cyber security Crossword Puzzles
Jobs of the Future by 2030 2025-04-16
8 Clues: : Helps businesses go green • : Defends against cyber threats • : Provides medical care remotely • : Builds self-driving vehicle systems • : Interprets big data to find patterns • : Uses AI to diagnose and treat patients • : Designs and builds intelligent machines • : Studies climate change and global warming
Cybersecurity Crossword Puzzle 2024-02-01
Across
- Passwords should not contain your
- Sikorsky Facility Security Officer (FSO)
- Strategy to protect sensitive information (operational security)
- Assured File Transfers (AFTs) should only be performed by a trained
- If you see something
- A company's most valuable asset
Down
- Report all security incidents to
- Sikorsky Classified Cybersecurity Manager
- Access is granted based on clearance level and
9 Clues: If you see something • A company's most valuable asset • Report all security incidents to • Passwords should not contain your • Sikorsky Facility Security Officer (FSO) • Sikorsky Classified Cybersecurity Manager • Access is granted based on clearance level and • Strategy to protect sensitive information (operational security) • ...
Nishant FRM 2024-07-15
Across
- Tata Power evaluates regulatory changes impacting renewable energy projects and carbon emissions.
- Maruti Suzuki assesses risks of disruptions in the supply of auto components impacting production schedules.
- Flipkart faces disruptions in e-commerce operations due to technical failures during peak shopping seasons.
- RBI monitors risks that could destabilize the entire banking sector, such as liquidity crises or economic recessions.
- Reliance Industries assesses overdependence on revenue from petrochemicals in its diversified business portfolio.
- Insurance companies assess exposure to claims from natural disasters like cyclones or floods.
- ONGC evaluates government policies impacting oil exploration projects in sensitive ecological zones.
- ITC manages risks associated with volatile prices of agricultural commodities used in its food and tobacco products.
Down
- State Bank of India assesses the creditworthiness of borrowers in its corporate lending portfolio.
- Infosys monitors exposure to fluctuations in global IT spending impacting service revenue.
- HDFC Bank ensures adherence to new banking regulations impacting loan approval processes.
- Amul manages public perception during food safety controversies affecting dairy product sales.
- Hindustan Unilever faces litigation over product safety regulations impacting consumer trust in its FMCG products.
- Mahindra & Mahindra assesses political stability and economic conditions before expanding manufacturing operations abroad.
- IndiGo Airlines deals with flight delays due to technical faults affecting passenger satisfaction.
- Tata Consultancy Services deals with currency fluctuations affecting revenue from international IT services contracts.
- Tata Motors evaluates the ability to raise short-term funds to meet operational expenses during economic downturns.
- Axis Bank reviews the accuracy of financial models used for risk assessment and capital allocation.
- Wipro strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
- ICICI Prudential Life Insurance manages exposure to fluctuations in interest rates affecting investment returns.
20 Clues: HDFC Bank ensures adherence to new banking regulations impacting loan approval processes. • Infosys monitors exposure to fluctuations in global IT spending impacting service revenue. • Insurance companies assess exposure to claims from natural disasters like cyclones or floods. • ...
Supply Chain Security Components 2018-12-05
Across
- Assessment These threats are external to the company and out of their control
- Security We screen employees with regulators
- Assessment Examination of internal security controls
- The Processes can affect this risk
Down
- I am a risk driver and can be a result from natural disasters
- IT Security, Physical Security, Container Security, Personnel Security
- Ratings We are ranked low, medium and high
7 Clues: The Processes can affect this risk • Ratings We are ranked low, medium and high • Security We screen employees with regulators • Assessment Examination of internal security controls • I am a risk driver and can be a result from natural disasters • IT Security, Physical Security, Container Security, Personnel Security • ...
Security of Computer 2024-10-01
Across
- small text file containing user's information
- disrupt use of computer access to internet service
- official looking message to scam people.
- a program that detect, and remove dangerous programs.
- trespasses computer and network to destroy
- uses threat and coercion for economic gain
- program that replicate itself
Down
- politically motivated group of computer experts
- less skilled than cracker
- secretly monitors user's activity.
- engage in malicious act for personal thrills
- malicious programs that damages computer.
- program that hides and steals information
- group of infected computer known as zombies.
- convert readable data to encoded character
15 Clues: less skilled than cracker • program that replicate itself • secretly monitors user's activity. • official looking message to scam people. • malicious programs that damages computer. • program that hides and steals information • convert readable data to encoded character • trespasses computer and network to destroy • uses threat and coercion for economic gain • ...
Vincy - Food security 2024-12-18
Across
- A substance that helps plants grow faster
- Foods made from milk, like cheese or yogurt
- The process of collecting ripe crops
- Sweet food made by bees
- Weather patterns that affect how food grows
- A tall building where grains are stored
- Nutrient found in foods like eggs and beans
- A fruit that monkeys and people love
- A person who grows food for others
Down
- A large store where people buy food
- A system to bring water to crops
- A person who cooks meals for others
- A small area where people grow fruits and vegetables
- Plants grown for food like corn or wheat
- Food grown without chemicals
15 Clues: Sweet food made by bees • Food grown without chemicals • A system to bring water to crops • A person who grows food for others • A large store where people buy food • A person who cooks meals for others • The process of collecting ripe crops • A fruit that monkeys and people love • A tall building where grains are stored • Plants grown for food like corn or wheat • ...
CROSSWORD BULLYING 2021-11-30
Across
- when you offer your hand to someone
- red street sign
- talking to people having a conversation
- what you are doing if you are bullying
- a feeling you get when someone moves away
- when you get worked up trying to do something
- how you feel when nobody listens
- is another way to say angry
- being friendly
Down
- the reason we have orange shirt day
- when you feel like you can't do anything
- another word for contact
- bullying online is called
- people you hang out with at school
14 Clues: being friendly • red street sign • another word for contact • bullying online is called • is another way to say angry • how you feel when nobody listens • people you hang out with at school • the reason we have orange shirt day • when you offer your hand to someone • what you are doing if you are bullying • talking to people having a conversation • ...
counter anak 2006 2025-10-01
Across
- Bentuk perundungan melalui media sosial / internet.
- Tindakan yang diharapkan korban lakukan ke pihak sekolah.
- Perilaku perundungan di sekolah.
- kelompok usia yang dibahas (pelaku/korban umumnya)
- Pengaruh sosial yang mendorong ikut melakukan bullying.
- Bentuk bullying yang melukai secara jasmani.
- Sumber pengawasan dan penanganan di sekolah (jabatan)
Down
- Bentuk bullying berupa ejekan atau hinaan
- tempat terjadinya penelitian (kota/sekolah).
- Orang yang menerima tindakan bullying
- Jenis pendekatan penelitian yang dipakai penulis.
- laporan internasional yang dicatat soal perundungan (singkatan).
- Faktor penyebab bullying yang berkaitan dengan rumah
- Upaya pencegahan singkat (kata tindakan).
14 Clues: Perilaku perundungan di sekolah. • Orang yang menerima tindakan bullying • Bentuk bullying berupa ejekan atau hinaan • Upaya pencegahan singkat (kata tindakan). • tempat terjadinya penelitian (kota/sekolah). • Bentuk bullying yang melukai secara jasmani. • Jenis pendekatan penelitian yang dipakai penulis. • kelompok usia yang dibahas (pelaku/korban umumnya) • ...
Homework 2023-02-27
17 Clues: Line • Wüste • grade • Shell • Fremd • Canon • Dämpfe • stretch • ecology • Process • Reserve • Notfall • Drehbuch • Reaction • Sicherheit • Aussprechen • Sonnenuntergang
... 2022-08-24
20 Clues: gate • claim • flight • ticket • customs • luggage • luggage • airport • arrival • suitcase • passport • to check • to board • security • itinerary • to travel • departure • passenger (m) • identification • monitor, screen
RUU TNI telah resmi 2025-04-02
Across
- kata 'cyber' dalam B.Indonesia adalah ...
- kata 'authorized' dalam B.Indonesia adalah ...
- kata 'support' dalam B.Indonesia sehari-hari ...
- kata lain untuk 'mengawasi' adalah ...
- diberikan pelayanan terlalu nyaman disebut juga ...(pampered)
- sinonim kata 'menjalani tugas' adalah ...(served)
- kata 'Pressed' dalam B.Indonesia adalah ...
- kata 'Represent' dalam B.Indonesia sehari-hari ...
- sinonim kata 'tujuan' adalah ...
Down
- kata 'change' dalam B.Indonesia adalah ...
- kejahatan dalam bentuk teror pesan atau bentuk lain disebut ...
- sinonim kata 'mengatasi' adalah ...
- sinonim kata 'utama' adalah ...
- kepanjangan dari 'UU' adalah ...
- sinonim kata 'candaan' adalah ...
- sesuatu yang harus dikerjakan dalam pekerjaan disebut ...(task)
- sinonim kata 'institusi' adalah ...
- kata lain dari 'resign' adalah ...
- kata lain untuk 'Official' adalah ...
- kata sehari-hari untuk 'against' adalah ...
20 Clues: sinonim kata 'utama' adalah ... • kepanjangan dari 'UU' adalah ... • sinonim kata 'tujuan' adalah ... • sinonim kata 'candaan' adalah ... • kata lain dari 'resign' adalah ... • sinonim kata 'mengatasi' adalah ... • sinonim kata 'institusi' adalah ... • kata lain untuk 'Official' adalah ... • kata lain untuk 'mengawasi' adalah ... • kata 'change' dalam B.Indonesia adalah ... • ...
Karrewiet 3 2025-09-23
Across
- jong van een paard
- op de luchthaven in Brussel was er ...-aanval
- hier was het WK atletiek
- in deze stad liep een reuzenspin
- naam van het programma tegen pesten: de ...
- hij pakte zilver op de 5000m
- route die de renners afleggen
- windrichting waaruit wind waait dinsdag
- dit eisen de computercriminelen
- werelddeel waarin Rwanda ligt
- verzamelnaam voor 7 atletiekonderdelen
Down
- zonder auto
- beroep Jacotte Brokken
- hoofdstad van Rwanda
- C-Bra heeft donderbruine...
- virtuele realiteitsbril
- het feest begint; het ... los
- een jong paard van 402000 euro is een ...
- aantal jongens en meisjes tijdens pestprogramma
- volledige naam: C-Bra van het ...
- familienaam van Nafissatou
- trommel
- sportpaard met lange benen
- familienaam Remco
- supporter
- wielerwedstrijd
26 Clues: trommel • supporter • zonder auto • wielerwedstrijd • familienaam Remco • jong van een paard • hoofdstad van Rwanda • beroep Jacotte Brokken • virtuele realiteitsbril • hier was het WK atletiek • familienaam van Nafissatou • sportpaard met lange benen • C-Bra heeft donderbruine... • hij pakte zilver op de 5000m • het feest begint; het ... los • route die de renners afleggen • ...
Gaming Engineer 2025-12-12
Across
- Engineer/Developer: General term for coding games.
- Artist: Bridges art and programming, solving technical art issues.
- Engineer: Focuses on visual rendering and performance.
- Skills & Concepts
- Engineer: Focuses on game security.
- Developer: Specializes in mobile gaming.
- Engineer: Implements features for designers to tune.
- Programmer: Writes the code for game mechanics.
Down
- & Hybrid Roles
- Intelligence (AI).
- Engineer: Handles sound and music implementation.
- Programmer: Creates internal software for other developers.
- Engines: Unity, Unreal Engine.
- Programmer: Works on the core game engine itself.
- Performance, Memory Management.
- Engineer: Develops non-player character (NPC) behaviors.
- Gaming Engineer: Works on streaming game technology.
- (User Interface/Experience).
- Languages: C++, C#, Python, etc..
19 Clues: & Hybrid Roles • Skills & Concepts • Intelligence (AI). • (User Interface/Experience). • Engines: Unity, Unreal Engine. • Performance, Memory Management. • Languages: C++, C#, Python, etc.. • Engineer: Focuses on game security. • Developer: Specializes in mobile gaming. • Programmer: Writes the code for game mechanics. • Engineer: Handles sound and music implementation. • ...
Unit 4: US History 2023-12-14
Across
- buried the farmers crops, giant dirt storm
- buying something with more than you can pay
- Social Security Act
- Agricultural Adjustment Act
- Federal Deposit Insurance Corp
- named after herbert hoover, town of homeless
- Civilian Conservation Corp.
- President bad
- security and exchange comission
- FDR won by a landslide
Down
- FDRs plan to fix the great depression
- FDRs way of getting the people to "get to know him"
- conducting a financial decision with risk
- Works Progressive Administration
- helped feed the hungry, one of their only meals
- Franklin Delano Roosevelt
- October 29th 1929
- in the 1930s' a great financial collapse
- When the gov spends more than it collects
19 Clues: President bad • October 29th 1929 • Social Security Act • FDR won by a landslide • Franklin Delano Roosevelt • Agricultural Adjustment Act • Civilian Conservation Corp. • Federal Deposit Insurance Corp • security and exchange comission • Works Progressive Administration • FDRs plan to fix the great depression • in the 1930s' a great financial collapse • ...
Cyber bullying Crossword Puzzle 2015-04-16
Across
- a file on a computer that records user information when visiting a website
- a wireless handheld device which allows for telephone communications
- the most popular social networking website
- physical or emotional injury to someone
- the act of restricting access to certain web sites
- acronym for the company that provides an Internet connection to individuals or companies
- intentional and repeated harm inflicted through the use of computers, cell phones, and other electronic devices
- unsolicited words or actions intended to annoy, alarm, or abuse another individual
- short for "World Wide Web" or pages linked together via the internet
- the act of requesting another person to enter your social network
- making a statement or taking an action that indicates harm to another
- repeated or deliberate harassment directed by one in a position of power toward one or more
- a user-created web page on a social networking website
Down
- an electronic device that stores and processes information and also facilitates electronic communication when connected to a network
- allows internet users to send and receive electronic text to and from other internet issues
- the denial of access to particular parts of the internet
- worldwide network of computers communicating with others via phone lines, satellite links, wireless networks, and cable systems
- an intermediary web site which hides or disguises the IP address associated with the internet user
- interactive web journal or diary, the contents of which are posted online and then view able by some or all individuals
- unsolicited electronic mail sent from someone yo do not know
- sending angry, rude, or obscene messages directed at a person or persons privately or an online group
- a form of bullying where physical assaults are recorded on mobile phones or digital cameras and distributed to others
- the second most popular social networking site
- sending short messages via cell phone
- two or more computers connected so that they can communicate with each other
25 Clues: sending short messages via cell phone • physical or emotional injury to someone • the most popular social networking website • the second most popular social networking site • the act of restricting access to certain web sites • a user-created web page on a social networking website • the denial of access to particular parts of the internet • ...
