cyber security Crossword Puzzles

Jobs of the Future by 2030 2025-04-16

Jobs of the Future by 2030 crossword puzzle
Across
  1. : Defends against cyber threats
  2. : Builds self-driving vehicle systems
  3. : Designs and builds intelligent machines
  4. : Studies climate change and global warming
  5. : Helps businesses go green
Down
  1. : Provides medical care remotely
  2. : Interprets big data to find patterns
  3. : Uses AI to diagnose and treat patients

8 Clues: : Helps businesses go green: Defends against cyber threats: Provides medical care remotely: Builds self-driving vehicle systems: Interprets big data to find patterns: Uses AI to diagnose and treat patients: Designs and builds intelligent machines: Studies climate change and global warming

Cybersecurity Crossword Puzzle 2024-02-01

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Passwords should not contain your
  2. Sikorsky Facility Security Officer (FSO)
  3. Strategy to protect sensitive information (operational security)
  4. Assured File Transfers (AFTs) should only be performed by a trained
  5. If you see something
  6. A company's most valuable asset
Down
  1. Report all security incidents to
  2. Sikorsky Classified Cybersecurity Manager
  3. Access is granted based on clearance level and

9 Clues: If you see somethingA company's most valuable assetReport all security incidents toPasswords should not contain yourSikorsky Facility Security Officer (FSO)Sikorsky Classified Cybersecurity ManagerAccess is granted based on clearance level andStrategy to protect sensitive information (operational security)...

Nishant FRM 2024-07-15

Nishant FRM crossword puzzle
Across
  1. Tata Power evaluates regulatory changes impacting renewable energy projects and carbon emissions.
  2. Maruti Suzuki assesses risks of disruptions in the supply of auto components impacting production schedules.
  3. Flipkart faces disruptions in e-commerce operations due to technical failures during peak shopping seasons.
  4. RBI monitors risks that could destabilize the entire banking sector, such as liquidity crises or economic recessions.
  5. Reliance Industries assesses overdependence on revenue from petrochemicals in its diversified business portfolio.
  6. Insurance companies assess exposure to claims from natural disasters like cyclones or floods.
  7. ONGC evaluates government policies impacting oil exploration projects in sensitive ecological zones.
  8. ITC manages risks associated with volatile prices of agricultural commodities used in its food and tobacco products.
Down
  1. State Bank of India assesses the creditworthiness of borrowers in its corporate lending portfolio.
  2. Infosys monitors exposure to fluctuations in global IT spending impacting service revenue.
  3. HDFC Bank ensures adherence to new banking regulations impacting loan approval processes.
  4. Amul manages public perception during food safety controversies affecting dairy product sales.
  5. Hindustan Unilever faces litigation over product safety regulations impacting consumer trust in its FMCG products.
  6. Mahindra & Mahindra assesses political stability and economic conditions before expanding manufacturing operations abroad.
  7. IndiGo Airlines deals with flight delays due to technical faults affecting passenger satisfaction.
  8. Tata Consultancy Services deals with currency fluctuations affecting revenue from international IT services contracts.
  9. Tata Motors evaluates the ability to raise short-term funds to meet operational expenses during economic downturns.
  10. Axis Bank reviews the accuracy of financial models used for risk assessment and capital allocation.
  11. Wipro strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
  12. ICICI Prudential Life Insurance manages exposure to fluctuations in interest rates affecting investment returns.

20 Clues: HDFC Bank ensures adherence to new banking regulations impacting loan approval processes.Infosys monitors exposure to fluctuations in global IT spending impacting service revenue.Insurance companies assess exposure to claims from natural disasters like cyclones or floods....

Supply Chain Security Components 2018-12-05

Supply Chain Security Components crossword puzzle
Across
  1. Assessment These threats are external to the company and out of their control
  2. Security We screen employees with regulators
  3. Assessment Examination of internal security controls
  4. The Processes can affect this risk
Down
  1. I am a risk driver and can be a result from natural disasters
  2. IT Security, Physical Security, Container Security, Personnel Security
  3. Ratings We are ranked low, medium and high

7 Clues: The Processes can affect this riskRatings We are ranked low, medium and highSecurity We screen employees with regulatorsAssessment Examination of internal security controlsI am a risk driver and can be a result from natural disastersIT Security, Physical Security, Container Security, Personnel Security...

Security of Computer 2024-10-01

Security of Computer crossword puzzle
Across
  1. small text file containing user's information
  2. disrupt use of computer access to internet service
  3. official looking message to scam people.
  4. a program that detect, and remove dangerous programs.
  5. trespasses computer and network to destroy
  6. uses threat and coercion for economic gain
  7. program that replicate itself
Down
  1. politically motivated group of computer experts
  2. less skilled than cracker
  3. secretly monitors user's activity.
  4. engage in malicious act for personal thrills
  5. malicious programs that damages computer.
  6. program that hides and steals information
  7. group of infected computer known as zombies.
  8. convert readable data to encoded character

15 Clues: less skilled than crackerprogram that replicate itselfsecretly monitors user's activity.official looking message to scam people.malicious programs that damages computer.program that hides and steals informationconvert readable data to encoded charactertrespasses computer and network to destroyuses threat and coercion for economic gain...

Vincy - Food security 2024-12-18

Vincy - Food security crossword puzzle
Across
  1. A substance that helps plants grow faster
  2. Foods made from milk, like cheese or yogurt
  3. The process of collecting ripe crops
  4. Sweet food made by bees
  5. Weather patterns that affect how food grows
  6. A tall building where grains are stored
  7. Nutrient found in foods like eggs and beans
  8. A fruit that monkeys and people love
  9. A person who grows food for others
Down
  1. A large store where people buy food
  2. A system to bring water to crops
  3. A person who cooks meals for others
  4. A small area where people grow fruits and vegetables
  5. Plants grown for food like corn or wheat
  6. Food grown without chemicals

15 Clues: Sweet food made by beesFood grown without chemicalsA system to bring water to cropsA person who grows food for othersA large store where people buy foodA person who cooks meals for othersThe process of collecting ripe cropsA fruit that monkeys and people loveA tall building where grains are storedPlants grown for food like corn or wheat...

CROSSWORD BULLYING 2021-11-30

CROSSWORD BULLYING crossword puzzle
Across
  1. when you offer your hand to someone
  2. red street sign
  3. talking to people having a conversation
  4. what you are doing if you are bullying
  5. a feeling you get when someone moves away
  6. when you get worked up trying to do something
  7. how you feel when nobody listens
  8. is another way to say angry
  9. being friendly
Down
  1. the reason we have orange shirt day
  2. when you feel like you can't do anything
  3. another word for contact
  4. bullying online is called
  5. people you hang out with at school

14 Clues: being friendlyred street signanother word for contactbullying online is calledis another way to say angryhow you feel when nobody listenspeople you hang out with at schoolthe reason we have orange shirt daywhen you offer your hand to someonewhat you are doing if you are bullyingtalking to people having a conversation...

counter anak 2006 2025-10-01

counter anak 2006 crossword puzzle
Across
  1. Bentuk perundungan melalui media sosial / internet.
  2. Tindakan yang diharapkan korban lakukan ke pihak sekolah.
  3. Perilaku perundungan di sekolah.
  4. kelompok usia yang dibahas (pelaku/korban umumnya)
  5. Pengaruh sosial yang mendorong ikut melakukan bullying.
  6. Bentuk bullying yang melukai secara jasmani.
  7. Sumber pengawasan dan penanganan di sekolah (jabatan)
Down
  1. Bentuk bullying berupa ejekan atau hinaan
  2. tempat terjadinya penelitian (kota/sekolah).
  3. Orang yang menerima tindakan bullying
  4. Jenis pendekatan penelitian yang dipakai penulis.
  5. laporan internasional yang dicatat soal perundungan (singkatan).
  6. Faktor penyebab bullying yang berkaitan dengan rumah
  7. Upaya pencegahan singkat (kata tindakan).

14 Clues: Perilaku perundungan di sekolah.Orang yang menerima tindakan bullyingBentuk bullying berupa ejekan atau hinaanUpaya pencegahan singkat (kata tindakan).tempat terjadinya penelitian (kota/sekolah).Bentuk bullying yang melukai secara jasmani.Jenis pendekatan penelitian yang dipakai penulis.kelompok usia yang dibahas (pelaku/korban umumnya)...

Homework 2023-02-27

Homework crossword puzzle
Across
  1. Drehbuch
  2. grade
  3. Reaction
  4. Dämpfe
  5. Line
  6. Reserve
  7. Notfall
  8. Aussprechen
Down
  1. Wüste
  2. Sonnenuntergang
  3. Sicherheit
  4. stretch
  5. ecology
  6. Process
  7. Shell
  8. Fremd
  9. Canon

17 Clues: LineWüstegradeShellFremdCanonDämpfestretchecologyProcessReserveNotfallDrehbuchReactionSicherheitAussprechenSonnenuntergang

... 2022-08-24

... crossword puzzle
Across
  1. passport
  2. to check
  3. itinerary
  4. departure
  5. luggage
  6. monitor, screen
  7. airport
  8. arrival
  9. ticket
Down
  1. suitcase
  2. customs
  3. claim
  4. identification
  5. luggage
  6. gate
  7. to travel
  8. passenger (m)
  9. to board
  10. flight
  11. security

20 Clues: gateclaimflightticketcustomsluggageluggageairportarrivalsuitcasepassportto checkto boardsecurityitineraryto traveldeparturepassenger (m)identificationmonitor, screen

RUU TNI telah resmi 2025-04-02

RUU TNI telah resmi crossword puzzle
Across
  1. kata 'cyber' dalam B.Indonesia adalah ...
  2. kata 'authorized' dalam B.Indonesia adalah ...
  3. kata 'support' dalam B.Indonesia sehari-hari ...
  4. kata lain untuk 'mengawasi' adalah ...
  5. diberikan pelayanan terlalu nyaman disebut juga ...(pampered)
  6. sinonim kata 'menjalani tugas' adalah ...(served)
  7. kata 'Pressed' dalam B.Indonesia adalah ...
  8. kata 'Represent' dalam B.Indonesia sehari-hari ...
  9. sinonim kata 'tujuan' adalah ...
Down
  1. kata 'change' dalam B.Indonesia adalah ...
  2. kejahatan dalam bentuk teror pesan atau bentuk lain disebut ...
  3. sinonim kata 'mengatasi' adalah ...
  4. sinonim kata 'utama' adalah ...
  5. kepanjangan dari 'UU' adalah ...
  6. sinonim kata 'candaan' adalah ...
  7. sesuatu yang harus dikerjakan dalam pekerjaan disebut ...(task)
  8. sinonim kata 'institusi' adalah ...
  9. kata lain dari 'resign' adalah ...
  10. kata lain untuk 'Official' adalah ...
  11. kata sehari-hari untuk 'against' adalah ...

20 Clues: sinonim kata 'utama' adalah ...kepanjangan dari 'UU' adalah ...sinonim kata 'tujuan' adalah ...sinonim kata 'candaan' adalah ...kata lain dari 'resign' adalah ...sinonim kata 'mengatasi' adalah ...sinonim kata 'institusi' adalah ...kata lain untuk 'Official' adalah ...kata lain untuk 'mengawasi' adalah ...kata 'change' dalam B.Indonesia adalah ......

Karrewiet 3 2025-09-23

Karrewiet 3 crossword puzzle
Across
  1. jong van een paard
  2. op de luchthaven in Brussel was er ...-aanval
  3. hier was het WK atletiek
  4. in deze stad liep een reuzenspin
  5. naam van het programma tegen pesten: de ...
  6. hij pakte zilver op de 5000m
  7. route die de renners afleggen
  8. windrichting waaruit wind waait dinsdag
  9. dit eisen de computercriminelen
  10. werelddeel waarin Rwanda ligt
  11. verzamelnaam voor 7 atletiekonderdelen
Down
  1. zonder auto
  2. beroep Jacotte Brokken
  3. hoofdstad van Rwanda
  4. C-Bra heeft donderbruine...
  5. virtuele realiteitsbril
  6. het feest begint; het ... los
  7. een jong paard van 402000 euro is een ...
  8. aantal jongens en meisjes tijdens pestprogramma
  9. volledige naam: C-Bra van het ...
  10. familienaam van Nafissatou
  11. trommel
  12. sportpaard met lange benen
  13. familienaam Remco
  14. supporter
  15. wielerwedstrijd

26 Clues: trommelsupporterzonder autowielerwedstrijdfamilienaam Remcojong van een paardhoofdstad van Rwandaberoep Jacotte Brokkenvirtuele realiteitsbrilhier was het WK atletiekfamilienaam van Nafissatousportpaard met lange benenC-Bra heeft donderbruine...hij pakte zilver op de 5000mhet feest begint; het ... losroute die de renners afleggen...

Gaming Engineer 2025-12-12

Gaming Engineer crossword puzzle
Across
  1. Engineer/Developer: General term for coding games.
  2. Artist: Bridges art and programming, solving technical art issues.
  3. Engineer: Focuses on visual rendering and performance.
  4. Skills & Concepts
  5. Engineer: Focuses on game security.
  6. Developer: Specializes in mobile gaming.
  7. Engineer: Implements features for designers to tune.
  8. Programmer: Writes the code for game mechanics.
Down
  1. & Hybrid Roles
  2. Intelligence (AI).
  3. Engineer: Handles sound and music implementation.
  4. Programmer: Creates internal software for other developers.
  5. Engines: Unity, Unreal Engine.
  6. Programmer: Works on the core game engine itself.
  7. Performance, Memory Management.
  8. Engineer: Develops non-player character (NPC) behaviors.
  9. Gaming Engineer: Works on streaming game technology.
  10. (User Interface/Experience).
  11. Languages: C++, C#, Python, etc..

19 Clues: & Hybrid RolesSkills & ConceptsIntelligence (AI).(User Interface/Experience).Engines: Unity, Unreal Engine.Performance, Memory Management.Languages: C++, C#, Python, etc..Engineer: Focuses on game security.Developer: Specializes in mobile gaming.Programmer: Writes the code for game mechanics.Engineer: Handles sound and music implementation....

Unit 4: US History 2023-12-14

Unit 4: US History crossword puzzle
Across
  1. buried the farmers crops, giant dirt storm
  2. buying something with more than you can pay
  3. Social Security Act
  4. Agricultural Adjustment Act
  5. Federal Deposit Insurance Corp
  6. named after herbert hoover, town of homeless
  7. Civilian Conservation Corp.
  8. President bad
  9. security and exchange comission
  10. FDR won by a landslide
Down
  1. FDRs plan to fix the great depression
  2. FDRs way of getting the people to "get to know him"
  3. conducting a financial decision with risk
  4. Works Progressive Administration
  5. helped feed the hungry, one of their only meals
  6. Franklin Delano Roosevelt
  7. October 29th 1929
  8. in the 1930s' a great financial collapse
  9. When the gov spends more than it collects

19 Clues: President badOctober 29th 1929Social Security ActFDR won by a landslideFranklin Delano RooseveltAgricultural Adjustment ActCivilian Conservation Corp.Federal Deposit Insurance Corpsecurity and exchange comissionWorks Progressive AdministrationFDRs plan to fix the great depressionin the 1930s' a great financial collapse...

Cyber bullying Crossword Puzzle 2015-04-16

Cyber bullying Crossword Puzzle crossword puzzle
Across
  1. a file on a computer that records user information when visiting a website
  2. a wireless handheld device which allows for telephone communications
  3. the most popular social networking website
  4. physical or emotional injury to someone
  5. the act of restricting access to certain web sites
  6. acronym for the company that provides an Internet connection to individuals or companies
  7. intentional and repeated harm inflicted through the use of computers, cell phones, and other electronic devices
  8. unsolicited words or actions intended to annoy, alarm, or abuse another individual
  9. short for "World Wide Web" or pages linked together via the internet
  10. the act of requesting another person to enter your social network
  11. making a statement or taking an action that indicates harm to another
  12. repeated or deliberate harassment directed by one in a position of power toward one or more
  13. a user-created web page on a social networking website
Down
  1. an electronic device that stores and processes information and also facilitates electronic communication when connected to a network
  2. allows internet users to send and receive electronic text to and from other internet issues
  3. the denial of access to particular parts of the internet
  4. worldwide network of computers communicating with others via phone lines, satellite links, wireless networks, and cable systems
  5. an intermediary web site which hides or disguises the IP address associated with the internet user
  6. interactive web journal or diary, the contents of which are posted online and then view able by some or all individuals
  7. unsolicited electronic mail sent from someone yo do not know
  8. sending angry, rude, or obscene messages directed at a person or persons privately or an online group
  9. a form of bullying where physical assaults are recorded on mobile phones or digital cameras and distributed to others
  10. the second most popular social networking site
  11. sending short messages via cell phone
  12. two or more computers connected so that they can communicate with each other

25 Clues: sending short messages via cell phonephysical or emotional injury to someonethe most popular social networking websitethe second most popular social networking sitethe act of restricting access to certain web sitesa user-created web page on a social networking websitethe denial of access to particular parts of the internet...

