cyber security Crossword Puzzles
Physical Security 2024-02-29
Across
- This area is were visitor check in and receive badges
- This site is a professional site where you can locate information on your schedule or other changes that may affect security operations
- known as the disk erase or eradication room
- who do you call if you are going to be late or not able to make it for shift?
Down
- What post is responsible for patrolling the perimeter if site
- This area is where you would pick up your equipment, attend briefings, and where deliveries are accepted
- What post is the first point of contact when visitors come to site?
- What post is responsible to patrolling the inside of the buildings
- What is housed in the Data Halls?
- who receives all phone, radio, and chat traffic for security
10 Clues: What is housed in the Data Halls? • known as the disk erase or eradication room • This area is were visitor check in and receive badges • who receives all phone, radio, and chat traffic for security • What post is responsible for patrolling the perimeter if site • What post is responsible to patrolling the inside of the buildings • ...
Security Features 2024-03-11
Across
- The process by which the portrait, signature and biographical data are applied to the document
- Ink that change its colour depending the angle of illumination and observation
- laser image A feature generated by laser engraving or laser perforation displaying changing information or images dependent upon the viewing angle.
- An unauthorized copy or complete reproduction of an officially issued authentic security document
Down
- A design printed on both sides of an inner page of the document which, when the page is
- printing process in which high printing pressure and special inks are used to create a relief image with tactile feel on the surface
- A clear material, which may have security features designed to be securely bonded to protect the biographical data or other page of the document.
- the document.
- by transmitted light, forms an interlocking image.
- number A number that uniquely identifies a document
10 Clues: the document. • by transmitted light, forms an interlocking image. • number A number that uniquely identifies a document • Ink that change its colour depending the angle of illumination and observation • A design printed on both sides of an inner page of the document which, when the page is • ...
Sigma security 2024-11-26
Across
- Kā sauc programmatūru, kas aizsargā datoru no vīrusiem?
- Kas jālieto, lai aizsargātu savu Wi-Fi tīklu?
- Kā sauc nelikumīgu datu iegūšanu, izliekoties par uzticamu personu vai organizāciju?
- Kas ir slepena frāze, kas aizsargā piekļuvi kontam?
- Kāda ir sistēma, kas informē par iespējamiem kiberuzbrukumiem vai nesankcionētu piekļuvi?
Down
- Kāda ir nezināmu vai aizdomīgu e-pastu pievienoto failu atvēršanas sekas?
- Kā sauc procesu, kas pārbauda lietotāja identitāti?
- Kā sauc paroļu metodi, kur tiek izmantoti gan burti, gan cipari, gan speciālie simboli?
- Kāda ir elektroniskā pasta veida nosaukums, kas mēģina izkrāpt datus?
- Kāds drošības līdzeklis tiek izmantots, lai aizsargātu lietotāja datus internetā?
10 Clues: Kas jālieto, lai aizsargātu savu Wi-Fi tīklu? • Kā sauc procesu, kas pārbauda lietotāja identitāti? • Kas ir slepena frāze, kas aizsargā piekļuvi kontam? • Kā sauc programmatūru, kas aizsargā datoru no vīrusiem? • Kāda ir elektroniskā pasta veida nosaukums, kas mēģina izkrāpt datus? • Kāda ir nezināmu vai aizdomīgu e-pastu pievienoto failu atvēršanas sekas? • ...
Food Security 2024-12-17
Across
- dried grapes commonly called.
- sweet, crunchy fruit rich in vitamins&fiber.
- Nadu which state ration shops are run by co-operatives in large extend.
- Liquid made from fruits or vegetables,packed nutrients.
- When did the word food security came into exist.
Down
- Food item which Popeye eat to get strength.
- How many pillars are there in food security according to WHO.
- dairy product used to make cheese.
- support price MSP stands for.
- How many eggs are there in a dozen.
10 Clues: support price MSP stands for. • dried grapes commonly called. • How many eggs are there in a dozen. • dairy product used to make cheese. • sweet, crunchy fruit rich in vitamins&fiber. • Food item which Popeye eat to get strength. • When did the word food security came into exist. • Liquid made from fruits or vegetables,packed nutrients. • ...
Food security 2024-12-18
Across
- A soft yellow fruit that gives you lots of energy and potassium.
- A red fruit often used in ketchup and pizza sauce.
- A green leafy vegetable that helps make you strong, just like Popeye the sailor.
- A fruit that "keeps the doctor away" when you eat one every day.
- This crunchy orange vegetable helps you see in the dark.
Down
- A brown vegetable that can be mashed, fried, or baked.
- A tropical fruit with orange flesh that helps with digestion.
- A citrus fruit that’s full of vitamin C to keep you healthy.
- A tropical fruit that is juicy, sweet, and called the "king of fruits."
- Small green balls that come from a pod and are fun to eat!
10 Clues: A red fruit often used in ketchup and pizza sauce. • A brown vegetable that can be mashed, fried, or baked. • This crunchy orange vegetable helps you see in the dark. • Small green balls that come from a pod and are fun to eat! • A citrus fruit that’s full of vitamin C to keep you healthy. • A tropical fruit with orange flesh that helps with digestion. • ...
Food security 2024-12-18
Across
- Monkey's love them?
- A sour and citrus fruit used to make lemonade.
- Grows in bunches on wines?
- The fruit's name is the same as its color?
- Vegetable that is good for your eye sight?
- Makes you cry when you chop it?
- A room in which you can't enter?
Down
- A fruit that keeps a docto away?
- potato, The opposite of a sweet potato?
- A cot on which you can't sit?
10 Clues: Monkey's love them? • Grows in bunches on wines? • A cot on which you can't sit? • Makes you cry when you chop it? • A fruit that keeps a docto away? • A room in which you can't enter? • potato, The opposite of a sweet potato? • The fruit's name is the same as its color? • Vegetable that is good for your eye sight? • A sour and citrus fruit used to make lemonade.
Food Security 2024-12-18
10 Clues: Cereal grain • kind of fruits • It keeps doctor away • Every kid morning drink • Vegetable with bitter taste • Vegetable with golden seeds • Snack eat while watching movie • This vegetable can make you cry • Indian kid have to increase memory • looks like ginger when grown in plant
Security Awareness 2024-10-01
Across
- Stealing sensitive information by watching someone enter details over their shoulder.
- A scam that involves a fraudulent phone call to steal personal information.
- A fraudulent activity using text messages to deceive and steal information.
- Security method requiring two or more verification factors.
Down
- An attempt to obtain sensitive information by disguising as a trustworthy entity.
- Crime involving the fraudulent use of another person's personal information.
- Act of pretending to be someone else to deceive others.
- Security breach where an unauthorized person follows someone into a restricted area.
- A secret word or phrase used to gain access to a system or service.
- Malicious software designed to damage or infiltrate systems.
10 Clues: Act of pretending to be someone else to deceive others. • Security method requiring two or more verification factors. • Malicious software designed to damage or infiltrate systems. • A secret word or phrase used to gain access to a system or service. • A scam that involves a fraudulent phone call to steal personal information. • ...
DIGITAL SECURITY 2024-11-09
Across
- A type of malware that replicates itself
- type of attack that attempts to overload system with traffic
- A secret word or phrase used to access a system
- A type of cybercrime involving fraudulent activities
- Unauthorized access to computer systems
- Malicious software designed to harm a computer
Down
- A security measure that verifies the identity of a user
- A technique used to gain unauthorized access to a computer system
- A technique used to protect sensitive information
- A security measure that prevents unauthorized access to a network
10 Clues: Unauthorized access to computer systems • A type of malware that replicates itself • Malicious software designed to harm a computer • A secret word or phrase used to access a system • A technique used to protect sensitive information • A type of cybercrime involving fraudulent activities • A security measure that verifies the identity of a user • ...
food security 2024-10-17
Across
- a substance used for making bread/Dosa rise
- keeping animals and growing crops for food; farming
- a bird’s egg, especially one from a chicken,that we eat.
- a lack of food over a long period of time in a large area that can cause the death of many people
- a small growth on a plant — a little new bud
- s a class of agriculture for the long-term production of milk, which is processed (either on the farm or at a dairy plant, either of which may be called a dairy) for the eventual sale of a dairy product.
Down
- Fish farming to obtain fish products as food.
- breeding, raising, and harvesting fish, shellfish, and aquatic plants
- the science and art of the development, sustainable production, marketing and use of high-value, intensively cultivated food and ornamental plants
- is an annual assessment measuring food security through affordability, availability, quality and safety
10 Clues: a substance used for making bread/Dosa rise • a small growth on a plant — a little new bud • Fish farming to obtain fish products as food. • keeping animals and growing crops for food; farming • a bird’s egg, especially one from a chicken,that we eat. • breeding, raising, and harvesting fish, shellfish, and aquatic plants • ...
Food Security 2024-10-17
Across
- What term refers to the state of being free from harm or contamination in food production?
- What is the key staple crop often ground into flour?
- What is not a food safety step when preparing raw meat or poultry?
- Start out with ______ hands, surfaces and utensils before cooking
- It is recommended to wash hands with warm water and soap for ________ seconds
Down
- While everyone is at risk of a ______________ young children and elderly people have a higher risk.
- What foodborne pathogen is often linked to raw eggs?
- What is the severe shortage of food in a region , often due to crop failure or conflict?
- What is the physical sensation or condition of needing food?
- The refrigerator is the best place to _____ perishables
10 Clues: What foodborne pathogen is often linked to raw eggs? • What is the key staple crop often ground into flour? • The refrigerator is the best place to _____ perishables • What is the physical sensation or condition of needing food? • Start out with ______ hands, surfaces and utensils before cooking • What is not a food safety step when preparing raw meat or poultry? • ...
Food Security 2024-12-17
Across
- What agricultural practice helps improve soil fertility and crop yield?
- What crop is the primary staple food in India?
- Which nutrient is essential for energy?
- What term refers to the increase in food production due to improved farming practices?
- What type of farming focuses on environmental sustainability?
Down
- Which natural resource is critical for crop irrigation?