Cyber Safety-Hugh Fox 2016-06-07
Across
- A saved link to a website that has been added to a list of saved links or favorite sites
- A scam that involves sending a fraudulent e-mail soliciting personal information from an unsuspecting user
- A hostile, strongly worded message that may contain obscene language
- Any unsolicited e-mail, or junk mail
- A piece of information
- a thing to stop viruses
- The name for bookmark
- A giant collection of computer networks
- A location online that allows multiple users to communicate electronically
- A self-replicating software program
Down
- Internet games
- Internet gamers who intentionally cause problems
- software installed on computers which collects information without your knowledge or consent and sends it to a spyware program
- The site that is the starting point on the web for a particular group or organization
- The World Wide Web
- A secret word or number that must be used to gain access to an online service
- a app to stop hackers
- The nickname a user
- To copy a file from one computer system to another
- stands for malicious software or code, which includes any harmful code
20 Clues: Internet games • The World Wide Web • The nickname a user • a app to stop hackers • The name for bookmark • A piece of information • a thing to stop viruses • A self-replicating software program • Any unsolicited e-mail, or junk mail • A giant collection of computer networks • Internet gamers who intentionally cause problems • To copy a file from one computer system to another • ...
CYBER AND DIGITAL LITERACY 2024-04-30
Across
- a common form of communication used for sending text-based messages, files, and documents to individuals or groups.
- it refers to the qualities and responsibilities expected of individuals as members of the digital community
- refers to bullying behavior that occurs through electronic communication platforms such as social media, messaging apps, or online forum.
- Logical deductions or conclusions based on prior knowledge, observations, or evidence.
- Information that is collected, stored, and processed by computers.
- The ability to perform a task or fulfill a role effectively and efficiently, often based on a combination of knowledge, skills, and experience.
- refer to the competencies needed to navigate, use, and evaluate digital technologies and information effectively.
- used to enhance content delivery and engagement, providing visual aids to help learners understand concepts or processes.
- The abilities or skills that a person or thing possesses and can use or apply.
- To communicate or get in touch with someone or an organization, often through email, phone, or other means.
- Able to be believed or trusted because of being reliable, accurate, or convincing.
- The users who utilize the platform to access educational resources
- Information, data, or facts that support or justify a conclusion, claim, or argument.
- An individual who instructs, educates, or guides others, typically in a formal setting such as a classroom.
- can include traditional forms such as newspapers, television, and radio, as well as digital platforms such as websites, social media, and streaming services.
- the world being diverse with cultures, media, print and non-print texts, implying a wide range of cultural backgrounds, media platforms, and types of information.
- Pertaining to or involving the use of computer technology
- The process of transferring data or files from a remote computer or server to a local computer or device, typically over a network such as the Internet.
- can include smartphones, tablets, computers, and other electronic gadgets used for various tasks such as communication, information retrieval, and content creation.
- The process of exchanging information, ideas, or messages between individuals or groups, often through verbal, written, or digital means.
- Tools Software applications or programs used to perform specific tasks or activities in a digital environment.
- refers to digital devices, software, and systems used for various purposes, including communication, information retrieval, and content creation.
- An environment or tool used for learning activities that take place in a digital setting, providing resources, interaction, and opportunities for skill development.
- A collection of related web pages, typically identified by a common domain name and accessible via the Internet.
- The process of acquiring knowledge, skills, behaviors, or attitudes through study, experience, or teaching.
- The state of being free from unwanted or unauthorized intrusion, especially in regards to personal information shared online.
- The methods, strategies, or approaches used in teaching
- A particular way of viewing or understanding a situation, concept, or issue, often influenced by one's experiences, beliefs, or cultural background.
Down
- In the context of digital literacy, integration refers to the incorporation of one's critical point of view into interactive messages created or encountered online.
- To evaluate or analyze something critically
- Pertaining to or conforming to moral principles or standards of conduct
- The process of moving around or browsing through a website or other digital interface.
- Literacy A life skill competence needed for survival in the world of computers, involving awareness of the promises and perils of computers and the internet.
- Thinking The ability to objectively analyze, evaluate, and synthesize information or arguments, especially in response to complex societal issues raised by digital technologies.
- Newly created products, processes, or ideas resulting from human creativity and ingenuity.
- The beliefs, customs, practices, and social behaviors of a particular group of people or society
- Information, understanding, or skills
- The state of being responsible or answerable for one's actions.
- The quality of being easily usable or accessible
- A clickable connection between one web page and another, allowing users to navigate between different pages or resources on the internet.
- Presenting someone else's work, ideas, or words as one's own without proper acknowledgment or citation.
- Relating to or involving computers or computer networks, especially the internet.
- The reciprocal actions or behaviors between individuals or entities, often involving communication, engagement, or collaboration.
- refers to the process of searching for and locating information online, while adhering to ethical conduct and procedures
- The act of showing or explaining something clearly and effectively
- They are used for a wide range of applications, including personal use, business operations, scientific research, and entertainment.
- The act of understanding or grasping the meaning or significance of something,
- The ability to read and write.
- understanding ethical viewpoints, staying current on new technologies
- To assess or judge the value, significance, or quality of something, especially by careful appraisal or examination.
50 Clues: The ability to read and write. • Information, understanding, or skills • To evaluate or analyze something critically • The quality of being easily usable or accessible • The methods, strategies, or approaches used in teaching • Pertaining to or involving the use of computer technology • The state of being responsible or answerable for one's actions. • ...
cyber and digital literacy 2024-04-30
Across
- to obtain or use
- or exchange information
- record or image being worked on to a storage medium
- literacy-ability to find evaluate and communicate
- easily send mass mails directly
- clever,secret plans that often decieve others
- computer program that represents information
- personal insults and vulgar and angry wors
- activity or service using internet
- personal area network
- physical parts of computer
- multimedia content
- media-infotmation in a storage medium
- programs that run on a device
- metropolitan area network
- computer virus
- of being free from danger or threat
- information thats converted into a machine\digital format
- a person or group after first gaining their trust
- arrange or set out
- technologies.virtual activities
- harming you on a regular basis
- activities using digital devices
- make changes or removing parts
- present or immediate past contemporary
Down
- used to locate a resource on the internet
- wide area network
- and intentionally use words or actions
- set on it that is either high low level
- working area of a computer screen
- unauthorized access to an account or computer system
- property that protects original works
- software intentionally designed to cause disruption
- of another's work words or ideas without attribution
- global computer network providing a variety ionformation
- -message distributed by electronic means
- used by cables,ports,
- representation for data visualization
- any name acknowledge as the author
- using the internet or other computer network
- web pages and related content
- local area network
- computer network for sharing information
- application for accessing websites
- -most important processor in a computer
- literate-analyze media
- culture of collaboration and teamwork
- type of data store
- freedom from inference or intrusion
- annoying but its also a threat
50 Clues: computer virus • to obtain or use • wide area network • local area network • multimedia content • type of data store • arrange or set out • used by cables,ports, • personal area network • literate-analyze media • or exchange information • metropolitan area network • physical parts of computer • web pages and related content • programs that run on a device • annoying but its also a threat • ...
Cyber and Digital literacy 2024-04-30
Across
- Visual representations or pictures, often stored or transmitted electronically.
- Secret code or phrase used to access a secure system or account.
- Global network connecting computers and other devices, enabling communication and information exchange.
- Taking responsibility for one's actions or decisions.
- To create, improve, or advance something, often in the context of software or technology.
- Framework or infrastructure enabling the development and operation of software applications.
- A group of people sharing common interests or characteristics, often interacting online.
- Unauthorized access to computer systems or networks, often for malicious purposes.
- Knowledge or skill gained from direct observation or participation in events or activities.
- Comprehension or grasp of the meaning or significance of something.
- Deceptive schemes or fraud conducted via the internet.
- Organized and interconnected set of components or elements working together to achieve a common purpose.
- Tools and techniques for practical purposes, often involving machinery and equipment.
- Data that provides knowledge or insight about a particular subject.
- Information, facts, or skills acquired through learning or experience.
- Online platforms facilitating social interaction and content sharing.
- Writing and organizing instructions for computers to execute specific tasks or functions.
- The realm of existence shaped by digital technology, encompassing online platforms and interactions.
- Programs and applications used to operate computers and perform tasks.
- Various channels for information dissemination, like TV, radio, and the internet.
- Potential dangers or risks to security, often in the context of cybersecurity.
- Interconnected system or group, particularly in the context of computers and communication.
- Steps or directions for completing a task or operating a system.
- Working together with others to achieve a common goal or objective.
- Exchanges or communications between individuals or entities, often in a digital context.
- Written or printed words, often in electronic form.
- Distinctive characteristics or qualities that distinguish an individual or entity.
- Unsolicited or unwanted email messages, often sent in bulk.
Down
- Verification of the identity or legitimacy of a user or entity accessing a system or service.
- Protection of personal or sensitive information from unauthorized access or use.
- Capacity for understanding, reasoning, and adapting to new situations.
- Tools or instruments, particularly electronic gadgets like smartphones and computers.
- Sets of instructions or code designed to perform specific tasks on a computer.
- Criminal activities carried out using digital technology or the internet.
- Software or applications used to perform tasks or solve problems in the digital domain.
- Having the ability to read, write, and understand information in a particular context.
- The surroundings in which something exists or operates, including the digital landscape.
- Exchange of information or messages between individuals or groups.
- Monitoring or following the movement or behavior of something or someone, often online.
- Capacity to perform or achieve a task or function.
- Process of changing from one state, condition, or activity to another.
- Relating to or involving computer technology and electronic data.
- Shared beliefs and practices within a group.
- Software designed to detect and remove malicious software from computer systems.
- Knowledge or perception of a situation or fact.
- Moral principles guiding behavior and decision-making.
- Mental abilities related to thinking, learning, and problem-solving.
- Position or function assumed by an individual within a group or system.
- Legal regulations governing behavior and activities in the digital realm.
- State of being protected from harm or danger.
50 Clues: Shared beliefs and practices within a group. • State of being protected from harm or danger. • Knowledge or perception of a situation or fact. • Capacity to perform or achieve a task or function. • Written or printed words, often in electronic form. • Taking responsibility for one's actions or decisions. • Deceptive schemes or fraud conducted via the internet. • ...
Cyber and Digital Literacy 2024-04-30
Across
- The act of understanding or grasping the meaning or significance of something,
- The process of transferring data or files from a remote computer or server to a local computer or device, typically over a network such as the Internet.
- Can include traditional forms such as newspapers, television, and radio, as well as digital platforms such as websites, social media, and streaming services.
- Refers to digital devices, software, and systems used for various purposes, including communication, information retrieval, and content creation.
- Presenting someone else's work, ideas, or words as one's own without proper acknowledgment or citation.
- It refers to the qualities and responsibilities expected of individuals as members of the digital community, including being digitally literate and adhering to ethical conduct while engaging in online activities.
- The world being diverse with cultures, media, print and non-print texts, implying a wide range of cultural backgrounds, media platforms, and types of information.
- To assess or judge the value, significance, or quality of something, especially by careful appraisal or examination.
- Information, data, or facts that support or justify a conclusion, claim, or argument.
- The abilities or skills that a person or thing possesses and can use or apply.
- Understanding ethical viewpoints, staying current on new technologies, and recognizing the responsibilities associated with using digital tools and systems.
- The process of moving around or browsing through a website or other digital interface.
- Refers to bullying behavior that occurs through electronic communication platforms such as social media, messaging apps, or online forums.
- The quality of being easily usable or accessible, especially for individuals with disabilities.
- The users who utilize the platform to access educational resources, engage in activities, and develop their digital literacy skills.
- Can include smartphones, tablets, computers, and other electronic gadgets used for various tasks such as communication, information retrieval, and content creation.
- The process of acquiring knowledge, skills, behaviors, or attitudes through study, experience, or teaching.
- The state of being responsible or answerable for one's actions.
- The state of being free from unwanted or unauthorized intrusion, especially in regards to personal information shared online.
- Relating to or involving computers or computer networks, especially the internet.
- Newly created products, processes, or ideas resulting from human creativity and ingenuity.
- The process of exchanging information, ideas, or messages between individuals or groups, often through verbal, written, or digital means.
- Information, understanding, or skills acquired through experience, education, or study.
- Used to enhance content delivery and engagement, providing visual aids to help learners understand concepts or processes.
- The methods, strategies, or approaches used in teaching, especially in formal education settings.
Down
- Refer to the competencies needed to navigate, use, and evaluate digital technologies and information effectively.
- To communicate or get in touch with someone or an organization, often through email, phone, or other means.
- Tools Software applications or programs used to perform specific tasks or activities in a digital environment.
- The act of showing or explaining something clearly and effectively, often to illustrate a point or concept.
- The knowledge and ability to use a range of technology tools for varied purposes.
- The ability to read and write, including digital literacy skills such as using, evaluating, and creating data and images in the digital environment.
- A collection of related web pages, typically identified by a common domain name and accessible via the Internet.
- The ability to objectively analyze, evaluate, and synthesize information or arguments, especially in response to complex societal issues raised by digital technologies.
- The beliefs, customs, practices, and social behaviors of a particular group of people or society. In the context of digital literacy
- A life skill competence needed for survival in the world of computers, involving awareness of the promises and perils of computers and the internet.
- Pertaining to or conforming to moral principles or standards of conduct, especially in relation to digital citizenship
- A common form of communication used for sending text-based messages, files, and documents to individuals or groups.
- To evaluate or analyze something critically, often by examining its strengths, weaknesses, and underlying assumptions.
- An individual who instructs, educates, or guides others, typically in a formal setting such as a classroom.
- A clickable connection between one web page and another, allowing users to navigate between different pages or resources on the internet.
- The ability to perform a task or fulfill a role effectively and efficiently, often based on a combination of knowledge, skills, and experience.
- Logical deductions or conclusions based on prior knowledge, observations, or evidence.
- A particular way of viewing or understanding a situation, concept, or issue, often influenced by one's experiences, beliefs, or cultural background.
- They are used for a wide range of applications, including personal use, business operations, scientific research, and entertainment.
- Pertaining to or involving the use of computer technology, especially the internet and digital devices, in various aspects of life.
- The reciprocal actions or behaviors between individuals or entities, often involving communication, engagement, or collaboration.
- An environment or tool used for learning activities that take place in a digital setting, providing resources, interaction, and opportunities for skill development.
