cyber security Crossword Puzzles

Security access 2021-10-20

Security access crossword puzzle
Across
  1. some key you use to enter
  2. identity verification service
  3. specifying access rights
  4. to undergoing procedure to gain access
  5. collection of data
  6. personal data used to verify access
Down
  1. the one who seeks access
  2. determining if you are the one you pretend to be
  3. to prove data is correct
  4. record of events

10 Clues: record of eventscollection of datathe one who seeks accessspecifying access rightsto prove data is correctsome key you use to enteridentity verification servicepersonal data used to verify accessto undergoing procedure to gain accessdetermining if you are the one you pretend to be

Platform security 2021-10-23

Platform security crossword puzzle
Across
  1. , separate low-level system software running on the host machine to perform visualization.
  2. , synchronous condition that results from a particularly undesirable situation.
  3. , Linux uses this technique to define the priority of processes
  4. , a real-time operating system used in mission-critical applications
  5. , an asynchronous event that can occur at any time irrespective of what the processor is doing
  6. , processes running in the background, started by the kernel itself.
Down
  1. , a connection used to exchange data between the processes.
  2. , one method to block buffer overflow attacks
  3. , helps to prevent unauthorized access to data on lost or stolen computers by combining
  4. , the process responsible for secure logon.

10 Clues: , the process responsible for secure logon., one method to block buffer overflow attacks, a connection used to exchange data between the processes., Linux uses this technique to define the priority of processes, a real-time operating system used in mission-critical applications...

Platform security 2021-10-23

Platform security crossword puzzle
Across
  1. Separate low-level system software running on the host machine to perform visualization.
  2. Synchronous condition that results from a particularly undesirable situation.
  3. Linux uses this technique to define the priority of processes
  4. A real-time operating system used in mission-critical applications
  5. An asynchronous event that can occur at any time irrespective of what the processor is doing
  6. Processes running in the background, started by the kernel itself.
Down
  1. A connection used to exchange data between the processes.
  2. One method to block buffer overflow attacks
  3. Helps to prevent unauthorized access to data on lost or stolen computers by combining
  4. the process responsible for secure logon.

10 Clues: the process responsible for secure logon.One method to block buffer overflow attacksA connection used to exchange data between the processes.Linux uses this technique to define the priority of processesA real-time operating system used in mission-critical applicationsProcesses running in the background, started by the kernel itself....

Network Security 2021-08-06

Network Security crossword puzzle
Across
  1. A group of interconnected computer systems.
  2. A handheld communication and computing device.
  3. A device that sends messages between devices in your network.
  4. Part of a computer network, either hardware or software that protects systems from unwanted access and/or intrusion.
  5. Something you apply to your computer to fix a vulnerability.
Down
  1. An electronic device for storing and process data.
  2. A type of connection that eliminates the need for wires.
  3. The device that connects your network to the internet.
  4. A social engineering attack, used to steal user data, or personal information, often conducted by email.
  5. A process where a user gains unauthorized access to a system.

10 Clues: A group of interconnected computer systems.A handheld communication and computing device.An electronic device for storing and process data.The device that connects your network to the internet.A type of connection that eliminates the need for wires.Something you apply to your computer to fix a vulnerability....

IT-Security 2023-06-01

IT-Security crossword puzzle
Across
  1. schließen infizierte Computer zu einer Gruppe zusammen
  2. schädliche Software
  3. Datendiebstahl durch gefälschte E-Mails
  4. Programm, das Viren im Betriebssystem versteckt
  5. Malware, die sich selbstständig über Netze(Internet) verbreitet
Down
  1. Textdateien, die am Computer abgespeichert werden
  2. wählen unbemerkt Mehrwertnummern - finanzieller Schaden
  3. Datensicherung
  4. Programme, die Tastatur eingaben mitprotokoliert
  5. "Hintertür" für Dritte, eines Computer fernzusteuern, auch für kriminelle Zwecke

10 Clues: Datensicherungschädliche SoftwareDatendiebstahl durch gefälschte E-MailsProgramm, das Viren im Betriebssystem verstecktProgramme, die Tastatur eingaben mitprotokoliertTextdateien, die am Computer abgespeichert werdenschließen infizierte Computer zu einer Gruppe zusammenwählen unbemerkt Mehrwertnummern - finanzieller Schaden...

Infomation Security 2015-10-06

Infomation Security crossword puzzle
Across
  1. never click on these from spam email
  2. does damage to, steals information from, or disrupts a computer system
  3. any flaw or weakness that can be exploited
  4. never provide this to anyone via email
Down
  1. assure reliability and accuracy of information and IT resources
  2. unsolicited email
  3. common target for social engineers
  4. examples include credit card fraud, spam and identity theft
  5. use this to create a unique password
  6. type of threat to information security

10 Clues: unsolicited emailcommon target for social engineersnever click on these from spam emailuse this to create a unique passwordtype of threat to information securitynever provide this to anyone via emailany flaw or weakness that can be exploitedexamples include credit card fraud, spam and identity theft...

Internet Security 2017-05-08

Internet Security crossword puzzle
Across
  1. Where the sender and receiver both use the same key to encrypt and decrypt data.
  2. A trusted organisation that provides digital certificates and signatures
  3. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules.
  4. A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key.
Down
  1. Where a public and private key are used to encrypt and decrypt data.
  2. A technique for examining the contents of packets on a network and rejecting them if they do not form a part of a recognised communication.
  3. A code used to encrypt/decrypt data that is only known by one user and is linked to a corresponding public key.
  4. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a certification Authority.
  5. A method of ensuring that an encrypted message is from a trusted source as they have a unique, encrypted signature verified by a Certification Authority.
  6. Hardware and software for protecting against unauthorised access to a network.

10 Clues: Where a public and private key are used to encrypt and decrypt data.A trusted organisation that provides digital certificates and signaturesHardware and software for protecting against unauthorised access to a network.Where the sender and receiver both use the same key to encrypt and decrypt data....

Computer Security 2017-01-28

Computer Security crossword puzzle
Across
  1. He or she has granted all the privileges on a linux machine
  2. You can access someone's computer through it
  3. To take advantage of something
  4. A software to stop malicious software
Down
  1. A kind of computer virus
  2. A network made of infected computers
  3. It is a junk email
  4. A Tecnique to collect your personal data through a website
  5. Denial of service
  6. Computer security system against online attack

10 Clues: Denial of serviceIt is a junk emailA kind of computer virusTo take advantage of somethingA network made of infected computersA software to stop malicious softwareYou can access someone's computer through itComputer security system against online attackA Tecnique to collect your personal data through a website...

Security Awareness 2022-05-17

Security Awareness crossword puzzle
Across
  1. Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
  2. Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban
  3. Perilaku hati-hati untuk melindungi kita terhadap ancaman
  4. Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
Down
  1. Jenis Informasi yang merupakan informasi pengetahuan umum
  2. Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
  3. Prinsip Keamanan Informasi agar akurat
  4. Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
  5. Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
  6. Perangkat lunak yang diciptakan untuk merusak sistem computer

10 Clues: Prinsip Keamanan Informasi agar akuratJenis Informasi yang merupakan informasi pengetahuan umumPerilaku hati-hati untuk melindungi kita terhadap ancamanPerangkat lunak yang diciptakan untuk merusak sistem computerJenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan...

Security Review 2023-08-24

Security Review crossword puzzle
Across
  1. Blinds 3/4 open.
  2. how we CONNOT leave the branch.
  3. how long we give the opener to clear the branch.
  4. Our maintenance person
  5. managers distress answer.
Down
  1. Responsible for any physical or building related problem.
  2. what to say when robbed.
  3. our team is _____________.
  4. computer and drawers must be __________ when we step away.
  5. our safe place.

10 Clues: our safe place.Blinds 3/4 open.Our maintenance personwhat to say when robbed.managers distress answer.our team is _____________.how we CONNOT leave the branch.how long we give the opener to clear the branch.Responsible for any physical or building related problem.computer and drawers must be __________ when we step away.

Wireless Security 2024-02-15

Wireless Security crossword puzzle
Across
  1. A password containing both letters and numbers.
  2. Type of network used in coffee shops and airports.
  3. What technology enables wireless networking?
  4. A security protocol for wireless networks.
Down
  1. A method used to prevent unauthorized access to a mobile device.
  2. The amount of computing time spent on mobile devices compared to desktops.
  3. A device designed to mimic an authorized Wi-Fi device.
  4. The process of encoding information to make it unreadable without proper authorization.
  5. Fear of being without your mobile phone.
  6. Software designed to harm or infiltrate computer systems.

10 Clues: Fear of being without your mobile phone.A security protocol for wireless networks.What technology enables wireless networking?A password containing both letters and numbers.Type of network used in coffee shops and airports.A device designed to mimic an authorized Wi-Fi device.Software designed to harm or infiltrate computer systems....

Network security 2024-01-24

Network security crossword puzzle
Across
  1. Used to disrupt, damage or gain unauthorized access to a computer system
  2. The gap between regions and demographics that have access to modern technology
  3. Attempting to gain sensitive information using emails
  4. Used to supress ideas on the internet
  5. Monitoring of data being transferred over computer networks
Down
  1. Malware that can self-replicate causing them to spread more rapidly
  2. Malware that spreads by copying infected files and activates when opening infected files
  3. The process of converting information into a line of code
  4. Malware disguised as legitimate software
  5. Two or more computers that are connected together for the purpose of communication

10 Clues: Used to supress ideas on the internetMalware disguised as legitimate softwareAttempting to gain sensitive information using emailsThe process of converting information into a line of codeMonitoring of data being transferred over computer networksMalware that can self-replicate causing them to spread more rapidly...

Physical Security 2024-02-29

Physical Security crossword puzzle
Across
  1. This area is were visitor check in and receive badges
  2. This site is a professional site where you can locate information on your schedule or other changes that may affect security operations
  3. known as the disk erase or eradication room
  4. who do you call if you are going to be late or not able to make it for shift?
Down
  1. What post is responsible for patrolling the perimeter if site
  2. This area is where you would pick up your equipment, attend briefings, and where deliveries are accepted
  3. What post is the first point of contact when visitors come to site?
  4. What post is responsible to patrolling the inside of the buildings
  5. What is housed in the Data Halls?
  6. who receives all phone, radio, and chat traffic for security

10 Clues: What is housed in the Data Halls?known as the disk erase or eradication roomThis area is were visitor check in and receive badgeswho receives all phone, radio, and chat traffic for securityWhat post is responsible for patrolling the perimeter if siteWhat post is responsible to patrolling the inside of the buildings...