Cyber Safety-Hugh Fox 2016-06-07

Cyber Safety-Hugh Fox crossword puzzle
Across
  1. A saved link to a website that has been added to a list of saved links or favorite sites
  2. A scam that involves sending a fraudulent e-mail soliciting personal information from an unsuspecting user
  3. A hostile, strongly worded message that may contain obscene language
  4. Any unsolicited e-mail, or junk mail
  5. A piece of information
  6. a thing to stop viruses
  7. The name for bookmark
  8. A giant collection of computer networks
  9. A location online that allows multiple users to communicate electronically
  10. A self-replicating software program
Down
  1. Internet games
  2. Internet gamers who intentionally cause problems
  3. software installed on computers which collects information without your knowledge or consent and sends it to a spyware program
  4. The site that is the starting point on the web for a particular group or organization
  5. The World Wide Web
  6. A secret word or number that must be used to gain access to an online service
  7. a app to stop hackers
  8. The nickname a user
  9. To copy a file from one computer system to another
  10. stands for malicious software or code, which includes any harmful code

20 Clues: Internet gamesThe World Wide WebThe nickname a usera app to stop hackersThe name for bookmarkA piece of informationa thing to stop virusesA self-replicating software programAny unsolicited e-mail, or junk mailA giant collection of computer networksInternet gamers who intentionally cause problemsTo copy a file from one computer system to another...

CYBER AND DIGITAL LITERACY 2024-04-30

CYBER AND DIGITAL LITERACY crossword puzzle
Across
  1. a common form of communication used for sending text-based messages, files, and documents to individuals or groups.
  2. it refers to the qualities and responsibilities expected of individuals as members of the digital community
  3. refers to bullying behavior that occurs through electronic communication platforms such as social media, messaging apps, or online forum.
  4. Logical deductions or conclusions based on prior knowledge, observations, or evidence.
  5. Information that is collected, stored, and processed by computers.
  6. The ability to perform a task or fulfill a role effectively and efficiently, often based on a combination of knowledge, skills, and experience.
  7. refer to the competencies needed to navigate, use, and evaluate digital technologies and information effectively.
  8. used to enhance content delivery and engagement, providing visual aids to help learners understand concepts or processes.
  9. The abilities or skills that a person or thing possesses and can use or apply.
  10. To communicate or get in touch with someone or an organization, often through email, phone, or other means.
  11. Able to be believed or trusted because of being reliable, accurate, or convincing.
  12. The users who utilize the platform to access educational resources
  13. Information, data, or facts that support or justify a conclusion, claim, or argument.
  14. An individual who instructs, educates, or guides others, typically in a formal setting such as a classroom.
  15. can include traditional forms such as newspapers, television, and radio, as well as digital platforms such as websites, social media, and streaming services.
  16. the world being diverse with cultures, media, print and non-print texts, implying a wide range of cultural backgrounds, media platforms, and types of information.
  17. Pertaining to or involving the use of computer technology
  18. The process of transferring data or files from a remote computer or server to a local computer or device, typically over a network such as the Internet.
  19. can include smartphones, tablets, computers, and other electronic gadgets used for various tasks such as communication, information retrieval, and content creation.
  20. The process of exchanging information, ideas, or messages between individuals or groups, often through verbal, written, or digital means.
  21. Tools Software applications or programs used to perform specific tasks or activities in a digital environment.
  22. refers to digital devices, software, and systems used for various purposes, including communication, information retrieval, and content creation.
  23. An environment or tool used for learning activities that take place in a digital setting, providing resources, interaction, and opportunities for skill development.
  24. A collection of related web pages, typically identified by a common domain name and accessible via the Internet.
  25. The process of acquiring knowledge, skills, behaviors, or attitudes through study, experience, or teaching.
  26. The state of being free from unwanted or unauthorized intrusion, especially in regards to personal information shared online.
  27. The methods, strategies, or approaches used in teaching
  28. A particular way of viewing or understanding a situation, concept, or issue, often influenced by one's experiences, beliefs, or cultural background.
Down
  1. In the context of digital literacy, integration refers to the incorporation of one's critical point of view into interactive messages created or encountered online.
  2. To evaluate or analyze something critically
  3. Pertaining to or conforming to moral principles or standards of conduct
  4. The process of moving around or browsing through a website or other digital interface.
  5. Literacy A life skill competence needed for survival in the world of computers, involving awareness of the promises and perils of computers and the internet.
  6. Thinking The ability to objectively analyze, evaluate, and synthesize information or arguments, especially in response to complex societal issues raised by digital technologies.
  7. Newly created products, processes, or ideas resulting from human creativity and ingenuity.
  8. The beliefs, customs, practices, and social behaviors of a particular group of people or society
  9. Information, understanding, or skills
  10. The state of being responsible or answerable for one's actions.
  11. The quality of being easily usable or accessible
  12. A clickable connection between one web page and another, allowing users to navigate between different pages or resources on the internet.
  13. Presenting someone else's work, ideas, or words as one's own without proper acknowledgment or citation.
  14. Relating to or involving computers or computer networks, especially the internet.
  15. The reciprocal actions or behaviors between individuals or entities, often involving communication, engagement, or collaboration.
  16. refers to the process of searching for and locating information online, while adhering to ethical conduct and procedures
  17. The act of showing or explaining something clearly and effectively
  18. They are used for a wide range of applications, including personal use, business operations, scientific research, and entertainment.
  19. The act of understanding or grasping the meaning or significance of something,
  20. The ability to read and write.
  21. understanding ethical viewpoints, staying current on new technologies
  22. To assess or judge the value, significance, or quality of something, especially by careful appraisal or examination.

50 Clues: The ability to read and write.Information, understanding, or skillsTo evaluate or analyze something criticallyThe quality of being easily usable or accessibleThe methods, strategies, or approaches used in teachingPertaining to or involving the use of computer technologyThe state of being responsible or answerable for one's actions....

cyber and digital literacy 2024-04-30

cyber and digital literacy crossword puzzle
Across
  1. to obtain or use
  2. or exchange information
  3. record or image being worked on to a storage medium
  4. literacy-ability to find evaluate and communicate
  5. easily send mass mails directly
  6. clever,secret plans that often decieve others
  7. computer program that represents information
  8. personal insults and vulgar and angry wors
  9. activity or service using internet
  10. personal area network
  11. physical parts of computer
  12. multimedia content
  13. media-infotmation in a storage medium
  14. programs that run on a device
  15. metropolitan area network
  16. computer virus
  17. of being free from danger or threat
  18. information thats converted into a machine\digital format
  19. a person or group after first gaining their trust
  20. arrange or set out
  21. technologies.virtual activities
  22. harming you on a regular basis
  23. activities using digital devices
  24. make changes or removing parts
  25. present or immediate past contemporary
Down
  1. used to locate a resource on the internet
  2. wide area network
  3. and intentionally use words or actions
  4. set on it that is either high low level
  5. working area of a computer screen
  6. unauthorized access to an account or computer system
  7. property that protects original works
  8. software intentionally designed to cause disruption
  9. of another's work words or ideas without attribution
  10. global computer network providing a variety ionformation
  11. -message distributed by electronic means
  12. used by cables,ports,
  13. representation for data visualization
  14. any name acknowledge as the author
  15. using the internet or other computer network
  16. web pages and related content
  17. local area network
  18. computer network for sharing information
  19. application for accessing websites
  20. -most important processor in a computer
  21. literate-analyze media
  22. culture of collaboration and teamwork
  23. type of data store
  24. freedom from inference or intrusion
  25. annoying but its also a threat

50 Clues: computer virusto obtain or usewide area networklocal area networkmultimedia contenttype of data storearrange or set outused by cables,ports,personal area networkliterate-analyze mediaor exchange informationmetropolitan area networkphysical parts of computerweb pages and related contentprograms that run on a deviceannoying but its also a threat...

Cyber and Digital literacy 2024-04-30

Cyber and Digital literacy crossword puzzle
Across
  1. Visual representations or pictures, often stored or transmitted electronically.
  2. Secret code or phrase used to access a secure system or account.
  3. Global network connecting computers and other devices, enabling communication and information exchange.
  4. Taking responsibility for one's actions or decisions.
  5. To create, improve, or advance something, often in the context of software or technology.
  6. Framework or infrastructure enabling the development and operation of software applications.
  7. A group of people sharing common interests or characteristics, often interacting online.
  8. Unauthorized access to computer systems or networks, often for malicious purposes.
  9. Knowledge or skill gained from direct observation or participation in events or activities.
  10. Comprehension or grasp of the meaning or significance of something.
  11. Deceptive schemes or fraud conducted via the internet.
  12. Organized and interconnected set of components or elements working together to achieve a common purpose.
  13. Tools and techniques for practical purposes, often involving machinery and equipment.
  14. Data that provides knowledge or insight about a particular subject.
  15. Information, facts, or skills acquired through learning or experience.
  16. Online platforms facilitating social interaction and content sharing.
  17. Writing and organizing instructions for computers to execute specific tasks or functions.
  18. The realm of existence shaped by digital technology, encompassing online platforms and interactions.
  19. Programs and applications used to operate computers and perform tasks.
  20. Various channels for information dissemination, like TV, radio, and the internet.
  21. Potential dangers or risks to security, often in the context of cybersecurity.
  22. Interconnected system or group, particularly in the context of computers and communication.
  23. Steps or directions for completing a task or operating a system.
  24. Working together with others to achieve a common goal or objective.
  25. Exchanges or communications between individuals or entities, often in a digital context.
  26. Written or printed words, often in electronic form.
  27. Distinctive characteristics or qualities that distinguish an individual or entity.
  28. Unsolicited or unwanted email messages, often sent in bulk.
Down
  1. Verification of the identity or legitimacy of a user or entity accessing a system or service.
  2. Protection of personal or sensitive information from unauthorized access or use.
  3. Capacity for understanding, reasoning, and adapting to new situations.
  4. Tools or instruments, particularly electronic gadgets like smartphones and computers.
  5. Sets of instructions or code designed to perform specific tasks on a computer.
  6. Criminal activities carried out using digital technology or the internet.
  7. Software or applications used to perform tasks or solve problems in the digital domain.
  8. Having the ability to read, write, and understand information in a particular context.
  9. The surroundings in which something exists or operates, including the digital landscape.
  10. Exchange of information or messages between individuals or groups.
  11. Monitoring or following the movement or behavior of something or someone, often online.
  12. Capacity to perform or achieve a task or function.
  13. Process of changing from one state, condition, or activity to another.
  14. Relating to or involving computer technology and electronic data.
  15. Shared beliefs and practices within a group.
  16. Software designed to detect and remove malicious software from computer systems.
  17. Knowledge or perception of a situation or fact.
  18. Moral principles guiding behavior and decision-making.
  19. Mental abilities related to thinking, learning, and problem-solving.
  20. Position or function assumed by an individual within a group or system.
  21. Legal regulations governing behavior and activities in the digital realm.
  22. State of being protected from harm or danger.

50 Clues: Shared beliefs and practices within a group.State of being protected from harm or danger.Knowledge or perception of a situation or fact.Capacity to perform or achieve a task or function.Written or printed words, often in electronic form.Taking responsibility for one's actions or decisions.Deceptive schemes or fraud conducted via the internet....

Cyber and Digital Literacy 2024-04-30

Cyber and Digital Literacy crossword puzzle
Across
  1. The act of understanding or grasping the meaning or significance of something,
  2. The process of transferring data or files from a remote computer or server to a local computer or device, typically over a network such as the Internet.
  3. Can include traditional forms such as newspapers, television, and radio, as well as digital platforms such as websites, social media, and streaming services.
  4. Refers to digital devices, software, and systems used for various purposes, including communication, information retrieval, and content creation.
  5. Presenting someone else's work, ideas, or words as one's own without proper acknowledgment or citation.
  6. It refers to the qualities and responsibilities expected of individuals as members of the digital community, including being digitally literate and adhering to ethical conduct while engaging in online activities.
  7. The world being diverse with cultures, media, print and non-print texts, implying a wide range of cultural backgrounds, media platforms, and types of information.
  8. To assess or judge the value, significance, or quality of something, especially by careful appraisal or examination.
  9. Information, data, or facts that support or justify a conclusion, claim, or argument.
  10. The abilities or skills that a person or thing possesses and can use or apply.
  11. Understanding ethical viewpoints, staying current on new technologies, and recognizing the responsibilities associated with using digital tools and systems.
  12. The process of moving around or browsing through a website or other digital interface.
  13. Refers to bullying behavior that occurs through electronic communication platforms such as social media, messaging apps, or online forums.
  14. The quality of being easily usable or accessible, especially for individuals with disabilities.
  15. The users who utilize the platform to access educational resources, engage in activities, and develop their digital literacy skills.
  16. Can include smartphones, tablets, computers, and other electronic gadgets used for various tasks such as communication, information retrieval, and content creation.
  17. The process of acquiring knowledge, skills, behaviors, or attitudes through study, experience, or teaching.
  18. The state of being responsible or answerable for one's actions.
  19. The state of being free from unwanted or unauthorized intrusion, especially in regards to personal information shared online.
  20. Relating to or involving computers or computer networks, especially the internet.
  21. Newly created products, processes, or ideas resulting from human creativity and ingenuity.
  22. The process of exchanging information, ideas, or messages between individuals or groups, often through verbal, written, or digital means.
  23. Information, understanding, or skills acquired through experience, education, or study.
  24. Used to enhance content delivery and engagement, providing visual aids to help learners understand concepts or processes.
  25. The methods, strategies, or approaches used in teaching, especially in formal education settings.
Down
  1. Refer to the competencies needed to navigate, use, and evaluate digital technologies and information effectively.
  2. To communicate or get in touch with someone or an organization, often through email, phone, or other means.
  3. Tools Software applications or programs used to perform specific tasks or activities in a digital environment.
  4. The act of showing or explaining something clearly and effectively, often to illustrate a point or concept.
  5. The knowledge and ability to use a range of technology tools for varied purposes.
  6. The ability to read and write, including digital literacy skills such as using, evaluating, and creating data and images in the digital environment.
  7. A collection of related web pages, typically identified by a common domain name and accessible via the Internet.
  8. The ability to objectively analyze, evaluate, and synthesize information or arguments, especially in response to complex societal issues raised by digital technologies.
  9. The beliefs, customs, practices, and social behaviors of a particular group of people or society. In the context of digital literacy
  10. A life skill competence needed for survival in the world of computers, involving awareness of the promises and perils of computers and the internet.
  11. Pertaining to or conforming to moral principles or standards of conduct, especially in relation to digital citizenship
  12. A common form of communication used for sending text-based messages, files, and documents to individuals or groups.
  13. To evaluate or analyze something critically, often by examining its strengths, weaknesses, and underlying assumptions.
  14. An individual who instructs, educates, or guides others, typically in a formal setting such as a classroom.
  15. A clickable connection between one web page and another, allowing users to navigate between different pages or resources on the internet.
  16. The ability to perform a task or fulfill a role effectively and efficiently, often based on a combination of knowledge, skills, and experience.
  17. Logical deductions or conclusions based on prior knowledge, observations, or evidence.
  18. A particular way of viewing or understanding a situation, concept, or issue, often influenced by one's experiences, beliefs, or cultural background.
  19. They are used for a wide range of applications, including personal use, business operations, scientific research, and entertainment.
  20. Pertaining to or involving the use of computer technology, especially the internet and digital devices, in various aspects of life.
  21. The reciprocal actions or behaviors between individuals or entities, often involving communication, engagement, or collaboration.
  22. An environment or tool used for learning activities that take place in a digital setting, providing resources, interaction, and opportunities for skill development.
  23. Able to be believed or trusted because of being reliable, accurate, or convincing.
  24. Refers to the process of searching for and locating information online, while adhering to ethical conduct and procedures
  25. In the context of digital literacy, integration refers to the incorporation of one's critical point of view into interactive messages created or encountered online.

50 Clues: The state of being responsible or answerable for one's actions.The act of understanding or grasping the meaning or significance of something,The abilities or skills that a person or thing possesses and can use or apply.The knowledge and ability to use a range of technology tools for varied purposes....