- What environmental practice helps prevent soil erosion and maintain crop yields?
- What program provides food for children in primary schools?
- What term refers to a person's inability to meet their dietary needs?
- Which country is the largest exporter of rice globally?
10 Clues: Which nutrient is essential for energy? • What crop is the primary staple food in India? • Which natural resource is critical for crop irrigation? • Which country is the largest exporter of rice globally? • What program provides food for children in primary schools? • What type of farming focuses on environmental sustainability? • ...
Food Security 2024-12-18
Across
- Small green vegetables that come in a pod
- Red fruit often mistaken for a vegetable
- Red berry with seeds on the outside
- Red fruit that keeps the doctor away
Down
- Leafy green that made Popeye strong
- Orange vegetable that helps you see in the
- Round citrus fruit named after its color
- I am called as King of fruits
- Green vegetable that looks like tiny trees
- Yellow fruit that monkeys love to eat
10 Clues: I am called as King of fruits • Leafy green that made Popeye strong • Red berry with seeds on the outside • Red fruit that keeps the doctor away • Yellow fruit that monkeys love to eat • Red fruit often mistaken for a vegetable • Round citrus fruit named after its color • Small green vegetables that come in a pod • Orange vegetable that helps you see in the • ...
Food Security 2024-12-17
Across
- is a global goal aimed at ending hunger.
- is a global organization working to end hunger.
- is a type of farming that relies on natural processes.
- is a crop grown for its seeds, often used for oil.
- is the ability to access sufficient, safe, and nutritious food.
- is the practice of growing crops in water.
Down
- is a type of agriculture that focuses on sustainable practices.
- is a common method of preserving food.
- is a period of inadequate rainfall leading to crop failure.
- is a nutrient-rich food often used to feed livestock.
10 Clues: is a common method of preserving food. • is a global goal aimed at ending hunger. • is the practice of growing crops in water. • is a global organization working to end hunger. • is a crop grown for its seeds, often used for oil. • is a nutrient-rich food often used to feed livestock. • is a type of farming that relies on natural processes. • ...
Food Security 2024-12-18
10 Clues: A common crop • A drink from cows • Where plants grow • What we eat to live • Planted to grow crops • Food eaten at one time • Natural water for plants • Essential for growing plants • A place where crops are grown • A staple food in many countries
Food Security 2025-09-01
Across
- – the buying, selling or exchanging of goods and services between people, businesses, or countries.
- – goods or services sold to another country.
- – when fertile land becomes dry and turns into desert, often due to drought, deforestation or poor farming practices.
- insecurity – when people do not have reliable access to enough safe and nutritious food.
Down
- – the practice of farming, including growing crops and raising animals for food and other products.
- change – long-term shifts in weather patterns and temperatures caused mostly by human activities like burning fossil fuels.
- – a set of rules, plans or actions made by governments or organisations to guide decisions.
- – the amount of crops or food produced from a piece of land (e.g., how many tonnes of wheat a farm grows).
- – the top layer of the earth where plants grow, made up of minerals, organic matter, air and water.
- – goods or services brought into a country from overseas.
10 Clues: – goods or services sold to another country. • – goods or services brought into a country from overseas. • insecurity – when people do not have reliable access to enough safe and nutritious food. • – a set of rules, plans or actions made by governments or organisations to guide decisions. • ...
food security 2025-09-04
Across
- the lack of the necessary resources to meet basic needs
- maintaining a process or system over a long period of time
- movement in economic activity and financial markets
- the science and practice of farming
- a disagreement or clash between 2 or more parties.
Down
- when a community doesn’t have access to nutritious and clean food, but also limited and uncertain about where and when people can access this.
- when a community has enough food that could supply the community for a long time with no issues that could affect the amount of food provided.
- the long-term changes in global temperatures and other characteristics of the atmosphere
- the unfair difference in status, wealth, rights, or opportunities between people or groups.
- increase in the level of prices of the goods and services
10 Clues: the science and practice of farming • a disagreement or clash between 2 or more parties. • movement in economic activity and financial markets • the lack of the necessary resources to meet basic needs • increase in the level of prices of the goods and services • maintaining a process or system over a long period of time • ...
Aviation security 2025-06-03
Across
- which checklist do CCMs follow in case an article is found on board during flight? Follow the …..article drill
- CCMs can submit security reports through the …..reporting tool
- A passenger is found smoking in the lavatory and shows uncooperative behaviour. We hand over a….
- a security search shall be done when the aircraft departs from a .….airport
- no person is allowed to access the aircraft without displaying a proper …….
Down
- normal access in the flight deck is done by saying position,….,a back up cabin crew member and closed curtain
- A category of bomb and sabotage threat
- the unlawful,violent or by threat of violence seizure of an aircraft
- which checklist do CCMs follow in case of a red bomb threat during flight. We follow the cabin …..checklist
- A security search shall be done when the aircraft departs from Tirana or Jeddah?
10 Clues: A category of bomb and sabotage threat • CCMs can submit security reports through the …..reporting tool • the unlawful,violent or by threat of violence seizure of an aircraft • a security search shall be done when the aircraft departs from a .….airport • no person is allowed to access the aircraft without displaying a proper ……. • ...
Spotlight 8 unit 7A p.161 2021-03-30
19 Clues: file • page • until • whole • happen • happen • should • poster • explain • forgive • message • envious • discuss • security • remember • password • apologize • permision • bulletin board
Bullying 2018-11-21
8 Clues: A strike with a foot • A synonym of 'hostile' • A strike with the fist • Bullying that happens online • Somebody who is being bullied • A strike with a hand or object • Somebody who intimidates others • Putting too much pressure on somebody
Prince FRM 2024-07-15
Across
- Insurance companies assess exposure to claims from natural disasters like earthquakes or cyclones.
- Adani Enterprises evaluates risks related to government policies affecting infrastructure projects and investments.
- SpiceJet deals with flight cancellations due to aircraft maintenance issues affecting customer satisfaction.
- RBI monitors risks that could destabilize the entire financial system, such as banking sector crises or economic recessions.
- Axis Bank assesses the risk of default by corporate borrowers in its loan portfolio.
- Reliance Industries faces litigation over environmental compliance impacting public perception and regulatory approvals.
- Zomato manages public perception during controversies over food quality affecting user trust and market share.
- Mahindra & Mahindra evaluates its ability to secure short-term financing for working capital needs during economic slowdowns.
- Rate Tata Steel deals with currency fluctuations impacting revenue from international steel sales.
- Indian Oil Corporation assesses geopolitical stability before expanding refining operations in new global markets.
- Nestle India assesses risks of disruptions in the supply of dairy and agricultural products impacting production.
Down
- Paytm faces disruptions in payment processing due to technical glitches during high-volume transactions.
- Rate Bajaj Finance manages exposure to fluctuations in interest rates impacting loan profitability.
- NTPC evaluates risks related to environmental regulations impacting thermal power plant operations.
- HDFC Standard Life ensures adherence to new insurance regulations impacting policy sales and operations.
- TCS reviews the accuracy of financial models used for risk assessment and project estimation.
- Infosys assesses overdependence on revenue from a few large clients in its IT services business.
- Infosys strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
- Marico evaluates exposure to changes in raw material prices affecting profit margins in FMCG sector.
- Hindustan Unilever manages risks associated with fluctuating prices of palm oil affecting production costs.
20 Clues: Axis Bank assesses the risk of default by corporate borrowers in its loan portfolio. • TCS reviews the accuracy of financial models used for risk assessment and project estimation. • Infosys assesses overdependence on revenue from a few large clients in its IT services business. • ...
PF Unit 3 Paystub & Taxes 2025-02-28
Across
- acronym used to represent the rate of inflation
- a type of tax applied to taxable earnings
- a proposal to distribute a flat amount of benefits to individuals during retirement (3 words)
- term used to describe a retired person choosing to collect social security after the age of 67 (2 words)
- an increase in prices of goods and services
- a type of tax structure that requires someone with higher income to pay a higher rate of tax for a portion of income
- this money is removed from gross pay so that a smaller amount of income is taxable (2 words)
- dues paid for membership in our society, used to fund things like road maintenance, government programs, and national defense
- hours worked beyond 40 hours per week
- type of mandatory tax used to secure income for workers who qualify for retirement (2 words)
- term used to describe a retired person choosing to collect social security between the ages of 62 and 66 (2 words)
- this acronym is used on your paycheck stub to represent social security and medicare taxes
- the letter P in CPI stands for ___________
- amount on your paycheck stub that is referred to as "take-home" pay; the actual amount that you can spend (2 words)
- the total earnings for an employee before any deductions or withholdings (2 words)
Down
- program that targets families of any age with low income to cover healthcare expenses for individuals and/or their children
- term used to describe a retired person choosing to collect social security payments at the age of 67 (2 words)
- type of mandatory tax used to secure funds for individuals over 65 to cover healthcare expenses
- an employee earns these each time that they earn $1760 in income during 3 consecutive months within one calendar year
- the amount of taxable income remaining after voluntary deductions (3 words)
- acronym used for the trust fund designated for older Americans
- this acronym is used to represent the department within the federal government that oversees the collection and distribution of social security funds
- the president who is responsible for enacting the Social Security Act in 1935
- the lowest dollar amount that an employer is allowed to pay an employee (2 words)
- a range of income tax dollars that have different percentages used to calculate federal and state taxes (2 words)
- the amount of earnings that is used to calculate an employee’s federal, state and FICA taxes (2 words)
- acronym used for the trust fund designated for Americans with disabilities
27 Clues: hours worked beyond 40 hours per week • a type of tax applied to taxable earnings • the letter P in CPI stands for ___________ • an increase in prices of goods and services • acronym used to represent the rate of inflation • acronym used for the trust fund designated for older Americans • acronym used for the trust fund designated for Americans with disabilities • ...