Security Features 2024-03-11

Security Features crossword puzzle
Across
  1. The process by which the portrait, signature and biographical data are applied to the document
  2. Ink that change its colour depending the angle of illumination and observation
  3. laser image A feature generated by laser engraving or laser perforation displaying changing information or images dependent upon the viewing angle.
  4. An unauthorized copy or complete reproduction of an officially issued authentic security document
Down
  1. A design printed on both sides of an inner page of the document which, when the page is
  2. printing process in which high printing pressure and special inks are used to create a relief image with tactile feel on the surface
  3. A clear material, which may have security features designed to be securely bonded to protect the biographical data or other page of the document.
  4. the document.
  5. by transmitted light, forms an interlocking image.
  6. number A number that uniquely identifies a document

10 Clues: the document.by transmitted light, forms an interlocking image.number A number that uniquely identifies a documentInk that change its colour depending the angle of illumination and observationA design printed on both sides of an inner page of the document which, when the page is...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. What agricultural practice helps improve soil fertility and crop yield?
  2. What crop is the primary staple food in India?
  3. Which nutrient is essential for energy?
  4. What term refers to the increase in food production due to improved farming practices?
  5. What type of farming focuses on environmental sustainability?
Down
  1. Which natural resource is critical for crop irrigation?
  2. What environmental practice helps prevent soil erosion and maintain crop yields?
  3. What program provides food for children in primary schools?
  4. What term refers to a person's inability to meet their dietary needs?
  5. Which country is the largest exporter of rice globally?

10 Clues: Which nutrient is essential for energy?What crop is the primary staple food in India?Which natural resource is critical for crop irrigation?Which country is the largest exporter of rice globally?What program provides food for children in primary schools?What type of farming focuses on environmental sustainability?...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Small green vegetables that come in a pod
  2. Red fruit often mistaken for a vegetable
  3. Red berry with seeds on the outside
  4. Red fruit that keeps the doctor away
Down
  1. Leafy green that made Popeye strong
  2. Orange vegetable that helps you see in the
  3. Round citrus fruit named after its color
  4. I am called as King of fruits
  5. Green vegetable that looks like tiny trees
  6. Yellow fruit that monkeys love to eat

10 Clues: I am called as King of fruitsLeafy green that made Popeye strongRed berry with seeds on the outsideRed fruit that keeps the doctor awayYellow fruit that monkeys love to eatRed fruit often mistaken for a vegetableRound citrus fruit named after its colorSmall green vegetables that come in a podOrange vegetable that helps you see in the...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. is a global goal aimed at ending hunger.
  2. is a global organization working to end hunger.
  3. is a type of farming that relies on natural processes.
  4. is a crop grown for its seeds, often used for oil.
  5. is the ability to access sufficient, safe, and nutritious food.
  6. is the practice of growing crops in water.
Down
  1. is a type of agriculture that focuses on sustainable practices.
  2. is a common method of preserving food.
  3. is a period of inadequate rainfall leading to crop failure.
  4. is a nutrient-rich food often used to feed livestock.

10 Clues: is a common method of preserving food.is a global goal aimed at ending hunger.is the practice of growing crops in water.is a global organization working to end hunger.is a crop grown for its seeds, often used for oil.is a nutrient-rich food often used to feed livestock.is a type of farming that relies on natural processes....

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. A drink from cows
  2. Where plants grow
  3. What we eat to live
  4. Natural water for plants
  5. Essential for growing plants
Down
  1. Food eaten at one time
  2. Planted to grow crops
  3. A common crop
  4. A staple food in many countries
  5. A place where crops are grown

10 Clues: A common cropA drink from cowsWhere plants growWhat we eat to livePlanted to grow cropsFood eaten at one timeNatural water for plantsEssential for growing plantsA place where crops are grownA staple food in many countries

Aviation security 2025-06-03

Aviation security crossword puzzle
Across
  1. which checklist do CCMs follow in case an article is found on board during flight? Follow the …..article drill
  2. CCMs can submit security reports through the …..reporting tool
  3. A passenger is found smoking in the lavatory and shows uncooperative behaviour. We hand over a….
  4. a security search shall be done when the aircraft departs from a .….airport
  5. no person is allowed to access the aircraft without displaying a proper …….
Down
  1. normal access in the flight deck is done by saying position,….,a back up cabin crew member and closed curtain
  2. A category of bomb and sabotage threat
  3. the unlawful,violent or by threat of violence seizure of an aircraft
  4. which checklist do CCMs follow in case of a red bomb threat during flight. We follow the cabin …..checklist
  5. A security search shall be done when the aircraft departs from Tirana or Jeddah?

10 Clues: A category of bomb and sabotage threatCCMs can submit security reports through the …..reporting toolthe unlawful,violent or by threat of violence seizure of an aircrafta security search shall be done when the aircraft departs from a .….airportno person is allowed to access the aircraft without displaying a proper ……....

Security Agent 2026-03-03

Security Agent crossword puzzle
Across
  1. Written record of daily events (6 letters)
  2. Unauthorized entry (11 letters)
  3. Ensuring safety policies and rules are followed (9 Letters)
  4. Process of talking down an argumentative or hostel person (11 letters)
Down
  1. Immediate action required in a fire (8 letters)
  2. Protection of assets, people, and property (6 letters)
  3. Process of checking bags or personnel (8 letters)
  4. Restricted access area entry device (10 letters)
  5. Person who monitors cameras (5 letters)
  6. Systematic walk-through of a facility (6 letters)

10 Clues: Unauthorized entry (11 letters)Person who monitors cameras (5 letters)Written record of daily events (6 letters)Immediate action required in a fire (8 letters)Restricted access area entry device (10 letters)Process of checking bags or personnel (8 letters)Systematic walk-through of a facility (6 letters)...

Sigma security 2024-11-26

Sigma security crossword puzzle
Across
  1. Kā sauc programmatūru, kas aizsargā datoru no vīrusiem?
  2. Kas jālieto, lai aizsargātu savu Wi-Fi tīklu?
  3. Kā sauc nelikumīgu datu iegūšanu, izliekoties par uzticamu personu vai organizāciju?
  4. Kas ir slepena frāze, kas aizsargā piekļuvi kontam?
  5. Kāda ir sistēma, kas informē par iespējamiem kiberuzbrukumiem vai nesankcionētu piekļuvi?
Down
  1. Kāda ir nezināmu vai aizdomīgu e-pastu pievienoto failu atvēršanas sekas?
  2. Kā sauc procesu, kas pārbauda lietotāja identitāti?
  3. Kā sauc paroļu metodi, kur tiek izmantoti gan burti, gan cipari, gan speciālie simboli?
  4. Kāda ir elektroniskā pasta veida nosaukums, kas mēģina izkrāpt datus?
  5. Kāds drošības līdzeklis tiek izmantots, lai aizsargātu lietotāja datus internetā?

10 Clues: Kas jālieto, lai aizsargātu savu Wi-Fi tīklu?Kā sauc procesu, kas pārbauda lietotāja identitāti?Kas ir slepena frāze, kas aizsargā piekļuvi kontam?Kā sauc programmatūru, kas aizsargā datoru no vīrusiem?Kāda ir elektroniskā pasta veida nosaukums, kas mēģina izkrāpt datus?Kāda ir nezināmu vai aizdomīgu e-pastu pievienoto failu atvēršanas sekas?...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. dried grapes commonly called.
  2. sweet, crunchy fruit rich in vitamins&fiber.
  3. Nadu which state ration shops are run by co-operatives in large extend.
  4. Liquid made from fruits or vegetables,packed nutrients.
  5. When did the word food security came into exist.
Down
  1. Food item which Popeye eat to get strength.
  2. How many pillars are there in food security according to WHO.
  3. dairy product used to make cheese.
  4. support price MSP stands for.
  5. How many eggs are there in a dozen.

10 Clues: support price MSP stands for.dried grapes commonly called.How many eggs are there in a dozen.dairy product used to make cheese.sweet, crunchy fruit rich in vitamins&fiber.Food item which Popeye eat to get strength.When did the word food security came into exist.Liquid made from fruits or vegetables,packed nutrients....

Food security 2024-12-18

Food security crossword puzzle
Across
  1. A soft yellow fruit that gives you lots of energy and potassium.
  2. A red fruit often used in ketchup and pizza sauce.
  3. A green leafy vegetable that helps make you strong, just like Popeye the sailor.
  4. A fruit that "keeps the doctor away" when you eat one every day.
  5. This crunchy orange vegetable helps you see in the dark.
Down
  1. A brown vegetable that can be mashed, fried, or baked.
  2. A tropical fruit with orange flesh that helps with digestion.
  3. A citrus fruit that’s full of vitamin C to keep you healthy.
  4. A tropical fruit that is juicy, sweet, and called the "king of fruits."
  5. Small green balls that come from a pod and are fun to eat!

10 Clues: A red fruit often used in ketchup and pizza sauce.A brown vegetable that can be mashed, fried, or baked.This crunchy orange vegetable helps you see in the dark.Small green balls that come from a pod and are fun to eat!A citrus fruit that’s full of vitamin C to keep you healthy.A tropical fruit with orange flesh that helps with digestion....

Food security 2024-12-18

Food security crossword puzzle
Across
  1. Monkey's love them?
  2. A sour and citrus fruit used to make lemonade.
  3. Grows in bunches on wines?
  4. The fruit's name is the same as its color?
  5. Vegetable that is good for your eye sight?
  6. Makes you cry when you chop it?
  7. A room in which you can't enter?
Down
  1. A fruit that keeps a docto away?
  2. potato, The opposite of a sweet potato?
  3. A cot on which you can't sit?

10 Clues: Monkey's love them?Grows in bunches on wines?A cot on which you can't sit?Makes you cry when you chop it?A fruit that keeps a docto away?A room in which you can't enter?potato, The opposite of a sweet potato?The fruit's name is the same as its color?Vegetable that is good for your eye sight?A sour and citrus fruit used to make lemonade.

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Cereal grain
  2. Vegetable with bitter taste
  3. It keeps doctor away
  4. Vegetable with golden seeds
  5. This vegetable can make you cry
Down
  1. kind of fruits
  2. looks like ginger when grown in plant
  3. Snack eat while watching movie
  4. Every kid morning drink
  5. Indian kid have to increase memory

10 Clues: Cereal grainkind of fruitsIt keeps doctor awayEvery kid morning drinkVegetable with bitter tasteVegetable with golden seedsSnack eat while watching movieThis vegetable can make you cryIndian kid have to increase memorylooks like ginger when grown in plant

Security Awareness 2024-10-01

Security Awareness crossword puzzle
Across
  1. Stealing sensitive information by watching someone enter details over their shoulder.
  2. A scam that involves a fraudulent phone call to steal personal information.
  3. A fraudulent activity using text messages to deceive and steal information.
  4. Security method requiring two or more verification factors.
Down
  1. An attempt to obtain sensitive information by disguising as a trustworthy entity.
  2. Crime involving the fraudulent use of another person's personal information.
  3. Act of pretending to be someone else to deceive others.
  4. Security breach where an unauthorized person follows someone into a restricted area.
  5. A secret word or phrase used to gain access to a system or service.
  6. Malicious software designed to damage or infiltrate systems.