Operating Systems (Cyber 100) 2024-02-01

Operating Systems (Cyber 100) crossword puzzle
Across
  1. file extension for compressed files
  2. Microsoft's disk operating system that came before Windows.
  3. A cable that connects networks
  4. A graphical OS released by Google in 2007
  5. Apple's computer operating system.
  6. A computer software package that preforms a specific function directly for the end user.
  7. The OS portions that interface with hardware
  8. Eight bits make up this
  9. OS developed in the late 1960's by AT&T Bell Laboratories
  10. Memory used for short term tasks
Down
  1. The command to see your current windows version
  2. A language that can be used to style a web page
  3. The most common base version of Linux.
  4. Holds instructions and data when a program is executing.
  5. The default browser for Mac
  6. a textual language for creating web pages
  7. Bill Gate's operating system created in 1985
  8. The default browser for Windows
  9. What is the default browser for Linux?
  10. Commonly placed after a modem to route packets
  11. The way computers communicate using zeros and ones is?

21 Clues: Eight bits make up thisThe default browser for MacA cable that connects networksThe default browser for WindowsMemory used for short term tasksApple's computer operating system.file extension for compressed filesThe most common base version of Linux.What is the default browser for Linux?a textual language for creating web pages...

DOMAIN 3 CROSSWORD | CYBER 2024-03-15

DOMAIN 3 CROSSWORD | CYBER crossword puzzle
Across
  1. software that creates, runs and manages virtual machines (VMs)
  2. module(TPM) an embedded hardware chip on a motherboard that stores cryptographic keys used for encryption hardware
  3. environment an environment used to test and application and discover any bugs or errors
  4. automation the Internet connection in home appliances, such as refrigerators and coffee makers
  5. a wireless network used to provide guests with Internet access
  6. a protocol that translates public IP addresses to private IP addresses and private addresses back to public IP addresses
  7. the use of different security control types, such as technical controls (firewalls, IDSs and proxy servers); administrative controls (vulnerability assessments and penetration tests); and physical controls (security cameras and locked rooms)
  8. an OS that manages a network device; some Cisco devices use the Cisco IOS (Internetwork OS)
  9. is the hardware-based and software-based encryption of an entire disk
  10. the exposure of data by an error, such as an integer overflow or buffer overflow
  11. a combination of all the elements required to produce a product
  12. the use of implementing security controls from different vendors to increase security
  13. environment an environment that simulates the production environment and is used for late stage testing
  14. a group of SQL statements that execute as one SQL statement, like a mini-program
  15. isolation that ensures that a system isn't connected to any other system to reduce risk of being attacked
Down
  1. the analysis of code without executing it
  2. a structure of basic concepts that is used to provide guidance to professionals on how to implement security in various systems
  3. theorganization of tables and columns in a database to reduce redundant data and improve overall database performance
  4. (SDN)a network that is comprised of virtualization technologies instead of hardware routers and switches
  5. a framework that is based on relevant laws and regulations, such as HIPAA
  6. is the software-based encryption of an entire disk;
  7. the analysis of code as the code is running
  8. a framework that is not based on law, but by common standards and practices
  9. a metaphor for physical isolation, indicating that there is a gap of air between an isolated system and other systems
  10. an internal network, used to communicate and share content
  11. encryption/self-encrypting drive (FDE/SED)
  12. a group of honeypots that is within a separate network or zone, but accessible from an organization's primary network
  13. to provide a digital signature for code
  14. an OS that manages a server, such as Windows Server 2016 or the Server base environments in Linux
  15. training of users on common threats and emerging threats to help avoid these types of attacks
  16. a part of a network that can be accessed by authorized users from outside of the network, such as business partners, customers, vendors, etc.
  17. an integrated circuit that includes all the functionality of a computing system within the hardware
  18. to use an isolated area on a system (usually, a virtual machine), often for testing purpose
  19. network a bridge to a wired network; a network that provides employees access to network resources as if they were connected from a wired dest node at their desk

34 Clues: to provide a digital signature for codethe analysis of code without executing itencryption/self-encrypting drive (FDE/SED)the analysis of code as the code is runningis the software-based encryption of an entire disk;an internal network, used to communicate and share contentsoftware that creates, runs and manages virtual machines (VMs)...

Networking Concepts & Cyber Ethics 2025-06-03

Networking Concepts & Cyber Ethics crossword puzzle
Across
  1. : We use this to type on computer
  2. : We do this to find things on internet
  3. : A machine we use to study and play
  4. : A saved document, photo or game
  5. : We watch this on YouTube
  6. : Sending and receiving messages online
  7. : A place on the internet with pages and information
  8. : Do not share this with people you don’t know
  9. : We must be this on the internet
  10. : We use this to click and move cursor
Down
  1. : We look at this part of a computer
  2. : A word for things on internet
  3. : Keep this secret, do not share it
  4. : We must follow these while using computer
  5. : We should only chat with real ____ online
  6. : It helps phone or laptop to connect to internet
  7. : We should not post too many of these online
  8. : Talking to friends using computer or phone
  9. : We use this to open websites
  10. : Fun thing we play on computer or phone

20 Clues: : We watch this on YouTube: We use this to open websites: A word for things on internet: We use this to type on computer: A saved document, photo or game: We must be this on the internet: Keep this secret, do not share it: We look at this part of a computer: A machine we use to study and play: We use this to click and move cursor...

Surfing Safety & Cyber Safety 2022-02-01

Surfing Safety & Cyber Safety crossword puzzle
Across
  1. Get _____________ from your parents or teacher before you download a file or an app. You could accidentally download a virus onto your computer, or see something that you shouldn't.
  2. Inside the computer case is the ______ drive where all of your documents are saved.
  3. programs do many different things. For example, Microsoft Word or Google Docs are both word processing programs that let you write book reports, essays, stories, and more. Examples of other application programs are Microsoft PowerPoint and Google Slides.
  4. When you are online, do not share your name, age, address, phone number, or any other ____________ information with anyone you do not know.
  5. The ___________ system is the most important program that runs on your computer. It lets the computer's hardware and software work together. Examples of operating systems are Microsoft's Windows and Apple's Mac OS.
  6. The _____ is the brains of the computer.
  7. The ______ lets you point to objects on your screen, click on them, and even move them. You can also use the mouse to scroll (or move) through different parts of your screen.
  8. The ___________ takes the text and pictures on your screen and prints them onto paper.
  9. Besides your parents, you should never share your _______________ with anyone. If you do, someone could get into your account and could even pretend to be you.
  10. Listen to your parents about what ___________ rules you should follow, such as which websites you may visit and what pictures you may post.
  11. is when a person bullies someone using technology. Social media sites, text messages, and online chats can all be used for cyberbullying.
Down
  1. The ___________ let you hear different sounds created by the computer. With speakers, you can listen to songs and videos that you play on your computer.
  2. The ________ looks like a TV screen and lets you see your work and your files.
  3. The parts of a computer that you can actually touch are called __________.
  4. software protects your computer so that it doesn't get a computer virus.
  5. If you, or someone you know, are being made fun of or __________ with hurtful words or bad pictures, tell your parents or teacher right away.
  6. is a system of many parts that work together. Computers can be used to write a paper, play games, email a friend, find information, and so much more.
  7. The ___________ is used for typing words and numbers on the computer.
  8. tells the hardware what to do and how to do it. For example, writing and reading programs, and games might be some types of software you have used before.
  9. If you have a social media account, use high ___________ settings. Ask a parent to help you if you're not sure how to do this.
  10. The ___________ case is the metal (or plastic) box that holds the 'brains' of the computer.
  11. Never meet up with an online "friend;" it can be very _________. If someone ever asks to meet with you, tell your parents or teacher right away.

22 Clues: The _____ is the brains of the computer.The ___________ is used for typing words and numbers on the computer.software protects your computer so that it doesn't get a computer virus.The parts of a computer that you can actually touch are called __________.The ________ looks like a TV screen and lets you see your work and your files....

Vocabulary at the airport 2025-07-31

Vocabulary at the airport crossword puzzle
Across
  1. สานพานรับส่งกระเป๋าในสนามบิน
  2. พนักงานขนกระเป๋า
  3. ออกเดินทาง
  4. ระบบรักษาความปลอดภัย
  5. สายการบิน
  6. ขึ้นเครื่องบิน
  7. ถอดออก
  8. ลงทะเบียนขึ้นเครื่องบิน
  9. ชั้นโดยสารราคาถูกที่สุด
Down
  1. มาถึง
  2. บัตรโดยสาร
  3. ผู้โดยสาร
  4. ความสนุกสนาน, ความเพลิดเพลิน
  5. การประกาศ
  6. ประตูทางออก
  7. เที่ยวบิน
  8. กระเป๋าเป้สะพายหลัง

17 Clues: มาถึงถอดออกผู้โดยสารสายการบินการประกาศเที่ยวบินบัตรโดยสารออกเดินทางประตูทางออกขึ้นเครื่องบินพนักงานขนกระเป๋ากระเป๋าเป้สะพายหลังระบบรักษาความปลอดภัยลงทะเบียนขึ้นเครื่องบินชั้นโดยสารราคาถูกที่สุดสานพานรับส่งกระเป๋าในสนามบินความสนุกสนาน, ความเพลิดเพลิน

Cyentia Institute Crossword 2022-06-14

Cyentia Institute Crossword crossword puzzle
Across
  1. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
  2. A research series dedicated to clearing away the fog of FUD (fear, uncertainty, and doubt) that has plagued cyber risk quantification for far too long.
  3. A company dedicated to building cybersecurity knowledge through data-driven research
  4. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  5. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
Down
  1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. A weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system.
  3. Relating to or characteristic of the culture of computers, information technology, and virtual reality.
  4. The hypothetical event wherein an attacker uses the vulnerability.

9 Clues: The hypothetical event wherein an attacker uses the vulnerability.A company dedicated to building cybersecurity knowledge through data-driven researchA malicious application or script that can be used to take advantage of a computer’s vulnerability.The process of encoding data to prevent theft by ensuring the data can only be accessed with a key....

sc900 Review 2024-02-18

sc900 Review crossword puzzle
Across
  1. Federation is used to establish a ----- relationship between organisations
  2. This abbreviation is used to ensure that users have just enough access, just in time
  3. These reviews are done to evaluate group membership and role assignments to ensure that the correct users are in the correct places
  4. ......... is one of the goals of the cyber security strategy which is ensuring data or messages haven’t been tampered with
  5. This identity can be used for authentication and authorization to on-premises and cloud resources
  6. ........... access policies can be used to examine signals such as location, device, ip address and either allow or block access to Azure
  7. ........ as a Service solutions allows users to access and use applications over the internet - eg Microsoft 365
  8. .......... a file means the data in the file is only readable to users with the appropriate key
  9. This score measures an organisation's progress in completing actions that reduce risks associated with data protection and regulatory standards
Down
  1. This is the process of verifying who you are
  2. This is the abbreviation used to describe the login process when it requires users to enter more information than just a password.
  3. ........... management allows multicloud discovery, remediation, and monitoring of privileged access across Azure, AWS, and GCP
  4. This is the process of verifying whether a signed in user can access a specific resource
  5. The ---- trust model assumes each request as though it was originated from an uncontrolled network. Verify explicitly - assume breach
  6. uses an algorithm to convert the original text to a unique fixed-length hash value
  7. Microsoft is responsible for managing the physical hardware in their datacentres in a ------ responsibility model
  8. A layer of the defence in depth policy where you would find DDoS protection and Firewall
  9. This acronym allows users to reset their own passwords without involving the IT Service Desk

18 Clues: This is the process of verifying who you areFederation is used to establish a ----- relationship between organisationsuses an algorithm to convert the original text to a unique fixed-length hash valueThis abbreviation is used to ensure that users have just enough access, just in time...

Cybersecurity Terms 2025-04-09

Cybersecurity Terms crossword puzzle
Across
  1. A software update to fix security flaws. (5 letters)
  2. Manipulating people to divulge confidential information. (15 letters)
  3. Granting permissions to access resources. (13 letters)
  4. System that monitors networks for suspicious activity. (3 letters)
  5. Malware that encrypts files and demands payment. (11 letters)
  6. A network security system that blocks unauthorized access. (8 letters)
  7. Weakness in a system that can be exploited. (12 letters)
  8. Securely connects a user to a network over the internet. (3 letters)
  9. Exploit targeting a previously unknown vulnerability. (8 letters)
  10. Attack that overwhelms a system with traffic to crash it. (4 letters)
Down
  1. Security method requiring two types of verification. (10 letters, hyphenated)
  2. Scrambling data to make it unreadable without a key. (10 letters)
  3. Malicious software designed to harm or exploit systems. (7 letters)
  4. Process of verifying a user’s identity. (14 letters)
  5. Deceptive emails or messages to steal sensitive data. (8 letters)

15 Clues: A software update to fix security flaws. (5 letters)Process of verifying a user’s identity. (14 letters)Granting permissions to access resources. (13 letters)Weakness in a system that can be exploited. (12 letters)Malware that encrypts files and demands payment. (11 letters)Scrambling data to make it unreadable without a key. (10 letters)...

Cyber safety 2016-06-07

Cyber  safety crossword puzzle
Across
  1. devices sick
  2. can block a virus
  3. viruses
  4. you should not press
Down
  1. besmean
  2. ,cyber smart

6 Clues: besmeanviruses,cyber smartdevices sickcan block a virusyou should not press

Trend Micro Mobile Security 2024-05-06

Trend Micro Mobile Security crossword puzzle
Across
  1. Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i)
  2. Trend Micro regularly releases ____ for it's mobile security products to address new threats and vulnerabilities. (Starts with u)
  3. Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e)
  4. Users are encouraged to keep their Trend Micro Mobile Security app ____ to ensure they have the latest security features and protections.
Down
  1. Trend Micro regular updates help to enhance ____ capabilities (Starts with p)
  2. Trend Micro Mobile Security provides ____ security protection. (Starts with c)
  3. Trend Micro Mobile Security optimizes ____ usage to ensure minimal disruption to device performance. (Starts with r)

7 Clues: Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e)Trend Micro regular updates help to enhance ____ capabilities (Starts with p)Trend Micro Mobile Security provides ____ security protection. (Starts with c)Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i)...

Digital Citizenship 2020-08-30

Digital Citizenship crossword puzzle
Across
  1. Keep it private
  2. Tell where you got your information
  3. When you post online, it's always there.
  4. Ownership of one's work has this
  5. To decide if a website is helpful for you
  6. Safety
  7. Everything you have ever posted online
  8. The kind of news When the media lie to you
  9. information
  10. Your password should be this.
  11. Harassing others online
Down
  1. Can the information be believed?
  2. Manners online
  3. What you are doing right now
  4. Facebook and Twitter are examples
  5. Places where you get information
  6. One who harasses someone online.
  7. To claim or steal someone else's work
  8. selling things online
  9. App
  10. A tendency to see things only your way
  11. _______your time online. Spend time with family

22 Clues: AppSafetyinformationManners onlineKeep it privateselling things onlineHarassing others onlineWhat you are doing right nowYour password should be this.Can the information be believed?Places where you get informationOwnership of one's work has thisOne who harasses someone online.Facebook and Twitter are examplesTell where you got your information...

Quarter Life crisis 2020-09-16

Quarter Life crisis crossword puzzle
Across
  1. location Ilyssa became famous at (YikYak)
  2. the best location to enter a car
  3. Sorry I’m late for chapter I was at _____
  4. Rachel’s favorite bad boi
  5. best footwear
  6. best broadway musical
  7. World’s newest artist
  8. best drink at Fats
  9. Carly drove here to find unrequited love
  10. law school student
Down
  1. Carly’s favorite food
  2. person who doesn’t eat vegetables
  3. 2 golden friends
  4. who Ilyssa cyber bullied
  5. movie without a sequel
  6. Ilyssas Historic Daddy
  7. Carlys first legal drinks
  8. the moon landing
  9. where Rachel turned 21
  10. Frat that Ilyssa was a member of
  11. the Ryans’ favorite teacher
  12. worlds sexiest black and yellow
  13. rachel has shared alarming videos of this being eaten
  14. Carlys relationship status

24 Clues: best footwear2 golden friendsthe moon landingbest drink at Fatslaw school studentCarly’s favorite foodbest broadway musicalWorld’s newest artistmovie without a sequelIlyssas Historic Daddywhere Rachel turned 21who Ilyssa cyber bulliedRachel’s favorite bad boiCarlys first legal drinksCarlys relationship statusthe Ryans’ favorite teacher...