CLF210 W8 Part IV Muscle Functions and Characteristics 2021-03-03
Across
- can recoil and return to the original shape and length
- Some fibrous connective tissues ____ over (some attachment points) to ensure (security of attachment points)
- The system ____ their muscles in order to produce (some energy)
- can stretch
- ____ (cover) over (some attachment points) to ensure (security of attachment points)
- (Some fibrous connective tissues) (cover) over ___ to ensure (security of attachment points)
- (some fibrous connective tissues) (cover) over (some attachment points) to ensure (attachment points) ______
Down
- the system makes _______ to maintain (stationary position)
- the system makes (some changes) to maintain _____
- can receive and respond to a stimulus
- The system (move) their muscles in order to produce ____
- along with (some attachment points) and (some rigid structures), they allow _____
- Along with (some attachment points) and ____, they allow (motion)
- can shorten to move body
14 Clues: can stretch • can shorten to move body • can receive and respond to a stimulus • can recoil and return to the original shape and length • The system (move) their muscles in order to produce ____ • the system makes _______ to maintain (stationary position) • the system makes (some changes) to maintain _____ • ...
Passalong 2025-10-29
Across
- A system used to verify Social Security benefits.
- Another system used to verify Social Security and SSI information.
- Limit A term referring to assets that must be below a certain limit for Medicaid eligibility.
- The term for excluding certain income from eligibility calculations.
- A term for money earned or received.
- assistance A type of assistance for individuals in adult care homes.
- Another name for the COLA Passalong group.
- Social Security Disability Insurance.
Down
- Cost-of-Living Adjustment.
- A Passalong category for individuals disabled before age 22.
- A Passalong category for individuals who lost SSI due to receiving widow benefits.
- The program designed to preserve Medicaid eligibility for certain individuals.
- The process of determining if someone qualifies for a program.
- A federal program that provides benefits to disabled individuals.
14 Clues: Cost-of-Living Adjustment. • A term for money earned or received. • Social Security Disability Insurance. • Another name for the COLA Passalong group. • A system used to verify Social Security benefits. • A Passalong category for individuals disabled before age 22. • The process of determining if someone qualifies for a program. • ...
Sample Title 2022-10-14
the Bison 2025-02-06
Across
- of information
- work history, date of birth, social security number, criminal record,
- Espionage
- which may arise from employment-related physicals, drug tests and
- of an employee’s performance on the job such as performance reports,
- information
- set of rules or promises which limits access or places restrictions on certain
- involves individuals hired to steal trade secrets, new products or
- actions, supervisory notations
Down
- Data
- in the Workplace
- about an employee prior to employment such as a résumé,
- of espionage conducted for commercial purposes rather than security;
- insurance information
- or Sensitive Data
- Data
- employee, customer and client information private
- religion, etc.
18 Clues: Data • Data • Espionage • information • of information • religion, etc. • in the Workplace • or Sensitive Data • insurance information • actions, supervisory notations • employee, customer and client information private • about an employee prior to employment such as a résumé, • which may arise from employment-related physicals, drug tests and • ...
Crossword - Voltedge 2019-09-05
Across
- TCT supports export control for which country?
- Security model used by most of the ERP applications
- One of the focus areas of EHS
- Re-tag in TCT can be done by?
- 50th percentile
- Portal to view security emergency contact and other security info
Down
- Tool replacing Oracle HR
- Python library for machine learning
- What is the SOX Compliant application under EHS
- Company wide EHS system of record
10 Clues: 50th percentile • Tool replacing Oracle HR • One of the focus areas of EHS • Re-tag in TCT can be done by? • Company wide EHS system of record • Python library for machine learning • TCT supports export control for which country? • What is the SOX Compliant application under EHS • Security model used by most of the ERP applications • ...
Confidentiality 2025-02-06
Across
- about an employee prior to employment such as a résumé,
- or Sensitive Data
- involves individuals hired to steal trade secrets, new products or
- of information
- Data
- of rules or promises which limits access or places restrictions on certain
- Data
- information
- work history, date of birth, social security number, criminal record,
Down
- which may arise from employment-related physicals, drug tests and
- Espionage
- in the Workplace
- actions, supervisory notations
- etc.
- of espionage conducted for commercial purposes rather than security;
- of an employee’s performance on the job such as performance reports,
- employee, customer and client information private
- insurance information
18 Clues: etc. • Data • Data • Espionage • information • of information • in the Workplace • or Sensitive Data • insurance information • actions, supervisory notations • employee, customer and client information private • about an employee prior to employment such as a résumé, • which may arise from employment-related physicals, drug tests and • ...
Confidentiality in the Workplace 2025-02-07
Across
- insurance information
- or Sensitive Data
- which may arise from employment-related physicals, drug tests and
- in the Workplace
- of espionage conducted for commercial purposes rather than security;
- Espionage
- Data
- religion, etc.
- employee, customer and client information private
- actions, supervisory notations
Down
- Data
- work history, date of birth, social security number, criminal record,
- involves individuals hired to steal trade secrets, new products or
- information
- about an employee prior to employment such as a résumé,
- of information
- of rules or promises which limits access or places restrictions on certain
- of an employee’s performance on the job such as performance reports,
18 Clues: Data • Data • Espionage • information • of information • religion, etc. • in the Workplace • or Sensitive Data • insurance information • actions, supervisory notations • employee, customer and client information private • about an employee prior to employment such as a résumé, • which may arise from employment-related physicals, drug tests and • ...
AI in fighting fraud 2022-03-14
8 Clues: a form or a model • crime of stealing • wicked, evil, horrible • the one who commits fraud • a fraud, a dishonest trick • cyber attack that steals one's personal data • prevent (someone) from accomplishing something • information resulting from the systematic analysis of data or statistics
Digital Safety 2024-10-09
Customer Care BFCM 23 2023-11-20
Across
- One of our best sellers, Sarrah ____ Quartz Rug.
- This really ties the room together.
- Moroccan Zig Zag, Stormy Grey rug
- Played Barbie in recent film, Margot ______.
- Black Friday ____ Monday
- Ruggable Founder Jeneva ____.
- Pink bird featured on an Iris Apfel rug.
- City of our Ruggable UK plant
- Magazine we recently collaborated with Architectural ______.
- Day before Black Friday.
Down
- Ruggable EU country famous for clogs.
- Jean-Michel Basquiat grew up in this NY borough.
- Discount code name.
- Stinky ____ features on our 'Hey Howdy Hey Doormat'
- Formerly known as PMP.
- Measures 32”x22".
- Anakin Skywalker, Qui-Gon Jinn & Yaddle; for example.
- Animal that features in the Keith Haring collection.
18 Clues: Measures 32”x22". • Discount code name. • Formerly known as PMP. • Black Friday ____ Monday • Day before Black Friday. • Ruggable Founder Jeneva ____. • City of our Ruggable UK plant • Moroccan Zig Zag, Stormy Grey rug • This really ties the room together. • Ruggable EU country famous for clogs. • Pink bird featured on an Iris Apfel rug. • ...
FITE: 2013-05-14
crossword 2024-01-31
Across
- warfare that tries to influence political, economic, or military conditions abroad without exposing or highlighting the role of the state conducting them.
- the process of changing electronic information or signals into a secret code that people cannot understand or use without special equipment.
- behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known.
- a deliberate action aimed at weakening a polity, government, effort, or organization through subversion, obstruction, demoralization.
- law that regulates the conduct of parties engaged in an armed conflict. synonymous with International Humanitarian Law.
- an academic, non-binding work on how international humanitarian law applies to cyber conflicts and cyber warfare.
Down
- the discovering of secrets, especially political or military information of another country or the industrial information of a business
- false information spread in order to deceive people.
- the process of getting information about enemy forces or positions by sending out small groups of soldiers or by using aircraft, etc.
- cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities.
10 Clues: false information spread in order to deceive people. • cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities. • behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known. • ...
Profiles 1 text 1 Veeti 2014-12-03
18 Clues: jono • slus • juosta • suunta • luvata • rukous • kokemus • maisema • tuhlata • hereillä • lentokone • matkustaa • kulttuuuri • paikallinen • vastakkainen • turvallisuus • viivastyminen • kutsua,soittaa
Appetizer Crossword 2023-01-03
Across
- ___ and Demand
- a party that takes on risk in return for payment, and they are used by private companies to go public
- _____ public offering is when a company first offers their stock to investors
- Financial ____ is where buyers and sellers conduct business
- If Supply goes down for a product, what will go down in return
- ______ markets are securities with a maturity of less then one year
- A ___ security is a name for a loan issued by a business or government
- Treasury _____ are a security with a maturity less then one year
Down
- This person is the name of an owners of a corporation
- A different name for a stock
- ___ liability is when a person can only lose what they contribute
- _____ markets are securities with a maturity of greater then one year
- A ____ has only two owners
- ______ return is the money that you make of an investment
- This type of Proprietorship has a ____ Owner
15 Clues: ___ and Demand • A ____ has only two owners • A different name for a stock • This type of Proprietorship has a ____ Owner • This person is the name of an owners of a corporation • ______ return is the money that you make of an investment • Financial ____ is where buyers and sellers conduct business • If Supply goes down for a product, what will go down in return • ...
2021 Compliance Month Crossword Puzzle 2021-10-12
Across
- Entities, Customers’ status under HIPAA
- The federal agency/department that enforces the HIPAA regulations.
- Information that is subject to a policy of destruction and/or retention.
- The federal regulation that governs the use and disclosure of health information.
- The Protenus ethics reporting mechanism for employees and customers.
- The security measures required in all Protenus systems; must not be shared with others for security purposes.
- The process of encoding data through the use of keys and codes.
- Necessary, Amount of PHI that Protenus must use for the task at hand.
Down
- A requirement of the Security Rule to protect electronic PHI (ePHI).
- An impermissible use or disclosure of PHI
- The punishment for employees who violate Protenus policies.
- Bribery, The Protenus policy that prohibits offering of gifts or money to potential customers.
- Associate, Protenus status under HIPAA
- The attempt to gain sensitive information through an email that is fake or malicious.
- Reavey, The Protenus CISO
15 Clues: Reavey, The Protenus CISO • Associate, Protenus status under HIPAA • Entities, Customers’ status under HIPAA • An impermissible use or disclosure of PHI • The punishment for employees who violate Protenus policies. • The process of encoding data through the use of keys and codes. • The federal agency/department that enforces the HIPAA regulations. • ...