- Able to be believed or trusted because of being reliable, accurate, or convincing.
- Refers to the process of searching for and locating information online, while adhering to ethical conduct and procedures
- In the context of digital literacy, integration refers to the incorporation of one's critical point of view into interactive messages created or encountered online.
50 Clues: The state of being responsible or answerable for one's actions. • The act of understanding or grasping the meaning or significance of something, • The abilities or skills that a person or thing possesses and can use or apply. • The knowledge and ability to use a range of technology tools for varied purposes. • ...
Operating Systems (Cyber 100) 2024-02-01
Across
- file extension for compressed files
- Microsoft's disk operating system that came before Windows.
- A cable that connects networks
- A graphical OS released by Google in 2007
- Apple's computer operating system.
- A computer software package that preforms a specific function directly for the end user.
- The OS portions that interface with hardware
- Eight bits make up this
- OS developed in the late 1960's by AT&T Bell Laboratories
- Memory used for short term tasks
Down
- The command to see your current windows version
- A language that can be used to style a web page
- The most common base version of Linux.
- Holds instructions and data when a program is executing.
- The default browser for Mac
- a textual language for creating web pages
- Bill Gate's operating system created in 1985
- The default browser for Windows
- What is the default browser for Linux?
- Commonly placed after a modem to route packets
- The way computers communicate using zeros and ones is?
21 Clues: Eight bits make up this • The default browser for Mac • A cable that connects networks • The default browser for Windows • Memory used for short term tasks • Apple's computer operating system. • file extension for compressed files • The most common base version of Linux. • What is the default browser for Linux? • a textual language for creating web pages • ...
DOMAIN 3 CROSSWORD | CYBER 2024-03-15
Across
- software that creates, runs and manages virtual machines (VMs)
- module(TPM) an embedded hardware chip on a motherboard that stores cryptographic keys used for encryption hardware
- environment an environment used to test and application and discover any bugs or errors
- automation the Internet connection in home appliances, such as refrigerators and coffee makers
- a wireless network used to provide guests with Internet access
- a protocol that translates public IP addresses to private IP addresses and private addresses back to public IP addresses
- the use of different security control types, such as technical controls (firewalls, IDSs and proxy servers); administrative controls (vulnerability assessments and penetration tests); and physical controls (security cameras and locked rooms)
- an OS that manages a network device; some Cisco devices use the Cisco IOS (Internetwork OS)
- is the hardware-based and software-based encryption of an entire disk
- the exposure of data by an error, such as an integer overflow or buffer overflow
- a combination of all the elements required to produce a product
- the use of implementing security controls from different vendors to increase security
- environment an environment that simulates the production environment and is used for late stage testing
- a group of SQL statements that execute as one SQL statement, like a mini-program
- isolation that ensures that a system isn't connected to any other system to reduce risk of being attacked
Down
- the analysis of code without executing it
- a structure of basic concepts that is used to provide guidance to professionals on how to implement security in various systems
- theorganization of tables and columns in a database to reduce redundant data and improve overall database performance
- (SDN)a network that is comprised of virtualization technologies instead of hardware routers and switches
- a framework that is based on relevant laws and regulations, such as HIPAA
- is the software-based encryption of an entire disk;
- the analysis of code as the code is running
- a framework that is not based on law, but by common standards and practices
- a metaphor for physical isolation, indicating that there is a gap of air between an isolated system and other systems
- an internal network, used to communicate and share content
- encryption/self-encrypting drive (FDE/SED)
- a group of honeypots that is within a separate network or zone, but accessible from an organization's primary network
- to provide a digital signature for code
- an OS that manages a server, such as Windows Server 2016 or the Server base environments in Linux
- training of users on common threats and emerging threats to help avoid these types of attacks
- a part of a network that can be accessed by authorized users from outside of the network, such as business partners, customers, vendors, etc.
- an integrated circuit that includes all the functionality of a computing system within the hardware
- to use an isolated area on a system (usually, a virtual machine), often for testing purpose
- network a bridge to a wired network; a network that provides employees access to network resources as if they were connected from a wired dest node at their desk
34 Clues: to provide a digital signature for code • the analysis of code without executing it • encryption/self-encrypting drive (FDE/SED) • the analysis of code as the code is running • is the software-based encryption of an entire disk; • an internal network, used to communicate and share content • software that creates, runs and manages virtual machines (VMs) • ...
Networking Concepts & Cyber Ethics 2025-06-03
Across
- : We use this to type on computer
- : We do this to find things on internet
- : A machine we use to study and play
- : A saved document, photo or game
- : We watch this on YouTube
- : Sending and receiving messages online
- : A place on the internet with pages and information
- : Do not share this with people you don’t know
- : We must be this on the internet
- : We use this to click and move cursor
Down
- : We look at this part of a computer
- : A word for things on internet
- : Keep this secret, do not share it
- : We must follow these while using computer
- : We should only chat with real ____ online
- : It helps phone or laptop to connect to internet
- : We should not post too many of these online
- : Talking to friends using computer or phone
- : We use this to open websites
- : Fun thing we play on computer or phone
20 Clues: : We watch this on YouTube • : We use this to open websites • : A word for things on internet • : We use this to type on computer • : A saved document, photo or game • : We must be this on the internet • : Keep this secret, do not share it • : We look at this part of a computer • : A machine we use to study and play • : We use this to click and move cursor • ...
Surfing Safety & Cyber Safety 2022-02-01
Across
- Get _____________ from your parents or teacher before you download a file or an app. You could accidentally download a virus onto your computer, or see something that you shouldn't.
- Inside the computer case is the ______ drive where all of your documents are saved.
- programs do many different things. For example, Microsoft Word or Google Docs are both word processing programs that let you write book reports, essays, stories, and more. Examples of other application programs are Microsoft PowerPoint and Google Slides.
- When you are online, do not share your name, age, address, phone number, or any other ____________ information with anyone you do not know.
- The ___________ system is the most important program that runs on your computer. It lets the computer's hardware and software work together. Examples of operating systems are Microsoft's Windows and Apple's Mac OS.
- The _____ is the brains of the computer.
- The ______ lets you point to objects on your screen, click on them, and even move them. You can also use the mouse to scroll (or move) through different parts of your screen.
- The ___________ takes the text and pictures on your screen and prints them onto paper.
- Besides your parents, you should never share your _______________ with anyone. If you do, someone could get into your account and could even pretend to be you.
- Listen to your parents about what ___________ rules you should follow, such as which websites you may visit and what pictures you may post.
- is when a person bullies someone using technology. Social media sites, text messages, and online chats can all be used for cyberbullying.
Down
- The ___________ let you hear different sounds created by the computer. With speakers, you can listen to songs and videos that you play on your computer.
- The ________ looks like a TV screen and lets you see your work and your files.
- The parts of a computer that you can actually touch are called __________.
- software protects your computer so that it doesn't get a computer virus.
- If you, or someone you know, are being made fun of or __________ with hurtful words or bad pictures, tell your parents or teacher right away.
- is a system of many parts that work together. Computers can be used to write a paper, play games, email a friend, find information, and so much more.
- The ___________ is used for typing words and numbers on the computer.
- tells the hardware what to do and how to do it. For example, writing and reading programs, and games might be some types of software you have used before.
- If you have a social media account, use high ___________ settings. Ask a parent to help you if you're not sure how to do this.
- The ___________ case is the metal (or plastic) box that holds the 'brains' of the computer.
- Never meet up with an online "friend;" it can be very _________. If someone ever asks to meet with you, tell your parents or teacher right away.
22 Clues: The _____ is the brains of the computer. • The ___________ is used for typing words and numbers on the computer. • software protects your computer so that it doesn't get a computer virus. • The parts of a computer that you can actually touch are called __________. • The ________ looks like a TV screen and lets you see your work and your files. • ...
Vocabulary at the airport 2025-07-31
17 Clues: มาถึง • ถอดออก • ผู้โดยสาร • สายการบิน • การประกาศ • เที่ยวบิน • บัตรโดยสาร • ออกเดินทาง • ประตูทางออก • ขึ้นเครื่องบิน • พนักงานขนกระเป๋า • กระเป๋าเป้สะพายหลัง • ระบบรักษาความปลอดภัย • ลงทะเบียนขึ้นเครื่องบิน • ชั้นโดยสารราคาถูกที่สุด • สานพานรับส่งกระเป๋าในสนามบิน • ความสนุกสนาน, ความเพลิดเพลิน
Cyentia Institute Crossword 2022-06-14
Across
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A research series dedicated to clearing away the fog of FUD (fear, uncertainty, and doubt) that has plagued cyber risk quantification for far too long.
- A company dedicated to building cybersecurity knowledge through data-driven research
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
Down
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- A weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system.
- Relating to or characteristic of the culture of computers, information technology, and virtual reality.
- The hypothetical event wherein an attacker uses the vulnerability.
9 Clues: The hypothetical event wherein an attacker uses the vulnerability. • A company dedicated to building cybersecurity knowledge through data-driven research • A malicious application or script that can be used to take advantage of a computer’s vulnerability. • The process of encoding data to prevent theft by ensuring the data can only be accessed with a key. • ...
sc900 Review 2024-02-18
Across
- Federation is used to establish a ----- relationship between organisations
- This abbreviation is used to ensure that users have just enough access, just in time
- These reviews are done to evaluate group membership and role assignments to ensure that the correct users are in the correct places
- ......... is one of the goals of the cyber security strategy which is ensuring data or messages haven’t been tampered with
- This identity can be used for authentication and authorization to on-premises and cloud resources
- ........... access policies can be used to examine signals such as location, device, ip address and either allow or block access to Azure
- ........ as a Service solutions allows users to access and use applications over the internet - eg Microsoft 365
- .......... a file means the data in the file is only readable to users with the appropriate key
- This score measures an organisation's progress in completing actions that reduce risks associated with data protection and regulatory standards
Down
- This is the process of verifying who you are
- This is the abbreviation used to describe the login process when it requires users to enter more information than just a password.
- ........... management allows multicloud discovery, remediation, and monitoring of privileged access across Azure, AWS, and GCP
- This is the process of verifying whether a signed in user can access a specific resource
- The ---- trust model assumes each request as though it was originated from an uncontrolled network. Verify explicitly - assume breach
- uses an algorithm to convert the original text to a unique fixed-length hash value
- Microsoft is responsible for managing the physical hardware in their datacentres in a ------ responsibility model
- A layer of the defence in depth policy where you would find DDoS protection and Firewall
- This acronym allows users to reset their own passwords without involving the IT Service Desk
18 Clues: This is the process of verifying who you are • Federation is used to establish a ----- relationship between organisations • uses an algorithm to convert the original text to a unique fixed-length hash value • This abbreviation is used to ensure that users have just enough access, just in time • ...
Cybersecurity Terms 2025-04-09
Across
- A software update to fix security flaws. (5 letters)
- Manipulating people to divulge confidential information. (15 letters)
- Granting permissions to access resources. (13 letters)
- System that monitors networks for suspicious activity. (3 letters)
- Malware that encrypts files and demands payment. (11 letters)
- A network security system that blocks unauthorized access. (8 letters)
- Weakness in a system that can be exploited. (12 letters)
- Securely connects a user to a network over the internet. (3 letters)
- Exploit targeting a previously unknown vulnerability. (8 letters)
- Attack that overwhelms a system with traffic to crash it. (4 letters)
Down
- Security method requiring two types of verification. (10 letters, hyphenated)
- Scrambling data to make it unreadable without a key. (10 letters)
- Malicious software designed to harm or exploit systems. (7 letters)
- Process of verifying a user’s identity. (14 letters)
- Deceptive emails or messages to steal sensitive data. (8 letters)
15 Clues: A software update to fix security flaws. (5 letters) • Process of verifying a user’s identity. (14 letters) • Granting permissions to access resources. (13 letters) • Weakness in a system that can be exploited. (12 letters) • Malware that encrypts files and demands payment. (11 letters) • Scrambling data to make it unreadable without a key. (10 letters) • ...
Cyber safety 2016-06-07
Trend Micro Mobile Security 2024-05-06
Across
- Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i)
- Trend Micro regularly releases ____ for it's mobile security products to address new threats and vulnerabilities. (Starts with u)
- Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e)
- Users are encouraged to keep their Trend Micro Mobile Security app ____ to ensure they have the latest security features and protections.
Down
- Trend Micro regular updates help to enhance ____ capabilities (Starts with p)
- Trend Micro Mobile Security provides ____ security protection. (Starts with c)
- Trend Micro Mobile Security optimizes ____ usage to ensure minimal disruption to device performance. (Starts with r)
7 Clues: Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e) • Trend Micro regular updates help to enhance ____ capabilities (Starts with p) • Trend Micro Mobile Security provides ____ security protection. (Starts with c) • Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i) • ...
Digital Citizenship 2020-08-30
Across
- Keep it private
- Tell where you got your information
- When you post online, it's always there.
- Ownership of one's work has this
- To decide if a website is helpful for you
- Safety
- Everything you have ever posted online
- The kind of news When the media lie to you
- information
- Your password should be this.
- Harassing others online
Down
- Can the information be believed?
- Manners online
- What you are doing right now
- Facebook and Twitter are examples
- Places where you get information
- One who harasses someone online.
- To claim or steal someone else's work
- selling things online
- App
- A tendency to see things only your way
- _______your time online. Spend time with family
22 Clues: App • Safety • information • Manners online • Keep it private • selling things online • Harassing others online • What you are doing right now • Your password should be this. • Can the information be believed? • Places where you get information • Ownership of one's work has this • One who harasses someone online. • Facebook and Twitter are examples • Tell where you got your information • ...
Quarter Life crisis 2020-09-16
Across
- location Ilyssa became famous at (YikYak)
- the best location to enter a car
- Sorry I’m late for chapter I was at _____
- Rachel’s favorite bad boi
- best footwear
- best broadway musical
- World’s newest artist
- best drink at Fats
- Carly drove here to find unrequited love
- law school student
Down
- Carly’s favorite food
- person who doesn’t eat vegetables
- 2 golden friends
- who Ilyssa cyber bullied
- movie without a sequel
- Ilyssas Historic Daddy
- Carlys first legal drinks
- the moon landing
- where Rachel turned 21
- Frat that Ilyssa was a member of
- the Ryans’ favorite teacher
- worlds sexiest black and yellow
- rachel has shared alarming videos of this being eaten
- Carlys relationship status
24 Clues: best footwear • 2 golden friends • the moon landing • best drink at Fats • law school student • Carly’s favorite food • best broadway musical • World’s newest artist • movie without a sequel • Ilyssas Historic Daddy • where Rachel turned 21 • who Ilyssa cyber bullied • Rachel’s favorite bad boi • Carlys first legal drinks • Carlys relationship status • the Ryans’ favorite teacher • ...