We Hope You Remember Us From Grade 9 Period 4 Math! 2023-04-28

We Hope You Remember Us From Grade 9 Period 4 Math! crossword puzzle
Across
  1. Often absent but not forgotten
  2. Crusty zip up
  3. Freaky four
  4. Lost a desk mate for two weeks
  5. Provides a necklace every day
  6. Always smiling
  7. Headphones on, math done!
  8. Cool sunglasses
  9. APGA Hockey
  10. Voice can be heard from far away
  11. Name is often mispronounced
  12. When I say hello, it's mistaken for me being on my phone
  13. Wears crocs everyday
  14. Fun and fashionable
  15. Often absent but not forgotten
Down
  1. Missed two weeks
  2. Often absent but not forgotten
  3. Loves cafeteria chocolate chip cookies
  4. Used to always wear a toque
  5. Basketball
  6. Apples
  7. Doodling and art
  8. Excelled with slope
  9. Knew y=mx+b before it was taught
  10. Does things above their level
  11. Second best friend
  12. Cyber Artist
  13. Always laughing
  14. Strong but silent

29 Clues: ApplesBasketballFreaky fourAPGA HockeyCyber ArtistCrusty zip upAlways smilingCool sunglassesAlways laughingMissed two weeksDoodling and artStrong but silentSecond best friendExcelled with slopeFun and fashionableWears crocs everydayHeadphones on, math done!Used to always wear a toqueName is often mispronouncedProvides a necklace every day...

Artificial Intelligence 2024-12-09

Artificial Intelligence crossword puzzle
Across
  1. AI is becoming more and more significant in a number of industries, including food, as demonstrated by the robotic tea maker developed by Hi Arya and LeewayHertz.
  2. AI is being used to assist automate labor intensive tasks in the legal sector, which saves time and enhances customer service.
  3. selecting the appropriate ai model for a project is essential
  4. provided by AI technologies, but using AI also brings up moral dilemmas as, for better or worse,
  5. Robotics integration into the workflow has been pioneered by the manufacturing sector.
  6. automation tools have the potential to increase the quantity and variety of jobs completed when combined with ai technology.
  7. AI is becoming more and more significant in a number of industries, including food, as demonstrated by the robotic tea maker developed by Hi Arya and LeewayHertz.
  8. (AI) technologies are employed in transportation to forecast aircraft delays, regulate traffic, and enhance the safety and efficiency of maritime transportation.
  9. The idea of the technological singularity
  10. customer service is being improved by the integration of machine learning.
Down
  1. Artificial intelligence (AI) is a useful tool in cyber security for anomaly identification, behavioral threat analytics, and false positive resolution.
  2. AI tools such as IBM Watson mimic human medical tasks, while NuMedii's AI-driven AIDD platform looks for medication interactions across diseases.
  3. sifting through papers during discovery phase of the legal case may be quite taxubg for people.
  4. By analyzing data from blogs, social media, and online platforms to detect trends and influencers, artificial intelligence (AI) has completely transformed the fashion business.
  5. AI may also be used to identify fraudulent activity and support strategic decision-making, which improves user engagement and experience
  6. AI-powered personalization allows marketing campaigns and product suggestions to be customized to each person's taste.
  7. It is advised to conduct further research on the effects of AI on adaptive tests, individualized learning, and creative teaching environments.
  8. Precise, timely, and consistent data is the cornerstone of artificial intelligence systems.
  9. AI is used by banking institutions to enhance loan decision-making, establish credit limits, and find investment possibilities.
  10. production of robots are the main emphasis of this branch of engineering.

20 Clues: The idea of the technological singularityselecting the appropriate ai model for a project is essentialproduction of robots are the main emphasis of this branch of engineering.customer service is being improved by the integration of machine learning.Robotics integration into the workflow has been pioneered by the manufacturing sector....

Year 8 ICT 2016-07-15

Year 8 ICT crossword puzzle
Across
  1. formatting your web page.
  2. an animation programme.
  3. somewhere that stores related information.
  4. language for creating websites.
  5. hyper link.
  6. one piece of information in a record.
  7. a question you might ask a database.
Down
  1. to bully online by sending or posting mean,hurtful, or intimidating messages usually anonymous.
  2. a character from Scratch.
  3. defines the top of a document or section in HTML.

10 Clues: hyper link.an animation programme.formatting your web page.a character from Scratch.language for creating websites.a question you might ask a database.one piece of information in a record.somewhere that stores related information.defines the top of a document or section in HTML....

Zeniths Cross Word 2024-10-30

Zeniths Cross Word crossword puzzle
Across
  1. The F in two F A
  2. Don't connect to this if its public
  3. Don't click any links or ______
  4. Another form of an update
  5. When someone tries to trick you into giving personal data
Down
  1. Three random words make this password _____
  2. a good place to save passwords
  3. Don't share everything on _____ media
  4. Always have this turned on
  5. Report all cyber crime to ______ Fraud

10 Clues: The F in two F AAnother form of an updateAlways have this turned ona good place to save passwordsDon't click any links or ______Don't connect to this if its publicDon't share everything on _____ mediaReport all cyber crime to ______ FraudThree random words make this password _____When someone tries to trick you into giving personal data

Bullying 2022-06-06

Bullying crossword puzzle
Across
  1. intentional repeated feels proud
  2. pointing out differences
  3. use of any electronic means to hurt someone
  4. secrecy of internet encourages those who might not otherwise bull
  5. name calling jokes offensive remarks
Down
  1. sending pictures messages information using electronic devices
  2. identity of the person who bullies can be kept secret.
  3. accidental occasional feels remorse
  4. a single significant act or a pattern of acts by one or more students
  5. excluding others from a group
  6. any physical contact that hurts a person
  7. using threats

12 Clues: using threatspointing out differencesexcluding others from a groupintentional repeated feels proudaccidental occasional feels remorsename calling jokes offensive remarksany physical contact that hurts a personuse of any electronic means to hurt someoneidentity of the person who bullies can be kept secret....

Facebook bullying 2014-11-17

Facebook bullying crossword puzzle
Across
  1. Et engelsk ord for internet/virtuel
  2. Ydmygelse hedder på engelsk
  3. The month she posted the video
  4. Amanda's last name
  5. This person found her in a ditch
  6. Amandas age when she died
  7. The bullying began when Amanda was in this grade/class
  8. Amanda came from this country
Down
  1. At slå hedder på engelsk
  2. The name of the month when she was found
  3. At undersøge hedder på engelsk (i politi sammenhæng)
  4. At omringe nogen hedder på engelsk
  5. Grøft hedder på engelsk
  6. Mave hedder på engelsk

14 Clues: Amanda's last nameMave hedder på engelskGrøft hedder på engelskAt slå hedder på engelskAmandas age when she diedYdmygelse hedder på engelskAmanda came from this countryThe month she posted the videoThis person found her in a ditchAt omringe nogen hedder på engelskEt engelsk ord for internet/virtuelThe name of the month when she was found...

The Many Sounds of Y 2023-03-06

The Many Sounds of Y crossword puzzle
Across
  1. any person at all
  2. provides access to water if a fire breaks out
  3. a dog less than a year old
  4. to make an effort
  5. the same as I or me
  6. a sweet food made from sugar
  7. something that stands for something else
Down
  1. how things change and move
  2. taking place on the internet
  3. a state of being close to being asleep
  4. fidgety and restless
  5. a traditional ancient story that is fictional
  6. a large number of persons or things
  7. wavy, curly, or spiraled shape

14 Clues: any person at allto make an effortthe same as I or mefidgety and restlesshow things change and movea dog less than a year oldtaking place on the interneta sweet food made from sugarwavy, curly, or spiraled shapea large number of persons or thingsa state of being close to being asleepsomething that stands for something else...

Departments of the US government 2021-01-05

Departments of the US government crossword puzzle
Across
  1. promotes job creation and economic growth by ensuing fair and reciprocal trade
  2. regulating food products and new pharmaceutical drugs, implementing healthcare programs and preventing the spread of disease
  3. responsible for providing military forces needed to deter war and protect the security of our country
  4. Responsible for providing vital services to Americas veterans including healthcare, and other benefits programs
  5. oversees farming, ranching and forestry as well as regulates food quality and safety and nutritional labeling
  6. in charge of country
  7. Responsible for managing federal finance, collection of taxes, duties and monies paid to and due to the U.S and paying of all bills
Down
  1. 2nd to the president
  2. Governments lead agency for planning and support of the nations land, air and sea-based travel systems
  3. responsible for national policy programs that address America's housing needs and enforce fair housing laws
  4. responsible for counterterrorism, cybersecurity, aviation security, border security etc.
  5. uses sound science to manage and sustain Americas lands, water, wildlife, and energy resources and honors ur nations responsibilities to tribal nations
  6. enforce the law and defend the interest of the United States according to the law
  7. establishes administrator policy, coordinates most federal educational assistance, collects data on U.S schools and enforce educational laws
  8. department responsible for advancing the energy, environmental, and nuclear security of the United States
  9. promotes the welfare of the job seekers, wage-earners and retirees of the United States

16 Clues: 2nd to the presidentin charge of countrypromotes job creation and economic growth by ensuing fair and reciprocal tradeenforce the law and defend the interest of the United States according to the lawpromotes the welfare of the job seekers, wage-earners and retirees of the United States...

Kaya-bullying 2022-03-04

Kaya-bullying crossword puzzle
Across
  1. online bullying
  2. making sure bullying doesn't happen
  3. Josh pushed Jim down the stairs what type of bullying is this?
  4. Natalie watches someone get bullied. what is Natalie
  5. making fun of your friend's hat
Down
  1. aggressive pressure or intimidation
  2. name calling
  3. bragging that you won and your friend lost
  4. someone seeking to harm to another person
  5. lying and spreading rumors

10 Clues: name callingonline bullyinglying and spreading rumorsmaking fun of your friend's hataggressive pressure or intimidationmaking sure bullying doesn't happensomeone seeking to harm to another personbragging that you won and your friend lostNatalie watches someone get bullied. what is Natalie...

TTS Pencegahan Kekerasan di Sekolah 2023-10-18

TTS Pencegahan Kekerasan di Sekolah crossword puzzle
Across
  1. Dampak kekerasan pada korban
  2. Tidak bisa melupakan kejadian di masa lalu
  3. Contoh kekerasan fisik
  4. Faktor penyebab kekerasan
  5. Jenis kekerasan yang terjadi di dunia maya
  6. Hal penting yang harus didapatkan oleh korban kekerasan
Down
  1. Perilaku yang merupakan bentuk kekerasan emosional
  2. Salah satu tindakan positif ketika menyaksikan kekerasan
  3. Bentuk kekerasan yang menyebabkan gesekan antar kelompok
  4. Salah satu bentuk kekerasan karena faktor pubertas

10 Clues: Contoh kekerasan fisikFaktor penyebab kekerasanDampak kekerasan pada korbanTidak bisa melupakan kejadian di masa laluJenis kekerasan yang terjadi di dunia mayaSalah satu bentuk kekerasan karena faktor pubertasPerilaku yang merupakan bentuk kekerasan emosionalHal penting yang harus didapatkan oleh korban kekerasan...

Keamanan Berinternet 2025-02-10

Keamanan Berinternet crossword puzzle
Across
  1. koneksi tanpa kabel disebut jaringan
  2. singkatan dari wireless fidelity
  3. koneksi nirkabel dipancarkan melalui gelombang
  4. Pengguna komputer
  5. orang yg memiliki kemampuan untuk membobol sistem keamanan jaringan komputer
Down
  1. istilah lain dari kata sandi
  2. prosedur untuk menyambungkan dua buah perangkat yang memiliki bluetooth
  3. kejahatan dunia maya
  4. peralatan media komunikasi yang berguna untuk menghubungkan sebuah perangkat dengan perangkat lain
  5. perangkat lunak yang dapat merusak data

10 Clues: Pengguna komputerkejahatan dunia mayaistilah lain dari kata sandisingkatan dari wireless fidelitykoneksi tanpa kabel disebut jaringanperangkat lunak yang dapat merusak datakoneksi nirkabel dipancarkan melalui gelombangprosedur untuk menyambungkan dua buah perangkat yang memiliki bluetooth...

Executive Protection 2013-03-09

Executive Protection crossword puzzle
Across
  1. Needed to want to harm the client
  2. What you provide for a client
  3. Type of method to reduce security problems; a way to look for faults in a plan
  4. The difference between Bodyguards and Executive Protection
  5. The level of a relationship to avoid between client and protector
Down
  1. Needed to be able to provide proper protection (HINT: Security problems that exist)
  2. When E.P. observes another person who is observing the client
  3. Third step to take when preparing for the mission
  4. Important person - time period 1850
  5. What a potentially dangerous subject exhibits when they are nervous (HINT: what happens when you workout)
  6. the highest level of protection
  7. Outlines the security guards responsibilities and licensing
  8. Who qualifies to receive E.P.

13 Clues: What you provide for a clientWho qualifies to receive E.P.the highest level of protectionNeeded to want to harm the clientImportant person - time period 1850Third step to take when preparing for the missionThe difference between Bodyguards and Executive ProtectionOutlines the security guards responsibilities and licensing...

Bullying 2023-03-07

Bullying crossword puzzle
Across
  1. another for the body
  2. another word for words (starts with v)
  3. the opposite of love
  4. talking about others
Down
  1. Friendship is one of the factors
  2. It happens on Instagram
  3. Face with emotion

7 Clues: Face with emotionanother for the bodythe opposite of lovetalking about othersIt happens on InstagramFriendship is one of the factorsanother word for words (starts with v)

Star Trek: Deep Space Nine: Characters 2025-02-20

Star Trek: Deep Space Nine: Characters crossword puzzle
Across
  1. Bajoran Freedom Fighter and Sisko's First In Command
  2. DS9's Doctor
  3. Former Teacher Of The Former DS9 School
  4. Ferengi Bar Owner
  5. Freighter Captain Currently Dating Benjamin Sisko
  6. Chief Of Security On Deep Space 9
  7. Brother Of The Bar Owner
  8. Ferengi In Starfleet Academy
Down
  1. Jake Sisko's Dad; Captain Of Deep Space Nine
  2. Current Trill Symbiant Host
  3. Son Of The Captain
  4. Klingon Formerly Of USS Enterprise
  5. High Officer On Cardassia; Garak's Nemesis
  6. Another Security Officer On Deep Space 9
  7. Cardassian Tailor
  8. Kira's Former Lover Who Died In A StarShip Accident
  9. Bajor's Spiritual Leader
  10. Chief Of Operations On Deep Space Nine

18 Clues: DS9's DoctorCardassian TailorFerengi Bar OwnerSon Of The CaptainBajor's Spiritual LeaderBrother Of The Bar OwnerCurrent Trill Symbiant HostFerengi In Starfleet AcademyChief Of Security On Deep Space 9Klingon Formerly Of USS EnterpriseChief Of Operations On Deep Space NineFormer Teacher Of The Former DS9 School...

1020 bitches 2023-10-24

1020 bitches crossword puzzle
Across
  1. Spesialtilpasset reklame
  2. Top Level Domain
  3. Laget med UDP og TCP
  4. sårbar data
  5. Protocol data unit (beskjed)
  6. Kommunikasjon mellom lag
  7. Laget som kobler sammen ende-til-ende systemer
  8. Reglement for datalagring
  9. ressurs som er åpen for rett person til rett tid
  10. Bekrefter en identitet
  11. Samling av 8 bit
  12. Laget som sikrer pålitelig overføring mellom enheter
Down
  1. Sikre at en ressurs ikke endres eller slettes
  2. Sårbarheter i et system
  3. Tilgang for kun de med rettmessige behov
  4. Karaktersett
  5. First in, first out
  6. Lag med tjenester for applikasjoner
  7. Samlebånd prinsipp, ulike prosesser skjer samtidig
  8. Laget som består av signal representasjon av bits
  9. Virtual Private Network
  10. Sikrer konfidensialitet
  11. sikkerhet Sikre sårbar informasjon via IKT
  12. Skape tillit til en identitet

24 Clues: sårbar dataKaraktersettTop Level DomainSamling av 8 bitFirst in, first outLaget med UDP og TCPBekrefter en identitetSårbarheter i et systemVirtual Private NetworkSikrer konfidensialitetSpesialtilpasset reklameKommunikasjon mellom lagReglement for datalagringProtocol data unit (beskjed)Skape tillit til en identitetLag med tjenester for applikasjoner...