Cybersecurity fun 2022-04-28
Across
- legal constraints that govern how data can be used or stored. Permission is often required from individual as to these elements
- possibility of undesired outcome occurring
- information classification
- Electronic or digital method to control how devices operate or control how they can or can not be used
- any security incident where sensitive, protected, or confidential data is accessed or stolen by an unauthorized party
- the original form of a message
- protect before an event happens
Down
- all the information on a website
- a conventional type of encryption
- the process of adding our signature to the document to show integrity
- someone who is responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
- a process of encoding a message so that its meaning is not obvious
- the a in CIA triad
- ways to protect vulnerabilities
- copies of data
15 Clues: copies of data • the a in CIA triad • information classification • the original form of a message • ways to protect vulnerabilities • protect before an event happens • all the information on a website • a conventional type of encryption • possibility of undesired outcome occurring • a process of encoding a message so that its meaning is not obvious • ...
Operating System-Unit 5 2019-07-03
Across
- Holds the only copy of the data
- Region of fast memory that holds copies of data
- Any malicious program which is used to hack into a computer
- Which register is read by the host to get input
- Set of wires and a rigidly defined protocol that specifies set of messages
- Mechanism of providing security to the information from unauthorized persons
- It is a process in which information is converted into a form which cannot be understood by unauthorized user
- ____keeps state information about the use of I/O components
Down
- Collection of access rights
- Hardware mechanism that allows a device to notify the CPU
- Major security problem for os is
- Mechanism that will provide a protection to system
- Self replicating and are designed to infect other programs
- Collection of electronic that can operate a port, a bus or a device
- Someone who seeks and exploits weakness in a system or network
15 Clues: Collection of access rights • Holds the only copy of the data • Major security problem for os is • Region of fast memory that holds copies of data • Which register is read by the host to get input • Mechanism that will provide a protection to system • Hardware mechanism that allows a device to notify the CPU • Self replicating and are designed to infect other programs • ...
CyberBullying 2013-11-26
Across
- abuse Messing with someone threw words
- threats Threating someone threw an electronic device
- Moving one picture from one site to another
- Someone that is getting bullied
- Someone don’t talk to another person
- False injury
Down
- Keep doing things over and over
- Something that is made up or fake
- Messages that you don’t need
- A post posted on someone’s post
- A thing that someone puts up for other people to see
- On the internet
- Things that people shouldn’t see
- bullying Making threats using an electronic device
- Making fun of someone
15 Clues: False injury • On the internet • Making fun of someone • Messages that you don’t need • Keep doing things over and over • A post posted on someone’s post • Someone that is getting bullied • Things that people shouldn’t see • Something that is made up or fake • Someone don’t talk to another person • abuse Messing with someone threw words • ...
KM Week 10 2021-10-11
Across
- Smart Nation through Digital _________
- An intellectual property
- ________ citizen through e-participation
- Increase in digital usage has brought about the need to protect data, infrastructure and networks from growing cyber threats.
- in the eco-system of Digital Economy.
- A KMS
- A communication tool
Down
- The Government, _____ and Society are closely
- an advantage to move towards digital economy
- One of the KM processes
- structural resource
- An impact/ area of concern for digital society
- We need an update of this to move to a digital future
- Infrastructural resources
- He conceived the concept of KM
15 Clues: A KMS • structural resource • A communication tool • One of the KM processes • An intellectual property • Infrastructural resources • He conceived the concept of KM • in the eco-system of Digital Economy. • Smart Nation through Digital _________ • ________ citizen through e-participation • an advantage to move towards digital economy • The Government, _____ and Society are closely • ...
STEMtoSpace 2022-10-14
Across
- a device for working with information
- everything in the universe beyond the top of the Earth's atmosphere
- The National Aeronautics and Space Administration
- the path of an object around a particular point in space
- knowledge and skills
- the practical application of principles or processes
- builder
Down
- the atmosphere and outer space
- coder
- military branch that conducts operations in space
- online realm
- a small object that orbits, or revolves around, a larger object in space
- Global Positioning System
- a space vehicle
- a means of improving our knowledge and understanding of the universe
15 Clues: coder • builder • online realm • a space vehicle • knowledge and skills • Global Positioning System • the atmosphere and outer space • a device for working with information • military branch that conducts operations in space • The National Aeronautics and Space Administration • the practical application of principles or processes • ...
IT Academy Crossword Puzzle 2020-10-21
Across
- Machine Learning made beautifully simple for everyone
- Microsoft's wearable device to support enhanced communication
- Security, Scale, Agility and _______________
- Total number of Keynote sessions
- Magna's digital signage
- General Security Update presenter
- IT Academy tag line second word
- Magazine with Most Admired Companies List for 2020
Down
- Nadelöhr
- MGIT operating model
- Acronym for the Magna IT training and information platform
- 2nd scavenger hunt winner
- IT Academy social networking community
- Weather Update forecast
- Platform for sharing videos
15 Clues: Nadelöhr • MGIT operating model • Weather Update forecast • Magna's digital signage • 2nd scavenger hunt winner • Platform for sharing videos • IT Academy tag line second word • Total number of Keynote sessions • General Security Update presenter • IT Academy social networking community • Security, Scale, Agility and _______________ • ...
Tony vs. Zoe Ultimate Battle of the Brains 2024-03-14
Across
- boneless french toast
- tony and zoe's relationship
- the best way to calm zoe
- how to start a sonnet
- ideal physique for any human
- makes sound while asleep
- adjective, commonly used for reality TV
- term of endearment, commonly used with "gump"
Down
- canadian supermarket chain with even less security
- boutique supermarket chain with minimal security
- historic botanical garden on Vancouver Island
- dramatic woman
- 80's leather brand known for its jewelry
- boring beach town near LA
- edm genre, or place of residence
15 Clues: dramatic woman • boneless french toast • how to start a sonnet • the best way to calm zoe • makes sound while asleep • boring beach town near LA • tony and zoe's relationship • ideal physique for any human • edm genre, or place of residence • adjective, commonly used for reality TV • 80's leather brand known for its jewelry • historic botanical garden on Vancouver Island • ...
Florian Pukownik 2022-04-29
Across
- officer person who catches thieves
- person who works with the flowers
- person who make music
- person who edits for television
- who plays with electricity
- a person who works at the shop
Down
- person who repairs pipes
- guard a person who provides security
- the person who maintains order
- a person who knows laws
- person who is calm
- person who heal damaged pets
- person who take care of the child
- person who makes the food
- person who doesn't want to do anything
15 Clues: person who is calm • person who make music • a person who knows laws • person who repairs pipes • person who makes the food • who plays with electricity • person who heal damaged pets • the person who maintains order • a person who works at the shop • person who edits for television • person who works with the flowers • person who take care of the child • ...
Vallari FRM 2024-07-16
Across
- NTPC evaluates risks related to environmental regulations impacting thermal power generation and emissions control.
- Dabur India assesses risks of disruptions in sourcing herbal ingredients impacting production of Ayurvedic products.
- Ola faces disruptions in ride-hailing services due to app server crashes during peak travel hours.
- RBI monitors risks that could destabilize the entire banking sector, such as economic downturns or liquidity crises.
- Biocon reviews dependency on a few key drug patents affecting revenue stability in biopharmaceuticals.
- Insurance companies assess exposure to claims from natural disasters like cyclones or floods impacting claims processing.
- Adani Green Energy evaluates risks associated with government policies impacting renewable energy projects.
- Titan Company manages risks associated with fluctuating gold prices impacting jewelry manufacturing costs.
Down
- Kotak Mahindra Bank assesses the risk of default by retail borrowers in its personal loan portfolio.
- Mahindra & Mahindra evaluates exposure to fluctuations in commodity prices affecting profitability in agricultural machinery manufacturing.
- Axis Securities ensures compliance with new SEBI regulations affecting brokerage operations.
- BigBasket navigates consumer trust issues during data privacy concerns impacting online grocery sales.
- Zee Entertainment faces litigation over copyright infringement affecting broadcasting rights and viewer engagement.
- Sun Pharma assesses geopolitical stability before expanding pharmaceutical manufacturing operations in new global markets.
- SpiceJet deals with flight cancellations due to aircraft maintenance issues impacting passenger satisfaction and flight schedules.
- Wipro deals with currency fluctuations impacting revenue from global IT services contracts.
- JSW Steel manages liquidity to meet debt obligations amidst fluctuating cash flows from steel production.
- L&T Finance Holdings reviews the accuracy of financial models used for risk assessment and loan underwriting.
- Infosys strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
- HDFC Life Insurance manages exposure to changes in interest rates impacting investment returns on policyholder funds.
20 Clues: Wipro deals with currency fluctuations impacting revenue from global IT services contracts. • Axis Securities ensures compliance with new SEBI regulations affecting brokerage operations. • Ola faces disruptions in ride-hailing services due to app server crashes during peak travel hours. • ...