10 Clues: Act of pretending to be someone else to deceive others.Security method requiring two or more verification factors.Malicious software designed to damage or infiltrate systems.A secret word or phrase used to gain access to a system or service.A scam that involves a fraudulent phone call to steal personal information....

DIGITAL SECURITY 2024-11-09

DIGITAL SECURITY crossword puzzle
Across
  1. A type of malware that replicates itself
  2. type of attack that attempts to overload system with traffic
  3. A secret word or phrase used to access a system
  4. A type of cybercrime involving fraudulent activities
  5. Unauthorized access to computer systems
  6. Malicious software designed to harm a computer
Down
  1. A security measure that verifies the identity of a user
  2. A technique used to gain unauthorized access to a computer system
  3. A technique used to protect sensitive information
  4. A security measure that prevents unauthorized access to a network

10 Clues: Unauthorized access to computer systemsA type of malware that replicates itselfMalicious software designed to harm a computerA secret word or phrase used to access a systemA technique used to protect sensitive informationA type of cybercrime involving fraudulent activitiesA security measure that verifies the identity of a user...

food security 2024-10-17

food security crossword puzzle
Across
  1. a substance used for making bread/Dosa rise
  2. keeping animals and growing crops for food; farming
  3. a bird’s egg, especially one from a chicken,that we eat.
  4. a lack of food over a long period of time in a large area that can cause the death of many people
  5. a small growth on a plant — a little new bud
  6. s a class of agriculture for the long-term production of milk, which is processed (either on the farm or at a dairy plant, either of which may be called a dairy) for the eventual sale of a dairy product.
Down
  1. Fish farming to obtain fish products as food.
  2. breeding, raising, and harvesting fish, shellfish, and aquatic plants
  3. the science and art of the development, sustainable production, marketing and use of high-value, intensively cultivated food and ornamental plants
  4. is an annual assessment measuring food security through affordability, availability, quality and safety

10 Clues: a substance used for making bread/Dosa risea small growth on a plant — a little new budFish farming to obtain fish products as food.keeping animals and growing crops for food; farminga bird’s egg, especially one from a chicken,that we eat.breeding, raising, and harvesting fish, shellfish, and aquatic plants...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. What term refers to the state of being free from harm or contamination in food production?
  2. What is the key staple crop often ground into flour?
  3. What is not a food safety step when preparing raw meat or poultry?
  4. Start out with ______ hands, surfaces and utensils before cooking
  5. It is recommended to wash hands with warm water and soap for ________ seconds
Down
  1. While everyone is at risk of a ______________ young children and elderly people have a higher risk.
  2. What foodborne pathogen is often linked to raw eggs?
  3. What is the severe shortage of food in a region , often due to crop failure or conflict?
  4. What is the physical sensation or condition of needing food?
  5. The refrigerator is the best place to _____ perishables

10 Clues: What foodborne pathogen is often linked to raw eggs?What is the key staple crop often ground into flour?The refrigerator is the best place to _____ perishablesWhat is the physical sensation or condition of needing food?Start out with ______ hands, surfaces and utensils before cookingWhat is not a food safety step when preparing raw meat or poultry?...

Food Security 2025-09-01

Food Security crossword puzzle
Across
  1. – the buying, selling or exchanging of goods and services between people, businesses, or countries.
  2. – goods or services sold to another country.
  3. – when fertile land becomes dry and turns into desert, often due to drought, deforestation or poor farming practices.
  4. insecurity – when people do not have reliable access to enough safe and nutritious food.
Down
  1. – the practice of farming, including growing crops and raising animals for food and other products.
  2. change – long-term shifts in weather patterns and temperatures caused mostly by human activities like burning fossil fuels.
  3. – a set of rules, plans or actions made by governments or organisations to guide decisions.
  4. – the amount of crops or food produced from a piece of land (e.g., how many tonnes of wheat a farm grows).
  5. – the top layer of the earth where plants grow, made up of minerals, organic matter, air and water.
  6. – goods or services brought into a country from overseas.

10 Clues: – goods or services sold to another country.– goods or services brought into a country from overseas.insecurity – when people do not have reliable access to enough safe and nutritious food.– a set of rules, plans or actions made by governments or organisations to guide decisions....

food security 2025-09-04

food security crossword puzzle
Across
  1. the lack of the necessary resources to meet basic needs
  2. maintaining a process or system over a long period of time
  3. movement in economic activity and financial markets
  4. the science and practice of farming
  5. a disagreement or clash between 2 or more parties.
Down
  1. when a community doesn’t have access to nutritious and clean food, but also limited and uncertain about where and when people can access this.
  2. when a community has enough food that could supply the community for a long time with no issues that could affect the amount of food provided.
  3. the long-term changes in global temperatures and other characteristics of the atmosphere
  4. the unfair difference in status, wealth, rights, or opportunities between people or groups.
  5. increase in the level of prices of the goods and services

10 Clues: the science and practice of farminga disagreement or clash between 2 or more parties.movement in economic activity and financial marketsthe lack of the necessary resources to meet basic needsincrease in the level of prices of the goods and servicesmaintaining a process or system over a long period of time...

PF Unit 3 Paystub & Taxes 2025-02-28

PF Unit 3 Paystub & Taxes crossword puzzle
Across
  1. acronym used to represent the rate of inflation
  2. a type of tax applied to taxable earnings
  3. a proposal to distribute a flat amount of benefits to individuals during retirement (3 words)
  4. term used to describe a retired person choosing to collect social security after the age of 67 (2 words)
  5. an increase in prices of goods and services
  6. a type of tax structure that requires someone with higher income to pay a higher rate of tax for a portion of income
  7. this money is removed from gross pay so that a smaller amount of income is taxable (2 words)
  8. dues paid for membership in our society, used to fund things like road maintenance, government programs, and national defense
  9. hours worked beyond 40 hours per week
  10. type of mandatory tax used to secure income for workers who qualify for retirement (2 words)
  11. term used to describe a retired person choosing to collect social security between the ages of 62 and 66 (2 words)
  12. this acronym is used on your paycheck stub to represent social security and medicare taxes
  13. the letter P in CPI stands for ___________
  14. amount on your paycheck stub that is referred to as "take-home" pay; the actual amount that you can spend (2 words)
  15. the total earnings for an employee before any deductions or withholdings (2 words)
Down
  1. program that targets families of any age with low income to cover healthcare expenses for individuals and/or their children
  2. term used to describe a retired person choosing to collect social security payments at the age of 67 (2 words)
  3. type of mandatory tax used to secure funds for individuals over 65 to cover healthcare expenses
  4. an employee earns these each time that they earn $1760 in income during 3 consecutive months within one calendar year
  5. the amount of taxable income remaining after voluntary deductions (3 words)
  6. acronym used for the trust fund designated for older Americans
  7. this acronym is used to represent the department within the federal government that oversees the collection and distribution of social security funds
  8. the president who is responsible for enacting the Social Security Act in 1935
  9. the lowest dollar amount that an employer is allowed to pay an employee (2 words)
  10. a range of income tax dollars that have different percentages used to calculate federal and state taxes (2 words)
  11. the amount of earnings that is used to calculate an employee’s federal, state and FICA taxes (2 words)
  12. acronym used for the trust fund designated for Americans with disabilities

27 Clues: hours worked beyond 40 hours per weeka type of tax applied to taxable earningsthe letter P in CPI stands for ___________an increase in prices of goods and servicesacronym used to represent the rate of inflationacronym used for the trust fund designated for older Americansacronym used for the trust fund designated for Americans with disabilities...

Vallari FRM 2024-07-16

Vallari FRM crossword puzzle
Across
  1. NTPC evaluates risks related to environmental regulations impacting thermal power generation and emissions control.
  2. Dabur India assesses risks of disruptions in sourcing herbal ingredients impacting production of Ayurvedic products.
  3. Ola faces disruptions in ride-hailing services due to app server crashes during peak travel hours.
  4. RBI monitors risks that could destabilize the entire banking sector, such as economic downturns or liquidity crises.
  5. Biocon reviews dependency on a few key drug patents affecting revenue stability in biopharmaceuticals.
  6. Insurance companies assess exposure to claims from natural disasters like cyclones or floods impacting claims processing.
  7. Adani Green Energy evaluates risks associated with government policies impacting renewable energy projects.
  8. Titan Company manages risks associated with fluctuating gold prices impacting jewelry manufacturing costs.
Down
  1. Kotak Mahindra Bank assesses the risk of default by retail borrowers in its personal loan portfolio.
  2. Mahindra & Mahindra evaluates exposure to fluctuations in commodity prices affecting profitability in agricultural machinery manufacturing.
  3. Axis Securities ensures compliance with new SEBI regulations affecting brokerage operations.
  4. BigBasket navigates consumer trust issues during data privacy concerns impacting online grocery sales.
  5. Zee Entertainment faces litigation over copyright infringement affecting broadcasting rights and viewer engagement.
  6. Sun Pharma assesses geopolitical stability before expanding pharmaceutical manufacturing operations in new global markets.
  7. SpiceJet deals with flight cancellations due to aircraft maintenance issues impacting passenger satisfaction and flight schedules.
  8. Wipro deals with currency fluctuations impacting revenue from global IT services contracts.
  9. JSW Steel manages liquidity to meet debt obligations amidst fluctuating cash flows from steel production.
  10. L&T Finance Holdings reviews the accuracy of financial models used for risk assessment and loan underwriting.
  11. Infosys strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
  12. HDFC Life Insurance manages exposure to changes in interest rates impacting investment returns on policyholder funds.

20 Clues: Wipro deals with currency fluctuations impacting revenue from global IT services contracts.Axis Securities ensures compliance with new SEBI regulations affecting brokerage operations.Ola faces disruptions in ride-hailing services due to app server crashes during peak travel hours....

CLF210 W8 Part IV Muscle Functions and Characteristics 2021-03-03

CLF210 W8 Part IV Muscle Functions and Characteristics crossword puzzle
Across
  1. can recoil and return to the original shape and length
  2. Some fibrous connective tissues ____ over (some attachment points) to ensure (security of attachment points)
  3. The system ____ their muscles in order to produce (some energy)
  4. can stretch
  5. ____ (cover) over (some attachment points) to ensure (security of attachment points)
  6. (Some fibrous connective tissues) (cover) over ___ to ensure (security of attachment points)
  7. (some fibrous connective tissues) (cover) over (some attachment points) to ensure (attachment points) ______
Down
  1. the system makes _______ to maintain (stationary position)
  2. the system makes (some changes) to maintain _____
  3. can receive and respond to a stimulus
  4. The system (move) their muscles in order to produce ____
  5. along with (some attachment points) and (some rigid structures), they allow _____
  6. Along with (some attachment points) and ____, they allow (motion)
  7. can shorten to move body

14 Clues: can stretchcan shorten to move bodycan receive and respond to a stimuluscan recoil and return to the original shape and lengthThe system (move) their muscles in order to produce ____the system makes _______ to maintain (stationary position)the system makes (some changes) to maintain _____...