We Hope You Remember Us From Grade 9 Period 4 Math! 2023-04-28
Across
- Often absent but not forgotten
- Crusty zip up
- Freaky four
- Lost a desk mate for two weeks
- Provides a necklace every day
- Always smiling
- Headphones on, math done!
- Cool sunglasses
- APGA Hockey
- Voice can be heard from far away
- Name is often mispronounced
- When I say hello, it's mistaken for me being on my phone
- Wears crocs everyday
- Fun and fashionable
- Often absent but not forgotten
Down
- Missed two weeks
- Often absent but not forgotten
- Loves cafeteria chocolate chip cookies
- Used to always wear a toque
- Basketball
- Apples
- Doodling and art
- Excelled with slope
- Knew y=mx+b before it was taught
- Does things above their level
- Second best friend
- Cyber Artist
- Always laughing
- Strong but silent
29 Clues: Apples • Basketball • Freaky four • APGA Hockey • Cyber Artist • Crusty zip up • Always smiling • Cool sunglasses • Always laughing • Missed two weeks • Doodling and art • Strong but silent • Second best friend • Excelled with slope • Fun and fashionable • Wears crocs everyday • Headphones on, math done! • Used to always wear a toque • Name is often mispronounced • Provides a necklace every day • ...
Artificial Intelligence 2024-12-09
Across
- AI is becoming more and more significant in a number of industries, including food, as demonstrated by the robotic tea maker developed by Hi Arya and LeewayHertz.
- AI is being used to assist automate labor intensive tasks in the legal sector, which saves time and enhances customer service.
- selecting the appropriate ai model for a project is essential
- provided by AI technologies, but using AI also brings up moral dilemmas as, for better or worse,
- Robotics integration into the workflow has been pioneered by the manufacturing sector.
- automation tools have the potential to increase the quantity and variety of jobs completed when combined with ai technology.
- AI is becoming more and more significant in a number of industries, including food, as demonstrated by the robotic tea maker developed by Hi Arya and LeewayHertz.
- (AI) technologies are employed in transportation to forecast aircraft delays, regulate traffic, and enhance the safety and efficiency of maritime transportation.
- The idea of the technological singularity
- customer service is being improved by the integration of machine learning.
Down
- Artificial intelligence (AI) is a useful tool in cyber security for anomaly identification, behavioral threat analytics, and false positive resolution.
- AI tools such as IBM Watson mimic human medical tasks, while NuMedii's AI-driven AIDD platform looks for medication interactions across diseases.
- sifting through papers during discovery phase of the legal case may be quite taxubg for people.
- By analyzing data from blogs, social media, and online platforms to detect trends and influencers, artificial intelligence (AI) has completely transformed the fashion business.
- AI may also be used to identify fraudulent activity and support strategic decision-making, which improves user engagement and experience
- AI-powered personalization allows marketing campaigns and product suggestions to be customized to each person's taste.
- It is advised to conduct further research on the effects of AI on adaptive tests, individualized learning, and creative teaching environments.
- Precise, timely, and consistent data is the cornerstone of artificial intelligence systems.
- AI is used by banking institutions to enhance loan decision-making, establish credit limits, and find investment possibilities.
- production of robots are the main emphasis of this branch of engineering.
20 Clues: The idea of the technological singularity • selecting the appropriate ai model for a project is essential • production of robots are the main emphasis of this branch of engineering. • customer service is being improved by the integration of machine learning. • Robotics integration into the workflow has been pioneered by the manufacturing sector. • ...
Year 8 ICT 2016-07-15
Across
- formatting your web page.
- an animation programme.
- somewhere that stores related information.
- language for creating websites.
- hyper link.
- one piece of information in a record.
- a question you might ask a database.
Down
- to bully online by sending or posting mean,hurtful, or intimidating messages usually anonymous.
- a character from Scratch.
- defines the top of a document or section in HTML.
10 Clues: hyper link. • an animation programme. • formatting your web page. • a character from Scratch. • language for creating websites. • a question you might ask a database. • one piece of information in a record. • somewhere that stores related information. • defines the top of a document or section in HTML. • ...
Zeniths Cross Word 2024-10-30
Across
- The F in two F A
- Don't connect to this if its public
- Don't click any links or ______
- Another form of an update
- When someone tries to trick you into giving personal data
Down
- Three random words make this password _____
- a good place to save passwords
- Don't share everything on _____ media
- Always have this turned on
- Report all cyber crime to ______ Fraud
10 Clues: The F in two F A • Another form of an update • Always have this turned on • a good place to save passwords • Don't click any links or ______ • Don't connect to this if its public • Don't share everything on _____ media • Report all cyber crime to ______ Fraud • Three random words make this password _____ • When someone tries to trick you into giving personal data
Bullying 2022-06-06
Across
- intentional repeated feels proud
- pointing out differences
- use of any electronic means to hurt someone
- secrecy of internet encourages those who might not otherwise bull
- name calling jokes offensive remarks
Down
- sending pictures messages information using electronic devices
- identity of the person who bullies can be kept secret.
- accidental occasional feels remorse
- a single significant act or a pattern of acts by one or more students
- excluding others from a group
- any physical contact that hurts a person
- using threats
12 Clues: using threats • pointing out differences • excluding others from a group • intentional repeated feels proud • accidental occasional feels remorse • name calling jokes offensive remarks • any physical contact that hurts a person • use of any electronic means to hurt someone • identity of the person who bullies can be kept secret. • ...
Facebook bullying 2014-11-17
Across
- Et engelsk ord for internet/virtuel
- Ydmygelse hedder på engelsk
- The month she posted the video
- Amanda's last name
- This person found her in a ditch
- Amandas age when she died
- The bullying began when Amanda was in this grade/class
- Amanda came from this country
Down
- At slå hedder på engelsk
- The name of the month when she was found
- At undersøge hedder på engelsk (i politi sammenhæng)
- At omringe nogen hedder på engelsk
- Grøft hedder på engelsk
- Mave hedder på engelsk
14 Clues: Amanda's last name • Mave hedder på engelsk • Grøft hedder på engelsk • At slå hedder på engelsk • Amandas age when she died • Ydmygelse hedder på engelsk • Amanda came from this country • The month she posted the video • This person found her in a ditch • At omringe nogen hedder på engelsk • Et engelsk ord for internet/virtuel • The name of the month when she was found • ...
The Many Sounds of Y 2023-03-06
Across
- any person at all
- provides access to water if a fire breaks out
- a dog less than a year old
- to make an effort
- the same as I or me
- a sweet food made from sugar
- something that stands for something else
Down
- how things change and move
- taking place on the internet
- a state of being close to being asleep
- fidgety and restless
- a traditional ancient story that is fictional
- a large number of persons or things
- wavy, curly, or spiraled shape
14 Clues: any person at all • to make an effort • the same as I or me • fidgety and restless • how things change and move • a dog less than a year old • taking place on the internet • a sweet food made from sugar • wavy, curly, or spiraled shape • a large number of persons or things • a state of being close to being asleep • something that stands for something else • ...
Departments of the US government 2021-01-05
Across
- promotes job creation and economic growth by ensuing fair and reciprocal trade
- regulating food products and new pharmaceutical drugs, implementing healthcare programs and preventing the spread of disease
- responsible for providing military forces needed to deter war and protect the security of our country
- Responsible for providing vital services to Americas veterans including healthcare, and other benefits programs
- oversees farming, ranching and forestry as well as regulates food quality and safety and nutritional labeling
- in charge of country
- Responsible for managing federal finance, collection of taxes, duties and monies paid to and due to the U.S and paying of all bills
Down
- 2nd to the president
- Governments lead agency for planning and support of the nations land, air and sea-based travel systems
- responsible for national policy programs that address America's housing needs and enforce fair housing laws
- responsible for counterterrorism, cybersecurity, aviation security, border security etc.
- uses sound science to manage and sustain Americas lands, water, wildlife, and energy resources and honors ur nations responsibilities to tribal nations
- enforce the law and defend the interest of the United States according to the law
- establishes administrator policy, coordinates most federal educational assistance, collects data on U.S schools and enforce educational laws
- department responsible for advancing the energy, environmental, and nuclear security of the United States
- promotes the welfare of the job seekers, wage-earners and retirees of the United States
16 Clues: 2nd to the president • in charge of country • promotes job creation and economic growth by ensuing fair and reciprocal trade • enforce the law and defend the interest of the United States according to the law • promotes the welfare of the job seekers, wage-earners and retirees of the United States • ...
Kaya-bullying 2022-03-04
Across
- online bullying
- making sure bullying doesn't happen
- Josh pushed Jim down the stairs what type of bullying is this?
- Natalie watches someone get bullied. what is Natalie
- making fun of your friend's hat
Down
- aggressive pressure or intimidation
- name calling
- bragging that you won and your friend lost
- someone seeking to harm to another person
- lying and spreading rumors
10 Clues: name calling • online bullying • lying and spreading rumors • making fun of your friend's hat • aggressive pressure or intimidation • making sure bullying doesn't happen • someone seeking to harm to another person • bragging that you won and your friend lost • Natalie watches someone get bullied. what is Natalie • ...
TTS Pencegahan Kekerasan di Sekolah 2023-10-18
Across
- Dampak kekerasan pada korban
- Tidak bisa melupakan kejadian di masa lalu
- Contoh kekerasan fisik
- Faktor penyebab kekerasan
- Jenis kekerasan yang terjadi di dunia maya
- Hal penting yang harus didapatkan oleh korban kekerasan
Down
- Perilaku yang merupakan bentuk kekerasan emosional
- Salah satu tindakan positif ketika menyaksikan kekerasan
- Bentuk kekerasan yang menyebabkan gesekan antar kelompok
- Salah satu bentuk kekerasan karena faktor pubertas
10 Clues: Contoh kekerasan fisik • Faktor penyebab kekerasan • Dampak kekerasan pada korban • Tidak bisa melupakan kejadian di masa lalu • Jenis kekerasan yang terjadi di dunia maya • Salah satu bentuk kekerasan karena faktor pubertas • Perilaku yang merupakan bentuk kekerasan emosional • Hal penting yang harus didapatkan oleh korban kekerasan • ...
Keamanan Berinternet 2025-02-10
Across
- koneksi tanpa kabel disebut jaringan
- singkatan dari wireless fidelity
- koneksi nirkabel dipancarkan melalui gelombang
- Pengguna komputer
- orang yg memiliki kemampuan untuk membobol sistem keamanan jaringan komputer
Down
- istilah lain dari kata sandi
- prosedur untuk menyambungkan dua buah perangkat yang memiliki bluetooth
- kejahatan dunia maya
- peralatan media komunikasi yang berguna untuk menghubungkan sebuah perangkat dengan perangkat lain
- perangkat lunak yang dapat merusak data
10 Clues: Pengguna komputer • kejahatan dunia maya • istilah lain dari kata sandi • singkatan dari wireless fidelity • koneksi tanpa kabel disebut jaringan • perangkat lunak yang dapat merusak data • koneksi nirkabel dipancarkan melalui gelombang • prosedur untuk menyambungkan dua buah perangkat yang memiliki bluetooth • ...
Executive Protection 2013-03-09
Across
- Needed to want to harm the client
- What you provide for a client
- Type of method to reduce security problems; a way to look for faults in a plan
- The difference between Bodyguards and Executive Protection
- The level of a relationship to avoid between client and protector
Down
- Needed to be able to provide proper protection (HINT: Security problems that exist)
- When E.P. observes another person who is observing the client
- Third step to take when preparing for the mission
- Important person - time period 1850
- What a potentially dangerous subject exhibits when they are nervous (HINT: what happens when you workout)
- the highest level of protection
- Outlines the security guards responsibilities and licensing
- Who qualifies to receive E.P.
13 Clues: What you provide for a client • Who qualifies to receive E.P. • the highest level of protection • Needed to want to harm the client • Important person - time period 1850 • Third step to take when preparing for the mission • The difference between Bodyguards and Executive Protection • Outlines the security guards responsibilities and licensing • ...
Bullying 2023-03-07
7 Clues: Face with emotion • another for the body • the opposite of love • talking about others • It happens on Instagram • Friendship is one of the factors • another word for words (starts with v)
Star Trek: Deep Space Nine: Characters 2025-02-20
Across
- Bajoran Freedom Fighter and Sisko's First In Command
- DS9's Doctor
- Former Teacher Of The Former DS9 School
- Ferengi Bar Owner
- Freighter Captain Currently Dating Benjamin Sisko
- Chief Of Security On Deep Space 9
- Brother Of The Bar Owner
- Ferengi In Starfleet Academy
Down
- Jake Sisko's Dad; Captain Of Deep Space Nine
- Current Trill Symbiant Host
- Son Of The Captain
- Klingon Formerly Of USS Enterprise
- High Officer On Cardassia; Garak's Nemesis
- Another Security Officer On Deep Space 9
- Cardassian Tailor
- Kira's Former Lover Who Died In A StarShip Accident
- Bajor's Spiritual Leader
- Chief Of Operations On Deep Space Nine
18 Clues: DS9's Doctor • Cardassian Tailor • Ferengi Bar Owner • Son Of The Captain • Bajor's Spiritual Leader • Brother Of The Bar Owner • Current Trill Symbiant Host • Ferengi In Starfleet Academy • Chief Of Security On Deep Space 9 • Klingon Formerly Of USS Enterprise • Chief Of Operations On Deep Space Nine • Former Teacher Of The Former DS9 School • ...
1020 bitches 2023-10-24
Across
- Spesialtilpasset reklame
- Top Level Domain
- Laget med UDP og TCP
- sårbar data
- Protocol data unit (beskjed)
- Kommunikasjon mellom lag
- Laget som kobler sammen ende-til-ende systemer
- Reglement for datalagring
- ressurs som er åpen for rett person til rett tid
- Bekrefter en identitet
- Samling av 8 bit
- Laget som sikrer pålitelig overføring mellom enheter
Down
- Sikre at en ressurs ikke endres eller slettes
- Sårbarheter i et system
- Tilgang for kun de med rettmessige behov
- Karaktersett
- First in, first out
- Lag med tjenester for applikasjoner
- Samlebånd prinsipp, ulike prosesser skjer samtidig
- Laget som består av signal representasjon av bits
- Virtual Private Network
- Sikrer konfidensialitet
- sikkerhet Sikre sårbar informasjon via IKT
- Skape tillit til en identitet
24 Clues: sårbar data • Karaktersett • Top Level Domain • Samling av 8 bit • First in, first out • Laget med UDP og TCP • Bekrefter en identitet • Sårbarheter i et system • Virtual Private Network • Sikrer konfidensialitet • Spesialtilpasset reklame • Kommunikasjon mellom lag • Reglement for datalagring • Protocol data unit (beskjed) • Skape tillit til en identitet • Lag med tjenester for applikasjoner • ...