Mata pelajaran (subject) 2022-11-24
20 Clues: art • easy • hall • start • twice • a week • lesson • finish • recess • strict • teacher • student • science • olahraga • religion • classroom • difficult • study/learn • social study • security guard
Spanish 2 Travel Vocabulary - Liliana Kirby 2022-10-13
20 Clues: gate • claim • board • ticket • agency • screen • airport • customs • luggage • station • arrival • suitcase • passport • vacation • security • passenger • departure • to travel • itinerary • stand in line (2 words)
Tech & science 2020-12-18
21 Clues: dane • koło • błąd • małpa • lepki • badać • twardy • rozwój • wtyczka • przycisk • wyłączać • wynalazca • astronauta • para wodna • ustawienia • wszechświat • szczepionka • opracowywać • bezpieczeństwo • przemysł lotniczy • kamerka internetowa
Speltoets 1 2023-04-11
20 Clues: seat • pilot • runway • window • airport • luggage • arrival • postcard • domestic • passport • take off • security • passenger • aeroplane • departure • check - in • air hostess • first class • flight ticket • international
Spanish Vocab 2023-04-26
20 Clues: gum • boat • fish • bomb • door • trick • plane • train • cloud • energy • turtle • to fly • airport • snorkle • avocado • to walk • the sun • security • suitcase • photo/image
Theme Words CH5 2023-06-12
21 Clues: bouw • fooi • stipt • handel • horeca • sociaal • ijverig • ervaren • flexibel • praktisch • productie • efficiënt • zelfstandig • beveiliging • gemotiveerd • betrouwbaar • enthousiast • professioneel • georganiseerd • gezondheidszorg • gedisciplineerd
2° D Letícia da Silva Santos, Izabelli Vitória Carvalho e Letícia Briguente 2023-10-19
22 Clues: Dois • Tiro • unida • honesto • Atraído • Família • Técnico • Chuveiro • Educação • Expansão • Crianças • Academia • Exaustivo • Segurança • Diferente • Organizado • Apresentando • Recrutamento • Inteligência • Universidade • Completamente • Revolucionando
Unidad 3 Vocabulario 2024-01-30
20 Clues: new • bed • shoes • water • jacket • desire • oxygen • success • to help • to want • empathy • to need • to live • shelter • security • clothing • necessity • stability • community • creatively
SyncUp Crossword 2024-03-20
Across
- One of Synchrony's larger clients
- This site has all your HR needs
- SYF CEO
- This team monitors Synchrony's physical and cyber defenses.
- Used to purchase with a loan (2words)
Down
- SYF CIO
- This team always tries new ideas to further the organization
- You can deposit money here
- Synchrony Headquarters is located here
9 Clues: SYF CIO • SYF CEO • You can deposit money here • This site has all your HR needs • One of Synchrony's larger clients • Used to purchase with a loan (2words) • Synchrony Headquarters is located here • This team monitors Synchrony's physical and cyber defenses. • This team always tries new ideas to further the organization
Cashless society 2024-09-11
Across
- do you think of a cashless world?
- Depositing money can also be done online
- payments can be made by
- illegal. gambling is done
- people who need to exchange dollars for local currency
- Bank enriches the security team
- targeted by thieves
- of date. protect large amounts of cash
Down
- payments are usually made for
- cash makes people?
- bank is used for
- cost. of printing money or coins requires
- debit or credit card service used?
- of first profit and cashless
- use of cash is considere
- currency coins are made of
16 Clues: bank is used for • cash makes people? • targeted by thieves • payments can be made by • use of cash is considere • illegal. gambling is done • currency coins are made of • of first profit and cashless • payments are usually made for • Bank enriches the security team • do you think of a cashless world? • debit or credit card service used? • of date. protect large amounts of cash • ...
preslyns crossword 2025-02-06
Across
- insurance information
- or Sensitive Data
- which may arise from employment-related physicals, drug tests and
- in the Workplace
- of espionage conducted for commercial purposes rather than security;
- Espionage
- Data
- religion, etc.
- employee, customer and client information private
- actions, supervisory notations
Down
- Data
- work history, date of birth, social security number, criminal record,
- involves individuals hired to steal trade secrets, new products or
- information
- about an employee prior to employment such as a résumé,
- of information
- of rules or promises which limits access or places restrictions on certain
- of an employee’s performance on the job such as performance reports,
18 Clues: Data • Data • Espionage • information • of information • religion, etc. • in the Workplace • or Sensitive Data • insurance information • actions, supervisory notations • employee, customer and client information private • about an employee prior to employment such as a résumé, • which may arise from employment-related physicals, drug tests and • ...
PDHPE CROSSWORD 2016-08-23
8 Clues: DISK THROWING • BULLING NAME CALLING • 1-5 PEOPLE WILL GET IT • YOU HAVE HIGH SUGER LEVLES • BULLING ONLINE BULLING • BULLING HITTING AND KICING • BULLING SPREDDING ROMERS ABOUT SOMEONE • KIKKING THE BALL TO YOUR TEAM MATES TRYING TO GET A GOAL
Jobs of the Future by 2030 2025-04-16
8 Clues: : Helps businesses go green • : Defends against cyber threats • : Provides medical care remotely • : Builds self-driving vehicle systems • : Interprets big data to find patterns • : Uses AI to diagnose and treat patients • : Designs and builds intelligent machines • : Studies climate change and global warming
Sustainable Biomes 2024-07-25
Across
- The average weather conditions over a long period.
- Security The condition in which all people have reliable access to sufficient, safe, and nutritious food.
- The natural environment where a species lives and grows.
- Footprint The total amount of carbon dioxide emissions caused by human activities.
- The process by which soil and rock are worn away by wind or water.
- The capacity to maintain environmental balance over time.
- A system of living organisms interacting with their environment.
- Resources - Resources that can be naturally replenished.
- The deterioration of environmental quality.
- Efforts to protect and manage natural resources.
- Security Measures and policies to safeguard ecosystems and natural resources from harm.
Down
- The clearing of forests for non-forest use, impacting ecosystems.
- The process of returning degraded ecosystems to a healthier state.
- The protection and stability of systems or resources from threats or risks.
- A large area with distinct climate and plant/animal life.
- The introduction of harmful substances into the environment.
- The variety of different species in an area.
- Footprint The measure of human impact on the environment.
18 Clues: The deterioration of environmental quality. • The variety of different species in an area. • Efforts to protect and manage natural resources. • The average weather conditions over a long period. • The natural environment where a species lives and grows. • Resources - Resources that can be naturally replenished. • ...
Information Security Challenge 2025-12-02
Across
- A privacy principle that limits the collection, processing, and retention of personal data to only what is strictly necessary for a specific purpose.
- A formal review of systems and processes to ensure security and compliance.
- A type of cyberattack where multiple systems flood a target with traffic, causing service disruption.
- In data security, this process replaces sensitive information with a unique identifier or symbol, making the original data inaccessible without a secure mapping.
- A security risk that originates from within an organization, often involving employees or contractors who misuse their access to harm systems or data.
Down
- Following laws, regulations, and internal policies to ensure proper governance and avoid legal or security risks.
- An unexpected event that compromises the integrity or availability of data.
- Security Protecting data and systems hosted on remote servers.
- A type of malicious software that can replicate and spread.
- this principle ensures that data remains accurate, consistent, and unaltered except by authorized processes.
10 Clues: A type of malicious software that can replicate and spread. • Security Protecting data and systems hosted on remote servers. • An unexpected event that compromises the integrity or availability of data. • A formal review of systems and processes to ensure security and compliance. • ...
Jillian - cab 2020-11-30
Across
- type of cyberbullying
- type of bullying where you text bad things
- type of bullying that spreads rumors
- someone being bullied
- someone who is mean to others
- type of cyberbullying where someone tricks you into revealing personal information.
- The 'a' in the abcd's of bullying.
- the 'd' in the abcd's of bullying
Down
- type of bullying that includes kicking
- type of bullying that includes threatening
- The 'b' in the abcd's of bullying
- someone who watches the bullying hapen
- someone who stands up to bullying
- The 'c' in the abcd's of bullying
14 Clues: type of cyberbullying • someone being bullied • someone who is mean to others • The 'b' in the abcd's of bullying • someone who stands up to bullying • The 'c' in the abcd's of bullying • the 'd' in the abcd's of bullying • The 'a' in the abcd's of bullying. • type of bullying that spreads rumors • type of bullying that includes kicking • someone who watches the bullying hapen • ...
Just for fun 2015-10-12
Across
- Where your emails go if they are deemed unsafe
- You should do this to your PC when you leave it unattended
- This type of security prevents or hinders access
- This has a risk of exploitation
- This type of email account should not be used for personal purposes
- All instances of this should be reported to the IT Security Team
- Care should be take with this type of device in case of loss or theft
Down
- This should be in place on devices containing personal data
- The biggest security threat
- NCG policy that governs the use of IT equipment
- This type of waste should be stored securely until collected
- This should be positioned away from visitors
- All corporate laptops and desktop machines should have this protective software installed
- Something of yours which you should never share with other people
- Filing cabinets containing personal data should be in this state
15 Clues: The biggest security threat • This has a risk of exploitation • This should be positioned away from visitors • Where your emails go if they are deemed unsafe • NCG policy that governs the use of IT equipment • This type of security prevents or hinders access • You should do this to your PC when you leave it unattended • ...
At the Airport 2023-10-01
21 Clues: tull • skör • pass* • bagage • avgång • lyfta* • inrikes • försenad • säkerhet • stiga på • luftfart • mittgång* • landgräns • flygbolag • ankommande • påstigning • flygmaskin • bagagevagn • flygplan(amE) • landningsbana* • säkerhetsbälte*
『명덕고등학교 2학년』Crossword (Practice) ③ 2025-12-02
Cyber safety- Ella Hill 2016-05-24
Across
- up- an add that tries to get you to do or get something can be inappropriate
- to explore the Internet by going from one link to another
- games- games you play on an iPad
- an easier way to get an answer for something without using a dictionary
- a file that is sent along with an email or message
- blocks harmful things
- in computer science this is the text written and used by programmers
- when an add or website gets your details EVIL I KNOW
- a social networking website
- a photo sharing app which allows you to send photos and videos to your friends
- a program which allows you to transmit calls over Internet connection
- a quick way of sending a message
Down
- copy something from one computer system to another
- when someone or something gets your credit card details or something like that
- mean person
- a photo sharing social network
- to stop a computer reaching something on the Internet
- keep it to yourself
- people who try to get into your iPad,computer,iPod or iPhone without using a password
- is I formation stored on a computer or other storage device
- help sort out problems
- a web address stored in your browser
- a small file that is sent to a web browser by a sever and stored on the users computer
- a way to exchange a message over the Internet
24 Clues: mean person • keep it to yourself • blocks harmful things • help sort out problems • a social networking website • a photo sharing social network • a quick way of sending a message • games- games you play on an iPad • a web address stored in your browser • a way to exchange a message over the Internet • copy something from one computer system to another • ...