CIS178 - Cybersecurity Crossword Puzzle 2023-07-13

CIS178 - Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. bring your own device
  2. code that protects data
  3. malicious software
  4. transmit information without users knowledge
  5. penetration testers
  6. wont allow changes to system’s settings
  7. illegally exploit network vulnerabilities
  8. identifies device connected to internet
  9. high traffic creates web shutdown
  10. vulnerable free wireless hotspots
  11. practicing to identify cyber threats
  12. software to carry out cyberattacks
  13. preventan d remove malware infections
  14. harrassing others over online platforms
Down
  1. propaganda to steal personal information
  2. downloaded apps disguised malicious attacks
  3. virtual private network
  4. exploits vulnerabilities in software
  5. helps remember passwords encrypted
  6. unauthorized users gain access
  7. attacks users until pay ransom
  8. clicking on hidden links
  9. tries to steal personal data
  10. software preventing access to networks
  11. scrambling sensitive data

25 Clues: malicious softwarepenetration testersbring your own devicevirtual private networkcode that protects dataclicking on hidden linksscrambling sensitive datatries to steal personal dataunauthorized users gain accessattacks users until pay ransomhigh traffic creates web shutdownvulnerable free wireless hotspotshelps remember passwords encrypted...

SECURITY ENGINEERING-SCM 2022-02-05

SECURITY ENGINEERING-SCM crossword puzzle
Across
  1. physical connection between elements
  2. system vulnerability
  3. key feature in SCM
  4. determines the sw system scope
  5. possible loss or harm
  6. making part of system unavailable
  7. is accepted version of a sw configuration item
Down
  1. inserting false information
  2. Maintaining secrecy of information
  3. A weakness in a system
  4. An exploitation of a system's vulnerability
  5. are used to evaluate the state of the product
  6. increases productivity with minimal mistakes
  7. One of the SCM participant
  8. size oriented sw metric

15 Clues: key feature in SCMsystem vulnerabilitypossible loss or harmA weakness in a systemsize oriented sw metricOne of the SCM participantinserting false informationdetermines the sw system scopemaking part of system unavailableMaintaining secrecy of informationphysical connection between elementsAn exploitation of a system's vulnerability...

DCPP Security Crossword 2024-10-07

DCPP Security Crossword crossword puzzle
Across
  1. W Phonetically
  2. Road to the ISFSI
  3. Name on Exciter
  4. Mechanical Gate with Horizontal Arms
  5. Always Use This on Stairways
  6. What We Generate
  7. Mechanical Lift
Down
  1. Explosive Detector
  2. They Wear Green Pants
  3. An Early or An Over
  4. Gate Arm
  5. Checking to See If a Door is Secure
  6. Elevated Location for NSO's
  7. Briefing Sweet Treat
  8. Security Hard Hat Color

15 Clues: Gate ArmW PhoneticallyName on ExciterMechanical LiftWhat We GenerateRoad to the ISFSIExplosive DetectorAn Early or An OverBriefing Sweet TreatThey Wear Green PantsSecurity Hard Hat ColorElevated Location for NSO'sAlways Use This on StairwaysChecking to See If a Door is SecureMechanical Gate with Horizontal Arms

ADM(Mat) Crossword Puzzle 2023-03-24

ADM(Mat) Crossword Puzzle crossword puzzle
Across
  1. a _____ must be completed when there is a change in personal circumstances
  2. it's unauthorized access, disclosure, destruction, removal, modification, use or interruption of assets or information
  3. it's the combination of the frequency, probability and the consequences of a mishap
  4. an _____ security report is to be completed within 48 hours of incident detection
  5. it's an area where access is limited to authorized personnel, to authorized and properly escorted visitors, signs indicate perimeter and is monitored
Down
  1. you are required to ______suspicious behavior
  2. these security _____ identify the type and level of sensitivity of information and their use protects the information from unauthorized disclosure
  3. a security _____ is a condition of employment or service, relative to position and must be fulfilled before commencement of duties
  4. is a situation where employees stop work and gather in a room that can be locked
  5. this tool further provides strategic direction on the management and oversight of security within ADM(Mat) in support of adherence to the PGS, DAODs and NDSODs etc
  6. a security _____ is any workplace violence, act, event, or omission that could result in a compromise of DND/CAF information, assets, or services

11 Clues: you are required to ______suspicious behaviora _____ must be completed when there is a change in personal circumstancesis a situation where employees stop work and gather in a room that can be lockedan _____ security report is to be completed within 48 hours of incident detection...

Unit 2 vocabolar 2025-09-30

Unit 2 vocabolar crossword puzzle
Across
  1. In computer security, risk is a measure of the extent to which an entity is threatened by a potential event, such as a data breach or cyberattack. It is often calculated as a function of the likelihood of the event occurring and the potential negative impact.
  2. The process of implementing controls and measures to reduce the impact of a potential security threat or vulnerability. The goal is to lower risk to an acceptable level.
  3. The assurance that a party in a communication or transaction cannot later deny having sent or received the data. It provides proof of the origin and integrity of the data.
  4. A foundational model for cybersecurity that guides the development of security systems. The three pillars are Confidentiality, Integrity, and Availability.
  5. In the context of technology and cybersecurity, accessible means that systems, tools, and information can be used and understood by people with a wide range of abilities and disabilities.
  6. The guarantee that systems and data are accessible and available to authorized users when needed.
  7. The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals.
Down
  1. A network security device that not only detects malicious activity but also actively blocks or prevents it. It is often placed directly in the path of network traffic.
  2. The assurance that data is trustworthy, accurate, and has not been improperly altered, modified, or destroyed by an unauthorized user.
  3. A security tool that monitors network traffic or system activity for known malicious signatures or suspicious behavior. An IDS alerts administrators to potential threats but does not block them directly.
  4. A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans.
  5. The process of verifying the claimed identity of a user, device, or other entity before granting access to a system or network.
  6. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.

13 Clues: The guarantee that systems and data are accessible and available to authorized users when needed.A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans.The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals....

At the airport 2018-10-16

At the airport crossword puzzle
Across
  1. Verspätung
  2. Sicherheit; Schutz, Wachdienst
  3. Zoll
  4. Abflug
  5. Landung
  6. Gate
  7. Ankunft
  8. Start
  9. Visum
Down
  1. Flugzeug
  2. Kontrolle
  3. Schalter
  4. Passagier
  5. Reisender
  6. Gepäck
  7. Ausweis
  8. Koffer
  9. Flug

18 Clues: ZollGateFlugStartVisumGepäckKofferAbflugAusweisLandungAnkunftFlugzeugSchalterKontrollePassagierReisenderVerspätungSicherheit; Schutz, Wachdienst

Paul y el avión 2022-10-10

Paul y el avión crossword puzzle
Across
  1. pass, go through
  2. bed
  3. security
  4. worried
  5. sad
  6. because
  7. leaves
  8. runs
  9. plane
Down
  1. special
  2. looks at
  3. agent
  4. opens
  5. airport
  6. closes
  7. frustrated
  8. traffic
  9. car

18 Clues: bedcarsadrunsagentopensplaneclosesleavesspecialairporttrafficworriedbecauselooks atsecurityfrustratedpass, go through

Corporate Security Crossword 2023-08-15

Corporate Security Crossword crossword puzzle
Across
  1. Many alarms come through this system via email on building issues
  2. Patrol vehicle for corporate security
  3. What does the "A" stand for in ALL
  4. App used to store employee badge identification
  5. App that is used for guests to check in
  6. Where we log our daily activity and incident reports
  7. App that Security uses to inform during emergency
Down
  1. Greatest boss of all time
  2. 99% of our job is this and 1% is better
  3. Homeland security partnered program with Haworth to mitigate risks during importing and exporting of goods
  4. Information shared from one shift to the next
  5. Name of the master key

12 Clues: Name of the master keyGreatest boss of all timeWhat does the "A" stand for in ALLPatrol vehicle for corporate security99% of our job is this and 1% is betterApp that is used for guests to check inInformation shared from one shift to the nextApp used to store employee badge identificationApp that Security uses to inform during emergency...

Security Exercise 06MAR23 2023-03-03

Security Exercise 06MAR23 crossword puzzle
Across
  1. all in organization should know them
  2. official list of approved shredders
  3. Security coordinator familiarization course
  4. if arrested for DUI
  5. minimum surveillances per month
  6. security coordinators must be
Down
  1. bonafide NOFORN unsecured
  2. on SACB, clear for SECRET on submarine
  3. required before allowed to photograph
  4. designation of documents below CUI
  5. no view inside from outside
  6. Camera inside CIA
  7. must be secure when not in use

13 Clues: Camera inside CIAif arrested for DUIbonafide NOFORN unsecuredno view inside from outsidesecurity coordinators must bemust be secure when not in useminimum surveillances per monthdesignation of documents below CUIofficial list of approved shreddersall in organization should know themrequired before allowed to photograph...

Understanding Money 15.1 by Emily Mendola 2024-05-09

Understanding Money 15.1 by Emily Mendola crossword puzzle
Across
  1. A plastic card that allows the holder to make credit purchases up to an authorized amount
  2. Means that money is a common measure of the worth or price of a good or service
  3. Allows customers to pay for purchases directly from their checking account
  4. Banks that are a part of the Federal Reserve
  5. Money received today is worth more in the future because money today can be invested or deposited in the bank to earn interest
  6. A security that pays interest over terms of ten to thirty years
  7. A transfer of money from one bank account to another(EFT)
  8. The process of transferring money from one individual or organization to another
  9. A security that matures in a year or less
  10. Money is used in exchange for goods and services needed by individuals, businesses, and governments
  11. Nation's central bank that supervises and regulates banks in the country
Down
  1. Action taken to manage the supply of money and interest rates in an economy
  2. A security that pays interest over terms ranging from two to ten years
  3. A type of document guaranteeing the payment of a specific amount of money, either on demand or at a set time, with the payer named on the document
  4. The mechanism a nation uses to provide and manage money for itself
  5. Means that money can be saved and used at a later date
  6. Type of financial investment issued by a corporation, government, or other organization
  7. Anything of value that is accepted in return for goods or services

18 Clues: A security that matures in a year or lessBanks that are a part of the Federal ReserveMeans that money can be saved and used at a later dateA transfer of money from one bank account to another(EFT)A security that pays interest over terms of ten to thirty yearsThe mechanism a nation uses to provide and manage money for itself...

cybersecurity terms 2022-12-16

cybersecurity terms crossword puzzle
Across
  1. a computer connected to a network that has been compromised by a hacker
  2. a kind of software used to prevent, scan, detect and delete viruses from a computer
  3. software that enables a user to covert information from another computer by transmitting data from their hard drive
  4. software that allows an unauthorized user to access a computer
  5. a type of malware that self replicates and infects other computers
  6. a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network
  7. a type of malware that disguises itself as legitimate code or software\
  8. software that displays advertising material
  9. A software-based firewall installed on a desktop or laptop computer to monitor and control its incoming and outgoing network traffic
Down
  1. a network security device that monitors and filters incoming and outgoing network traffic
  2. a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages
  3. malicious software that blocks access to a computer until a sum of money is paid
  4. an undocumented way of gaining access to a computer system
  5. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  6. a network of computers with malicious software
  7. any program that prohibits a pop-up at some point in time
  8. hackers who use automated techniques to scan specific network ranges and find vulnerable systems
  9. software updates that address security vulnerabilities

18 Clues: software that displays advertising materiala network of computers with malicious softwaresoftware updates that address security vulnerabilitiesany program that prohibits a pop-up at some point in timean undocumented way of gaining access to a computer systemsoftware that allows an unauthorized user to access a computer...

amazing crossword puzzle 1 2023-09-12

amazing crossword puzzle 1 crossword puzzle
Across
  1. ff
  2. c
  3. f
  4. ate
  5. s y
  6. ph
  7. cres
  8. tu
  9. x
Down
  1. tt
  2. w
  3. b
  4. l
  5. no
  6. in
  7. s
  8. c
  9. i

18 Clues: wbcflscixttffnoinphtuates ycres

vocabulary 2025-08-01

vocabulary crossword puzzle
Across
  1. สานพานรับส่งกระเป๋าในสนามบิน
  2. กระเป๋าเป้สะพายหลัง
  3. สายการบิน
  4. ออกเดินทาง
  5. ลงทะเบียนขึ้นเครื่องบิน
  6. ประตูทางออก
  7. เที่ยวบิน
  8. ผู้โดยสาร
Down
  1. การประกาศ
  2. ระบบรักษาความปลอดภัย
  3. ความสนุกสนาน, ความเพลิดเพลิน
  4. บัตรโดยสาร
  5. มาถึง
  6. ขึ้นเครื่องบิน
  7. ชั้นโดยสารราคาถูกที่สุด
  8. ถอดออก
  9. พนักงานขนกระเป๋า

17 Clues: มาถึงถอดออกการประกาศสายการบินเที่ยวบินผู้โดยสารบัตรโดยสารออกเดินทางประตูทางออกขึ้นเครื่องบินพนักงานขนกระเป๋ากระเป๋าเป้สะพายหลังระบบรักษาความปลอดภัยชั้นโดยสารราคาถูกที่สุดลงทะเบียนขึ้นเครื่องบินความสนุกสนาน, ความเพลิดเพลินสานพานรับส่งกระเป๋าในสนามบิน

Cyber safety- Charlotte Cameron 2016-05-25

Cyber safety- Charlotte Cameron crossword puzzle
Across
  1. could contain a virus so do not open.
  2. a large device that can be hacked.
  3. to put an picture or information on the internet.
  4. someone who steels someone's identity and uses it as them to gain money or benefits.
  5. people who login to an device and steels money , and information.
  6. they keep you safe online and give you a safe guide.
  7. people who message harmful and rude messages.
  8. allows parents to see what activities their children are using.
  9. an device many people have but can be dangerous.
  10. information about you that has to be kept safe.
Down
  1. an add that automatically comes up on your screen.
  2. enjoy seeing people getting mad at what they have put up.
  3. the first step to logging into an online game.
  4. to lure someone online to know what the are talking about.
  5. an object that is small and can be scammed and get virus's.
  6. something that comes up on your screen and tells you to login.
  7. tries to gain trust with someone and then does something mean and rude on the internet.
  8. a set of numbers or letters that gains access to an device.
  9. safe information kept in an computer to hide.
  10. can wipe an devices memory.

20 Clues: can wipe an devices memory.a large device that can be hacked.could contain a virus so do not open.people who message harmful and rude messages.safe information kept in an computer to hide.the first step to logging into an online game.information about you that has to be kept safe.an device many people have but can be dangerous....

Cyber Safety-Irene Jose 2016-05-25

Cyber Safety-Irene Jose crossword puzzle
Across
  1. program that lets you find,see and hear material
  2. bad thing that can ruin your device
  3. you can chat on with family and friends
  4. method of sending short messages
  5. small hand-controlled device for pointing and clicking
  6. send information from one computer to another computer
  7. name that a user has chosen for you
  8. program,or set of instructions
  9. website for you so you can search
  10. search engine visual for parents mostly
Down
  1. upload information to the web
  2. starting point on the web
  3. add that automatically comes onto the screen
  4. you can send to others
  5. adviser that teaches you how to use technology
  6. security system to keep your things safe
  7. secrets code that unlocks something for you
  8. giant collection of networks of networks
  9. Engine,an Internet service that helps you find information on the website
  10. Tag,the nickname a user has chosen to be identified when playing Internet Games

20 Clues: you can send to othersstarting point on the webupload information to the webprogram,or set of instructionsmethod of sending short messageswebsite for you so you can searchbad thing that can ruin your devicename that a user has chosen for youyou can chat on with family and friendssearch engine visual for parents mostly...

Thomas's Cyber Safety Crossword 2016-06-07

Thomas's Cyber Safety Crossword crossword puzzle
Across
  1. a name that is not your real name
  2. stops viruses
  3. people who bully you onLine
  4. online communities where people share information about themselves,music files and photos
  5. sharing this software enable multiple users to access the same computer
  6. the world wide web as accessed from mobile
  7. a program that protects your computer from others
  8. people who steal money from your computer
  9. a strongly word comment
  10. a program that attacks your computer
Down
  1. to upload information to the web
  2. a person who steals your credit card
  3. a method an individual uses to track,lure or harass another person online
  4. a popular computer program that enables users to video conference
  5. a program or set of instructions that runs on a computer
  6. The World Wide Web
  7. Your online identity name
  8. message from your computer or mobile devices
  9. a network that tweets online
  10. a method of sending text

20 Clues: stops virusesThe World Wide Weba strongly word commenta method of sending textYour online identity namepeople who bully you onLinea network that tweets onlineto upload information to the weba name that is not your real namea person who steals your credit carda program that attacks your computerpeople who steal money from your computer...

