4009 (2015)?A hostile action to spread malicious code via multiple methods.The property of being accessible and useable upon demand by an authorized entityNotification that a specific attack has been directed at an organization’s information systems....

Cyber Crossword 2021-04-26

Cyber Crossword crossword puzzle
Across
  1. media, A computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.
  2. Electronic device most students own at home and is square and mostly portable.
  3. the use of technology to harass, threaten, embarrass, or target another person.
Down
  1. A result or effect, typically one that is unwelcome or unpleasant.
  2. An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
  3. A repetitive action toward another human purposely causing harm or intimidation.
  4. safety, The act of protecting ones self or others from harm or intimidation online.
  5. An individual who causes harm or stress to another human intentionally and repetitively.
  6. Having firm belief or reliability in someone.

9 Clues: Having firm belief or reliability in someone.A result or effect, typically one that is unwelcome or unpleasant.Electronic device most students own at home and is square and mostly portable.the use of technology to harass, threaten, embarrass, or target another person.A repetitive action toward another human purposely causing harm or intimidation....

cyber bullying 2024-02-06

cyber bullying crossword puzzle
Across
  1. /making someone feel embarrassed infront of others
  2. /communicate online
  3. / when you are left out of activities on purpose
  4. / when somebody enters into personal things online
  5. /constantly being sad
  6. / when your location gets leaked
Down
  1. /treating people bad
  2. / talk bad about you
  3. / when someone stops talking to you without reason

9 Clues: /communicate online/treating people bad/ talk bad about you/constantly being sad/ when your location gets leaked/ when you are left out of activities on purpose/making someone feel embarrassed infront of others/ when somebody enters into personal things online/ when someone stops talking to you without reason

CYBER BULLYING 2019-11-19

CYBER BULLYING crossword puzzle
Across
  1. CAN SNAP PITHURES
  2. MEAN TO DO
  3. HAS A KEYBORD
  4. KIDS HAS THIS ELETRONIC
  5. HAVE THIS APP
  6. A MOTHER BOARD OF APPS
Down
  1. TO PUT SOMETHING ON THE INTERNET
  2. A ELECTRONIC THAT TENNAGERS HAVE
  3. DONALD TRUMP HAS A ACCOUNT ON THIS APP

9 Clues: MEAN TO DOHAS A KEYBORDHAVE THIS APPCAN SNAP PITHURESA MOTHER BOARD OF APPSKIDS HAS THIS ELETRONICTO PUT SOMETHING ON THE INTERNETA ELECTRONIC THAT TENNAGERS HAVEDONALD TRUMP HAS A ACCOUNT ON THIS APP

Cyber Quiz17 2024-08-29

Cyber Quiz17 crossword puzzle
Across
  1. Attack involving the use of malicious software
  2. Process of verifying identity
  3. Secure connection protocol
  4. communicating device in a network is known as
Down
  1. Software that protects against malware
  2. Method used to protect/hide information
  3. A method to confirm the integrity of data
  4. A network security device
  5. Threat that involves fraudulent emails

9 Clues: A network security deviceSecure connection protocolProcess of verifying identitySoftware that protects against malwareThreat that involves fraudulent emailsMethod used to protect/hide informationA method to confirm the integrity of datacommunicating device in a network is known asAttack involving the use of malicious software

Cyber wellness 2023-02-01

Cyber wellness crossword puzzle
Across
  1. We need to respect other people's _______
  2. We should _______ our teachers and classmates
  3. We can get __________ from the Internet
  4. If we post something negative online, it
Down
  1. Something you do to let someone personal and private details to the public
  2. _______ other people's feelings
  3. Our ________ information includes our username and password
  4. We should use the _______ for the right purposes
  5. We should not ____ other people's personal information

9 Clues: _______ other people's feelingsWe can get __________ from the InternetIf we post something negative online, itWe need to respect other people's _______We should _______ our teachers and classmatesWe should use the _______ for the right purposesWe should not ____ other people's personal information...

Cyber Safety 2023-05-02

Cyber Safety crossword puzzle
Across
  1. If a stranger tries to find you on social media, you should _______ them.
  2. To keep my personal information safe, I must not share my _______.
  3. You should tell an _______ if something happens online that makes you uncomfortable.
  4. Hiding behind a fake profile to be unkind is called _______.
  5. Only accept _______ requests from people that you know.
Down
  1. Bullying online is called _______.
  2. I must _______ others when communicating online.
  3. Online _______ can be good fun with friends.
  4. Do not open unknown emails, as they may contain a _______.

9 Clues: Bullying online is called _______.Online _______ can be good fun with friends.I must _______ others when communicating online.Only accept _______ requests from people that you know.Do not open unknown emails, as they may contain a _______.Hiding behind a fake profile to be unkind is called _______....