Passalong 2025-10-29

Passalong crossword puzzle
Across
  1. A system used to verify Social Security benefits.
  2. Another system used to verify Social Security and SSI information.
  3. Limit A term referring to assets that must be below a certain limit for Medicaid eligibility.
  4. The term for excluding certain income from eligibility calculations.
  5. A term for money earned or received.
  6. assistance A type of assistance for individuals in adult care homes.
  7. Another name for the COLA Passalong group.
  8. Social Security Disability Insurance.
Down
  1. Cost-of-Living Adjustment.
  2. A Passalong category for individuals disabled before age 22.
  3. A Passalong category for individuals who lost SSI due to receiving widow benefits.
  4. The program designed to preserve Medicaid eligibility for certain individuals.
  5. The process of determining if someone qualifies for a program.
  6. A federal program that provides benefits to disabled individuals.

14 Clues: Cost-of-Living Adjustment.A term for money earned or received.Social Security Disability Insurance.Another name for the COLA Passalong group.A system used to verify Social Security benefits.A Passalong category for individuals disabled before age 22.The process of determining if someone qualifies for a program....

Types of measures to counter security threats. Legal bases of information technology security. 2022-05-16

Types of measures to counter security threats. Legal bases of information technology security. crossword puzzle
Across
  1. Methods based on several principles of information security management, each of which serves to solve its own problem
  2. Measures establishing responsibility for computer crimes, protection of copyright of programmers, improvement of criminal and civil legislation, as well as judicial proceedings.
  3. The principle of building an information security system, which involves focusing on preventing threats to the most valuable information
  4. Special mathematical and algorithmic means of protection of information transmitted over communication networks, stored and processed on computers using encryption methods.
Down
  1. Methods that are based on one principle of information security management
  2. Methods that are built on the basis of powerful automated intelligent tools with organizational management
  3. One of the most important methods of analyzing the state of information security
  4. The principle of building an information security system, which excludes acquaintance of third parties with the means and technology of information protection
  5. stage that analyzes the possible actions of attackers
  6. Information transmitted by telecommunication networks

10 Clues: stage that analyzes the possible actions of attackersInformation transmitted by telecommunication networksMethods that are based on one principle of information security managementOne of the most important methods of analyzing the state of information security...

Digital Safety 2024-10-09

Digital Safety crossword puzzle
Across
  1. Bullying
  2. Jessie
  3. Art
Down
  1. bad
  2. Prescott

5 Clues: badArtJessieBullyingPrescott

Spotlight 8 unit 7A p.161 2021-03-30

Spotlight 8 unit 7A p.161 crossword puzzle
Across
  1. explain
  2. happen
  3. message
  4. page
  5. envious
  6. should
  7. until
  8. whole
  9. bulletin board
  10. password
Down
  1. apologize
  2. file
  3. security
  4. happen
  5. forgive
  6. discuss
  7. remember
  8. permision
  9. poster

19 Clues: filepageuntilwholehappenhappenshouldposterexplainforgivemessageenviousdiscusssecurityrememberpasswordapologizepermisionbulletin board

Cyber safety- Ella Hill 2016-05-24

Cyber safety- Ella Hill crossword puzzle
Across
  1. up- an add that tries to get you to do or get something can be inappropriate
  2. to explore the Internet by going from one link to another
  3. games- games you play on an iPad
  4. an easier way to get an answer for something without using a dictionary
  5. a file that is sent along with an email or message
  6. blocks harmful things
  7. in computer science this is the text written and used by programmers
  8. when an add or website gets your details EVIL I KNOW
  9. a social networking website
  10. a photo sharing app which allows you to send photos and videos to your friends
  11. a program which allows you to transmit calls over Internet connection
  12. a quick way of sending a message
Down
  1. copy something from one computer system to another
  2. when someone or something gets your credit card details or something like that
  3. mean person
  4. a photo sharing social network
  5. to stop a computer reaching something on the Internet
  6. keep it to yourself
  7. people who try to get into your iPad,computer,iPod or iPhone without using a password
  8. is I formation stored on a computer or other storage device
  9. help sort out problems
  10. a web address stored in your browser
  11. a small file that is sent to a web browser by a sever and stored on the users computer
  12. a way to exchange a message over the Internet

24 Clues: mean personkeep it to yourselfblocks harmful thingshelp sort out problemsa social networking websitea photo sharing social networka quick way of sending a messagegames- games you play on an iPada web address stored in your browsera way to exchange a message over the Internetcopy something from one computer system to another...

James Cyber safety crossword 2016-05-21

James Cyber safety crossword crossword puzzle
Across
  1. a small piece of information or chocolate chip
  2. computer villainy
  3. Search engine
  4. Request details
  5. group of friends
  6. this flickers in a fire
  7. Short cut to speed access
  8. email,junk mail you didn't ask for
Down
  1. Highlight your favourites
  2. keeping private information safe
  3. an on line talk with friends
  4. Unwanted advertising
  5. secret code
  6. burning bricks to protect you
  7. secret identity
  8. my up to date news
  9. a person who gains access without permission
  10. the flu is one of these
  11. Device that moves you curser
  12. unexpected ad

20 Clues: secret codeSearch engineunexpected adRequest detailssecret identitygroup of friendscomputer villainymy up to date newsUnwanted advertisingthis flickers in a firethe flu is one of theseHighlight your favouritesShort cut to speed accessan on line talk with friendsDevice that moves you curserburning bricks to protect you...

Cyber safety Sienna Finau 2016-05-25

Cyber safety      Sienna Finau crossword puzzle
Across
  1. A place to keep things
  2. If you want to send something to some one
  3. Cordless Internet
  4. Something that pops up on your screen
  5. Someone that tricks you in to buying things that are not real
  6. A thing adults use to post thing on
  7. Something you must always protect
  8. Some one who is finding out your password
  9. If some one is watching you
  10. If some one is being mean
  11. On the Internet
Down
  1. time To see some one on a phone or iPad
  2. something you don't want on your computer
  3. What to do is to keep something to yourself
  4. So wing you keep private
  5. A texts file
  6. Too make your screen smaller
  7. A . .of some one
  8. Sending a letter on line
  9. A website the you can post stuff on it

20 Clues: A texts fileOn the InternetCordless InternetA . .of some oneA place to keep thingsSending a letter on lineSo wing you keep privateIf some one is being meanIf some one is watching youToo make your screen smallerSomething you must always protectA thing adults use to post thing onSomething that pops up on your screen...

Cyber safety-AGNES MATRIN 2016-05-26

Cyber safety-AGNES MATRIN crossword puzzle
Across
  1. damaging systems
  2. a device that is connected to the internet
  3. helps you when inappropriate things come up on a device at home
  4. information about a particular subject that is available on the internet
  5. security system
  6. the fact of being who or what a person is
  7. the repeated use of electronic communications to harass or frighten someone
  8. in a place or situation that allows you to do things without other people seeing you
  9. to enter your username or password
Down
  1. sending or posting mean messages
  2. a short article giving a description about a person
  3. a piece of information
  4. a global computer network providing a variety of information
  5. that allows you to access into a system
  6. data from one computer system
  7. an ad that comes up on a device randomly
  8. secures a system from virus
  9. to store own information
  10. the means of communication as radio and television
  11. the condition of being protected

20 Clues: security systemdamaging systemsa piece of informationto store own informationsecures a system from virusdata from one computer systemsending or posting mean messagesthe condition of being protectedto enter your username or passwordthat allows you to access into a systeman ad that comes up on a device randomly...

Cyber safety - Ella Smith 2016-05-18

Cyber safety - Ella Smith crossword puzzle
Across
  1. someone who helps you
  2. people who try and get your money
  3. distributive emails or messages
  4. how you talk
  5. information your own details
  6. a type of social media
  7. your own or other people's email or phone number
  8. a mean person
  9. something that we use everyday
  10. something that can shut down your computer
Down
  1. how you get information
  2. something that can pop up on your computer
  3. bad people who can still your belongings
  4. your own place
  5. something that you can get spams on
  6. media websites that you can communicate on
  7. about your self
  8. your own space
  9. you face on the Internet
  10. people who follow you

20 Clues: how you talka mean personyour own placeyour own spaceabout your selfsomeone who helps youpeople who follow youa type of social mediahow you get informationyou face on the Internetinformation your own detailssomething that we use everydaydistributive emails or messagespeople who try and get your moneysomething that you can get spams on...

Armstrong kids cyber monday 2021-11-29

Armstrong kids cyber monday crossword puzzle
Across
  1. this is the name of the city where your maternal grandfather's father lived as a small child before his family owned an automoblile so they traveled by horse and buggy
  2. this is a french word for the very fun way that your grandfathe would come down the upper part of Mount Hood after climbing it
  3. the number of sisters that your maternal grandfathers father had
  4. the state that your maternal grandparents were married in
  5. The one room school that your grandmother attended in Marion South Dakota had this many children in the same number of grades. what is that number
  6. 3rd book after the end of the Pentateuch
  7. this great grandfathers first name is shared with the most prominent troublemaker of the cartoon "the chipmunks"
  8. the country that your maternal gradfathers grandfather emigrated from
  9. the german city your parents were married in
  10. your maternal grandfather's father was this type of inspector when he was first married
  11. what happened to a mountain your grandfather once climbedd that is 72 miles north east of the town we were in when your mother was 123 days old
  12. this is the name that your maternal grandfather was originally going to be called (it is also his middle name)
  13. this is then name of scandanvian food often eathen when the Johnson side of the family is together
  14. this is maiden name of you ancestor who did not have to change her last name when she married.
  15. this is the first name of your maternal grandfather's paternal grandfather's father's Father-in-law (It is only one one letter differnt from your your maternal grandfather's Father's name)
  16. how many brothers and sisters did your maternal grandfathers mother have
  17. the animal that your maternal grandfathers father raised when he was first married
  18. what is the name of the town that Aunt Karen lives closest to
  19. this is what Sarah's last name would be if she had lived in Scandanaviain the 1700's
  20. the occupation that your maternal grand fathers maternal grandfather had when he lived in Marion South Dakota
  21. what is the name of the glacier that your mother lived near when she was in high schoo.
  22. in what city was your mother born
  23. what is the name of the relationship of the living relative that you have met in the previous two generations did not finish high school
Down
  1. the maiden name of your Uncle's wife on your mothers' side
  2. this is the name of the country where your maternal grandmother's fathers long past relative was a wagon maker for Catherine the Great
  3. the distance of the school from your grandmother was one mile away. The reason for this distance was that roads followed ______ section lines that occured every mile in each direction
  4. A coupling link with a safety closure used on the zipline - it is derived from the german word that means "carbine hook"
  5. 4th book of the new testament
  6. the number of brothers that your maternal grandmothers father had
  7. this is the first word of the dessert created by you maternal grandfathers mother
  8. this is a scandanavian dish that is prepared by soaking dried fish in lye, then skinning, boning and boiling it to a gelatinous consistency
  9. this is the name shared by your grandmothers and an aunt
  10. I was once called a planet, but I lost that title several decades ago
  11. This great great grandfather's middle name was the same as the first name of the very famous first pair of american explorers to reach the west coast of North America.
  12. what weather event threatened to keep you grandmother from the hospital when she thought she was in labor a week before your mother was born
  13. the french city that your aunt Karen was visiting when a stranger (young man) approached her and kissed her hand and up her arm.
  14. this is the 4th word of the chorus of a song that grandma hated as a child cause she was teased with it in grade school. It is also the nickname associated with her first name.
  15. the name of the denomination of your maternal grandfathers paternal grandfather belonged to that had its start in wittenburg germany when a monk whose name is shared by the denomination nailed 95 thesis to the church door
  16. This prominent creek in the area was named because an early survey party had a skirmish with the local indians along it's bank
  17. the country that your maternal Grandmother emigrated from

40 Clues: 4th book of the new testamentin what city was your mother born3rd book after the end of the Pentateuchthe german city your parents were married inthis is the name shared by your grandmothers and an auntthe state that your maternal grandparents were married inthe country that your maternal Grandmother emigrated from...