Cyber safety - Ella Smith 2016-05-17

Cyber safety - Ella Smith crossword puzzle
Across
  1. someone who helps you
  2. people who try and get your money
  3. distributive emails or messages
  4. how you talk
  5. information your own details
  6. a type of social media
  7. your own or other people's email or phone number
  8. a mean person
  9. something that we use everyday
  10. something that can shut down your computer
Down
  1. how you get information
  2. something that can pop up on your computer
  3. bad people who can still your belongings
  4. your own place
  5. something that you can get spams on
  6. media websites that you can communicate on
  7. about your self
  8. your own space
  9. you face on the Internet
  10. people who follow you

20 Clues: how you talka mean personyour own placeyour own spaceabout your selfsomeone who helps youpeople who follow youa type of social mediahow you get informationyou face on the Internetinformation your own detailssomething that we use everydaydistributive emails or messagespeople who try and get your moneysomething that you can get spams on...

CYBER AND DIGITAL LITERACY 2024-04-30

CYBER AND DIGITAL LITERACY crossword puzzle
Across
  1. security, is a multidimensional discipline aimed at safeguarding digital assets, data, and systems from unauthorized access, attacks, disclosure, or destruction.
  2. YouTube is a video sharing service where users can watch, like, share, comment and upload their own videos.
  3. "learning facilitated by technology that gives students some element of control over time, place, path and/or pace.
  4. creating, sharing and discovering short videos. The app is used by young people as an outlet to express themselves through singing, dancing, comedy, and lip-syncing, and allows users to create videos and share them across a community.
  5. Social media are interactive technologies that facilitate the creation, sharing and aggregation of content, ideas, interests, and other forms of expression through virtual communities and networks.
  6. defined as the ability to effectively navigate, critically analyze, and produce information using digital technology as well as the ability to create new tools for navigating, analyzing, and producing information.
  7. refers to technology, ranging from computers and the internet to technological objects and programs such as cellphones, smart home systems, check-in kiosks at airports and more.
  8. the ability to consume and communicate information ethically online.
  9. a variety of skills associated with using ICT (information and communication technologies) to find, evaluate, create and communicate information.
  10. This element kind of goes without saying. The digital world can be a very scary place
  11. the ability to derive meaningful information from data.
  12. the tendency to generate or recognize ideas, alternatives, or possibilities that may be useful in solving problems, communicating with others, and entertaining ourselves and others.
  13. Instagram is a free photo and video sharing app available on iPhone and Android. People can upload photos or videos to our service and share them with their followers or with a select group of friends.
  14. the ability to locate and consume, create, and communicate digital content, while simultaneously employing a process of critical evaluation.
  15. Understanding of Data. Educational technology is often powerful because of the precise data that it can provide on each student's performance.
  16. Information is an abstract concept that refers to something which has the power to inform.
  17. Research is "creative and systematic work undertaken to increase the stock of knowledge".
  18. the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring both cognitive and technical skills.
  19. equipping people with ICT concepts, methods and skills to enable them to use and exploit ICTs.
  20. Digital literacy is the ability to access, manage, understand, integrate, communicate, evaluate and create information safely and appropriately through digital technologies for employment, decent jobs and entrepreneurship.
  21. a website which allows users, who sign-up for free profiles, to connect with friends, work colleagues or people they don't know, online.
  22. equipping people with ICT concepts, methods and skills to enable them to use and exploit ICTs.
  23. Providing curriculum support and additional information to students. Promoting better organization: Laptops help students keep track of their assignments and utilize an online school calendar.
  24. Being online means having a computer connected to the internet.
Down
  1. a secure and easy way to prove who you are online. You can create your Digital Identity, such as myGovID, using Australian identity documents like your driver's licence and your passport. Find out more information about Digital Identity on the Digital Identity website.
  2. to work jointly with others or together especially in an intellectual endeavor
  3. proficiency in using digital devices (smartphones, laptops, tablets) to access the Internet to discover, create, review, evaluate, and use information via different digital platforms.
  4. an interactive web-based student-response system (also available through iOS, Android, and Chrome apps) that can help teachers spark conversation and learning through polls and quizzes.
  5. to connect its users and allow them to share their thoughts with their followers and others through the use of hashtags.
  6. platform that makes it easy to create, share and play learning games or trivia quizzes in minutes.
  7. digital well-being, but some key components include being able to set boundaries around our use of technology, such as limiting screen time or not using devices in bed, being aware of how technology affects our emotions, and taking steps to manage any negative effects, taking breaks
  8. can enhance digital literacy by providing access to thousands of IT and Digital Skills Training courses to ensure the right people
  9. The privacy and security domain covers competences such as effectively managing information shared online and using tools
  10. The related concept of information literacy consists of providing people with concepts and training in order to process data and transform them into information, knowledge and decisions.
  11. Technology is the application of conceptual knowledge for achieving practical goals, especially in a reproducible way.
  12. It is a combination of both technical and cognitive abilities in using information and communication technologies to create, evaluate, and share information.
  13. it's about effectively navigating a world that has been transformed by technology, whether in your personal, cultural, educational, or professional life.
  14. This is probably the easiest element of digital literacy to teach/demonstrate in the classroom.
  15. providing people with concepts and training in order to process data and transform them into information, knowledge and decisions.
  16. Mobile literacy, then, is a macroliteracy, which requires us to be able to master all the afore-mentioned literacies.
  17. acts as a filter in a digital space brimming with information, opinions, and messages, helping us discern fact from fiction and valuable data from noise.
  18. the behaviors, practices and values that develop from the use of digital technologies.
  19. Being digitally literate is essential as many employers expect that you possess certain IT skills to perform your duties effectively.
  20. Media literacy focuses on understanding and interpreting various forms of digital media, including images, videos, and online articles.
  21. process that involves sending and receiving messages through the verbal and non-verbal methods.
  22. an individual's ability to find, evaluate, and communicate information using typing or digital media platforms.
  23. platform can create and analyse data, providing real time support to a learning experience. This is relevant at both personal and collective levels.
  24. we are constantly bombarded with information, and being able to discern reliable sources from misinformation is crucial.
  25. Personal computers are general purpose computing devices like desktops and laptops.
  26. the goal of evaluation is to make sure you use resources that are reliable, authoritative, truthful and appropriate for academic research.
  27. refers to a particular set of skills that help us navigate the digital space, understand the implications of our actions, and protect ourselves from cyber threats.

51 Clues: the ability to derive meaningful information from data.Being online means having a computer connected to the internet.the ability to consume and communicate information ethically online.to work jointly with others or together especially in an intellectual endeavorPersonal computers are general purpose computing devices like desktops and laptops....

Cyber and Digital Literacy 2024-05-13

Cyber and Digital Literacy crossword puzzle
Across
  1. The reciprocal actions or behaviors between individuals or entities, often involving communication, engagement, or collaboration.
  2. The act of showing or explaining something clearly and effectively, often to illustrate a point or concept.
  3. A particular way of viewing or understanding a situation, concept, or issue, often influenced by one's experiences, beliefs, or cultural background.
  4. the users who utilize the platform to access educational resources, engage in activities, and develop their digital literacy skills.
  5. A collection of related web pages, typically identified by a common domain name and accessible via the Internet.
  6. The ability to perform a task or fulfill a role effectively and efficiently, often based on a combination of knowledge, skills, and experience.
  7. The process of transferring data or files from a remote computer or server to a local computer or device, typically over a network such as the Internet.
  8. refers to bullying behavior that occurs through electronic communication platforms such as social media, messaging apps, or online forums.
  9. The act of understanding or grasping the meaning or significance of something,
  10. The state of being free from unwanted or unauthorized intrusion, especially in regards to personal information shared online.
  11. To evaluate or analyze something critically, often by examining its strengths, weaknesses, and underlying assumptions.
  12. can include smartphones, tablets, computers, and other electronic gadgets used for various tasks such as communication, information retrieval, and content creation.
  13. Able to be believed or trusted because of being reliable, accurate, or convincing.
  14. refer to the competencies needed to navigate, use, and evaluate digital technologies and information effectively.
  15. The abilities or skills that a person or thing possesses and can use or apply.
  16. Tools Software applications or programs used to perform specific tasks or activities in a digital environment.
  17. can include traditional forms such as newspapers, television, and radio, as well as digital platforms such as websites, social media, and streaming services.
  18. Literacy A life skill competence needed for survival in the world of computers, involving awareness of the promises and perils of computers and the internet.
  19. refers to digital devices, software, and systems used for various purposes, including communication, information retrieval, and content creation.
  20. The beliefs, customs, practices, and social behaviors of a particular group of people or society. In the context of digital literacy
  21. Thinking The ability to objectively analyze, evaluate, and synthesize information or arguments, especially in response to complex societal issues raised by digital technologies.
  22. The knowledge and ability to use a range of technology tools for varied purposes.
  23. The process of acquiring knowledge, skills, behaviors, or attitudes through study, experience, or teaching.
  24. The process of moving around or browsing through a website or other digital interface.
  25. it refers to the qualities and responsibilities expected of individuals as members of the digital community, including being digitally literate and adhering to ethical conduct while engaging in online activities.
Down
  1. understanding ethical viewpoints, staying current on new technologies, and recognizing the responsibilities associated with using digital tools and systems.
  2. the world being diverse with cultures, media, print and non-print texts, implying a wide range of cultural backgrounds, media platforms, and types of information.
  3. Pertaining to or conforming to moral principles or standards of conduct, especially in relation to digital citizenship
  4. They are used for a wide range of applications, including personal use, business operations, scientific research, and entertainment.
  5. Logical deductions or conclusions based on prior knowledge, observations, or evidence.
  6. Newly created products, processes, or ideas resulting from human creativity and ingenuity.
  7. Information, understanding, or skills acquired through experience, education, or study.
  8. Information, data, or facts that support or justify a conclusion, claim, or argument.
  9. a common form of communication used for sending text-based messages, files, and documents to individuals or groups.
  10. The methods, strategies, or approaches used in teaching, especially in formal education settings.
  11. The process of exchanging information, ideas, or messages between individuals or groups, often through verbal, written, or digital means.
  12. refers to the process of searching for and locating information online, while adhering to ethical conduct and procedures
  13. To communicate or get in touch with someone or an organization, often through email, phone, or other means.
  14. The quality of being easily usable or accessible, especially for individuals with disabilities.
  15. An environment or tool used for learning activities that take place in a digital setting, providing resources, interaction, and opportunities for skill development.
  16. To assess or judge the value, significance, or quality of something, especially by careful appraisal or examination.
  17. A clickable connection between one web page and another, allowing users to navigate between different pages or resources on the internet.
  18. An individual who instructs, educates, or guides others, typically in a formal setting such as a classroom.
  19. The state of being responsible or answerable for one's actions.
  20. The ability to read and write, including digital literacy skills such as using, evaluating, and creating data and images in the digital environment.
  21. Pertaining to or involving the use of computer technology, especially the internet and digital devices, in various aspects of life.
  22. Relating to or involving computers or computer networks, especially the internet.
  23. used to enhance content delivery and engagement, providing visual aids to help learners understand concepts or processes.
  24. Presenting someone else's work, ideas, or words as one's own without proper acknowledgment or citation.
  25. In the context of digital literacy, integration refers to the incorporation of one's critical point of view into interactive messages created or encountered online.

50 Clues: The state of being responsible or answerable for one's actions.The act of understanding or grasping the meaning or significance of something,The abilities or skills that a person or thing possesses and can use or apply.Relating to or involving computers or computer networks, especially the internet....

Cyber Physical Systems-2 2025-03-20

Cyber Physical Systems-2 crossword puzzle
Across
  1. Using data to forecast and prevent equipment failures.
  2. Self-driving cars and intelligent transportation systems.
  3. A predictable system behavior under given conditions.
  4. The delay between input and response in a system.
  5. An intelligent electricity network with automated controls.
  6. The use of technology to control industrial processes.
  7. Ensuring processes operate in a coordinated manner.
  8. The ability to continue operation despite component failures.
Down
  1. Smart healthcare devices with embedded intelligence.
  2. The creation of mathematical representations of systems.
  3. The ability of a system to function under expected conditions.
  4. The process of improving system performance.
  5. The capacity of a system to handle growth efficiently.
  6. Urban areas that integrate technology for improved efficiency.
  7. Monitoring and optimizing energy consumption.
  8. Farming with IoT and AI for better productivity.
  9. The production of goods using machines and automation.
  10. The management of materials and goods from production to delivery.
  11. Duplication of critical components to increase reliability.
  12. The capacity of a system to recover from disruptions.

20 Clues: The process of improving system performance.Monitoring and optimizing energy consumption.Farming with IoT and AI for better productivity.The delay between input and response in a system.Ensuring processes operate in a coordinated manner.Smart healthcare devices with embedded intelligence.A predictable system behavior under given conditions....

Cyber Physical Systems-2 2025-03-20

Cyber Physical Systems-2 crossword puzzle
Across
  1. Using data to forecast and prevent equipment failures.
  2. Self-driving cars and intelligent transportation systems.
  3. A predictable system behavior under given conditions.
  4. The delay between input and response in a system.
  5. An intelligent electricity network with automated controls.
  6. The use of technology to control industrial processes.
  7. Ensuring processes operate in a coordinated manner.
  8. The ability to continue operation despite component failures.
Down
  1. Smart healthcare devices with embedded intelligence.
  2. The creation of mathematical representations of systems.
  3. The ability of a system to function under expected conditions.
  4. The process of improving system performance.
  5. The capacity of a system to handle growth efficiently.
  6. Urban areas that integrate technology for improved efficiency.
  7. Monitoring and optimizing energy consumption.
  8. Farming with IoT and AI for better productivity.
  9. The production of goods using machines and automation.
  10. The management of materials and goods from production to delivery.
  11. Duplication of critical components to increase reliability.
  12. The capacity of a system to recover from disruptions.

20 Clues: The process of improving system performance.Monitoring and optimizing energy consumption.Farming with IoT and AI for better productivity.The delay between input and response in a system.Ensuring processes operate in a coordinated manner.Smart healthcare devices with embedded intelligence.A predictable system behavior under given conditions....

Cyber Ethics Crossword Puzzle 2025-06-14

Cyber Ethics Crossword Puzzle crossword puzzle
Across
  1. : Blocks harmful or unauthorized access
  2. : Fake emails used to steal information
  3. : Malicious software disguised as useful
  4. : Secret code used to access accounts
  5. : Tracks your activity without permission
  6. : Preventing unauthorized access to data
  7. : A crime committed using computers
  8. : Good behavior and manners online
  9. Factor : Extra layer of login security
Down
  1. : Protects data by making it unreadable without a key
  2. : Making a copy of data for safety
  3. : Unwanted or junk emails
  4. : Using someone’s work without giving credit
  5. : Your trace left behind online
  6. : Digital version of bad behavior
  7. : Where most cyberbullying happens
  8. : Permission before collecting personal data
  9. : Illegally accessing someone’s computer
  10. : Software to detect and remove malware
  11. Theft : Stealing someone’s personal info online

20 Clues: : Unwanted or junk emails: Your trace left behind online: Digital version of bad behavior: Making a copy of data for safety: Where most cyberbullying happens: Good behavior and manners online: A crime committed using computers: Secret code used to access accountsFactor : Extra layer of login security: Blocks harmful or unauthorized access...

Cyber Ethics Crosswords Puzzle 2025-06-05

Cyber Ethics Crosswords Puzzle crossword puzzle
Across
  1. Criminal activity involving computer
  2. Using others original works
  3. Unwanted emails from a unknown sources
  4. Copied and distributed illegally
  5. Converting encrypted data into readable form
  6. Appropriately using the Internet
  7. A type of Spamming
  8. Sending emails to user to get their information
  9. A security system
  10. A criminal practice on social influence
Down
  1. Attackers send mails to make server full
  2. Illegal intrusion in a computer system
  3. Harassing a person in a deliberate manner
  4. Disrupts normal functioning of a Computer
  5. Protecting original ideas
  6. Keep it secret and change periodically
  7. Set of procedures and moral principles
  8. Secretly breaks into a computer system
  9. Convert data into a code
  10. Prevent Plagiarism

20 Clues: A security systemPrevent PlagiarismA type of SpammingConvert data into a codeProtecting original ideasUsing others original worksCopied and distributed illegallyAppropriately using the InternetCriminal activity involving computerIllegal intrusion in a computer systemKeep it secret and change periodicallyUnwanted emails from a unknown sources...

Bullying 2022-06-06

Bullying crossword puzzle
Across
  1. intentional repeated feels proud
  2. pointing out differences
  3. use of any electronic means to hurt someone
  4. secrecy of internet encourages those who might not otherwise bull
  5. name calling jokes offensive remarks
Down
  1. sending pictures messages information using electronic devices
  2. identity of the person who bullies can be kept secret.
  3. accidental occasional feels remorse
  4. a single significant act or a pattern of acts by one or more students
  5. excluding others from a group
  6. any physical contact that hurts a person
  7. using threats

12 Clues: using threatspointing out differencesexcluding others from a groupintentional repeated feels proudaccidental occasional feels remorsename calling jokes offensive remarksany physical contact that hurts a personuse of any electronic means to hurt someoneidentity of the person who bullies can be kept secret....