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. A COLLECTION OF THINGS TO BUY
  2. ITEMS AVAILABLE FOR SALE
  3. WHAT YOU DO TO LOOK FOR ITEMS
  4. THE COST OF AN ITEM
Down
  1. WHAT YOU BUY FOR SOMEONE ELSE
  2. TO BUY SOMETHING ONLINE
  3. WHAT YOU DO WITH MONEY ONLINE
  4. WHERE YOU RECEIVE PROMO CODES
  5. A SHORTENED TERM FOR PROMOTION

9 Clues: THE COST OF AN ITEMTO BUY SOMETHING ONLINEITEMS AVAILABLE FOR SALEWHAT YOU BUY FOR SOMEONE ELSEA COLLECTION OF THINGS TO BUYWHAT YOU DO TO LOOK FOR ITEMSWHAT YOU DO WITH MONEY ONLINEWHERE YOU RECEIVE PROMO CODESA SHORTENED TERM FOR PROMOTION

cyber threats 2025-04-05

cyber threats crossword puzzle
Across
  1. abusive or threatening speech or writing that expresses prejudice on the basis of ethnicity, religion, sexual orientation, or similar grounds.
  2. false or misleading information (misinformation, disinformation, propaganda, and hoaxes) claiming the aesthetics and legitimacy of news.
  3. the distribution of sexually explicit images or videos of individuals without their consent,[1] with the punitive intention to create public humiliation out of revenge against the victim.
  4. a term that comes from the English words ‘vampire’ and ‘texting’ and refers to the practice, carried out mostly by teenagers, which consists in making excessive use of electronic devices such as cell phones, laptops, tablets, consoles just before going to sleep.
Down
  1. when group violence or maltreatment is recorded and then published on the Internet.
  2. sending, receiving, or forwarding sexually explicit messages, photographs, or videos, primarily between mobile phones.
  3. severe or total withdrawal from society and seeking extreme degrees of social isolation and confinement.
  4. the act of playing videogames or betting money on games.
  5. the action or behavior used to establish an emotional connection with a vulnerable person generally a minor.

9 Clues: the act of playing videogames or betting money on games.when group violence or maltreatment is recorded and then published on the Internet.severe or total withdrawal from society and seeking extreme degrees of social isolation and confinement....

Cyber Ethics 2025-05-24

Cyber Ethics crossword puzzle
Across
  1. network device that is used to connect all the computers in a network with each other
  2. network maintained without using wires
  3. networks connects two or more computers located at distant places
  4. simplest form of network structure in which two nodes are directly connected with each
Down
  1. topology uses a single communication line or one main cable to which all nodes are directly connected
  2. device that connects two different types of networks with each other
  3. topology which connected to a central computer using a point to point connection
  4. computer network that is mainly created for an individual person
  5. computers that communicate with each other

9 Clues: network maintained without using wirescomputers that communicate with each othercomputer network that is mainly created for an individual personnetworks connects two or more computers located at distant placesdevice that connects two different types of networks with each other...

Cyber Ethics 2025-06-02

Cyber Ethics crossword puzzle
Across
  1. Practices this means accessing the internet in an illegal manner
  2. this refers to the act of using or imitating the language and thoughts of other person at one's original work
  3. dossier what is digital footprint also known as
  4. this refers to an illegal intrusion into a computer system or network
  5. ethics while using the internet, we need to follow certain moral rules which includes honesty, respecting the privacy of others, and property rights. These rules are called
  6. this refers to criminal activities that involves the use of computer, networks, and the internet connection with the intend to cause harm to individual or their digital devices
Down
  1. this refer to unwanted bulk emails that come from unknown sources
  2. it refers to being aware of the ethical practices and behaving Responsibly and appropriately while using the internet
  3. footprint this is an impression or information about a person that exist on the internet because of his online activity
  4. they are highly technical people who secretly break into computer to steal important data or sometimes to destroy it

10 Clues: dossier what is digital footprint also known asPractices this means accessing the internet in an illegal mannerthis refer to unwanted bulk emails that come from unknown sourcesthis refers to an illegal intrusion into a computer system or network...

Cyber Ethics 2025-06-12

Cyber Ethics crossword puzzle
Across
  1. is the act of accessing someone’s computer system without permission
  2. is the unauthorized use of someone’s personal data
  3. Software that damages or disables a computer system
  4. is a protection method that filters incoming and outgoing traffic.
Down
  1. protects the creator’s exclusive rights over their original work
  2. is any illegal activity intended to harm people using computers or the internet
  3. refers to sending unwanted or harmful messages to harass someone online
  4. The act of watching someone’s online activity without their knowledge
  5. it is a software that protects your computer from viruses

9 Clues: is the unauthorized use of someone’s personal dataSoftware that damages or disables a computer systemit is a software that protects your computer from virusesprotects the creator’s exclusive rights over their original workis a protection method that filters incoming and outgoing traffic....