Cyber Words Crossword Puzzle 2022-11-17

Cyber Words Crossword Puzzle crossword puzzle
Across
  1. blocker A separate program or a feature incorporated within a browser that stops popup advertisements from appearing.
  2. Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
  3. Malware that prevents a user's device from properly operating until a fee is paid.
  4. Software of hardware device that captures and stores each key stroke that a user types on a keyboard.
  5. Software that spies on users by gathering information without consent.
  6. A logical computer network of zombies under the control of an attacker.
  7. pack Software that is a cumulative package of all patches and feature updates.
  8. Software that helps prevent computers from becoming infected by different types of spyware.
  9. An infected computer that is under the remote control of an attacker.
  10. horse An executable program that is advertised as performing one activity but which actually performs a malicious activity.
  11. bomb Computer code that lies dormant until it is triggered by a specific logical event.
Down
  1. virus Malicious computer code that reproduces itself on the same computer.
  2. update Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability.
  3. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
  4. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
  5. firewall Software that runs as a program on the local computer to block or filter traffic coming into and out of the computer.
  6. A malicious program designed to enter a computer via network to take advantage of a vulnerability in an application or an operating system.
  7. Hardware of software designed to limit the spread of malware.
  8. A set of software tools used by an attacker to hide the presence of other types of malicious software.
  9. A publicly released software security update intended to repair a vulnerability.

20 Clues: Hardware of software designed to limit the spread of malware.An infected computer that is under the remote control of an attacker.Software that spies on users by gathering information without consent.A logical computer network of zombies under the control of an attacker.virus Malicious computer code that reproduces itself on the same computer....

Cyber and Digital Literacy 2024-04-30

Cyber and Digital Literacy crossword puzzle
Across
  1. an electronic device that manipulates information or data
  2. knowledge obtained from investigation, study, or instruction.
  3. use learning technologies in a variety of different contexts.
  4. is to digital media.
  5. a reference (an address) to a resource on the internet.
  6. to connect with friends, work, colleagues or people they don't know online.
  7. exchange information and ideas in virtual communities and networks.
  8. is a wireless, portable personal computer with a touchscreen interface
  9. an online tool for teachers to give quizzes and on the fly assessments to students.
  10. individual is he/she who possesses a range of digital skills.
  11. the use of technology to harass, threaten, embarrass, or target another person.
  12. is a tool that delivers and presents questions to students.
  13. the communication outlets or tools used to store and deliver information or data.
  14. refers to a collection of webpages you can view using internet and a browser.
  15. a free sharing tool perfect for clipping, curating, and sharing content.
  16. is a small portable personal computer.
  17. a vast network that connects computers all over the world.
  18. TED's youth and education initiative.
  19. is the sending and receiving of information.
  20. also known as “Facebook for school.”
Down
  1. embedding media content in images and videos.
  2. is complex and multifaceted.
  3. a free video sharing website that makes it easy to watch online videos.
  4. to develop an understanding of online security, identity and data management in our own literacy practices
  5. is a type of digital literacy and it refers both to the individuals capacity of synthesis and critical thinking.
  6. the ability to read, interpret, and understand information presented in pictorial or graphic images.
  7. is a free, cloud-based 3D CAD Software package for students.
  8. is a handheld electronic device that provides a connection to a cellular network and the internet.
  9. provider of a presentation design tool for the creative community.
  10. also known as digital literacy.
  11. is an easy to use learning portfolio application.
  12. is a powerful community based social tool for learning.
  13. handy management and messaging tool helps recognize. reward students.
  14. the capacity to use computer technology successfully while also understanding the consequences of those actions.
  15. enable students to produce short animated narrated explainer videos.
  16. engaging and interactive game.
  17. you can literally learn anything.
  18. presentations are nothing like your traditional presentations.
  19. the use of scientific knowledge for practical purposes or applications, whether in industry or in our everyday lives.
  20. increasing access to high quality educational materials for K-12 students all over the world.
  21. entails taking responsibility for ones role in cyberspace.
  22. is a digital tool for designing visual stories.
  23. is a sneaky or dishonest plan that's meant to con someone.
  24. a free photo and video sharing app.
  25. possesses critical thinking skills in understanding all sociatal issues raised by digital technologies.
  26. qualities that a person is expected to have as a responsible member of digital community.
  27. to connect people and allow people to share their thoughts with a big audience.
  28. only teach programming concepts.
  29. create and share videos with your class, with parents, and beyond.
  30. encompassesa wide range of criminal activities that are carried out using digital devices and/or networks.

50 Clues: is to digital media.is complex and multifaceted.engaging and interactive game.also known as digital literacy.only teach programming concepts.you can literally learn anything.a free photo and video sharing app.also known as “Facebook for school.”TED's youth and education initiative.is a small portable personal computer....

Cyber and Digital Literacy 2024-04-30

Cyber and Digital Literacy crossword puzzle
Across
  1. handy management and messaging tool helps recognize. reward students.
  2. to connect with friends, work, colleagues or people they don't know online.
  3. engaging and interactive game.
  4. individual is he/she who possesses a range of digital skills.
  5. create and share videos with your class, with parents, and beyond.
  6. is a handheld electronic device that provides a connection to a cellular network and the internet.
  7. is the sending and receiving of information.
  8. is to digital media.
  9. is a sneaky or dishonest plan that's meant to con someone.
  10. the communication outlets or tools used to store and deliver information or data.
  11. is a wireless, portable personal computer with a touchscreen interface.
  12. refers to a collection of webpages you can view using internet and a browser.
  13. provider of a presentation design tool for the creative community.
  14. is a powerful community based social tool for learning.
  15. a complex and multifaceted.
  16. presentations are nothing like your traditional presentations.
  17. enables students to produce short, animated narrated explainer videos.
  18. to connect people and allow people to share their thoughts with a big audience.
  19. the capacity to use computer technology successfully while also understanding the consequences of those actions.
  20. a free video sharing website that makes it easy to watch online videos.
  21. increasing access to high quality educational materials for K-12 students all over the world.
  22. to develop an understanding of online security, identity and data management in our own literacy practices
Down
  1. is a type of digital literacy and it refers both to the individuals capacity of synthesis and critical thinking.
  2. an online tool for teachers to give quizzes and on the fly assessments to students.
  3. a free photo and video sharing app.
  4. the use of scientific knowledge for practical purposes or applications, whether in industry or in our everyday lives.
  5. encompasses a wide range of criminal activities that are carried out using digital devices and/or networks.
  6. a vast network that connects computers all over the world.
  7. only teach programming concepts.
  8. embedding media content in images and videos.
  9. is a tool that delivers and presents questions to students.
  10. a free sharing tool perfect for clipping, curating, and sharing content.
  11. qualities that a person is expected to have as a responsible member of digital community.
  12. is an easy to use learning portfolio application.
  13. you can literally learn anything.
  14. is a small portable personal computer.
  15. the use of technology to harass, threaten, embarrass, or target another person.
  16. also known as digital literacy.
  17. the ability to read, interpret, and understand information presented in pictorial or graphic images.
  18. an electronic device that manipulates information or data.
  19. exchange information and ideas in virtual communities and networks.
  20. a reference (an address) to a resource on the internet.
  21. knowledge obtained from investigation, study, or instruction.
  22. also known as “Facebook for school.”
  23. is a digital tool for designing visual stories.
  24. TED's youth and education initiative.
  25. is a free, cloud-based 3D CAD Software package for students.
  26. use learning technologies in a variety of different contexts.
  27. possesses critical thinking skills in understanding all societal issues raised by digital technologies.

49 Clues: is to digital media.a complex and multifaceted.engaging and interactive game.also known as digital literacy.only teach programming concepts.you can literally learn anything.a free photo and video sharing app.also known as “Facebook for school.”TED's youth and education initiative.is a small portable personal computer....

Networking & Cyber Ethics Crossword 2025-06-13

Networking & Cyber Ethics Crossword crossword puzzle
Across
  1. A unit of data transmitted over a network
  2. Network that covers a small geographic area
  3. Unique number assigned to each device on a network
  4. A computer that provides data or services to others
  5. Rules of polite and responsible behavior online
  6. A secure, private network over a public network
  7. Wireless local area network technology
  8. A device or software that accesses services from a server
  9. Unauthorized access to a system or data
  10. Device that forwards data packets between networks
Down
  1. A secret word or phrase for authentication
  2. Common wired network technology
  3. Fraudulent attempt to obtain sensitive information
  4. Process of converting data into unreadable code
  5. Security system that controls incoming and outgoing traffic
  6. Online harassment or abuse
  7. Software used to detect and remove malicious programs
  8. Network that covers a large geographic area
  9. Malicious software designed to harm devices or data
  10. Company that provides internet services

20 Clues: Online harassment or abuseCommon wired network technologyWireless local area network technologyCompany that provides internet servicesUnauthorized access to a system or dataA unit of data transmitted over a networkA secret word or phrase for authenticationNetwork that covers a small geographic areaNetwork that covers a large geographic area...

Bullying 2021-09-16

Bullying crossword puzzle
Across
  1. a kind act
  2. a person identified as being easy to tease
  3. adult Someone to go and tell when being bully person hurting others continuously
  4. to bother or upset someone repeatedly
  5. the websites you can talk to
  6. impacts on feeling and thoughts
  7. abilities
Down
  1. words directly to the person
  2. to embarrass someone to make them feel sad
  3. This type of bullying happens online.
  4. a word or term used to put someone down
  5. who can be bullied
  6. person who witnesses an act or an event
  7. When the bully hits the victim
  8. happens
  9. sadness, gloom, dejection
  10. a fight, battle or struggle, controversy

17 Clues: happensabilitiesa kind actwho can be bulliedsadness, gloom, dejectionwords directly to the personthe websites you can talk toWhen the bully hits the victimimpacts on feeling and thoughtsThis type of bullying happens online.to bother or upset someone repeatedlya word or term used to put someone downperson who witnesses an act or an event...