Bullying 2022-06-06

Bullying crossword puzzle
Across
  1. intentional repeated feels proud
  2. pointing out differences
  3. use of any electronic means to hurt someone
  4. secrecy of internet encourages those who might not otherwise bull
  5. name calling jokes offensive remarks
Down
  1. sending pictures messages information using electronic devices
  2. identity of the person who bullies can be kept secret.
  3. accidental occasional feels remorse
  4. a single significant act or a pattern of acts by one or more students
  5. excluding others from a group
  6. any physical contact that hurts a person
  7. using threats

12 Clues: using threatspointing out differencesexcluding others from a groupintentional repeated feels proudaccidental occasional feels remorsename calling jokes offensive remarksany physical contact that hurts a personuse of any electronic means to hurt someoneidentity of the person who bullies can be kept secret....

Back to school 2025-09-28

Back to school crossword puzzle
Across
  1. the best autumnal beverage
  2. the animal embedded in a conkers real name
  3. pythagoras’ theorem applies to right angle…
  4. septembers seasonal fruit
  5. famous for his one armed strut
  6. uniform colour if nobody obeys the dress code
Down
  1. name of sixth form cafe
  2. otherwise known as sodium chloride
  3. wrote the book from the “book review section”
  4. studying technique named after an italian tomato
  5. september 22nd is the autumn…

11 Clues: name of sixth form cafeseptembers seasonal fruitthe best autumnal beverageseptember 22nd is the autumn…famous for his one armed strutotherwise known as sodium chloridethe animal embedded in a conkers real namepythagoras’ theorem applies to right angle…wrote the book from the “book review section”uniform colour if nobody obeys the dress code...

Normal difficulty 2018-04-07

Normal difficulty crossword puzzle
Across
  1. to give a warning
  2. not legal
  3. very big
  4. this animal is in danger of becoming extinct
  5. a person who knows everything about a subject
  6. to find something new
Down
  1. a person who buys things
  2. animals that live in the wild
  3. something related to the internet
  4. a product, animal or person that is difficult to find or see
  5. writing a letter but you don't give your name
  6. an animal that has very low numbers in the wild

12 Clues: very bignot legalto give a warningto find something newa person who buys thingsanimals that live in the wildsomething related to the internetthis animal is in danger of becoming extinctwriting a letter but you don't give your namea person who knows everything about a subjectan animal that has very low numbers in the wild...

Security within the IoT 2017-04-26

Security within the IoT crossword puzzle
Across
  1. People don't learn enough about the _______ they use to secure them properly.
  2. The number of connected devices, systems and sensors worldwide is expected to grow rapidly over the coming years, with Cisco Systems and Intel both predicting as many as 50 ______ or more such devices by 2020.
  3. 72 percent of consumers do not know how to configure a wireless router in a way to _______ a home network.
  4. An important step to take during product development is to identify the potential ________ of hackers.
  5. The Internet of things is changing our _______ of personal security.
  6. Security can be a significant _______ to organizations adopting IoT technologies.
  7. BullGuard officials noted that the industry has not yet created common security ______ for IoT devices.
Down
  1. Recent research from SAS Institute states that only 11 percent of consumers believe that they have total ______ over the data they provide companies.
  2. IoT networks bring in a diverse set of connected devices that can introduce multiple points of ___________ in the networks.
  3. IoT systems are groupings of network-connected devices that automatically collect and exchange _____, allowing enterprises to increase efficiency and productivity.
  4. Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks.
  5. Most manufacturers are taking their own approaches to ______, which can create update procedures that are complex and difficult to carry out.
  6. The conflict between the demand for connected devices and the users' _______ to secure them or the networks they're on presents challenges.
  7. According to BullGuard CEP Paul Lipman "consumers are clearly not equipped to handle the myriad of security ____ presented by connected devices."
  8. Gartner predicts that by 2020, more than 25 percent of identified _______ in enterprises will be IoT-related.

15 Clues: The Internet of things is changing our _______ of personal security.People don't learn enough about the _______ they use to secure them properly.Security can be a significant _______ to organizations adopting IoT technologies.Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks....

global food security cross word puzzle 2024-04-19

global food security cross word puzzle crossword puzzle
Across
  1. The first basic human necessity and everyone's fundamental right.
  2. Long-term or persistent. Results from poverty and lack of resources. Addressed by long-term development measures.
  3. Altered weather patterns and agricultural productivity
  4. Importance of consistent access to food. Factors affecting stability: Adverse weather, political instability, and economic factors. Periodic inadequate access can lead to nutritional deterioration.
  5. An adequate supply doesn't guarantee household food security. Focus on incomes, expenditures, markets, and prices. Factors: Purchasing power, income, transportation, and market infrastructures.
  6. the food crisis created awareness for food security and led to a formal institutional response globally. However, food availability through buffer stocks was considered enough for ensuring food security.
Down
  1. Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets.
  2. Addresses the "supply side" of food security. Determined by food production, stock levels, and net trade. Includes domestic production, import capacity, and food stocks.
  3. Focuses on nutrient intake and utilization by individuals. Influenced by care and feeding practices, food preparation, diet diversity, and intra-household food distribution. Determines nutritional status.
  4. leading international efforts to address the need that people around the world have for reliable sources of quality food.
  5. Foster Strategic Coordination-regional and global level to improve governance and to promote better allocation of resources.
  6. Crucial for agriculture, requires sustainable management
  7. Invest in country-owned plans, aimed at channeling resources to well- designed and results-based programs and partnerships.
  8. When all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life.
  9. evidence of increasing malnutrition among the children/females led to inclusion of nutrition also as an essential element of food security.

15 Clues: Altered weather patterns and agricultural productivityCrucial for agriculture, requires sustainable managementThe first basic human necessity and everyone's fundamental right.Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets....

2024 OSCE Scholarship for Peace and Security - Crossword puzzle 2024-11-26

2024 OSCE Scholarship for Peace and Security - Crossword puzzle crossword puzzle
Across
  1. the world's foremost intergovernmental forum for scientific and technical cooperation in the peaceful use of nuclear energy
  2. The world's largest regional security organization (Acronym)
  3. Synonym for firearms (Acronym)
  4. Agreement which prohibits the possession of nuclear weapons (Acronym)
  5. UN Security Council Resolution on Women, Peace and Security (Acronym)
  6. Agreement allowing for conduct of short-notice, unarmed, observation flights by its States Parties over the territories of other States Parties
Down
  1. A key OSCE arms control agreement outlining provisions n military information exchange
  2. Cornerstone rule guiding OSCE decision-making processes
  3. UN Security Council Resolution on the non-proliferation of weapons of mass destruction (Acronym)
  4. Together with Pu-239, it is used for the production of nuclear weapons (Abbrev.)

10 Clues: Synonym for firearms (Acronym)Cornerstone rule guiding OSCE decision-making processesThe world's largest regional security organization (Acronym)Agreement which prohibits the possession of nuclear weapons (Acronym)UN Security Council Resolution on Women, Peace and Security (Acronym)...

We're All Cyber Superheroes! 2023-02-14

We're All Cyber Superheroes! crossword puzzle
Across
  1. A form of malware that when executed, changes, corrupts, or destroys information in a system, then it passes on to other systems and damages those as well
  2. A network of computers that have been infected with a virus and now continuously work to create security breaches
  3. A hacking strategy that relies on user manipulation and exploiting human psychology to carry out attacks (two words)
  4. A form of malware that hijacks your system, encrypts your files, and denies you access until you send a payment to unlock them
  5. Threat detection technology designed to shield users from viruses, spyware, trojans, and worms (two words)
  6. A form of ethical hacking that simulates a cyberattack to look for weaknesses that malicious actors may be able to exploit (two words)
  7. A part of the computer system designed to block unauthorized access and keep intruders out
  8. A term for a wide variety of malicious software used to infect and/or damage systems
  9. The use of unique biological features for digital authentication and access control
  10. Protection from potential harm caused by others
  11. An acronym for a tool that gives a user privacy and anonymity online by connecting to a secure server
  12. Use this to access resources, software, and databases over the Internet and outside the confines of local hardware restrictions
Down
  1. A type of scam where a threat actor poses as a legitimate business or organization in order to trick a victim into clicking on a malicious link or attachment
  2. When a hacker changes the email address or Wi-Fi network name so that it appears to be a trusted source
  3. Someone who uses their information technology knowledge and skill to gain unauthorized access to computers, systems, and data
  4. Converting raw data, known as plaintext, into a code, known as ciphertext, to prevent hackers from being able to understand it if they gain access to it
  5. A group of applications that instruct a computer to carry out a task
  6. Occurs when a hacker successfully breaks into a system, takes control of a network, or exposes personal information (two words)
  7. A piece of audio or video that has been altered to make it seem authentic, often used maliciously to spread false information
  8. An acronym for an authentication tool that requires a combination of two or more credentials to verify a user’s identity for login
  9. A form of malware that replicates itself in order to spread to other computers
  10. A code that takes advantage of a software vulnerability or flaw
  11. A form of malware that throws up unwanted advertisements on your screen
  12. A form of malware used to spy on you and your computer activity
  13. Concerning the proper handling of sensitive data to protect its confidentiality and meet regulatory requirements

25 Clues: Protection from potential harm caused by othersA code that takes advantage of a software vulnerability or flawA form of malware used to spy on you and your computer activityA group of applications that instruct a computer to carry out a taskA form of malware that throws up unwanted advertisements on your screen...

Cyber safety-Charlotte Cameron 2016-05-21

Cyber safety-Charlotte Cameron crossword puzzle
Across
  1. could contain a virus so do not open.
  2. they keep you safe online and give you a safe guide.
  3. to put a picture or information on the internet.
  4. up, an add that automatically comes up on your screen.
  5. tries to gain trust and then does something mean and rude.
  6. can wipe a devices memory.
  7. safe information kept in computer to hide.
  8. bulling, people who message harmful and rude messages.
  9. a device many people have but can be dangerous.
  10. theft,someone who steels someones identity and uses it as them to gain money or benefits.
  11. the first step to logging into a online game.
Down
  1. people who login to an device and steels money, and information.
  2. something that comes up on your screen and tells you to login.
  3. enjoy seeing people getting mad of what the have put up.
  4. information about you that has to be kept safe.
  5. to lure someone online to know what they are talking about.
  6. a set of numbers or letters that has to be kept secret.
  7. a large device that can be hacked.
  8. lock, allows parents to see what activities their children are using.
  9. a object that is small and can be scammed and get virus'.

20 Clues: can wipe a devices memory.a large device that can be hacked.could contain a virus so do not open.safe information kept in computer to hide.the first step to logging into a online game.information about you that has to be kept safe.a device many people have but can be dangerous.to put a picture or information on the internet....

Cyber safety -Madeline Ween 2016-06-07

Cyber safety -Madeline Ween crossword puzzle
Across
  1. mean people who are not nice
  2. copying notes from the website
  3. can impact on actions
  4. a thing that is very important on the iPad
  5. chatting to strangers
  6. a trick or a lie
  7. you can search about everything
  8. people that can take care of you on the websites
  9. for work and play
Down
  1. A bad thing that can ruin your device
  2. people who are the opposite of bullies
  3. people that get a hold of your password
  4. following people on or off line
  5. photos or videos that can be bad or good
  6. apps or other things
  7. can be inappropriate or sensible
  8. chatting to contacts
  9. some games are inappropriate for little kids
  10. how we conect
  11. sending things

20 Clues: how we conectsending thingsa trick or a liefor work and playapps or other thingschatting to contactscan impact on actionschatting to strangersmean people who are not nicecopying notes from the websitefollowing people on or off lineyou can search about everythingcan be inappropriate or sensibleA bad thing that can ruin your device...

Cyber safety -Tessa Griffin 2016-05-24

Cyber safety -Tessa Griffin crossword puzzle
Across
  1. an app you've used to look up things
  2. You can get a lot of apps on it
  3. How we connect like Telstra
  4. you look at it when you are watching a movie
  5. an app you use to text people
  6. People that can track you down
  7. something Lawyers work on a lot
  8. you use them on iPads
  9. It starts with a L and you play on it
  10. Chatting to Stranges
  11. an app you use to watch videos
  12. They are everywhere
  13. They can cause a virus
Down
  1. a person that supervisors you
  2. another word for concentrate
  3. something bad you get on a computer
  4. I device do you use to talk to another person
  5. Another Word for safe
  6. They can cause the virus
  7. you use it to get apps
  8. You use it to get onto a iPad (some people don't have it)
  9. Bad people on the Internet

22 Clues: They are everywhereyou use them on iPadsyou use it to get appsChatting to StrangesThey can cause a virusAnother Word for safeThey can cause the virusHow we connect like TelstraBad people on the Internetanother word for concentratean app you use to text peoplea person that supervisors youPeople that can track you down...

Cyber safety Sienna Finau 2016-05-25

Cyber safety     Sienna Finau crossword puzzle
Across
  1. Something that pops up on your screen
  2. A . .of some one
  3. Too make your screen smaller
  4. A thing adults use to post thing on
  5. A website the you can post stuff on it
  6. A texts file
  7. Something you must always protect
  8. If some one is watching you
  9. something you don't want on your computer
  10. Sending a letter on line
  11. A place to keep things
Down
  1. To see some one on a phone or iPad
  2. If you want to send something to some one
  3. So wing you keep private
  4. What to do is to keep something to yourself
  5. If some one is being mean
  6. Some one who is finding out your password
  7. On the Internet
  8. Someone that tricks you in to buying things that are not real
  9. Cordless Internet

20 Clues: A texts fileOn the InternetCordless InternetA . .of some oneA place to keep thingsSending a letter on lineSo wing you keep privateIf some one is being meanIf some one is watching youToo make your screen smallerSomething you must always protectTo see some one on a phone or iPadA thing adults use to post thing on...

Cyber safety Sienna Finau 2016-05-25

Cyber safety     Sienna Finau crossword puzzle
Across
  1. Something that pops up on your screen
  2. A . .of some one
  3. Too make your screen smaller
  4. A thing adults use to post thing on
  5. A website the you can post stuff on it
  6. A texts file
  7. Something you must always protect
  8. If some one is watching you
  9. something you don't want on your computer
  10. Sending a letter on line
  11. A place to keep things
Down
  1. To see some one on a phone or iPad
  2. If you want to send something to some one
  3. So wing you keep private
  4. What to do is to keep something to yourself
  5. If some one is being mean
  6. Some one who is finding out your password
  7. On the Internet
  8. Someone that tricks you in to buying things that are not real
  9. Cordless Internet

20 Clues: A texts fileOn the InternetCordless InternetA . .of some oneA place to keep thingsSending a letter on lineSo wing you keep privateIf some one is being meanIf some one is watching youToo make your screen smallerSomething you must always protectTo see some one on a phone or iPadA thing adults use to post thing on...

Cyber safety - Ella Smith 2016-05-17

Cyber safety - Ella Smith crossword puzzle
Across
  1. someone who helps you
  2. people who try and get your money
  3. distributive emails or messages
  4. how you talk
  5. information your own details
  6. a type of social media
  7. your own or other people's email or phone number
  8. a mean person
  9. something that we use everyday
  10. something that can shut down your computer
Down
  1. how you get information
  2. something that can pop up on your computer
  3. bad people who can still your belongings
  4. your own place
  5. something that you can get spams on
  6. media websites that you can communicate on
  7. about your self
  8. your own space
  9. you face on the Internet
  10. people who follow you

20 Clues: how you talka mean personyour own placeyour own spaceabout your selfsomeone who helps youpeople who follow youa type of social mediahow you get informationyou face on the Internetinformation your own detailssomething that we use everydaydistributive emails or messagespeople who try and get your moneysomething that you can get spams on...