James Cyber safety crossword 2016-05-21
Across
- a small piece of information or chocolate chip
- computer villainy
- Search engine
- Request details
- group of friends
- this flickers in a fire
- Short cut to speed access
- email,junk mail you didn't ask for
Down
- Highlight your favourites
- keeping private information safe
- an on line talk with friends
- Unwanted advertising
- secret code
- burning bricks to protect you
- secret identity
- my up to date news
- a person who gains access without permission
- the flu is one of these
- Device that moves you curser
- unexpected ad
20 Clues: secret code • Search engine • unexpected ad • Request details • secret identity • group of friends • computer villainy • my up to date news • Unwanted advertising • this flickers in a fire • the flu is one of these • Highlight your favourites • Short cut to speed access • an on line talk with friends • Device that moves you curser • burning bricks to protect you • ...
Cyber safety Sienna Finau 2016-05-25
Across
- A place to keep things
- If you want to send something to some one
- Cordless Internet
- Something that pops up on your screen
- Someone that tricks you in to buying things that are not real
- A thing adults use to post thing on
- Something you must always protect
- Some one who is finding out your password
- If some one is watching you
- If some one is being mean
- On the Internet
Down
- time To see some one on a phone or iPad
- something you don't want on your computer
- What to do is to keep something to yourself
- So wing you keep private
- A texts file
- Too make your screen smaller
- A . .of some one
- Sending a letter on line
- A website the you can post stuff on it
20 Clues: A texts file • On the Internet • Cordless Internet • A . .of some one • A place to keep things • Sending a letter on line • So wing you keep private • If some one is being mean • If some one is watching you • Too make your screen smaller • Something you must always protect • A thing adults use to post thing on • Something that pops up on your screen • ...
Cyber safety-AGNES MATRIN 2016-05-26
Across
- damaging systems
- a device that is connected to the internet
- helps you when inappropriate things come up on a device at home
- information about a particular subject that is available on the internet
- security system
- the fact of being who or what a person is
- the repeated use of electronic communications to harass or frighten someone
- in a place or situation that allows you to do things without other people seeing you
- to enter your username or password
Down
- sending or posting mean messages
- a short article giving a description about a person
- a piece of information
- a global computer network providing a variety of information
- that allows you to access into a system
- data from one computer system
- an ad that comes up on a device randomly
- secures a system from virus
- to store own information
- the means of communication as radio and television
- the condition of being protected
20 Clues: security system • damaging systems • a piece of information • to store own information • secures a system from virus • data from one computer system • sending or posting mean messages • the condition of being protected • to enter your username or password • that allows you to access into a system • an ad that comes up on a device randomly • ...
Cyber safety - Ella Smith 2016-05-18
Across
- someone who helps you
- people who try and get your money
- distributive emails or messages
- how you talk
- information your own details
- a type of social media
- your own or other people's email or phone number
- a mean person
- something that we use everyday
- something that can shut down your computer
Down
- how you get information
- something that can pop up on your computer
- bad people who can still your belongings
- your own place
- something that you can get spams on
- media websites that you can communicate on
- about your self
- your own space
- you face on the Internet
- people who follow you
20 Clues: how you talk • a mean person • your own place • your own space • about your self • someone who helps you • people who follow you • a type of social media • how you get information • you face on the Internet • information your own details • something that we use everyday • distributive emails or messages • people who try and get your money • something that you can get spams on • ...
Armstrong kids cyber monday 2021-11-29
Across
- this is the name of the city where your maternal grandfather's father lived as a small child before his family owned an automoblile so they traveled by horse and buggy
- this is a french word for the very fun way that your grandfathe would come down the upper part of Mount Hood after climbing it
- the number of sisters that your maternal grandfathers father had
- the state that your maternal grandparents were married in
- The one room school that your grandmother attended in Marion South Dakota had this many children in the same number of grades. what is that number
- 3rd book after the end of the Pentateuch
- this great grandfathers first name is shared with the most prominent troublemaker of the cartoon "the chipmunks"
- the country that your maternal gradfathers grandfather emigrated from
- the german city your parents were married in
- your maternal grandfather's father was this type of inspector when he was first married
- what happened to a mountain your grandfather once climbedd that is 72 miles north east of the town we were in when your mother was 123 days old
- this is the name that your maternal grandfather was originally going to be called (it is also his middle name)
- this is then name of scandanvian food often eathen when the Johnson side of the family is together
- this is maiden name of you ancestor who did not have to change her last name when she married.
- this is the first name of your maternal grandfather's paternal grandfather's father's Father-in-law (It is only one one letter differnt from your your maternal grandfather's Father's name)
- how many brothers and sisters did your maternal grandfathers mother have
- the animal that your maternal grandfathers father raised when he was first married
- what is the name of the town that Aunt Karen lives closest to
- this is what Sarah's last name would be if she had lived in Scandanaviain the 1700's
- the occupation that your maternal grand fathers maternal grandfather had when he lived in Marion South Dakota
- what is the name of the glacier that your mother lived near when she was in high schoo.
- in what city was your mother born
- what is the name of the relationship of the living relative that you have met in the previous two generations did not finish high school
Down
- the maiden name of your Uncle's wife on your mothers' side
- this is the name of the country where your maternal grandmother's fathers long past relative was a wagon maker for Catherine the Great
- the distance of the school from your grandmother was one mile away. The reason for this distance was that roads followed ______ section lines that occured every mile in each direction
- A coupling link with a safety closure used on the zipline - it is derived from the german word that means "carbine hook"
- 4th book of the new testament
- the number of brothers that your maternal grandmothers father had
- this is the first word of the dessert created by you maternal grandfathers mother
- this is a scandanavian dish that is prepared by soaking dried fish in lye, then skinning, boning and boiling it to a gelatinous consistency
- this is the name shared by your grandmothers and an aunt
- I was once called a planet, but I lost that title several decades ago
- This great great grandfather's middle name was the same as the first name of the very famous first pair of american explorers to reach the west coast of North America.
- what weather event threatened to keep you grandmother from the hospital when she thought she was in labor a week before your mother was born
- the french city that your aunt Karen was visiting when a stranger (young man) approached her and kissed her hand and up her arm.
- this is the 4th word of the chorus of a song that grandma hated as a child cause she was teased with it in grade school. It is also the nickname associated with her first name.
- the name of the denomination of your maternal grandfathers paternal grandfather belonged to that had its start in wittenburg germany when a monk whose name is shared by the denomination nailed 95 thesis to the church door
- This prominent creek in the area was named because an early survey party had a skirmish with the local indians along it's bank
- the country that your maternal Grandmother emigrated from
40 Clues: 4th book of the new testament • in what city was your mother born • 3rd book after the end of the Pentateuch • the german city your parents were married in • this is the name shared by your grandmothers and an aunt • the state that your maternal grandparents were married in • the country that your maternal Grandmother emigrated from • ...
Cyber Words Crossword Puzzle 2022-11-17
Across
- blocker A separate program or a feature incorporated within a browser that stops popup advertisements from appearing.
- Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
- Malware that prevents a user's device from properly operating until a fee is paid.
- Software of hardware device that captures and stores each key stroke that a user types on a keyboard.
- Software that spies on users by gathering information without consent.
- A logical computer network of zombies under the control of an attacker.
- pack Software that is a cumulative package of all patches and feature updates.
- Software that helps prevent computers from becoming infected by different types of spyware.
- An infected computer that is under the remote control of an attacker.
- horse An executable program that is advertised as performing one activity but which actually performs a malicious activity.
- bomb Computer code that lies dormant until it is triggered by a specific logical event.
Down
- virus Malicious computer code that reproduces itself on the same computer.
- update Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability.
- A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
- Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
- firewall Software that runs as a program on the local computer to block or filter traffic coming into and out of the computer.
- A malicious program designed to enter a computer via network to take advantage of a vulnerability in an application or an operating system.
- Hardware of software designed to limit the spread of malware.
- A set of software tools used by an attacker to hide the presence of other types of malicious software.
- A publicly released software security update intended to repair a vulnerability.
20 Clues: Hardware of software designed to limit the spread of malware. • An infected computer that is under the remote control of an attacker. • Software that spies on users by gathering information without consent. • A logical computer network of zombies under the control of an attacker. • virus Malicious computer code that reproduces itself on the same computer. • ...
Cyber and Digital Literacy 2024-04-30
Across
- an electronic device that manipulates information or data
- knowledge obtained from investigation, study, or instruction.
- use learning technologies in a variety of different contexts.
- is to digital media.
- a reference (an address) to a resource on the internet.
- to connect with friends, work, colleagues or people they don't know online.
- exchange information and ideas in virtual communities and networks.
- is a wireless, portable personal computer with a touchscreen interface
- an online tool for teachers to give quizzes and on the fly assessments to students.
- individual is he/she who possesses a range of digital skills.
- the use of technology to harass, threaten, embarrass, or target another person.
- is a tool that delivers and presents questions to students.
- the communication outlets or tools used to store and deliver information or data.
- refers to a collection of webpages you can view using internet and a browser.
- a free sharing tool perfect for clipping, curating, and sharing content.
- is a small portable personal computer.
- a vast network that connects computers all over the world.
- TED's youth and education initiative.
- is the sending and receiving of information.
- also known as “Facebook for school.”
Down
- embedding media content in images and videos.
- is complex and multifaceted.
- a free video sharing website that makes it easy to watch online videos.
- to develop an understanding of online security, identity and data management in our own literacy practices
- is a type of digital literacy and it refers both to the individuals capacity of synthesis and critical thinking.
- the ability to read, interpret, and understand information presented in pictorial or graphic images.
- is a free, cloud-based 3D CAD Software package for students.
- is a handheld electronic device that provides a connection to a cellular network and the internet.
- provider of a presentation design tool for the creative community.
- also known as digital literacy.
- is an easy to use learning portfolio application.
- is a powerful community based social tool for learning.
- handy management and messaging tool helps recognize. reward students.
- the capacity to use computer technology successfully while also understanding the consequences of those actions.
- enable students to produce short animated narrated explainer videos.
- engaging and interactive game.
- you can literally learn anything.