PDHPE CROSSWORD 2016-08-23

PDHPE CROSSWORD crossword puzzle
Across
  1. BULLING ONLINE BULLING
  2. BULLING HITTING AND KICING
  3. 1-5 PEOPLE WILL GET IT
  4. DISK THROWING
Down
  1. YOU HAVE HIGH SUGER LEVLES
  2. BULLING SPREDDING ROMERS ABOUT SOMEONE
  3. BULLING NAME CALLING
  4. KIKKING THE BALL TO YOUR TEAM MATES TRYING TO GET A GOAL

8 Clues: DISK THROWINGBULLING NAME CALLING1-5 PEOPLE WILL GET ITYOU HAVE HIGH SUGER LEVLESBULLING ONLINE BULLINGBULLING HITTING AND KICINGBULLING SPREDDING ROMERS ABOUT SOMEONEKIKKING THE BALL TO YOUR TEAM MATES TRYING TO GET A GOAL

Jobs of the Future by 2030 2025-04-16

Jobs of the Future by 2030 crossword puzzle
Across
  1. : Defends against cyber threats
  2. : Builds self-driving vehicle systems
  3. : Designs and builds intelligent machines
  4. : Studies climate change and global warming
  5. : Helps businesses go green
Down
  1. : Provides medical care remotely
  2. : Interprets big data to find patterns
  3. : Uses AI to diagnose and treat patients

8 Clues: : Helps businesses go green: Defends against cyber threats: Provides medical care remotely: Builds self-driving vehicle systems: Interprets big data to find patterns: Uses AI to diagnose and treat patients: Designs and builds intelligent machines: Studies climate change and global warming

the Bison 2025-02-06

the Bison crossword puzzle
Across
  1. of information
  2. work history, date of birth, social security number, criminal record,
  3. Espionage
  4. which may arise from employment-related physicals, drug tests and
  5. of an employee’s performance on the job such as performance reports,
  6. information
  7. set of rules or promises which limits access or places restrictions on certain
  8. involves individuals hired to steal trade secrets, new products or
  9. actions, supervisory notations
Down
  1. Data
  2. in the Workplace
  3. about an employee prior to employment such as a résumé,
  4. of espionage conducted for commercial purposes rather than security;
  5. insurance information
  6. or Sensitive Data
  7. Data
  8. employee, customer and client information private
  9. religion, etc.

18 Clues: DataDataEspionageinformationof informationreligion, etc.in the Workplaceor Sensitive Datainsurance informationactions, supervisory notationsemployee, customer and client information privateabout an employee prior to employment such as a résumé,which may arise from employment-related physicals, drug tests and...

Appetizer Crossword 2023-01-03

Appetizer Crossword crossword puzzle
Across
  1. ___ and Demand
  2. a party that takes on risk in return for payment, and they are used by private companies to go public
  3. _____ public offering is when a company first offers their stock to investors
  4. Financial ____ is where buyers and sellers conduct business
  5. If Supply goes down for a product, what will go down in return
  6. ______ markets are securities with a maturity of less then one year
  7. A ___ security is a name for a loan issued by a business or government
  8. Treasury _____ are a security with a maturity less then one year
Down
  1. This person is the name of an owners of a corporation
  2. A different name for a stock
  3. ___ liability is when a person can only lose what they contribute
  4. _____ markets are securities with a maturity of greater then one year
  5. A ____ has only two owners
  6. ______ return is the money that you make of an investment
  7. This type of Proprietorship has a ____ Owner

15 Clues: ___ and DemandA ____ has only two ownersA different name for a stockThis type of Proprietorship has a ____ OwnerThis person is the name of an owners of a corporation______ return is the money that you make of an investmentFinancial ____ is where buyers and sellers conduct businessIf Supply goes down for a product, what will go down in return...

2021 Compliance Month Crossword Puzzle 2021-10-12

2021 Compliance Month Crossword Puzzle crossword puzzle
Across
  1. Entities, Customers’ status under HIPAA
  2. The federal agency/department that enforces the HIPAA regulations.
  3. Information that is subject to a policy of destruction and/or retention.
  4. The federal regulation that governs the use and disclosure of health information.
  5. The Protenus ethics reporting mechanism for employees and customers.
  6. The security measures required in all Protenus systems; must not be shared with others for security purposes.
  7. The process of encoding data through the use of keys and codes.
  8. Necessary, Amount of PHI that Protenus must use for the task at hand.
Down
  1. A requirement of the Security Rule to protect electronic PHI (ePHI).
  2. An impermissible use or disclosure of PHI
  3. The punishment for employees who violate Protenus policies.
  4. Bribery, The Protenus policy that prohibits offering of gifts or money to potential customers.
  5. Associate, Protenus status under HIPAA
  6. The attempt to gain sensitive information through an email that is fake or malicious.
  7. Reavey, The Protenus CISO

15 Clues: Reavey, The Protenus CISOAssociate, Protenus status under HIPAAEntities, Customers’ status under HIPAAAn impermissible use or disclosure of PHIThe punishment for employees who violate Protenus policies.The process of encoding data through the use of keys and codes.The federal agency/department that enforces the HIPAA regulations....

Cybersecurity fun 2022-04-28

Cybersecurity fun crossword puzzle
Across
  1. legal constraints that govern how data can be used or stored. Permission is often required from individual as to these elements
  2. possibility of undesired outcome occurring
  3. information classification
  4. Electronic or digital method to control how devices operate or control how they can or can not be used
  5. any security incident where sensitive, protected, or confidential data is accessed or stolen by an unauthorized party
  6. the original form of a message
  7. protect before an event happens
Down
  1. all the information on a website
  2. a conventional type of encryption
  3. the process of adding our signature to the document to show integrity
  4. someone who is responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
  5. a process of encoding a message so that its meaning is not obvious
  6. the a in CIA triad
  7. ways to protect vulnerabilities
  8. copies of data

15 Clues: copies of datathe a in CIA triadinformation classificationthe original form of a messageways to protect vulnerabilitiesprotect before an event happensall the information on a websitea conventional type of encryptionpossibility of undesired outcome occurringa process of encoding a message so that its meaning is not obvious...

Operating System-Unit 5 2019-07-03

Operating System-Unit 5 crossword puzzle
Across
  1. Holds the only copy of the data
  2. Region of fast memory that holds copies of data
  3. Any malicious program which is used to hack into a computer
  4. Which register is read by the host to get input
  5. Set of wires and a rigidly defined protocol that specifies set of messages
  6. Mechanism of providing security to the information from unauthorized persons
  7. It is a process in which information is converted into a form which cannot be understood by unauthorized user
  8. ____keeps state information about the use of I/O components
Down
  1. Collection of access rights
  2. Hardware mechanism that allows a device to notify the CPU
  3. Major security problem for os is
  4. Mechanism that will provide a protection to system
  5. Self replicating and are designed to infect other programs
  6. Collection of electronic that can operate a port, a bus or a device
  7. Someone who seeks and exploits weakness in a system or network

15 Clues: Collection of access rightsHolds the only copy of the dataMajor security problem for os isRegion of fast memory that holds copies of dataWhich register is read by the host to get inputMechanism that will provide a protection to systemHardware mechanism that allows a device to notify the CPUSelf replicating and are designed to infect other programs...

Confidentiality 2025-02-06

Confidentiality crossword puzzle
Across
  1. about an employee prior to employment such as a résumé,
  2. or Sensitive Data
  3. involves individuals hired to steal trade secrets, new products or
  4. of information
  5. Data
  6. of rules or promises which limits access or places restrictions on certain
  7. Data
  8. information
  9. work history, date of birth, social security number, criminal record,
Down
  1. which may arise from employment-related physicals, drug tests and
  2. Espionage
  3. in the Workplace
  4. actions, supervisory notations
  5. etc.
  6. of espionage conducted for commercial purposes rather than security;
  7. of an employee’s performance on the job such as performance reports,
  8. employee, customer and client information private
  9. insurance information

18 Clues: etc.DataDataEspionageinformationof informationin the Workplaceor Sensitive Datainsurance informationactions, supervisory notationsemployee, customer and client information privateabout an employee prior to employment such as a résumé,which may arise from employment-related physicals, drug tests and...

Confidentiality in the Workplace 2025-02-07

Confidentiality in the Workplace crossword puzzle
Across
  1. insurance information
  2. or Sensitive Data
  3. which may arise from employment-related physicals, drug tests and
  4. in the Workplace
  5. of espionage conducted for commercial purposes rather than security;
  6. Espionage
  7. Data
  8. religion, etc.
  9. employee, customer and client information private
  10. actions, supervisory notations
Down
  1. Data
  2. work history, date of birth, social security number, criminal record,
  3. involves individuals hired to steal trade secrets, new products or
  4. information
  5. about an employee prior to employment such as a résumé,
  6. of information
  7. of rules or promises which limits access or places restrictions on certain
  8. of an employee’s performance on the job such as performance reports,

18 Clues: DataDataEspionageinformationof informationreligion, etc.in the Workplaceor Sensitive Datainsurance informationactions, supervisory notationsemployee, customer and client information privateabout an employee prior to employment such as a résumé,which may arise from employment-related physicals, drug tests and...

Bullying 2020-11-30

Bullying crossword puzzle
Across
  1. someone is being hurt on purpose
  2. everyone is having fun
  3. name calling, threatning
  4. punching,kicking,spitting
  5. what is the D in the ABCDS of bullying?
  6. writing mean things on the internet
  7. spreading rumors, excluding
  8. what is the C in the ABCDS of bullying?
Down
  1. what is the A in the ABCDS of bullying?
  2. what is the B in the ABCDS of bullying?
  3. someone who stands by and watches bullying happen
  4. no one is having fun , there is a sollution
  5. attacked, unequal balance of power
  6. stands up to a bully

14 Clues: stands up to a bullyeveryone is having funname calling, threatningpunching,kicking,spittingspreading rumors, excludingsomeone is being hurt on purposeattacked, unequal balance of powerwriting mean things on the internetwhat is the A in the ABCDS of bullying?what is the B in the ABCDS of bullying?what is the D in the ABCDS of bullying?...