Cyber and Digital Literacy 2024-04-30

Cyber and Digital Literacy crossword puzzle
Across
  1. is a digital space that lets educators pull lots of different rich media types into in one easy-to-access place
  2. any creative element, for example, text, applications, images, archived e-mail messages, data, e-services, audio and video files, and so on
  3. are small files of information that a web server generates and sends to a web browser
  4. is the practical application of knowledge especially in a particular area
  5. is a digital reference to data that the user can follow or be guided to by clicking or tapping
  6. media refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
  7. is a generic term used to refer to applications, scripts and programs that run on a device
  8. the imparting of knowledge in general
  9. is a free online encyclopedia, created and edited by volunteers around the world
  10. is used to give users quick access to all of their essential programs, applications, settings, and notifications
  11. is a game-based learning platform that makes it easy to create, share and play learning games or trivia quizzes in minutes
  12. it means having the skills to be able to read, write and speak to understand and create meaning
  13. is an online tool for teachers to give quizzes and on-the-fly assessments to students
  14. is a software program used to locate and display information on the Internet or an intranet
  15. to transfer the data from one computer to another
  16. is a group of two or more computers or other electronic devices that are interconnected for the purpose of exchanging data and sharing resources
  17. it means to receive data from a remote system, typically a server such as a web server, an FTP server, an email server, or other similar systems
  18. is a reference to a source
  19. is information that is set up for easy access, management and updating
  20. is a collection of web pages and related content that is identified by a common domain name and published on at least one web server
  21. an excessive quantity or fullness
  22. are the communication outlets or tools used to store and deliver information or data
  23. a prefix that means “computer” or “computer network”
Down
  1. to produce printed matter
  2. is any hardware or software used to host an application or service
  3. a program used for software development or system maintenance
  4. is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission or storage
  5. It is brand-specific original content curated and published by customers on any social media platform
  6. is a computer program or device that provides a service to another computer program and its user, also known as the client
  7. is an electronic device that manipulates information, or data
  8. refers to the computer's tangible components or delivery systems that store and run the written instructions provided by the software
  9. is a global collection of documents and other resources, linked by hyperlinks and URIs
  10. are software programs developed for end-users to accomplish specific computing tasks
  11. refers to both the delivery system and individual messages that are sent and received
  12. it is to connect its users and allow them to share their thoughts with their followers and others through the use of hashtags
  13. is a popular internet search engine
  14. is a global network of billions of computers and other electronic devices
  15. is being such in essence or effect though not formally recognized or admitted
  16. is the process of translating printed words into speech
  17. the activity of exploring various websites and webpages using a web browser
  18. is a free web browser used for accessing the internet and running web-based applications
  19. is a sequence or set of instructions in a programming language for a computer to execute
  20. connected to, served by, or available through a system and especially a computer or telecommunications system
  21. a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment
  22. facts and statistics collected together for reference or analysis
  23. refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication
  24. is a media platform made by Mark Zuckerberg
  25. relating to, or utilizing devices constructed or working by the methods or principles of electronics
  26. engine is a software program that helps people find the information they are looking for online using keywords or phrases
  27. is the technology that connects your offices, data centers, cloud applications, and cloud storage together

50 Clues: to produce printed matteris a reference to a sourcean excessive quantity or fullnessis a popular internet search enginethe imparting of knowledge in generalis a media platform made by Mark Zuckerbergto transfer the data from one computer to anothera prefix that means “computer” or “computer network”...

Cyber Awareness Month Crossword 2025-10-10

Cyber Awareness Month Crossword crossword puzzle
Across
  1. Malware disguised as legitimate software
  2. A second layer of security for logging in
  3. Tricking people into revealing confidential info
  4. A software fix for security vulnerabilities
  5. A saved copy of your data in case of loss
  6. Good habits to stay safe online
  7. Malware that locks your files and demands payment
  8. Misleading links designed to get your attention
  9. Verifying your identity before granting access
  10. Software that detects and removes malicious programs
  11. A secure connection that hides your online activity
  12. Malicious software designed to harm or exploit systems
Down
  1. Software that automatically displays unwanted ads
  2. Protocol that encrypts data between websites and browsers
  3. Malware that hides deep in your system
  4. Scrambling data so only authorized users can read it
  5. Software that secretly monitors your activity
  6. A hidden part of the internet not indexed by search engines
  7. A network of infected devices controlled remotely
  8. Unauthorized access to data or systems
  9. Fake emails trying to trick you into giving personal info
  10. A flaw exploited before developers can fix it
  11. Pretending to be someone else online
  12. A secret word or phrase used to access accounts
  13. A digital barrier that blocks unauthorized access

25 Clues: Good habits to stay safe onlinePretending to be someone else onlineMalware that hides deep in your systemUnauthorized access to data or systemsMalware disguised as legitimate softwareA second layer of security for logging inA saved copy of your data in case of lossA software fix for security vulnerabilities...

Cyber Ethics Crossword Puzzle 2025-06-14

Cyber Ethics Crossword Puzzle crossword puzzle
Across
  1. : Secret code used to access accounts
  2. : Blocks harmful or unauthorized access
  3. : Software to detect and remove malware
  4. : Fake emails used to steal information
  5. : Unwanted or junk emails
  6. : Permission before collecting personal data
  7. Factor : Extra layer of login security
  8. : A crime committed using computers
  9. : Your trace left behind online
Down
  1. : Malicious software disguised as useful
  2. : Making a copy of data for safety
  3. : Using someone’s work without giving credit
  4. : Protects data by making it unreadable without a key
  5. : Where most cyberbullying happens
  6. : Digital version of bad behavior
  7. Theft : Stealing someone’s personal info online
  8. : Good behavior and manners online
  9. : Preventing unauthorized access to data
  10. : Illegally accessing someone’s computer
  11. : Tracks your activity without permission

20 Clues: : Unwanted or junk emails: Your trace left behind online: Digital version of bad behavior: Making a copy of data for safety: Where most cyberbullying happens: Good behavior and manners online: A crime committed using computers: Secret code used to access accountsFactor : Extra layer of login security: Blocks harmful or unauthorized access...

Networking concepts & Cyber ethics 2025-06-18

Networking concepts & Cyber ethics crossword puzzle
Across
  1. a small message sent over the internet.
  2. the unique number assigned to every device on a network.
  3. a group of connected computers in a small area.
  4. the illegal act of stealing someone’s personal data.
  5. keeping your data safe and private online.
  6. a place to store web pages.
  7. a physical device used to connect computers in a network.
  8. software that blocks harmful websites.
  9. acting kindly and respectfully online.
Down
  1. harmful links or attachments often sent via email.
  2. a global system of interconnected networks.
  3. software used to browse the web.
  4. rule-breaking activity on a computer.
  5. another word for cyber cheating or copying someone’s work.
  6. a strong word used to protect accounts.
  7. someone who uses the internet to bully others.
  8. unwanted software that harms your system.
  9. a document that explains acceptable computer use.
  10. the right to control how your personal information is used.
  11. connecting two or more computers.

20 Clues: a place to store web pages.software used to browse the web.connecting two or more computers.rule-breaking activity on a computer.software that blocks harmful websites.acting kindly and respectfully online.a small message sent over the internet.a strong word used to protect accounts.unwanted software that harms your system....

Maritime Piracy 2014-12-03

Maritime Piracy crossword puzzle
Across
  1. Festland
  2. abnehmen
  3. Zwischenfall
  4. zur See gehörig
  5. Gewalt
  6. Bewusstheit
  7. Spannungen
  8. Wasserfahrzeug
  9. Hafen
  10. vemeiden
Down
  1. Fracht
  2. berauben
  3. Überschrift
  4. einheimisch
  5. Sicherheitsmaßnahme
  6. Grenze
  7. Raub
  8. blinder Passagier
  9. Bedrohung

19 Clues: RaubHafenFrachtGrenzeGewaltberaubenFestlandabnehmenvemeidenBedrohungSpannungenÜberschrifteinheimischBewusstheitZwischenfallWasserfahrzeugzur See gehörigblinder PassagierSicherheitsmaßnahme

Comunidad = Community 2025-09-25

Comunidad = Community crossword puzzle
Across
  1. pastor
  2. libreria
  3. iglesia
  4. paramedico
  5. concerje
  6. bombero
  7. polecia
  8. mesero(a)
Down
  1. taller
  2. seguridad
  3. escuela
  4. cura/sacerdote
  5. jefe de cocina
  6. biblotecaria
  7. carpintero
  8. monja
  9. biblioteca
  10. propina
  11. banderas

19 Clues: monjapastortallerescuelaiglesiabomberopropinapolecialibreriaconcerjebanderasseguridadmesero(a)paramedicocarpinterobibliotecabiblotecariacura/sacerdotejefe de cocina

Cybersecurity Fundamental Chapter 7 Part 2 2022-10-31

Cybersecurity Fundamental Chapter 7 Part 2 crossword puzzle
Across
  1. dedicated site that monitor, assesses, and defends the organization's information system.
  2. can supplement or in some cases, replace security guards.
  3. hardware or software solutions that enforce network security policies. Filters unauthorize or potentially dangerous traffic from entering the network.
  4. uses network to make or receive phone calls.
Down
  1. one of the faster sectors of information technology is the use of intelligent devices and sensors.
  2. allows two or more locations to communicate simultaneously using telecommunication technologies.
  3. logs the transaction for later retrieval.
  4. one or more location containing the tools that provide administrators with a detail status of the organization's network.
  5. form the backbone of the internet and communications between different
  6. the outermost layer of security, and these solutions are the most publicly visible.
  7. can be the foundation of highly secure identification and personal verification solutions.
  8. allows an individual to gain access to an area with automated entry points.
  9. provide a way to group devices within a LAN and on individual switches. use logical connections instead of physical connections.

13 Clues: logs the transaction for later retrieval.uses network to make or receive phone calls.can supplement or in some cases, replace security guards.form the backbone of the internet and communications between differentallows an individual to gain access to an area with automated entry points....

9/11 2025-06-02

9/11 crossword puzzle
Across
  1. deep emotional response
  2. Type of attack carried out on 9/11
  3. Some were sacrificed for security
  4. US President
  5. intense national pride & unity
  6. saw stricter laws and regulations
Down
  1. gov. department added
  2. increased following 9/11
  3. Immigrants faced this
  4. expanded government authority to spy on citizens
  5. Targeted religious group
  6. created to strengthen national security

12 Clues: US Presidentgov. department addedImmigrants faced thisdeep emotional responseincreased following 9/11Targeted religious groupintense national pride & unitySome were sacrificed for securitysaw stricter laws and regulationsType of attack carried out on 9/11created to strengthen national securityexpanded government authority to spy on citizens

Year 8 ICT 2016-07-15

Year 8 ICT crossword puzzle
Across
  1. a question you might ask a database.
  2. somewhere that stores related information.
  3. an animation programme.
  4. hyper link.
  5. a character from Scratch.
Down
  1. defines the top of a document or section in HTML.
  2. to bully online by sending or posting mean,hurtful, or intimidating messages usually anonymous.
  3. language for creating websites.
  4. one piece of information in a record.
  5. formatting your web page.

10 Clues: hyper link.an animation programme.formatting your web page.a character from Scratch.language for creating websites.a question you might ask a database.one piece of information in a record.somewhere that stores related information.defines the top of a document or section in HTML....

cybersecurity 2024-02-21

cybersecurity crossword puzzle
Across
  1. Cyber-attack
  2. Action that guarantee the identity of a computer
  3. Error checking method
  4. Hash function
Down
  1. Unpredictable number generated by an algorithm
  2. Systems that are connected by each others
  3. Technological process for telling a computer which tasks to perform in order to solve problems
  4. One way encryption
  5. Internet protocol part of the transport layer
  6. Reference model of system interconnection

10 Clues: Cyber-attackHash functionOne way encryptionError checking methodSystems that are connected by each othersReference model of system interconnectionInternet protocol part of the transport layerUnpredictable number generated by an algorithmAction that guarantee the identity of a computer...

Online bulling 2024-06-11

Online bulling crossword puzzle
Across
  1. Someone you can talk to at school.
  2. You go to the police to write a report.
  3. If someone sends you this don’t share it.
  4. Harassing someone.
  5. A place to report crime.
Down
  1. Something you can talk and text on.
  2. Do not share what isn’t yours.
  3. Only share things with people you.
  4. You can always get help.
  5. An online internet word.

10 Clues: Harassing someone.You can always get help.An online internet word.A place to report crime.Do not share what isn’t yours.Someone you can talk to at school.Only share things with people you.Something you can talk and text on.You go to the police to write a report.If someone sends you this don’t share it.

AZKA HEYRA MAULIDHIA 2024-09-30

AZKA HEYRA MAULIDHIA crossword puzzle
Across
  1. kerja sama antar kelompok disebut
  2. perangkat lunak presentasi untuk mengeksplorasi berbagai ide
  3. sesuatu yang dapat dilihat dengan indra penglihatan
  4. data yang berupa angka
  5. berbicara atau berkomunikasi dengan banyak orang
  6. bentuk penyajian data atau informasi dalam bentuk grafis
Down
  1. kepanjangan dari AD adalah
  2. fenomena mengolaborasikan teknologi cyber dan teknologi otomatis
  3. sistem komputer dan informasi
  4. aplikasi yang sering dimainkan oleh anak" adalah

10 Clues: data yang berupa angkakepanjangan dari AD adalahsistem komputer dan informasikerja sama antar kelompok disebutberbicara atau berkomunikasi dengan banyak orangaplikasi yang sering dimainkan oleh anak" adalahsesuatu yang dapat dilihat dengan indra penglihatanbentuk penyajian data atau informasi dalam bentuk grafis...

Sosiologi Tentang Globalisasi 2025-08-25

Sosiologi Tentang Globalisasi crossword puzzle
Across
  1. proses pembelajaran yang berpusat pada siswaLea
  2. nilai-nilai yang dianut oleh suatu masyarakat
  3. bahasa pemrograman yang populer
  4. domestik bruto indikator keberhasilan ekonomi suatu negara
  5. metode pembelajaran yang menggunakan teknologi
  6. jenis serangan cyber yang berbahaya
Down
  1. sistem ekonomi yang berdasarkan pada kepemilikan swasta
  2. bentuk kemonukasi yang tidak langsung
  3. perusahaan teknologi yang terkenal
  4. jenis teknologi yang digunakan untuk mengakses internet

10 Clues: bahasa pemrograman yang populerperusahaan teknologi yang terkenaljenis serangan cyber yang berbahayabentuk kemonukasi yang tidak langsungnilai-nilai yang dianut oleh suatu masyarakatmetode pembelajaran yang menggunakan teknologiproses pembelajaran yang berpusat pada siswaLeasistem ekonomi yang berdasarkan pada kepemilikan swasta...

HAAS1 2024-07-19

HAAS1 crossword puzzle
Across
  1. What Centre would a customer go to for an appointment?
  2. What term do we use apart from 'customer' for a person applying for or receiving benefits
  3. What type of calls will we mostly be dealing with?
  4. We must ask security questions before speaking to a Customer in order to comply with Data_____?
  5. What is the name of the company we work for?
  6. A security question we ask for is the Customer's N___?
  7. What should you take plenty of during training?
  8. Which device should you have on silent during training?
  9. What term is used for a person who deals with a Customer's affairs if they are unable to do it for themselves?
Down
  1. What Centre will a customer call to reschedule an assessment appointment?
  2. What is a Customer applying for from DWP?
  3. In training what is there never, when it comes to a question?
  4. What number does NINO stand for?
  5. What does the second 'A' in HAAS stand for?
  6. This is a security question
  7. Which is the UK's biggest public service department?
  8. What type of contract is HAAS?
  9. What does the first 'A' in HAAS stand for?
  10. What does the 'H' stand for in HAAS?
  11. What 2x15 minute activity will we have each day?

20 Clues: This is a security questionWhat type of contract is HAAS?What number does NINO stand for?What does the 'H' stand for in HAAS?What is a Customer applying for from DWP?What does the first 'A' in HAAS stand for?What does the second 'A' in HAAS stand for?What is the name of the company we work for?What should you take plenty of during training?...

Travelling 2024-01-28

Travelling crossword puzzle
Across
  1. badedragt
  2. sikkerhed
  3. solbriller
  4. hovedstad
  5. flybillet
  6. attraktion
  7. møntenhed
Down
  1. stewardesse
  2. visum
  3. fly
  4. kuffert
  5. strand
  6. pas
  7. geografi
  8. lufthavn
  9. håndbagage

16 Clues: flypasvisumstrandkuffertgeografilufthavnbadedragtsikkerhedhovedstadflybilletmøntenhedsolbrillerhåndbagageattraktionstewardesse

az nfb 2024-08-14

az nfb crossword puzzle
Across
  1. Respect
  2. Ownership
  3. Resilience
  4. Journey
  5. Opportunity
  6. Reinforce
  7. Delegate
  8. Experience
  9. Identity
Down
  1. Status
  2. Arizona
  3. Freewill
  4. Authentic
  5. Momentum
  6. Innovation
  7. Porterfield

16 Clues: StatusRespectArizonaJourneyFreewillMomentumDelegateIdentityOwnershipAuthenticReinforceResilienceInnovationExperienceOpportunityPorterfield