- presentations are nothing like your traditional presentations.
- the use of scientific knowledge for practical purposes or applications, whether in industry or in our everyday lives.
- increasing access to high quality educational materials for K-12 students all over the world.
- entails taking responsibility for ones role in cyberspace.
- is a digital tool for designing visual stories.
- is a sneaky or dishonest plan that's meant to con someone.
- a free photo and video sharing app.
- possesses critical thinking skills in understanding all sociatal issues raised by digital technologies.
- qualities that a person is expected to have as a responsible member of digital community.
- to connect people and allow people to share their thoughts with a big audience.
- only teach programming concepts.
- create and share videos with your class, with parents, and beyond.
- encompassesa wide range of criminal activities that are carried out using digital devices and/or networks.
50 Clues: is to digital media. • is complex and multifaceted. • engaging and interactive game. • also known as digital literacy. • only teach programming concepts. • you can literally learn anything. • a free photo and video sharing app. • also known as “Facebook for school.” • TED's youth and education initiative. • is a small portable personal computer. • ...
Cyber and Digital Literacy 2024-04-30
Across
- handy management and messaging tool helps recognize. reward students.
- to connect with friends, work, colleagues or people they don't know online.
- engaging and interactive game.
- individual is he/she who possesses a range of digital skills.
- create and share videos with your class, with parents, and beyond.
- is a handheld electronic device that provides a connection to a cellular network and the internet.
- is the sending and receiving of information.
- is to digital media.
- is a sneaky or dishonest plan that's meant to con someone.
- the communication outlets or tools used to store and deliver information or data.
- is a wireless, portable personal computer with a touchscreen interface.
- refers to a collection of webpages you can view using internet and a browser.
- provider of a presentation design tool for the creative community.
- is a powerful community based social tool for learning.
- a complex and multifaceted.
- presentations are nothing like your traditional presentations.
- enables students to produce short, animated narrated explainer videos.
- to connect people and allow people to share their thoughts with a big audience.
- the capacity to use computer technology successfully while also understanding the consequences of those actions.
- a free video sharing website that makes it easy to watch online videos.
- increasing access to high quality educational materials for K-12 students all over the world.
- to develop an understanding of online security, identity and data management in our own literacy practices
Down
- is a type of digital literacy and it refers both to the individuals capacity of synthesis and critical thinking.
- an online tool for teachers to give quizzes and on the fly assessments to students.
- a free photo and video sharing app.
- the use of scientific knowledge for practical purposes or applications, whether in industry or in our everyday lives.
- encompasses a wide range of criminal activities that are carried out using digital devices and/or networks.
- a vast network that connects computers all over the world.
- only teach programming concepts.
- embedding media content in images and videos.
- is a tool that delivers and presents questions to students.
- a free sharing tool perfect for clipping, curating, and sharing content.
- qualities that a person is expected to have as a responsible member of digital community.
- is an easy to use learning portfolio application.
- you can literally learn anything.
- is a small portable personal computer.
- the use of technology to harass, threaten, embarrass, or target another person.
- also known as digital literacy.
- the ability to read, interpret, and understand information presented in pictorial or graphic images.
- an electronic device that manipulates information or data.
- exchange information and ideas in virtual communities and networks.
- a reference (an address) to a resource on the internet.
- knowledge obtained from investigation, study, or instruction.
- also known as “Facebook for school.”
- is a digital tool for designing visual stories.
- TED's youth and education initiative.
- is a free, cloud-based 3D CAD Software package for students.
- use learning technologies in a variety of different contexts.
- possesses critical thinking skills in understanding all societal issues raised by digital technologies.
49 Clues: is to digital media. • a complex and multifaceted. • engaging and interactive game. • also known as digital literacy. • only teach programming concepts. • you can literally learn anything. • a free photo and video sharing app. • also known as “Facebook for school.” • TED's youth and education initiative. • is a small portable personal computer. • ...
Networking & Cyber Ethics Crossword 2025-06-13
Across
- A unit of data transmitted over a network
- Network that covers a small geographic area
- Unique number assigned to each device on a network
- A computer that provides data or services to others
- Rules of polite and responsible behavior online
- A secure, private network over a public network
- Wireless local area network technology
- A device or software that accesses services from a server
- Unauthorized access to a system or data
- Device that forwards data packets between networks
Down
- A secret word or phrase for authentication
- Common wired network technology
- Fraudulent attempt to obtain sensitive information
- Process of converting data into unreadable code
- Security system that controls incoming and outgoing traffic
- Online harassment or abuse
- Software used to detect and remove malicious programs
- Network that covers a large geographic area
- Malicious software designed to harm devices or data
- Company that provides internet services
20 Clues: Online harassment or abuse • Common wired network technology • Wireless local area network technology • Company that provides internet services • Unauthorized access to a system or data • A unit of data transmitted over a network • A secret word or phrase for authentication • Network that covers a small geographic area • Network that covers a large geographic area • ...
Finance 2024-04-02
Across
- Financial contract whose value is derived from the value of an underlying asset.
- A financial chart used to describe price movements of a security.
- Financial contract that gives the right, but not the obligation, to buy or sell an underlying asset at a predetermined price within a specified period.
Down
- Central bank of India
- Financial contract that that obligate the buyer to purchase an asset or the seller to sell an asset at a predetermined future date and price.
- The highest price that a buyer is willing to pay for security.
- An order to buy or sell a security at the current market price.
- Risk management strategy used to offset potential losses in one investment by taking an opposite position in another investment.
- The highest price that a seller is willing to accept for a security.
- An order to buy or sell a security at a specific price.
10 Clues: Central bank of India • An order to buy or sell a security at a specific price. • The highest price that a buyer is willing to pay for security. • An order to buy or sell a security at the current market price. • A financial chart used to describe price movements of a security. • The highest price that a seller is willing to accept for a security. • ...
Profiles 1 text one Leo V 2014-12-03
17 Clues: Esine • Kaveri • Suunta • Kantaa • Kaapata • Miehistö • Kiikarit • Peruutus • Hyttynen • Viivästys • Määränpää • Lentoyhtiö • Paikallinen • Matkatavarat • Aurinkovoide • Turvallisuus • Hiustenkuivaaja
Human rights 2022-11-04
17 Clues: mad • vand • frihed • lighed • familie • respekt • ægteskab • religion • demokrati • etnicitet • sikkerhed • behandling • uddannelse • rettigheder • kriminalitet • retfærdighed • nationalitet
Browsing sefely 2025-06-17
17 Clues: TDUPAE • ERHKCA • Malware • Password • SOIWPYRA • RATWESFO • RWFAIELL • Security • RBCYELWA • Phishing • DRAWOPSS • SVRUITANI • OSCLAIDAME • NELIONCSMA • CUREESEISTS • CAYRUBNLULIG • NEINLODYTNTIEI
Bullying 2021-09-16
Across
- a kind act
- a person identified as being easy to tease
- adult Someone to go and tell when being bully person hurting others continuously
- to bother or upset someone repeatedly
- the websites you can talk to
- impacts on feeling and thoughts
- abilities
Down
- words directly to the person
- to embarrass someone to make them feel sad
- This type of bullying happens online.
- a word or term used to put someone down
- who can be bullied
- person who witnesses an act or an event
- When the bully hits the victim
- happens
- sadness, gloom, dejection
- a fight, battle or struggle, controversy
17 Clues: happens • abilities • a kind act • who can be bullied • sadness, gloom, dejection • words directly to the person • the websites you can talk to • When the bully hits the victim • impacts on feeling and thoughts • This type of bullying happens online. • to bother or upset someone repeatedly • a word or term used to put someone down • person who witnesses an act or an event • ...
Bullying 2020-11-30
Across
- someone is being hurt on purpose
- everyone is having fun
- name calling, threatning
- punching,kicking,spitting
- what is the D in the ABCDS of bullying?
- writing mean things on the internet
- spreading rumors, excluding
- what is the C in the ABCDS of bullying?
Down
- what is the A in the ABCDS of bullying?
- what is the B in the ABCDS of bullying?
- someone who stands by and watches bullying happen
- no one is having fun , there is a sollution
- attacked, unequal balance of power
- stands up to a bully
14 Clues: stands up to a bully • everyone is having fun • name calling, threatning • punching,kicking,spitting • spreading rumors, excluding • someone is being hurt on purpose • attacked, unequal balance of power • writing mean things on the internet • what is the A in the ABCDS of bullying? • what is the B in the ABCDS of bullying? • what is the D in the ABCDS of bullying? • ...
Cloud Computing Acronyms 2022-01-15
Across
- Secure Web Gateway
- Zero Trust Network Architecture
- Mobile Device Management
- Cloud Workload Protection Platform
- Software Defined WAN
- Anything as a Service
Down
- Cloud Security Posture Management
- Cloud Application Management for Platforms
- Windows Virtual Desktop
- Secure Access Server Edge
- Cloud Access Security Broker
11 Clues: Secure Web Gateway • Software Defined WAN • Anything as a Service • Windows Virtual Desktop • Mobile Device Management • Secure Access Server Edge • Cloud Access Security Broker • Zero Trust Network Architecture • Cloud Security Posture Management • Cloud Workload Protection Platform • Cloud Application Management for Platforms
Sentinels Crossword game 2024-07-15
Across
- Act of using key to protect data (10)
- Moving data from one place to another (8)
- Restoring lost data (8)
- Prioritizing incidents (6)
- Finding threats (9)
- Adhering to laws and regulations (10)
- Act of stopping something (10)
Down
- Event affecting data security (8)
- Copy of data for safety (6)
- Private and secret information (12)
- Easily affected data (9)
- Watching and checking data movement (10)
- Breaking through security (6)
- Measurements for evaluation (7)
- Visual display of data (9)
15 Clues: Finding threats (9) • Restoring lost data (8) • Easily affected data (9) • Prioritizing incidents (6) • Visual display of data (9) • Copy of data for safety (6) • Breaking through security (6) • Act of stopping something (10) • Measurements for evaluation (7) • Event affecting data security (8) • Private and secret information (12) • Act of using key to protect data (10) • ...