Profiles 1 text 1 Veeti 2014-12-03

Profiles 1 text 1 Veeti crossword puzzle
Across
  1. kulttuuuri
  2. maisema
  3. hereillä
  4. suunta
  5. vastakkainen
  6. turvallisuus
  7. matkustaa
  8. kutsua,soittaa
Down
  1. jono
  2. juosta
  3. viivastyminen
  4. kokemus
  5. lentokone
  6. luvata
  7. slus
  8. tuhlata
  9. rukous
  10. paikallinen

18 Clues: jonoslusjuostasuuntaluvatarukouskokemusmaisematuhlatahereillälentokonematkustaakulttuuuripaikallinenvastakkainenturvallisuusviivastyminenkutsua,soittaa

Customer Care BFCM 23 2023-11-20

Customer Care BFCM 23 crossword puzzle
Across
  1. One of our best sellers, Sarrah ____ Quartz Rug.
  2. This really ties the room together.
  3. Moroccan Zig Zag, Stormy Grey rug
  4. Played Barbie in recent film, Margot ______.
  5. Black Friday ____ Monday
  6. Ruggable Founder Jeneva ____.
  7. Pink bird featured on an Iris Apfel rug.
  8. City of our Ruggable UK plant
  9. Magazine we recently collaborated with Architectural ______.
  10. Day before Black Friday.
Down
  1. Ruggable EU country famous for clogs.
  2. Jean-Michel Basquiat grew up in this NY borough.
  3. Discount code name.
  4. Stinky ____ features on our 'Hey Howdy Hey Doormat'
  5. Formerly known as PMP.
  6. Measures 32”x22".
  7. Anakin Skywalker, Qui-Gon Jinn & Yaddle; for example.
  8. Animal that features in the Keith Haring collection.

18 Clues: Measures 32”x22".Discount code name.Formerly known as PMP.Black Friday ____ MondayDay before Black Friday.Ruggable Founder Jeneva ____.City of our Ruggable UK plantMoroccan Zig Zag, Stormy Grey rugThis really ties the room together.Ruggable EU country famous for clogs.Pink bird featured on an Iris Apfel rug....

viruses 2017-04-27

viruses crossword puzzle
Across
  1. computer
  2. danger
Down
  1. safe
  2. search bar
  3. bad

5 Clues: badsafedangercomputersearch bar

Crossword - Voltedge 2019-09-05

Crossword - Voltedge crossword puzzle
Across
  1. TCT supports export control for which country?
  2. Security model used by most of the ERP applications
  3. One of the focus areas of EHS
  4. Re-tag in TCT can be done by?
  5. 50th percentile
  6. Portal to view security emergency contact and other security info
Down
  1. Tool replacing Oracle HR
  2. Python library for machine learning
  3. What is the SOX Compliant application under EHS
  4. Company wide EHS system of record

10 Clues: 50th percentileTool replacing Oracle HROne of the focus areas of EHSRe-tag in TCT can be done by?Company wide EHS system of recordPython library for machine learningTCT supports export control for which country?What is the SOX Compliant application under EHSSecurity model used by most of the ERP applications...

Nishant FRM 2024-07-15

Nishant FRM crossword puzzle
Across
  1. Tata Power evaluates regulatory changes impacting renewable energy projects and carbon emissions.
  2. Maruti Suzuki assesses risks of disruptions in the supply of auto components impacting production schedules.
  3. Flipkart faces disruptions in e-commerce operations due to technical failures during peak shopping seasons.
  4. RBI monitors risks that could destabilize the entire banking sector, such as liquidity crises or economic recessions.
  5. Reliance Industries assesses overdependence on revenue from petrochemicals in its diversified business portfolio.
  6. Insurance companies assess exposure to claims from natural disasters like cyclones or floods.
  7. ONGC evaluates government policies impacting oil exploration projects in sensitive ecological zones.
  8. ITC manages risks associated with volatile prices of agricultural commodities used in its food and tobacco products.
Down
  1. State Bank of India assesses the creditworthiness of borrowers in its corporate lending portfolio.
  2. Infosys monitors exposure to fluctuations in global IT spending impacting service revenue.
  3. HDFC Bank ensures adherence to new banking regulations impacting loan approval processes.
  4. Amul manages public perception during food safety controversies affecting dairy product sales.
  5. Hindustan Unilever faces litigation over product safety regulations impacting consumer trust in its FMCG products.
  6. Mahindra & Mahindra assesses political stability and economic conditions before expanding manufacturing operations abroad.
  7. IndiGo Airlines deals with flight delays due to technical faults affecting passenger satisfaction.
  8. Tata Consultancy Services deals with currency fluctuations affecting revenue from international IT services contracts.
  9. Tata Motors evaluates the ability to raise short-term funds to meet operational expenses during economic downturns.
  10. Axis Bank reviews the accuracy of financial models used for risk assessment and capital allocation.
  11. Wipro strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
  12. ICICI Prudential Life Insurance manages exposure to fluctuations in interest rates affecting investment returns.

20 Clues: HDFC Bank ensures adherence to new banking regulations impacting loan approval processes.Infosys monitors exposure to fluctuations in global IT spending impacting service revenue.Insurance companies assess exposure to claims from natural disasters like cyclones or floods....

Cyberbullying 2021-04-30

Cyberbullying crossword puzzle
Across
  1. pretending to be someone you are not using a fake or stolen online identity is called ____________.
  2. sharing someones personal or private information in an effort to humiliate or embarrass them is a form of _____________.
  3. the term ‘digital _______’ is a common term used for the information you upload to the Internet.
  4. you can tell an ________ you trust if you are being cyber bullied.
  5. it is important to ________ carefully before you upload photos or personal information to the internet as you don't know who might be reading it.
  6. the most downloaded social media application of 2020 with 1 billion users monthly.
Down
  1. Digital _________ is a collection of information regarding an individual, organisation, or group of electronic users.
  2. it's not just ________ who can be cyber bullied, it can happen to adults too.
  3. An assortment of websites and applications that have been developed to build and maintain online communities, this is for the purpose of sharing information and networking is called ________ media.

9 Clues: you can tell an ________ you trust if you are being cyber bullied.it's not just ________ who can be cyber bullied, it can happen to adults too.the most downloaded social media application of 2020 with 1 billion users monthly.the term ‘digital _______’ is a common term used for the information you upload to the Internet....

AI in fighting fraud 2022-03-14

AI in fighting fraud crossword puzzle
Across
  1. wicked, evil, horrible
  2. information resulting from the systematic analysis of data or statistics
  3. a fraud, a dishonest trick
  4. crime of stealing
  5. cyber attack that steals one's personal data
Down
  1. the one who commits fraud
  2. prevent (someone) from accomplishing something
  3. a form or a model

8 Clues: a form or a modelcrime of stealingwicked, evil, horriblethe one who commits frauda fraud, a dishonest trickcyber attack that steals one's personal dataprevent (someone) from accomplishing somethinginformation resulting from the systematic analysis of data or statistics

CyberBullying 2013-11-26

CyberBullying crossword puzzle
Across
  1. abuse Messing with someone threw words
  2. threats Threating someone threw an electronic device
  3. Moving one picture from one site to another
  4. Someone that is getting bullied
  5. Someone don’t talk to another person
  6. False injury
Down
  1. Keep doing things over and over
  2. Something that is made up or fake
  3. Messages that you don’t need
  4. A post posted on someone’s post
  5. A thing that someone puts up for other people to see
  6. On the internet
  7. Things that people shouldn’t see
  8. bullying Making threats using an electronic device
  9. Making fun of someone

15 Clues: False injuryOn the internetMaking fun of someoneMessages that you don’t needKeep doing things over and overA post posted on someone’s postSomeone that is getting bulliedThings that people shouldn’t seeSomething that is made up or fakeSomeone don’t talk to another personabuse Messing with someone threw words...

KM Week 10 2021-10-11

KM Week 10 crossword puzzle
Across
  1. Smart Nation through Digital _________
  2. An intellectual property
  3. ________ citizen through e-participation
  4. Increase in digital usage has brought about the need to protect data, infrastructure and networks from growing cyber threats.
  5. in the eco-system of Digital Economy.
  6. A KMS
  7. A communication tool
Down
  1. The Government, _____ and Society are closely
  2. an advantage to move towards digital economy
  3. One of the KM processes
  4. structural resource
  5. An impact/ area of concern for digital society
  6. We need an update of this to move to a digital future
  7. Infrastructural resources
  8. He conceived the concept of KM

15 Clues: A KMSstructural resourceA communication toolOne of the KM processesAn intellectual propertyInfrastructural resourcesHe conceived the concept of KMin the eco-system of Digital Economy.Smart Nation through Digital _________________ citizen through e-participationan advantage to move towards digital economyThe Government, _____ and Society are closely...

STEMtoSpace 2022-10-14

STEMtoSpace crossword puzzle
Across
  1. a device for working with information
  2. everything in the universe beyond the top of the Earth's atmosphere
  3. The National Aeronautics and Space Administration
  4. the path of an object around a particular point in space
  5. knowledge and skills
  6. the practical application of principles or processes
  7. builder
Down
  1. the atmosphere and outer space
  2. coder
  3. military branch that conducts operations in space
  4. online realm
  5. a small object that orbits, or revolves around, a larger object in space
  6. Global Positioning System
  7. a space vehicle
  8. a means of improving our knowledge and understanding of the universe

15 Clues: coderbuilderonline realma space vehicleknowledge and skillsGlobal Positioning Systemthe atmosphere and outer spacea device for working with informationmilitary branch that conducts operations in spaceThe National Aeronautics and Space Administrationthe practical application of principles or processes...

Mata pelajaran (subject) 2022-11-24

Mata pelajaran (subject) crossword puzzle
Across
  1. teacher
  2. classroom
  3. difficult
  4. art
  5. social study
  6. twice
  7. religion
  8. finish
  9. recess
  10. strict
Down
  1. a week
  2. easy
  3. start
  4. lesson
  5. student
  6. study/learn
  7. olahraga
  8. science
  9. hall
  10. security guard

20 Clues: arteasyhallstarttwicea weeklessonfinishrecessstrictteacherstudentscienceolahragareligionclassroomdifficultstudy/learnsocial studysecurity guard

Spanish 2 Travel Vocabulary - Liliana Kirby 2022-10-13

Spanish 2 Travel Vocabulary - Liliana Kirby crossword puzzle
Across
  1. passport
  2. claim
  3. departure
  4. luggage
  5. station
  6. arrival
  7. board
  8. agency
  9. security
Down
  1. airport
  2. stand in line (2 words)
  3. suitcase
  4. passenger
  5. customs
  6. gate
  7. to travel
  8. vacation
  9. itinerary
  10. ticket
  11. screen

20 Clues: gateclaimboardticketagencyscreenairportcustomsluggagestationarrivalsuitcasepassportvacationsecuritypassengerdepartureto travelitinerarystand in line (2 words)

Tech & science 2020-12-18

Tech & science crossword puzzle
Across
  1. dane
  2. wynalazca
  3. bezpieczeństwo
  4. badać
  5. wyłączać
  6. szczepionka
  7. opracowywać
  8. ustawienia
  9. przemysł lotniczy
Down
  1. kamerka internetowa
  2. astronauta
  3. koło
  4. małpa
  5. lepki
  6. twardy
  7. przycisk
  8. wszechświat
  9. rozwój
  10. para wodna
  11. błąd
  12. wtyczka

21 Clues: danekołobłądmałpalepkibadaćtwardyrozwójwtyczkaprzyciskwyłączaćwynalazcaastronautapara wodnaustawieniawszechświatszczepionkaopracowywaćbezpieczeństwoprzemysł lotniczykamerka internetowa