CIS178 - Cybersecurity Crossword Puzzle 2023-07-13
Across
- bring your own device
- code that protects data
- malicious software
- transmit information without users knowledge
- penetration testers
- wont allow changes to system’s settings
- illegally exploit network vulnerabilities
- identifies device connected to internet
- high traffic creates web shutdown
- vulnerable free wireless hotspots
- practicing to identify cyber threats
- software to carry out cyberattacks
- preventan d remove malware infections
- harrassing others over online platforms
Down
- propaganda to steal personal information
- downloaded apps disguised malicious attacks
- virtual private network
- exploits vulnerabilities in software
- helps remember passwords encrypted
- unauthorized users gain access
- attacks users until pay ransom
- clicking on hidden links
- tries to steal personal data
- software preventing access to networks
- scrambling sensitive data
25 Clues: malicious software • penetration testers • bring your own device • virtual private network • code that protects data • clicking on hidden links • scrambling sensitive data • tries to steal personal data • unauthorized users gain access • attacks users until pay ransom • high traffic creates web shutdown • vulnerable free wireless hotspots • helps remember passwords encrypted • ...
SECURITY ENGINEERING-SCM 2022-02-05
Across
- physical connection between elements
- system vulnerability
- key feature in SCM
- determines the sw system scope
- possible loss or harm
- making part of system unavailable
- is accepted version of a sw configuration item
Down
- inserting false information
- Maintaining secrecy of information
- A weakness in a system
- An exploitation of a system's vulnerability
- are used to evaluate the state of the product
- increases productivity with minimal mistakes
- One of the SCM participant
- size oriented sw metric
15 Clues: key feature in SCM • system vulnerability • possible loss or harm • A weakness in a system • size oriented sw metric • One of the SCM participant • inserting false information • determines the sw system scope • making part of system unavailable • Maintaining secrecy of information • physical connection between elements • An exploitation of a system's vulnerability • ...
DCPP Security Crossword 2024-10-07
Across
- W Phonetically
- Road to the ISFSI
- Name on Exciter
- Mechanical Gate with Horizontal Arms
- Always Use This on Stairways
- What We Generate
- Mechanical Lift
Down
- Explosive Detector
- They Wear Green Pants
- An Early or An Over
- Gate Arm
- Checking to See If a Door is Secure
- Elevated Location for NSO's
- Briefing Sweet Treat
- Security Hard Hat Color
15 Clues: Gate Arm • W Phonetically • Name on Exciter • Mechanical Lift • What We Generate • Road to the ISFSI • Explosive Detector • An Early or An Over • Briefing Sweet Treat • They Wear Green Pants • Security Hard Hat Color • Elevated Location for NSO's • Always Use This on Stairways • Checking to See If a Door is Secure • Mechanical Gate with Horizontal Arms
ADM(Mat) Crossword Puzzle 2023-03-24
Across
- a _____ must be completed when there is a change in personal circumstances
- it's unauthorized access, disclosure, destruction, removal, modification, use or interruption of assets or information
- it's the combination of the frequency, probability and the consequences of a mishap
- an _____ security report is to be completed within 48 hours of incident detection
- it's an area where access is limited to authorized personnel, to authorized and properly escorted visitors, signs indicate perimeter and is monitored
Down
- you are required to ______suspicious behavior
- these security _____ identify the type and level of sensitivity of information and their use protects the information from unauthorized disclosure
- a security _____ is a condition of employment or service, relative to position and must be fulfilled before commencement of duties
- is a situation where employees stop work and gather in a room that can be locked
- this tool further provides strategic direction on the management and oversight of security within ADM(Mat) in support of adherence to the PGS, DAODs and NDSODs etc
- a security _____ is any workplace violence, act, event, or omission that could result in a compromise of DND/CAF information, assets, or services
11 Clues: you are required to ______suspicious behavior • a _____ must be completed when there is a change in personal circumstances • is a situation where employees stop work and gather in a room that can be locked • an _____ security report is to be completed within 48 hours of incident detection • ...
Unit 2 vocabolar 2025-09-30
Across
- In computer security, risk is a measure of the extent to which an entity is threatened by a potential event, such as a data breach or cyberattack. It is often calculated as a function of the likelihood of the event occurring and the potential negative impact.
- The process of implementing controls and measures to reduce the impact of a potential security threat or vulnerability. The goal is to lower risk to an acceptable level.
- The assurance that a party in a communication or transaction cannot later deny having sent or received the data. It provides proof of the origin and integrity of the data.
- A foundational model for cybersecurity that guides the development of security systems. The three pillars are Confidentiality, Integrity, and Availability.
- In the context of technology and cybersecurity, accessible means that systems, tools, and information can be used and understood by people with a wide range of abilities and disabilities.
- The guarantee that systems and data are accessible and available to authorized users when needed.
- The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals.
Down
- A network security device that not only detects malicious activity but also actively blocks or prevents it. It is often placed directly in the path of network traffic.
- The assurance that data is trustworthy, accurate, and has not been improperly altered, modified, or destroyed by an unauthorized user.
- A security tool that monitors network traffic or system activity for known malicious signatures or suspicious behavior. An IDS alerts administrators to potential threats but does not block them directly.
- A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans.
- The process of verifying the claimed identity of a user, device, or other entity before granting access to a system or network.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.
13 Clues: The guarantee that systems and data are accessible and available to authorized users when needed. • A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans. • The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals. • ...
At the airport 2018-10-16
18 Clues: Zoll • Gate • Flug • Start • Visum • Gepäck • Koffer • Abflug • Ausweis • Landung • Ankunft • Flugzeug • Schalter • Kontrolle • Passagier • Reisender • Verspätung • Sicherheit; Schutz, Wachdienst
Paul y el avión 2022-10-10
18 Clues: bed • car • sad • runs • agent • opens • plane • closes • leaves • special • airport • traffic • worried • because • looks at • security • frustrated • pass, go through
Corporate Security Crossword 2023-08-15
Across
- Many alarms come through this system via email on building issues
- Patrol vehicle for corporate security
- What does the "A" stand for in ALL
- App used to store employee badge identification
- App that is used for guests to check in
- Where we log our daily activity and incident reports
- App that Security uses to inform during emergency
Down
- Greatest boss of all time
- 99% of our job is this and 1% is better
- Homeland security partnered program with Haworth to mitigate risks during importing and exporting of goods
- Information shared from one shift to the next
- Name of the master key
12 Clues: Name of the master key • Greatest boss of all time • What does the "A" stand for in ALL • Patrol vehicle for corporate security • 99% of our job is this and 1% is better • App that is used for guests to check in • Information shared from one shift to the next • App used to store employee badge identification • App that Security uses to inform during emergency • ...
Security Exercise 06MAR23 2023-03-03
Across
- all in organization should know them
- official list of approved shredders
- Security coordinator familiarization course
- if arrested for DUI
- minimum surveillances per month
- security coordinators must be
Down
- bonafide NOFORN unsecured
- on SACB, clear for SECRET on submarine
- required before allowed to photograph
- designation of documents below CUI
- no view inside from outside
- Camera inside CIA
- must be secure when not in use
13 Clues: Camera inside CIA • if arrested for DUI • bonafide NOFORN unsecured • no view inside from outside • security coordinators must be • must be secure when not in use • minimum surveillances per month • designation of documents below CUI • official list of approved shredders • all in organization should know them • required before allowed to photograph • ...
Understanding Money 15.1 by Emily Mendola 2024-05-09
Across
- A plastic card that allows the holder to make credit purchases up to an authorized amount
- Means that money is a common measure of the worth or price of a good or service
- Allows customers to pay for purchases directly from their checking account
- Banks that are a part of the Federal Reserve
- Money received today is worth more in the future because money today can be invested or deposited in the bank to earn interest
- A security that pays interest over terms of ten to thirty years
- A transfer of money from one bank account to another(EFT)
- The process of transferring money from one individual or organization to another
- A security that matures in a year or less
- Money is used in exchange for goods and services needed by individuals, businesses, and governments
- Nation's central bank that supervises and regulates banks in the country
Down
- Action taken to manage the supply of money and interest rates in an economy
- A security that pays interest over terms ranging from two to ten years
- A type of document guaranteeing the payment of a specific amount of money, either on demand or at a set time, with the payer named on the document
- The mechanism a nation uses to provide and manage money for itself
- Means that money can be saved and used at a later date
- Type of financial investment issued by a corporation, government, or other organization
- Anything of value that is accepted in return for goods or services
18 Clues: A security that matures in a year or less • Banks that are a part of the Federal Reserve • Means that money can be saved and used at a later date • A transfer of money from one bank account to another(EFT) • A security that pays interest over terms of ten to thirty years • The mechanism a nation uses to provide and manage money for itself • ...
cybersecurity terms 2022-12-16
Across
- a computer connected to a network that has been compromised by a hacker
- a kind of software used to prevent, scan, detect and delete viruses from a computer
- software that enables a user to covert information from another computer by transmitting data from their hard drive
- software that allows an unauthorized user to access a computer
- a type of malware that self replicates and infects other computers
- a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network
- a type of malware that disguises itself as legitimate code or software\
- software that displays advertising material
- A software-based firewall installed on a desktop or laptop computer to monitor and control its incoming and outgoing network traffic
Down
- a network security device that monitors and filters incoming and outgoing network traffic
- a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages
- malicious software that blocks access to a computer until a sum of money is paid
- an undocumented way of gaining access to a computer system
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- a network of computers with malicious software
- any program that prohibits a pop-up at some point in time
- hackers who use automated techniques to scan specific network ranges and find vulnerable systems
- software updates that address security vulnerabilities
18 Clues: software that displays advertising material • a network of computers with malicious software • software updates that address security vulnerabilities • any program that prohibits a pop-up at some point in time • an undocumented way of gaining access to a computer system • software that allows an unauthorized user to access a computer • ...
amazing crossword puzzle 1 2023-09-12
vocabulary 2025-08-01
17 Clues: มาถึง • ถอดออก • การประกาศ • สายการบิน • เที่ยวบิน • ผู้โดยสาร • บัตรโดยสาร • ออกเดินทาง • ประตูทางออก • ขึ้นเครื่องบิน • พนักงานขนกระเป๋า • กระเป๋าเป้สะพายหลัง • ระบบรักษาความปลอดภัย • ชั้นโดยสารราคาถูกที่สุด • ลงทะเบียนขึ้นเครื่องบิน • ความสนุกสนาน, ความเพลิดเพลิน • สานพานรับส่งกระเป๋าในสนามบิน
Cyber safety- Charlotte Cameron 2016-05-25
Across
- could contain a virus so do not open.
- a large device that can be hacked.
- to put an picture or information on the internet.
- someone who steels someone's identity and uses it as them to gain money or benefits.
- people who login to an device and steels money , and information.
- they keep you safe online and give you a safe guide.
- people who message harmful and rude messages.
- allows parents to see what activities their children are using.
- an device many people have but can be dangerous.
- information about you that has to be kept safe.
Down
- an add that automatically comes up on your screen.
- enjoy seeing people getting mad at what they have put up.
- the first step to logging into an online game.
- to lure someone online to know what the are talking about.
- an object that is small and can be scammed and get virus's.
- something that comes up on your screen and tells you to login.
- tries to gain trust with someone and then does something mean and rude on the internet.
- a set of numbers or letters that gains access to an device.
- safe information kept in an computer to hide.
- can wipe an devices memory.
20 Clues: can wipe an devices memory. • a large device that can be hacked. • could contain a virus so do not open. • people who message harmful and rude messages. • safe information kept in an computer to hide. • the first step to logging into an online game. • information about you that has to be kept safe. • an device many people have but can be dangerous. • ...
Cyber Safety-Irene Jose 2016-05-25
Across
- program that lets you find,see and hear material
- bad thing that can ruin your device
- you can chat on with family and friends
- method of sending short messages
- small hand-controlled device for pointing and clicking
- send information from one computer to another computer
- name that a user has chosen for you
- program,or set of instructions
- website for you so you can search
- search engine visual for parents mostly
Down
- upload information to the web
- starting point on the web
- add that automatically comes onto the screen
- you can send to others
- adviser that teaches you how to use technology
- security system to keep your things safe
- secrets code that unlocks something for you
- giant collection of networks of networks
- Engine,an Internet service that helps you find information on the website
- Tag,the nickname a user has chosen to be identified when playing Internet Games
20 Clues: you can send to others • starting point on the web • upload information to the web • program,or set of instructions • method of sending short messages • website for you so you can search • bad thing that can ruin your device • name that a user has chosen for you • you can chat on with family and friends • search engine visual for parents mostly • ...
Thomas's Cyber Safety Crossword 2016-06-07
Across
- a name that is not your real name
- stops viruses
- people who bully you onLine
- online communities where people share information about themselves,music files and photos
- sharing this software enable multiple users to access the same computer
- the world wide web as accessed from mobile
- a program that protects your computer from others
- people who steal money from your computer
- a strongly word comment
- a program that attacks your computer
Down
- to upload information to the web
- a person who steals your credit card
- a method an individual uses to track,lure or harass another person online
- a popular computer program that enables users to video conference
- a program or set of instructions that runs on a computer
- The World Wide Web
- Your online identity name
- message from your computer or mobile devices
- a network that tweets online
- a method of sending text
20 Clues: stops viruses • The World Wide Web • a strongly word comment • a method of sending text • Your online identity name • people who bully you onLine • a network that tweets online • to upload information to the web • a name that is not your real name • a person who steals your credit card • a program that attacks your computer • people who steal money from your computer • ...
Cyber safety - Ella Smith 2016-05-17
Across
- someone who helps you
- people who try and get your money
- distributive emails or messages
- how you talk
- information your own details
- a type of social media
- your own or other people's email or phone number
- a mean person
- something that we use everyday
- something that can shut down your computer
Down
- how you get information
- something that can pop up on your computer
- bad people who can still your belongings
- your own place
- something that you can get spams on
- media websites that you can communicate on
- about your self
- your own space
- you face on the Internet
- people who follow you
20 Clues: how you talk • a mean person • your own place • your own space • about your self • someone who helps you • people who follow you • a type of social media • how you get information • you face on the Internet • information your own details • something that we use everyday • distributive emails or messages • people who try and get your money • something that you can get spams on • ...