Individual Rights vs. Communal Safety 2023-07-26
Across
- Permission or agreement
- Monitoring for security purposes
- Rules and controls imposed by authorities
- A group of people living in the same area
- Expressing objection or dissent
- Fair treatment and equal rights for different people
- Personal freedom and autonomy
- Restricting or controlling information
Down
- Giving up something for someone else
- Right to keep personal information secret
- Absence of conflict or war
- Protection from harm or danger
- Being accountable for one's actions
- Acceptance of different beliefs and practices
- Fairness and impartiality in decisions
15 Clues: Permission or agreement • Absence of conflict or war • Personal freedom and autonomy • Protection from harm or danger • Expressing objection or dissent • Monitoring for security purposes • Being accountable for one's actions • Giving up something for someone else • Fairness and impartiality in decisions • Restricting or controlling information • ...
Cyberbullying 2021-04-30
Across
- pretending to be someone you are not using a fake or stolen online identity is called ____________.
- sharing someones personal or private information in an effort to humiliate or embarrass them is a form of _____________.
- the term ‘digital _______’ is a common term used for the information you upload to the Internet.
- you can tell an ________ you trust if you are being cyber bullied.
- it is important to ________ carefully before you upload photos or personal information to the internet as you don't know who might be reading it.
- the most downloaded social media application of 2020 with 1 billion users monthly.
Down
- Digital _________ is a collection of information regarding an individual, organisation, or group of electronic users.
- it's not just ________ who can be cyber bullied, it can happen to adults too.
- An assortment of websites and applications that have been developed to build and maintain online communities, this is for the purpose of sharing information and networking is called ________ media.
9 Clues: you can tell an ________ you trust if you are being cyber bullied. • it's not just ________ who can be cyber bullied, it can happen to adults too. • the most downloaded social media application of 2020 with 1 billion users monthly. • the term ‘digital _______’ is a common term used for the information you upload to the Internet. • ...
confidentiality test 2025-02-06
Across
- insurance information
- or Sensitive Data
- which may arise from employment-related physicals, drug tests and
- in the Workplace
- of espionage conducted for commercial purposes rather than security;
- Espionage
- Data
- religion, etc.
- employee, customer and client information private
- actions, supervisory notations
Down
- Data
- work history, date of birth, social security number, criminal record,
- involves individuals hired to steal trade secrets, new products or
- information
- about an employee prior to employment such as a résumé,
- of information
- of rules or promises which limits access or places restrictions on certain
- of an employee’s performance on the job such as performance reports,
18 Clues: Data • Data • Espionage • information • of information • religion, etc. • in the Workplace • or Sensitive Data • insurance information • actions, supervisory notations • employee, customer and client information private • about an employee prior to employment such as a résumé, • which may arise from employment-related physicals, drug tests and • ...
viruses 2017-04-27
Sustainable Biomes 2024-07-25
Across
- The variety of different species in an area.
- The introduction of harmful substances into the environment.
- The protection and stability of systems or resources from threats or risks.
- Efforts to protect and manage natural resources.
- The deterioration of environmental quality.
- The average weather conditions over a long period.
- A system of living organisms interacting with their environment.
- Resources - Resources that can be naturally replenished.
- Security Measures and policies to safeguard ecosystems and natural resources from harm.
- The process of returning degraded ecosystems to a healthier state.
- Security The condition in which all people have reliable access to sufficient, safe, and nutritious food.
Down
- Footprint The measure of human impact on the environment.
- A large area with distinct climate and plant/animal life.
- The capacity to maintain environmental balance over time.
- Footprint The total amount of carbon dioxide emissions caused by human activities.
- The process by which soil and rock are worn away by wind or water.
- The natural environment where a species lives and grows.
- The clearing of forests for non-forest use, impacting ecosystems.
18 Clues: The deterioration of environmental quality. • The variety of different species in an area. • Efforts to protect and manage natural resources. • The average weather conditions over a long period. • The natural environment where a species lives and grows. • Resources - Resources that can be naturally replenished. • ...
ANTIBULLYING NOT MYSELF TODAY 2021-02-11
7 Clues: MOBBING,SCAPEGOATING • SHOW YOUR SUPPORT ON • TO SHOW SUPPORT WEAR • HITTING,POKING,PINCHING • RESOURCES AVAILABLE TO YOU • NAME-CALLING,SARCASM, TEASING • INTERNET OR TEXT MESSAGE TO INTIMIDATE
yy 2022-05-06
7 Clues: piece of paper • looking for a fish • cows, hourses and dogs • do dream overdose snake • protection of cyber space • software speatialy design • a men who hacks to smn elses computer
Created by: Joe 2024-05-09
Across
- A ___ is a security that pays interest over terms ranging from 2 to 10 years
- A ___ is a security that pays interest over terms of 10 to 30 years
- ______ are banks that are part of the federal reserve system
- A ___is a security that matures in a year or less
- A ___ is money that must maintain its value over time in order for it to be widely accepted
- The _____ is an action taken to manage the supply of money and interest rates
- A ___ means it can be saved and used at a later date
- exchange _____ can cover many areas including privacy disclosure fraud consumer rights and interest rates
Down
- A ____ is a process of transferring money from one individual or organization to another
- The _____ is themechanism a nation uses to provide and manage money
- A ___ is money used in exchange for goods and services needed by individuals buisiness and governments
- A ___ is a plastic card that allows the holder to make credit purchases up to an authorized amount
- The _____ is a transfer of money from one bank account to another
- A ___ is a type of financial investment issued by a corperation or government
- card ____ allows customers to pay for purchases directly from thier checking's account
- A ___ means that money is a common measure of the worth or price of a good or service
16 Clues: A ___is a security that matures in a year or less • A ___ means it can be saved and used at a later date • ______ are banks that are part of the federal reserve system • The _____ is a transfer of money from one bank account to another • The _____ is themechanism a nation uses to provide and manage money • ...
tses 2023-10-06
Across
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- It should be changed immediately if suspected of being compromised .
- _______ your data regularly and periodically check that you are able to restore them.
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- Do not provide your _______ email account to social networks.
- displays annoying pop-ups to generate revenue for its authors.
- Always use _______ factor authentication where available.
- Erases user data beyond recoverability.
- Use a _______ password different from the passwords you use to access other sites.
Down
- This can slow down your computer and watch everywhere you go on the Internet.
- Online traces revealing user activities.
- A type of security incident where unauthorized access is gained to a system or data
- _______ your computer when left unattended.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
16 Clues: Erases user data beyond recoverability. • Online traces revealing user activities. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • displays annoying pop-ups to generate revenue for its authors. • ...
Globalisation 2023-03-08
Across
- I __ __ __ __ __ security software to protect against harmful cyberattacks.
- With the increase in foreign culture, local culture might be l __ __ __.
- H __ __ __ __ __ __ are people who illegally gain access to other people's computer systems.
- the interconnectedness of societies.
- C__ __ __ __ __ __ __ __ __ __ __ __ protects computers and electronic devices from cyberattacks.
Down
- I__ __ __ __ __ __ __ __ __ __ __ in technology contributes to Globalisation.
- Better economic situation can lead to b__ __ __ __ __ quality of life.
- Globalisation leads to economic, c__ __ __ __ __ __ __ and security impacts.
- Globalisation has i__ __ __ __ __ __ __ __ security threats.
- M__ __ __ __ __ phones have allowed us to connect with people faster.
- F __ __ __ __ __ __ culture has spread throughout the world, such as K-pop.
- G__ __ __ __ __ of Multinational Corporations (MNCs) is a factor that drives Globalisation.
12 Clues: the interconnectedness of societies. • Globalisation has i__ __ __ __ __ __ __ __ security threats. • M__ __ __ __ __ phones have allowed us to connect with people faster. • Better economic situation can lead to b__ __ __ __ __ quality of life. • With the increase in foreign culture, local culture might be l __ __ __. • ...
Cyber safety 2016-06-07
Le plus fort du monde 2021-05-14
21 Clues: dad • mom • boss • hero • world • movie • knight • genius • leader • parent • strong • father • protect • routine • studies • soldier • security • supporter • James Bond • Darth Vader • guardian angel
Dülmener 2022-10-05
20 Clues: Chef • Boxer • Mongo • R.I.P. • Musikus • Schwamm • Trottel • Security • Polizist • Ms. Piggy • Prankster • Supersohn • Lola rennt • Salattante • Kassenwart • Mundschenk • Militärfreak • Zeitungsmann • Frau mit News • Nikotinwichser
Travel Vocab. 2020-09-15
22 Clues: tray • pack • cabin • scale • track • pilot • flight • window • copilot • takeoff • counter • hallway • customs • security • passport • suitcase • landings • departures • turbulence • quarantine • reservation • flight attendant
Diné Binidaanishígíí Natashia - 5th Hour 2023-03-06
20 Clues: Baker • Tailor • Barber • Florist • Butcher • Janitor • Painter • Plumber • Optician • Mechanic • Jeweller • Gardener • Carpenter • Pharmacist • Accountant • Hairdresser • Repair Agent • Security Guard • Weather Person • Computer Programmer
Measuring Emotional intelligence 2023-01-16
20 Clues: calm • brave • power • modest • inactive • dominate • hesitant • pressure • moderate • careless • security • carefree • out going • excessive • fast paced • weaknesses • repetition • cooperative • self assured • enjoys being alone
un 2024-11-12
Across
- A group that works to protect world heritage and promote education.
- Council: A group of countries that keeps peace and security.
- A group that works to make trade fair.
- Assembly: A big meeting of all UN member countries.
- A group that works to improve food security.
- A group that works to protect the environment.
Down
- A group that works to improve global health.
- The leader of the UN.
- A group that helps refugees find safety.
- A group of countries working together to solve global problems.
- A group that helps countries develop.
11 Clues: The leader of the UN. • A group that helps countries develop. • A group that works to make trade fair. • A group that helps refugees find safety. • A group that works to improve global health. • A group that works to improve food security. • A group that works to protect the environment. • Assembly: A big meeting of all UN member countries. • ...