. 2014-05-30

. crossword puzzle
Across
  1. takes the 3rd place in cybercrime world ranking
  2. device used for criminal activities
  3. top target of cyber attacks
  4. to bypass internet users to fake websites for frauding their idendity
  5. protects your computer from unauthorised access
  6. computer operating system
Down
  1. malware whivh distribute itself
  2. person who want to damage or steal information
  3. manipulation
  4. successful people collect it

10 Clues: manipulationcomputer operating systemtop target of cyber attackssuccessful people collect itmalware whivh distribute itselfdevice used for criminal activitiesperson who want to damage or steal informationtakes the 3rd place in cybercrime world rankingprotects your computer from unauthorised access...

Topic 7 - Development of Computer Industry and Law 2024-05-02

Topic 7 - Development of Computer Industry and Law crossword puzzle
Across
  1. In Malaysia, a core legislation in governing the communications and multimedia industry is called
  2. What vendor is ranked first for the semiconductor industry in 2018
  3. Sector that handles communication on a global scale and create infrastructure that allows any type of data sending
  4. Computer system resources and services that can be accessed over the cloud
  5. Cyber law exists to handle cybersecurity and…
  6. Digital form of value that can be used as a token for transaction electronically
  7. The act of analyzing data, create conclusion about that information, and make a future prediction out of it is called
  8. Devices of information-age products are called
  9. Law that cover all internet-related technologies and provide a legal system for controlling it is called
  10. Hardware component that acts as the “brain” of a desktop computer, that could performs both arithmetic and operations, is called
Down
  1. Institution that is responsible for the abuse of telecommunicating services done by the industries in that certain sector is called
  2. In telecommunication industry, who manufacture and sell telecommunications equipment
  3. Design/infrastructure of information resource that can be navigated efficiently
  4. The process of protecting systems, data, and networks from cyber attacks is called
  5. In telecommunication industry, who operate and provide access to deliver services via internet
  6. Major segments of telecommunication industry besides equipment vendors and service providers
  7. The most important legislation that applies to telecoms (including internet)
  8. What is the leading computer manufacturing company that based in Taiwan
  9. What institution that serve as the telecommunications regulator in Malaysia
  10. Two of the most leading countries that controlled more than 80% of the semiconductor industry are U.S. and…

20 Clues: Cyber law exists to handle cybersecurity and…Devices of information-age products are calledWhat vendor is ranked first for the semiconductor industry in 2018What is the leading computer manufacturing company that based in TaiwanComputer system resources and services that can be accessed over the cloud...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  2. berbuat menyebar informasi yang merugikan orang lain (14 huruf)
  3. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  4. pencurian hak cipta (11 huruf)
  5. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  6. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
  7. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  8. perbuatan melanggar hukum didunia maya (10 huruf)
  9. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  10. aturan dan normal berperilaku baik di media sosial (11 huruf)
  11. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
  12. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  13. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  14. penyebaran informasi palsu yang luas (4 huruf)
  15. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  16. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  17. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
Down
  1. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
  2. program kecil yang dapat merusak sistem komputer (5 huruf)
  3. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  4. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  5. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  6. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
  7. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  8. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  9. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  10. peraturan yang melindungi data pribadi (16 huruf)
  11. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  12. perilaku tidak atau kasar di dunia maya (10 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)peraturan yang melindungi data pribadi (16 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

Elle Severt- Types of bullying 2022-05-17

Elle Severt- Types of bullying crossword puzzle
Across
  1. Cyber bullying can be someone texting or posting something __ photos of people.
  2. Jake threatened to beat up Marc after school, what is this?
  3. Amy spreads a rumor about Lou to make everyone hate her, what type of bullying is this?
  4. Social bullying is spreading rumors,__ people from games and groups
Down
  1. Steven gets a message from Arthur that he's weak and bad at the game they're playing, what type of bullying is this?
  2. Layla spits on Jenny and laughs at her outfit, what is this?
  3. Verbal bullying contains someone ___ someone to do some kind of harm to them.

7 Clues: Jake threatened to beat up Marc after school, what is this?Layla spits on Jenny and laughs at her outfit, what is this?Social bullying is spreading rumors,__ people from games and groupsVerbal bullying contains someone ___ someone to do some kind of harm to them.Cyber bullying can be someone texting or posting something __ photos of people....

DP-3 Crossword Puzzle 2024-07-23

DP-3 Crossword Puzzle crossword puzzle
Across
  1. DP-3 policies with minimum 3-day/2-night short-term rental must be managed through a site like ______ or VRBO
  2. 4-Point ___________are required for DP-3 risks age 20 and over
  3. These are allowed as long as the load bearing wall is not impacted and the footprint of the dwelling is not changed
Down
  1. Binding ___________ can be added to provide an average savings of 20%
  2. This optional endorsement protects against computers, home systems, cyber extortion, and online fraud
  3. This endorsement offers more robust coverage and a lower rate compared to the NFIP
  4. Tenant and _____-occupied properties are eligible for DP-3 coverage

7 Clues: 4-Point ___________are required for DP-3 risks age 20 and overTenant and _____-occupied properties are eligible for DP-3 coverageBinding ___________ can be added to provide an average savings of 20%This endorsement offers more robust coverage and a lower rate compared to the NFIP...