CYBER AND DIGITAL LITERACY 2024-04-30
Across
- security, is a multidimensional discipline aimed at safeguarding digital assets, data, and systems from unauthorized access, attacks, disclosure, or destruction.
- YouTube is a video sharing service where users can watch, like, share, comment and upload their own videos.
- "learning facilitated by technology that gives students some element of control over time, place, path and/or pace.
- creating, sharing and discovering short videos. The app is used by young people as an outlet to express themselves through singing, dancing, comedy, and lip-syncing, and allows users to create videos and share them across a community.
- Social media are interactive technologies that facilitate the creation, sharing and aggregation of content, ideas, interests, and other forms of expression through virtual communities and networks.
- defined as the ability to effectively navigate, critically analyze, and produce information using digital technology as well as the ability to create new tools for navigating, analyzing, and producing information.
- refers to technology, ranging from computers and the internet to technological objects and programs such as cellphones, smart home systems, check-in kiosks at airports and more.
- the ability to consume and communicate information ethically online.
- a variety of skills associated with using ICT (information and communication technologies) to find, evaluate, create and communicate information.
- This element kind of goes without saying. The digital world can be a very scary place
- the ability to derive meaningful information from data.
- the tendency to generate or recognize ideas, alternatives, or possibilities that may be useful in solving problems, communicating with others, and entertaining ourselves and others.
- Instagram is a free photo and video sharing app available on iPhone and Android. People can upload photos or videos to our service and share them with their followers or with a select group of friends.
- the ability to locate and consume, create, and communicate digital content, while simultaneously employing a process of critical evaluation.
- Understanding of Data. Educational technology is often powerful because of the precise data that it can provide on each student's performance.
- Information is an abstract concept that refers to something which has the power to inform.
- Research is "creative and systematic work undertaken to increase the stock of knowledge".
- the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring both cognitive and technical skills.
- equipping people with ICT concepts, methods and skills to enable them to use and exploit ICTs.
- Digital literacy is the ability to access, manage, understand, integrate, communicate, evaluate and create information safely and appropriately through digital technologies for employment, decent jobs and entrepreneurship.
- a website which allows users, who sign-up for free profiles, to connect with friends, work colleagues or people they don't know, online.
- equipping people with ICT concepts, methods and skills to enable them to use and exploit ICTs.
- Providing curriculum support and additional information to students. Promoting better organization: Laptops help students keep track of their assignments and utilize an online school calendar.
- Being online means having a computer connected to the internet.
Down
- a secure and easy way to prove who you are online. You can create your Digital Identity, such as myGovID, using Australian identity documents like your driver's licence and your passport. Find out more information about Digital Identity on the Digital Identity website.
- to work jointly with others or together especially in an intellectual endeavor
- proficiency in using digital devices (smartphones, laptops, tablets) to access the Internet to discover, create, review, evaluate, and use information via different digital platforms.
- an interactive web-based student-response system (also available through iOS, Android, and Chrome apps) that can help teachers spark conversation and learning through polls and quizzes.
- to connect its users and allow them to share their thoughts with their followers and others through the use of hashtags.
- platform that makes it easy to create, share and play learning games or trivia quizzes in minutes.
- digital well-being, but some key components include being able to set boundaries around our use of technology, such as limiting screen time or not using devices in bed, being aware of how technology affects our emotions, and taking steps to manage any negative effects, taking breaks
- can enhance digital literacy by providing access to thousands of IT and Digital Skills Training courses to ensure the right people
- The privacy and security domain covers competences such as effectively managing information shared online and using tools
- The related concept of information literacy consists of providing people with concepts and training in order to process data and transform them into information, knowledge and decisions.
- Technology is the application of conceptual knowledge for achieving practical goals, especially in a reproducible way.
- It is a combination of both technical and cognitive abilities in using information and communication technologies to create, evaluate, and share information.
- it's about effectively navigating a world that has been transformed by technology, whether in your personal, cultural, educational, or professional life.
- This is probably the easiest element of digital literacy to teach/demonstrate in the classroom.
- providing people with concepts and training in order to process data and transform them into information, knowledge and decisions.
- Mobile literacy, then, is a macroliteracy, which requires us to be able to master all the afore-mentioned literacies.
- acts as a filter in a digital space brimming with information, opinions, and messages, helping us discern fact from fiction and valuable data from noise.
- the behaviors, practices and values that develop from the use of digital technologies.
- Being digitally literate is essential as many employers expect that you possess certain IT skills to perform your duties effectively.
- Media literacy focuses on understanding and interpreting various forms of digital media, including images, videos, and online articles.
- process that involves sending and receiving messages through the verbal and non-verbal methods.
- an individual's ability to find, evaluate, and communicate information using typing or digital media platforms.
- platform can create and analyse data, providing real time support to a learning experience. This is relevant at both personal and collective levels.
- we are constantly bombarded with information, and being able to discern reliable sources from misinformation is crucial.
- Personal computers are general purpose computing devices like desktops and laptops.
- the goal of evaluation is to make sure you use resources that are reliable, authoritative, truthful and appropriate for academic research.
- refers to a particular set of skills that help us navigate the digital space, understand the implications of our actions, and protect ourselves from cyber threats.
51 Clues: the ability to derive meaningful information from data. • Being online means having a computer connected to the internet. • the ability to consume and communicate information ethically online. • to work jointly with others or together especially in an intellectual endeavor • Personal computers are general purpose computing devices like desktops and laptops. • ...
Cyber and Digital Literacy 2024-05-13
Across
- The reciprocal actions or behaviors between individuals or entities, often involving communication, engagement, or collaboration.
- The act of showing or explaining something clearly and effectively, often to illustrate a point or concept.
- A particular way of viewing or understanding a situation, concept, or issue, often influenced by one's experiences, beliefs, or cultural background.
- the users who utilize the platform to access educational resources, engage in activities, and develop their digital literacy skills.
- A collection of related web pages, typically identified by a common domain name and accessible via the Internet.
- The ability to perform a task or fulfill a role effectively and efficiently, often based on a combination of knowledge, skills, and experience.
- The process of transferring data or files from a remote computer or server to a local computer or device, typically over a network such as the Internet.
- refers to bullying behavior that occurs through electronic communication platforms such as social media, messaging apps, or online forums.
- The act of understanding or grasping the meaning or significance of something,
- The state of being free from unwanted or unauthorized intrusion, especially in regards to personal information shared online.
- To evaluate or analyze something critically, often by examining its strengths, weaknesses, and underlying assumptions.
- can include smartphones, tablets, computers, and other electronic gadgets used for various tasks such as communication, information retrieval, and content creation.
- Able to be believed or trusted because of being reliable, accurate, or convincing.
- refer to the competencies needed to navigate, use, and evaluate digital technologies and information effectively.
- The abilities or skills that a person or thing possesses and can use or apply.
- Tools Software applications or programs used to perform specific tasks or activities in a digital environment.
- can include traditional forms such as newspapers, television, and radio, as well as digital platforms such as websites, social media, and streaming services.
- Literacy A life skill competence needed for survival in the world of computers, involving awareness of the promises and perils of computers and the internet.
- refers to digital devices, software, and systems used for various purposes, including communication, information retrieval, and content creation.
- The beliefs, customs, practices, and social behaviors of a particular group of people or society. In the context of digital literacy
- Thinking The ability to objectively analyze, evaluate, and synthesize information or arguments, especially in response to complex societal issues raised by digital technologies.
- The knowledge and ability to use a range of technology tools for varied purposes.
- The process of acquiring knowledge, skills, behaviors, or attitudes through study, experience, or teaching.
- The process of moving around or browsing through a website or other digital interface.
- it refers to the qualities and responsibilities expected of individuals as members of the digital community, including being digitally literate and adhering to ethical conduct while engaging in online activities.
Down
- understanding ethical viewpoints, staying current on new technologies, and recognizing the responsibilities associated with using digital tools and systems.
- the world being diverse with cultures, media, print and non-print texts, implying a wide range of cultural backgrounds, media platforms, and types of information.
- Pertaining to or conforming to moral principles or standards of conduct, especially in relation to digital citizenship
- They are used for a wide range of applications, including personal use, business operations, scientific research, and entertainment.
- Logical deductions or conclusions based on prior knowledge, observations, or evidence.
- Newly created products, processes, or ideas resulting from human creativity and ingenuity.
- Information, understanding, or skills acquired through experience, education, or study.
- Information, data, or facts that support or justify a conclusion, claim, or argument.
- a common form of communication used for sending text-based messages, files, and documents to individuals or groups.
- The methods, strategies, or approaches used in teaching, especially in formal education settings.
- The process of exchanging information, ideas, or messages between individuals or groups, often through verbal, written, or digital means.
- refers to the process of searching for and locating information online, while adhering to ethical conduct and procedures
- To communicate or get in touch with someone or an organization, often through email, phone, or other means.
- The quality of being easily usable or accessible, especially for individuals with disabilities.
- An environment or tool used for learning activities that take place in a digital setting, providing resources, interaction, and opportunities for skill development.
- To assess or judge the value, significance, or quality of something, especially by careful appraisal or examination.
- A clickable connection between one web page and another, allowing users to navigate between different pages or resources on the internet.
- An individual who instructs, educates, or guides others, typically in a formal setting such as a classroom.
- The state of being responsible or answerable for one's actions.
- The ability to read and write, including digital literacy skills such as using, evaluating, and creating data and images in the digital environment.
- Pertaining to or involving the use of computer technology, especially the internet and digital devices, in various aspects of life.
- Relating to or involving computers or computer networks, especially the internet.
- used to enhance content delivery and engagement, providing visual aids to help learners understand concepts or processes.
- Presenting someone else's work, ideas, or words as one's own without proper acknowledgment or citation.
- In the context of digital literacy, integration refers to the incorporation of one's critical point of view into interactive messages created or encountered online.
50 Clues: The state of being responsible or answerable for one's actions. • The act of understanding or grasping the meaning or significance of something, • The abilities or skills that a person or thing possesses and can use or apply. • Relating to or involving computers or computer networks, especially the internet. • ...
Cyber Physical Systems-2 2025-03-20
Across
- Using data to forecast and prevent equipment failures.
- Self-driving cars and intelligent transportation systems.
- A predictable system behavior under given conditions.
- The delay between input and response in a system.
- An intelligent electricity network with automated controls.
- The use of technology to control industrial processes.
- Ensuring processes operate in a coordinated manner.
- The ability to continue operation despite component failures.
Down
- Smart healthcare devices with embedded intelligence.
- The creation of mathematical representations of systems.
- The ability of a system to function under expected conditions.
- The process of improving system performance.
- The capacity of a system to handle growth efficiently.
- Urban areas that integrate technology for improved efficiency.
- Monitoring and optimizing energy consumption.
- Farming with IoT and AI for better productivity.
- The production of goods using machines and automation.
- The management of materials and goods from production to delivery.
- Duplication of critical components to increase reliability.
- The capacity of a system to recover from disruptions.
20 Clues: The process of improving system performance. • Monitoring and optimizing energy consumption. • Farming with IoT and AI for better productivity. • The delay between input and response in a system. • Ensuring processes operate in a coordinated manner. • Smart healthcare devices with embedded intelligence. • A predictable system behavior under given conditions. • ...
Cyber Physical Systems-2 2025-03-20
Across
- Using data to forecast and prevent equipment failures.
- Self-driving cars and intelligent transportation systems.
- A predictable system behavior under given conditions.
- The delay between input and response in a system.
- An intelligent electricity network with automated controls.
- The use of technology to control industrial processes.
- Ensuring processes operate in a coordinated manner.
- The ability to continue operation despite component failures.
Down
- Smart healthcare devices with embedded intelligence.
- The creation of mathematical representations of systems.
- The ability of a system to function under expected conditions.
- The process of improving system performance.
- The capacity of a system to handle growth efficiently.
- Urban areas that integrate technology for improved efficiency.
- Monitoring and optimizing energy consumption.
- Farming with IoT and AI for better productivity.
- The production of goods using machines and automation.
- The management of materials and goods from production to delivery.
- Duplication of critical components to increase reliability.
- The capacity of a system to recover from disruptions.
20 Clues: The process of improving system performance. • Monitoring and optimizing energy consumption. • Farming with IoT and AI for better productivity. • The delay between input and response in a system. • Ensuring processes operate in a coordinated manner. • Smart healthcare devices with embedded intelligence. • A predictable system behavior under given conditions. • ...
Cyber Ethics Crossword Puzzle 2025-06-14
Across
- : Blocks harmful or unauthorized access
- : Fake emails used to steal information
- : Malicious software disguised as useful
- : Secret code used to access accounts
- : Tracks your activity without permission
- : Preventing unauthorized access to data
- : A crime committed using computers
- : Good behavior and manners online
- Factor : Extra layer of login security
Down
- : Protects data by making it unreadable without a key
- : Making a copy of data for safety
- : Unwanted or junk emails
- : Using someone’s work without giving credit
- : Your trace left behind online
- : Digital version of bad behavior
- : Where most cyberbullying happens
- : Permission before collecting personal data
- : Illegally accessing someone’s computer
- : Software to detect and remove malware
- Theft : Stealing someone’s personal info online
20 Clues: : Unwanted or junk emails • : Your trace left behind online • : Digital version of bad behavior • : Making a copy of data for safety • : Where most cyberbullying happens • : Good behavior and manners online • : A crime committed using computers • : Secret code used to access accounts • Factor : Extra layer of login security • : Blocks harmful or unauthorized access • ...
Cyber Ethics Crosswords Puzzle 2025-06-05
Across
- Criminal activity involving computer
- Using others original works
- Unwanted emails from a unknown sources
- Copied and distributed illegally
- Converting encrypted data into readable form
- Appropriately using the Internet
- A type of Spamming
- Sending emails to user to get their information
- A security system
- A criminal practice on social influence
Down
- Attackers send mails to make server full
- Illegal intrusion in a computer system
- Harassing a person in a deliberate manner
- Disrupts normal functioning of a Computer
- Protecting original ideas
- Keep it secret and change periodically
- Set of procedures and moral principles
- Secretly breaks into a computer system
- Convert data into a code
- Prevent Plagiarism
20 Clues: A security system • Prevent Plagiarism • A type of Spamming • Convert data into a code • Protecting original ideas • Using others original works • Copied and distributed illegally • Appropriately using the Internet • Criminal activity involving computer • Illegal intrusion in a computer system • Keep it secret and change periodically • Unwanted emails from a unknown sources • ...
Bullying 2022-06-06
Across
- intentional repeated feels proud
- pointing out differences
- use of any electronic means to hurt someone
- secrecy of internet encourages those who might not otherwise bull
- name calling jokes offensive remarks
Down
- sending pictures messages information using electronic devices
- identity of the person who bullies can be kept secret.
- accidental occasional feels remorse
- a single significant act or a pattern of acts by one or more students
- excluding others from a group
- any physical contact that hurts a person
- using threats
12 Clues: using threats • pointing out differences • excluding others from a group • intentional repeated feels proud • accidental occasional feels remorse • name calling jokes offensive remarks • any physical contact that hurts a person • use of any electronic means to hurt someone • identity of the person who bullies can be kept secret. • ...
Bullying 2022-06-06
Across
- intentional repeated feels proud
- pointing out differences
- use of any electronic means to hurt someone
- secrecy of internet encourages those who might not otherwise bull
- name calling jokes offensive remarks
Down
- sending pictures messages information using electronic devices
- identity of the person who bullies can be kept secret.
- accidental occasional feels remorse
- a single significant act or a pattern of acts by one or more students
- excluding others from a group
- any physical contact that hurts a person
- using threats
12 Clues: using threats • pointing out differences • excluding others from a group • intentional repeated feels proud • accidental occasional feels remorse • name calling jokes offensive remarks • any physical contact that hurts a person • use of any electronic means to hurt someone • identity of the person who bullies can be kept secret. • ...
Back to school 2025-09-28
Across
- the best autumnal beverage
- the animal embedded in a conkers real name
- pythagoras’ theorem applies to right angle…
- septembers seasonal fruit
- famous for his one armed strut
- uniform colour if nobody obeys the dress code
Down
- name of sixth form cafe
- otherwise known as sodium chloride
- wrote the book from the “book review section”
- studying technique named after an italian tomato
- september 22nd is the autumn…
11 Clues: name of sixth form cafe • septembers seasonal fruit • the best autumnal beverage • september 22nd is the autumn… • famous for his one armed strut • otherwise known as sodium chloride • the animal embedded in a conkers real name • pythagoras’ theorem applies to right angle… • wrote the book from the “book review section” • uniform colour if nobody obeys the dress code • ...
Normal difficulty 2018-04-07
Across
- to give a warning
- not legal
- very big
- this animal is in danger of becoming extinct
- a person who knows everything about a subject
- to find something new
Down
- a person who buys things
- animals that live in the wild
- something related to the internet
- a product, animal or person that is difficult to find or see
- writing a letter but you don't give your name
- an animal that has very low numbers in the wild
12 Clues: very big • not legal • to give a warning • to find something new • a person who buys things • animals that live in the wild • something related to the internet • this animal is in danger of becoming extinct • writing a letter but you don't give your name • a person who knows everything about a subject • an animal that has very low numbers in the wild • ...
Security within the IoT 2017-04-26
Across
- People don't learn enough about the _______ they use to secure them properly.
- The number of connected devices, systems and sensors worldwide is expected to grow rapidly over the coming years, with Cisco Systems and Intel both predicting as many as 50 ______ or more such devices by 2020.
- 72 percent of consumers do not know how to configure a wireless router in a way to _______ a home network.
- An important step to take during product development is to identify the potential ________ of hackers.
- The Internet of things is changing our _______ of personal security.
- Security can be a significant _______ to organizations adopting IoT technologies.
- BullGuard officials noted that the industry has not yet created common security ______ for IoT devices.
Down
- Recent research from SAS Institute states that only 11 percent of consumers believe that they have total ______ over the data they provide companies.
- IoT networks bring in a diverse set of connected devices that can introduce multiple points of ___________ in the networks.
- IoT systems are groupings of network-connected devices that automatically collect and exchange _____, allowing enterprises to increase efficiency and productivity.
- Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks.
- Most manufacturers are taking their own approaches to ______, which can create update procedures that are complex and difficult to carry out.
- The conflict between the demand for connected devices and the users' _______ to secure them or the networks they're on presents challenges.
- According to BullGuard CEP Paul Lipman "consumers are clearly not equipped to handle the myriad of security ____ presented by connected devices."
- Gartner predicts that by 2020, more than 25 percent of identified _______ in enterprises will be IoT-related.
15 Clues: The Internet of things is changing our _______ of personal security. • People don't learn enough about the _______ they use to secure them properly. • Security can be a significant _______ to organizations adopting IoT technologies. • Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks. • ...
global food security cross word puzzle 2024-04-19
Across
- The first basic human necessity and everyone's fundamental right.
- Long-term or persistent. Results from poverty and lack of resources. Addressed by long-term development measures.
- Altered weather patterns and agricultural productivity
- Importance of consistent access to food. Factors affecting stability: Adverse weather, political instability, and economic factors. Periodic inadequate access can lead to nutritional deterioration.
- An adequate supply doesn't guarantee household food security. Focus on incomes, expenditures, markets, and prices. Factors: Purchasing power, income, transportation, and market infrastructures.
- the food crisis created awareness for food security and led to a formal institutional response globally. However, food availability through buffer stocks was considered enough for ensuring food security.
Down
- Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets.
- Addresses the "supply side" of food security. Determined by food production, stock levels, and net trade. Includes domestic production, import capacity, and food stocks.
- Focuses on nutrient intake and utilization by individuals. Influenced by care and feeding practices, food preparation, diet diversity, and intra-household food distribution. Determines nutritional status.
- leading international efforts to address the need that people around the world have for reliable sources of quality food.
- Foster Strategic Coordination-regional and global level to improve governance and to promote better allocation of resources.
- Crucial for agriculture, requires sustainable management
- Invest in country-owned plans, aimed at channeling resources to well- designed and results-based programs and partnerships.
- When all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life.
- evidence of increasing malnutrition among the children/females led to inclusion of nutrition also as an essential element of food security.
15 Clues: Altered weather patterns and agricultural productivity • Crucial for agriculture, requires sustainable management • The first basic human necessity and everyone's fundamental right. • Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets. • ...
2024 OSCE Scholarship for Peace and Security - Crossword puzzle 2024-11-26
Across
- the world's foremost intergovernmental forum for scientific and technical cooperation in the peaceful use of nuclear energy
- The world's largest regional security organization (Acronym)
- Synonym for firearms (Acronym)
- Agreement which prohibits the possession of nuclear weapons (Acronym)
- UN Security Council Resolution on Women, Peace and Security (Acronym)
- Agreement allowing for conduct of short-notice, unarmed, observation flights by its States Parties over the territories of other States Parties
Down
- A key OSCE arms control agreement outlining provisions n military information exchange
- Cornerstone rule guiding OSCE decision-making processes
- UN Security Council Resolution on the non-proliferation of weapons of mass destruction (Acronym)
- Together with Pu-239, it is used for the production of nuclear weapons (Abbrev.)
10 Clues: Synonym for firearms (Acronym) • Cornerstone rule guiding OSCE decision-making processes • The world's largest regional security organization (Acronym) • Agreement which prohibits the possession of nuclear weapons (Acronym) • UN Security Council Resolution on Women, Peace and Security (Acronym) • ...
We're All Cyber Superheroes! 2023-02-14
Across
- A form of malware that when executed, changes, corrupts, or destroys information in a system, then it passes on to other systems and damages those as well
- A network of computers that have been infected with a virus and now continuously work to create security breaches
- A hacking strategy that relies on user manipulation and exploiting human psychology to carry out attacks (two words)
- A form of malware that hijacks your system, encrypts your files, and denies you access until you send a payment to unlock them
- Threat detection technology designed to shield users from viruses, spyware, trojans, and worms (two words)
- A form of ethical hacking that simulates a cyberattack to look for weaknesses that malicious actors may be able to exploit (two words)
- A part of the computer system designed to block unauthorized access and keep intruders out
- A term for a wide variety of malicious software used to infect and/or damage systems
- The use of unique biological features for digital authentication and access control
- Protection from potential harm caused by others
- An acronym for a tool that gives a user privacy and anonymity online by connecting to a secure server
- Use this to access resources, software, and databases over the Internet and outside the confines of local hardware restrictions
Down
- A type of scam where a threat actor poses as a legitimate business or organization in order to trick a victim into clicking on a malicious link or attachment
- When a hacker changes the email address or Wi-Fi network name so that it appears to be a trusted source
- Someone who uses their information technology knowledge and skill to gain unauthorized access to computers, systems, and data
- Converting raw data, known as plaintext, into a code, known as ciphertext, to prevent hackers from being able to understand it if they gain access to it
- A group of applications that instruct a computer to carry out a task
- Occurs when a hacker successfully breaks into a system, takes control of a network, or exposes personal information (two words)
- A piece of audio or video that has been altered to make it seem authentic, often used maliciously to spread false information
- An acronym for an authentication tool that requires a combination of two or more credentials to verify a user’s identity for login
- A form of malware that replicates itself in order to spread to other computers
- A code that takes advantage of a software vulnerability or flaw
- A form of malware that throws up unwanted advertisements on your screen
- A form of malware used to spy on you and your computer activity
- Concerning the proper handling of sensitive data to protect its confidentiality and meet regulatory requirements
25 Clues: Protection from potential harm caused by others • A code that takes advantage of a software vulnerability or flaw • A form of malware used to spy on you and your computer activity • A group of applications that instruct a computer to carry out a task • A form of malware that throws up unwanted advertisements on your screen • ...
Cyber safety-Charlotte Cameron 2016-05-21
Across
- could contain a virus so do not open.
- they keep you safe online and give you a safe guide.
- to put a picture or information on the internet.
- up, an add that automatically comes up on your screen.
- tries to gain trust and then does something mean and rude.
- can wipe a devices memory.
- safe information kept in computer to hide.
- bulling, people who message harmful and rude messages.
- a device many people have but can be dangerous.
- theft,someone who steels someones identity and uses it as them to gain money or benefits.
- the first step to logging into a online game.
Down
- people who login to an device and steels money, and information.
- something that comes up on your screen and tells you to login.
- enjoy seeing people getting mad of what the have put up.
- information about you that has to be kept safe.
- to lure someone online to know what they are talking about.
- a set of numbers or letters that has to be kept secret.
- a large device that can be hacked.
- lock, allows parents to see what activities their children are using.
- a object that is small and can be scammed and get virus'.
20 Clues: can wipe a devices memory. • a large device that can be hacked. • could contain a virus so do not open. • safe information kept in computer to hide. • the first step to logging into a online game. • information about you that has to be kept safe. • a device many people have but can be dangerous. • to put a picture or information on the internet. • ...
Cyber safety -Madeline Ween 2016-06-07
Across
- mean people who are not nice
- copying notes from the website
- can impact on actions
- a thing that is very important on the iPad
- chatting to strangers
- a trick or a lie
- you can search about everything
- people that can take care of you on the websites
- for work and play
Down
- A bad thing that can ruin your device
- people who are the opposite of bullies
- people that get a hold of your password
- following people on or off line
- photos or videos that can be bad or good
- apps or other things
- can be inappropriate or sensible
- chatting to contacts
- some games are inappropriate for little kids
- how we conect
- sending things
20 Clues: how we conect • sending things • a trick or a lie • for work and play • apps or other things • chatting to contacts • can impact on actions • chatting to strangers • mean people who are not nice • copying notes from the website • following people on or off line • you can search about everything • can be inappropriate or sensible • A bad thing that can ruin your device • ...
Cyber safety -Tessa Griffin 2016-05-24
Across
- an app you've used to look up things
- You can get a lot of apps on it
- How we connect like Telstra
- you look at it when you are watching a movie
- an app you use to text people
- People that can track you down
- something Lawyers work on a lot
- you use them on iPads
- It starts with a L and you play on it
- Chatting to Stranges
- an app you use to watch videos
- They are everywhere
- They can cause a virus
Down
- a person that supervisors you
- another word for concentrate
- something bad you get on a computer
- I device do you use to talk to another person
- Another Word for safe
- They can cause the virus
- you use it to get apps
- You use it to get onto a iPad (some people don't have it)
- Bad people on the Internet
22 Clues: They are everywhere • you use them on iPads • you use it to get apps • Chatting to Stranges • They can cause a virus • Another Word for safe • They can cause the virus • How we connect like Telstra • Bad people on the Internet • another word for concentrate • an app you use to text people • a person that supervisors you • People that can track you down • ...
Cyber safety Sienna Finau 2016-05-25
Across
- Something that pops up on your screen
- A . .of some one
- Too make your screen smaller
- A thing adults use to post thing on
- A website the you can post stuff on it
- A texts file
- Something you must always protect
- If some one is watching you
- something you don't want on your computer
- Sending a letter on line
- A place to keep things
Down
- To see some one on a phone or iPad
- If you want to send something to some one
- So wing you keep private
- What to do is to keep something to yourself
- If some one is being mean
- Some one who is finding out your password
- On the Internet
- Someone that tricks you in to buying things that are not real
- Cordless Internet
20 Clues: A texts file • On the Internet • Cordless Internet • A . .of some one • A place to keep things • Sending a letter on line • So wing you keep private • If some one is being mean • If some one is watching you • Too make your screen smaller • Something you must always protect • To see some one on a phone or iPad • A thing adults use to post thing on • ...
Cyber safety Sienna Finau 2016-05-25
Across
- Something that pops up on your screen
- A . .of some one
- Too make your screen smaller
- A thing adults use to post thing on
- A website the you can post stuff on it
- A texts file
- Something you must always protect
- If some one is watching you
- something you don't want on your computer
- Sending a letter on line
- A place to keep things
Down
- To see some one on a phone or iPad
- If you want to send something to some one
- So wing you keep private
- What to do is to keep something to yourself
- If some one is being mean
- Some one who is finding out your password
- On the Internet
- Someone that tricks you in to buying things that are not real
- Cordless Internet
20 Clues: A texts file • On the Internet • Cordless Internet • A . .of some one • A place to keep things • Sending a letter on line • So wing you keep private • If some one is being mean • If some one is watching you • Too make your screen smaller • Something you must always protect • To see some one on a phone or iPad • A thing adults use to post thing on • ...
Cyber safety - Ella Smith 2016-05-17
Across
- someone who helps you
- people who try and get your money
- distributive emails or messages
- how you talk
- information your own details
- a type of social media
- your own or other people's email or phone number
- a mean person
- something that we use everyday
- something that can shut down your computer
Down
- how you get information
- something that can pop up on your computer
- bad people who can still your belongings
- your own place
- something that you can get spams on
- media websites that you can communicate on
- about your self
- your own space
- you face on the Internet
- people who follow you
20 Clues: how you talk • a mean person • your own place • your own space • about your self • someone who helps you • people who follow you • a type of social media • how you get information • you face on the Internet • information your own details • something that we use everyday • distributive emails or messages • people who try and get your money • something that you can get spams on • ...
Cyber and Digital Literacy 2024-04-30
Across
- is a digital space that lets educators pull lots of different rich media types into in one easy-to-access place
- any creative element, for example, text, applications, images, archived e-mail messages, data, e-services, audio and video files, and so on
- are small files of information that a web server generates and sends to a web browser
- is the practical application of knowledge especially in a particular area
- is a digital reference to data that the user can follow or be guided to by clicking or tapping
- media refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
- is a generic term used to refer to applications, scripts and programs that run on a device
- the imparting of knowledge in general
- is a free online encyclopedia, created and edited by volunteers around the world
- is used to give users quick access to all of their essential programs, applications, settings, and notifications
- is a game-based learning platform that makes it easy to create, share and play learning games or trivia quizzes in minutes
- it means having the skills to be able to read, write and speak to understand and create meaning
- is an online tool for teachers to give quizzes and on-the-fly assessments to students
- is a software program used to locate and display information on the Internet or an intranet
- to transfer the data from one computer to another
- is a group of two or more computers or other electronic devices that are interconnected for the purpose of exchanging data and sharing resources
- it means to receive data from a remote system, typically a server such as a web server, an FTP server, an email server, or other similar systems
- is a reference to a source
- is information that is set up for easy access, management and updating
- is a collection of web pages and related content that is identified by a common domain name and published on at least one web server
- an excessive quantity or fullness
- are the communication outlets or tools used to store and deliver information or data
- a prefix that means “computer” or “computer network”
Down
- to produce printed matter
- is any hardware or software used to host an application or service
- a program used for software development or system maintenance
- is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission or storage
- It is brand-specific original content curated and published by customers on any social media platform
- is a computer program or device that provides a service to another computer program and its user, also known as the client
- is an electronic device that manipulates information, or data
- refers to the computer's tangible components or delivery systems that store and run the written instructions provided by the software
- is a global collection of documents and other resources, linked by hyperlinks and URIs
- are software programs developed for end-users to accomplish specific computing tasks
- refers to both the delivery system and individual messages that are sent and received
- it is to connect its users and allow them to share their thoughts with their followers and others through the use of hashtags
- is a popular internet search engine
- is a global network of billions of computers and other electronic devices
- is being such in essence or effect though not formally recognized or admitted
- is the process of translating printed words into speech
- the activity of exploring various websites and webpages using a web browser
- is a free web browser used for accessing the internet and running web-based applications
- is a sequence or set of instructions in a programming language for a computer to execute
- connected to, served by, or available through a system and especially a computer or telecommunications system
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment
- facts and statistics collected together for reference or analysis
- refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication
- is a media platform made by Mark Zuckerberg
- relating to, or utilizing devices constructed or working by the methods or principles of electronics
- engine is a software program that helps people find the information they are looking for online using keywords or phrases
- is the technology that connects your offices, data centers, cloud applications, and cloud storage together
50 Clues: to produce printed matter • is a reference to a source • an excessive quantity or fullness • is a popular internet search engine • the imparting of knowledge in general • is a media platform made by Mark Zuckerberg • to transfer the data from one computer to another • a prefix that means “computer” or “computer network” • ...
Cyber Awareness Month Crossword 2025-10-10
Across
- Malware disguised as legitimate software
- A second layer of security for logging in
- Tricking people into revealing confidential info
- A software fix for security vulnerabilities
- A saved copy of your data in case of loss
- Good habits to stay safe online
- Malware that locks your files and demands payment
- Misleading links designed to get your attention
- Verifying your identity before granting access
- Software that detects and removes malicious programs
- A secure connection that hides your online activity
- Malicious software designed to harm or exploit systems
Down
- Software that automatically displays unwanted ads
- Protocol that encrypts data between websites and browsers
- Malware that hides deep in your system
- Scrambling data so only authorized users can read it
- Software that secretly monitors your activity
- A hidden part of the internet not indexed by search engines
- A network of infected devices controlled remotely
- Unauthorized access to data or systems
- Fake emails trying to trick you into giving personal info
- A flaw exploited before developers can fix it
- Pretending to be someone else online
- A secret word or phrase used to access accounts
- A digital barrier that blocks unauthorized access
25 Clues: Good habits to stay safe online • Pretending to be someone else online • Malware that hides deep in your system • Unauthorized access to data or systems • Malware disguised as legitimate software • A second layer of security for logging in • A saved copy of your data in case of loss • A software fix for security vulnerabilities • ...
Cyber Ethics Crossword Puzzle 2025-06-14
Across
- : Secret code used to access accounts
- : Blocks harmful or unauthorized access
- : Software to detect and remove malware
- : Fake emails used to steal information
- : Unwanted or junk emails
- : Permission before collecting personal data
- Factor : Extra layer of login security
- : A crime committed using computers
- : Your trace left behind online
Down
- : Malicious software disguised as useful
- : Making a copy of data for safety
- : Using someone’s work without giving credit
- : Protects data by making it unreadable without a key
- : Where most cyberbullying happens
- : Digital version of bad behavior
- Theft : Stealing someone’s personal info online
- : Good behavior and manners online
- : Preventing unauthorized access to data
- : Illegally accessing someone’s computer
- : Tracks your activity without permission
20 Clues: : Unwanted or junk emails • : Your trace left behind online • : Digital version of bad behavior • : Making a copy of data for safety • : Where most cyberbullying happens • : Good behavior and manners online • : A crime committed using computers • : Secret code used to access accounts • Factor : Extra layer of login security • : Blocks harmful or unauthorized access • ...
Networking concepts & Cyber ethics 2025-06-18
Across
- a small message sent over the internet.
- the unique number assigned to every device on a network.
- a group of connected computers in a small area.
- the illegal act of stealing someone’s personal data.
- keeping your data safe and private online.
- a place to store web pages.
- a physical device used to connect computers in a network.
- software that blocks harmful websites.
- acting kindly and respectfully online.
Down
- harmful links or attachments often sent via email.
- a global system of interconnected networks.
- software used to browse the web.
- rule-breaking activity on a computer.
- another word for cyber cheating or copying someone’s work.
- a strong word used to protect accounts.
- someone who uses the internet to bully others.
- unwanted software that harms your system.
- a document that explains acceptable computer use.
- the right to control how your personal information is used.
- connecting two or more computers.
20 Clues: a place to store web pages. • software used to browse the web. • connecting two or more computers. • rule-breaking activity on a computer. • software that blocks harmful websites. • acting kindly and respectfully online. • a small message sent over the internet. • a strong word used to protect accounts. • unwanted software that harms your system. • ...
Maritime Piracy 2014-12-03
19 Clues: Raub • Hafen • Fracht • Grenze • Gewalt • berauben • Festland • abnehmen • vemeiden • Bedrohung • Spannungen • Überschrift • einheimisch • Bewusstheit • Zwischenfall • Wasserfahrzeug • zur See gehörig • blinder Passagier • Sicherheitsmaßnahme
Comunidad = Community 2025-09-25
19 Clues: monja • pastor • taller • escuela • iglesia • bombero • propina • polecia • libreria • concerje • banderas • seguridad • mesero(a) • paramedico • carpintero • biblioteca • biblotecaria • cura/sacerdote • jefe de cocina
Cybersecurity Fundamental Chapter 7 Part 2 2022-10-31
Across
- dedicated site that monitor, assesses, and defends the organization's information system.
- can supplement or in some cases, replace security guards.
- hardware or software solutions that enforce network security policies. Filters unauthorize or potentially dangerous traffic from entering the network.
- uses network to make or receive phone calls.
Down
- one of the faster sectors of information technology is the use of intelligent devices and sensors.
- allows two or more locations to communicate simultaneously using telecommunication technologies.
- logs the transaction for later retrieval.
- one or more location containing the tools that provide administrators with a detail status of the organization's network.
- form the backbone of the internet and communications between different
- the outermost layer of security, and these solutions are the most publicly visible.
- can be the foundation of highly secure identification and personal verification solutions.
- allows an individual to gain access to an area with automated entry points.
- provide a way to group devices within a LAN and on individual switches. use logical connections instead of physical connections.
13 Clues: logs the transaction for later retrieval. • uses network to make or receive phone calls. • can supplement or in some cases, replace security guards. • form the backbone of the internet and communications between different • allows an individual to gain access to an area with automated entry points. • ...
9/11 2025-06-02
Across
- deep emotional response
- Type of attack carried out on 9/11
- Some were sacrificed for security
- US President
- intense national pride & unity
- saw stricter laws and regulations
Down
- gov. department added
- increased following 9/11
- Immigrants faced this
- expanded government authority to spy on citizens
- Targeted religious group
- created to strengthen national security
12 Clues: US President • gov. department added • Immigrants faced this • deep emotional response • increased following 9/11 • Targeted religious group • intense national pride & unity • Some were sacrificed for security • saw stricter laws and regulations • Type of attack carried out on 9/11 • created to strengthen national security • expanded government authority to spy on citizens
Year 8 ICT 2016-07-15
Across
- a question you might ask a database.
- somewhere that stores related information.
- an animation programme.
- hyper link.
- a character from Scratch.
Down
- defines the top of a document or section in HTML.
- to bully online by sending or posting mean,hurtful, or intimidating messages usually anonymous.
- language for creating websites.
- one piece of information in a record.
- formatting your web page.
10 Clues: hyper link. • an animation programme. • formatting your web page. • a character from Scratch. • language for creating websites. • a question you might ask a database. • one piece of information in a record. • somewhere that stores related information. • defines the top of a document or section in HTML. • ...
cybersecurity 2024-02-21
Across
- Cyber-attack
- Action that guarantee the identity of a computer
- Error checking method
- Hash function
Down
- Unpredictable number generated by an algorithm
- Systems that are connected by each others
- Technological process for telling a computer which tasks to perform in order to solve problems
- One way encryption
- Internet protocol part of the transport layer
- Reference model of system interconnection
10 Clues: Cyber-attack • Hash function • One way encryption • Error checking method • Systems that are connected by each others • Reference model of system interconnection • Internet protocol part of the transport layer • Unpredictable number generated by an algorithm • Action that guarantee the identity of a computer • ...
Online bulling 2024-06-11
Across
- Someone you can talk to at school.
- You go to the police to write a report.
- If someone sends you this don’t share it.
- Harassing someone.
- A place to report crime.
Down
- Something you can talk and text on.
- Do not share what isn’t yours.
- Only share things with people you.
- You can always get help.
- An online internet word.
10 Clues: Harassing someone. • You can always get help. • An online internet word. • A place to report crime. • Do not share what isn’t yours. • Someone you can talk to at school. • Only share things with people you. • Something you can talk and text on. • You go to the police to write a report. • If someone sends you this don’t share it.
AZKA HEYRA MAULIDHIA 2024-09-30
Across
- kerja sama antar kelompok disebut
- perangkat lunak presentasi untuk mengeksplorasi berbagai ide
- sesuatu yang dapat dilihat dengan indra penglihatan
- data yang berupa angka
- berbicara atau berkomunikasi dengan banyak orang
- bentuk penyajian data atau informasi dalam bentuk grafis
Down
- kepanjangan dari AD adalah
- fenomena mengolaborasikan teknologi cyber dan teknologi otomatis
- sistem komputer dan informasi
- aplikasi yang sering dimainkan oleh anak" adalah
10 Clues: data yang berupa angka • kepanjangan dari AD adalah • sistem komputer dan informasi • kerja sama antar kelompok disebut • berbicara atau berkomunikasi dengan banyak orang • aplikasi yang sering dimainkan oleh anak" adalah • sesuatu yang dapat dilihat dengan indra penglihatan • bentuk penyajian data atau informasi dalam bentuk grafis • ...
Sosiologi Tentang Globalisasi 2025-08-25
Across
- proses pembelajaran yang berpusat pada siswaLea
- nilai-nilai yang dianut oleh suatu masyarakat
- bahasa pemrograman yang populer
- domestik bruto indikator keberhasilan ekonomi suatu negara
- metode pembelajaran yang menggunakan teknologi
- jenis serangan cyber yang berbahaya
Down
- sistem ekonomi yang berdasarkan pada kepemilikan swasta
- bentuk kemonukasi yang tidak langsung
- perusahaan teknologi yang terkenal
- jenis teknologi yang digunakan untuk mengakses internet
10 Clues: bahasa pemrograman yang populer • perusahaan teknologi yang terkenal • jenis serangan cyber yang berbahaya • bentuk kemonukasi yang tidak langsung • nilai-nilai yang dianut oleh suatu masyarakat • metode pembelajaran yang menggunakan teknologi • proses pembelajaran yang berpusat pada siswaLea • sistem ekonomi yang berdasarkan pada kepemilikan swasta • ...
HAAS1 2024-07-19
Across
- What Centre would a customer go to for an appointment?
- What term do we use apart from 'customer' for a person applying for or receiving benefits
- What type of calls will we mostly be dealing with?
- We must ask security questions before speaking to a Customer in order to comply with Data_____?
- What is the name of the company we work for?
- A security question we ask for is the Customer's N___?
- What should you take plenty of during training?
- Which device should you have on silent during training?
- What term is used for a person who deals with a Customer's affairs if they are unable to do it for themselves?
Down
- What Centre will a customer call to reschedule an assessment appointment?
- What is a Customer applying for from DWP?
- In training what is there never, when it comes to a question?
- What number does NINO stand for?
- What does the second 'A' in HAAS stand for?
- This is a security question
- Which is the UK's biggest public service department?
- What type of contract is HAAS?
- What does the first 'A' in HAAS stand for?
- What does the 'H' stand for in HAAS?
- What 2x15 minute activity will we have each day?
20 Clues: This is a security question • What type of contract is HAAS? • What number does NINO stand for? • What does the 'H' stand for in HAAS? • What is a Customer applying for from DWP? • What does the first 'A' in HAAS stand for? • What does the second 'A' in HAAS stand for? • What is the name of the company we work for? • What should you take plenty of during training? • ...
Travelling 2024-01-28
16 Clues: fly • pas • visum • strand • kuffert • geografi • lufthavn • badedragt • sikkerhed • hovedstad • flybillet • møntenhed • solbriller • håndbagage • attraktion • stewardesse
az nfb 2024-08-14
16 Clues: Status • Respect • Arizona • Journey • Freewill • Momentum • Delegate • Identity • Ownership • Authentic • Reinforce • Resilience • Innovation • Experience • Opportunity • Porterfield