Speltoets 1 2023-04-11

Speltoets 1 crossword puzzle
Across
  1. airport
  2. luggage
  3. aeroplane
  4. international
  5. runway
  6. arrival
  7. security
  8. seat
  9. window
  10. departure
Down
  1. passenger
  2. postcard
  3. flight ticket
  4. air hostess
  5. first class
  6. domestic
  7. passport
  8. pilot
  9. take off
  10. check - in

20 Clues: seatpilotrunwaywindowairportluggagearrivalpostcarddomesticpassporttake offsecuritypassengeraeroplanedeparturecheck - inair hostessfirst classflight ticketinternational

Spanish Vocab 2023-04-26

Spanish Vocab crossword puzzle
Across
  1. fish
  2. bomb
  3. trick
  4. snorkle
  5. avocado
  6. energy
  7. train
  8. to walk
  9. to fly
  10. cloud
  11. suitcase
Down
  1. security
  2. boat
  3. gum
  4. airport
  5. plane
  6. turtle
  7. door
  8. the sun
  9. photo/image

20 Clues: gumboatfishbombdoortrickplanetraincloudenergyturtleto flyairportsnorkleavocadoto walkthe sunsecuritysuitcasephoto/image

Theme Words CH5 2023-06-12

Theme Words CH5 crossword puzzle
Across
  1. handel
  2. zelfstandig
  3. productie
  4. bouw
  5. beveiliging
  6. gedisciplineerd
  7. sociaal
  8. ijverig
  9. flexibel
  10. enthousiast
Down
  1. professioneel
  2. praktisch
  3. stipt
  4. gezondheidszorg
  5. georganiseerd
  6. horeca
  7. gemotiveerd
  8. betrouwbaar
  9. fooi
  10. efficiënt
  11. ervaren

21 Clues: bouwfooistipthandelhorecasociaalijverigervarenflexibelpraktischproductieefficiëntzelfstandigbeveiliginggemotiveerdbetrouwbaarenthousiastprofessioneelgeorganiseerdgezondheidszorggedisciplineerd

2° D Letícia da Silva Santos, Izabelli Vitória Carvalho e Letícia Briguente 2023-10-19

2° D Letícia da Silva Santos, Izabelli Vitória Carvalho e Letícia Briguente crossword puzzle
Across
  1. Apresentando
  2. Recrutamento
  3. Educação
  4. Segurança
  5. Dois
  6. Diferente
  7. Família
  8. Crianças
  9. Revolucionando
  10. Academia
  11. Tiro
Down
  1. Chuveiro
  2. Organizado
  3. Exaustivo
  4. honesto
  5. Completamente
  6. unida
  7. Inteligência
  8. Expansão
  9. Universidade
  10. Atraído
  11. Técnico

22 Clues: DoisTirounidahonestoAtraídoFamíliaTécnicoChuveiroEducaçãoExpansãoCriançasAcademiaExaustivoSegurançaDiferenteOrganizadoApresentandoRecrutamentoInteligênciaUniversidadeCompletamenteRevolucionando

Unidad 3 Vocabulario 2024-01-30

Unidad 3 Vocabulario crossword puzzle
Across
  1. necessity
  2. bed
  3. desire
  4. to want
  5. empathy
  6. to need
  7. to live
  8. creatively
  9. oxygen
Down
  1. jacket
  2. shoes
  3. new
  4. success
  5. to help
  6. stability
  7. community
  8. security
  9. clothing
  10. shelter
  11. water

20 Clues: newbedshoeswaterjacketdesireoxygensuccessto helpto wantempathyto needto livesheltersecurityclothingnecessitystabilitycommunitycreatively

IT Academy Crossword Puzzle 2020-10-21

IT Academy Crossword Puzzle crossword puzzle
Across
  1. Machine Learning made beautifully simple for everyone
  2. Microsoft's wearable device to support enhanced communication
  3. Security, Scale, Agility and _______________
  4. Total number of Keynote sessions
  5. Magna's digital signage
  6. General Security Update presenter
  7. IT Academy tag line second word
  8. Magazine with Most Admired Companies List for 2020
Down
  1. Nadelöhr
  2. MGIT operating model
  3. Acronym for the Magna IT training and information platform
  4. 2nd scavenger hunt winner
  5. IT Academy social networking community
  6. Weather Update forecast
  7. Platform for sharing videos

15 Clues: NadelöhrMGIT operating modelWeather Update forecastMagna's digital signage2nd scavenger hunt winnerPlatform for sharing videosIT Academy tag line second wordTotal number of Keynote sessionsGeneral Security Update presenterIT Academy social networking communitySecurity, Scale, Agility and _______________...

Tony vs. Zoe Ultimate Battle of the Brains 2024-03-14

Tony vs. Zoe Ultimate Battle of the Brains crossword puzzle
Across
  1. boneless french toast
  2. tony and zoe's relationship
  3. the best way to calm zoe
  4. how to start a sonnet
  5. ideal physique for any human
  6. makes sound while asleep
  7. adjective, commonly used for reality TV
  8. term of endearment, commonly used with "gump"
Down
  1. canadian supermarket chain with even less security
  2. boutique supermarket chain with minimal security
  3. historic botanical garden on Vancouver Island
  4. dramatic woman
  5. 80's leather brand known for its jewelry
  6. boring beach town near LA
  7. edm genre, or place of residence

15 Clues: dramatic womanboneless french toasthow to start a sonnetthe best way to calm zoemakes sound while asleepboring beach town near LAtony and zoe's relationshipideal physique for any humanedm genre, or place of residenceadjective, commonly used for reality TV80's leather brand known for its jewelryhistoric botanical garden on Vancouver Island...

Florian Pukownik 2022-04-29

Florian Pukownik crossword puzzle
Across
  1. officer person who catches thieves
  2. person who works with the flowers
  3. person who make music
  4. person who edits for television
  5. who plays with electricity
  6. a person who works at the shop
Down
  1. person who repairs pipes
  2. guard a person who provides security
  3. the person who maintains order
  4. a person who knows laws
  5. person who is calm
  6. person who heal damaged pets
  7. person who take care of the child
  8. person who makes the food
  9. person who doesn't want to do anything

15 Clues: person who is calmperson who make musica person who knows lawsperson who repairs pipesperson who makes the foodwho plays with electricityperson who heal damaged petsthe person who maintains ordera person who works at the shopperson who edits for televisionperson who works with the flowersperson who take care of the child...

Isirani cybersecurity crossword 2026-04-01

Isirani cybersecurity crossword crossword puzzle
Across
  1. Coding data to keep it safe
  2. Person who breaks into systems
  3. Software that secretly collects information
  4. Secret word used to log in
  5. Malware that spreads through networks
  6. Harmful computer software
  7. Process of proving identity
  8. Malware that spreads through files
Down
  1. Malware that locks files for money
  2. Stolen private information from a system
  3. Fake messages used to steal information
  4. Extra security code after login
  5. Connected computers sharing data
  6. Software that removes malware
  7. Security system that blocks threats

15 Clues: Harmful computer softwareSecret word used to log inCoding data to keep it safeProcess of proving identitySoftware that removes malwarePerson who breaks into systemsExtra security code after loginConnected computers sharing dataMalware that locks files for moneyMalware that spreads through filesSecurity system that blocks threats...

AI ja kübermaailm 2026-01-26

AI ja kübermaailm crossword puzzle
Across
  1. - Küber inglise keeles
  2. - Küberrünnak, mis ujutab servereid
  3. - Automatiseeritud otsuste tegemine
  4. - Pahavara, mis maskeerivad ennast legaalsena, et kasutajat petta
  5. - Arvutisiseline vara
  6. - Võlts, mis tekib kas video, pildi või heli kujul
  7. - Pahavara inglise keeles
  8. - Koodide kasutuskeel
  9. - Pahavara, mis kinnituvad failidele ja levivad avanemisel
  10. - AI täisnimi inglise keeles
  11. - AI programm
  12. - Arvuti „aju”
  13. - AI, mis loob pilte või teksti
  14. - Tehnoloogia inglise keeles
  15. - Koodikeel
Down
  1. - Paroolide kaitsemeetod
  2. - Arvutid, programmeerimine, internett, info kaitsmine.
  3. - Elektroonikas kasutatav signaali- ja andmevorming
  4. - Tehisintellekti lühend
  5. - Pettur, kes varastab andmeid
  6. - Programmi kirjutamise keel
  7. - Koodikeel
  8. - Arvutitevaheline ühendus
  9. - Digitaalne identiteet
  10. - Sõnum, mille läbimise teel varastab omanikult raha
  11. - AI täisnimi
  12. - Arvutiväline vara
  13. - Koodikeel
  14. - Isikuandmete kaitsmise põhimõte
  15. - Arvutid, telefonid, tarkvara ja riistvara

30 Clues: - Koodikeel- Koodikeel- Koodikeel- AI täisnimi- AI programm- Arvutiväline vara- Arvutisiseline vara- Koodide kasutuskeel- Küber inglise keeles- Digitaalne identiteet- Tehisintellekti lühend- Pahavara inglise keeles- Arvutitevaheline ühendus- AI täisnimi inglise keeles- Tehnoloogia inglise keeles- Pettur, kes varastab andmeid...

RUU TNI telah resmi 2025-04-02

RUU TNI telah resmi crossword puzzle
Across
  1. kata 'cyber' dalam B.Indonesia adalah ...
  2. kata 'authorized' dalam B.Indonesia adalah ...
  3. kata 'support' dalam B.Indonesia sehari-hari ...
  4. kata lain untuk 'mengawasi' adalah ...
  5. diberikan pelayanan terlalu nyaman disebut juga ...(pampered)
  6. sinonim kata 'menjalani tugas' adalah ...(served)
  7. kata 'Pressed' dalam B.Indonesia adalah ...
  8. kata 'Represent' dalam B.Indonesia sehari-hari ...
  9. sinonim kata 'tujuan' adalah ...
Down
  1. kata 'change' dalam B.Indonesia adalah ...
  2. kejahatan dalam bentuk teror pesan atau bentuk lain disebut ...
  3. sinonim kata 'mengatasi' adalah ...
  4. sinonim kata 'utama' adalah ...
  5. kepanjangan dari 'UU' adalah ...
  6. sinonim kata 'candaan' adalah ...
  7. sesuatu yang harus dikerjakan dalam pekerjaan disebut ...(task)
  8. sinonim kata 'institusi' adalah ...
  9. kata lain dari 'resign' adalah ...
  10. kata lain untuk 'Official' adalah ...
  11. kata sehari-hari untuk 'against' adalah ...

20 Clues: sinonim kata 'utama' adalah ...kepanjangan dari 'UU' adalah ...sinonim kata 'tujuan' adalah ...sinonim kata 'candaan' adalah ...kata lain dari 'resign' adalah ...sinonim kata 'mengatasi' adalah ...sinonim kata 'institusi' adalah ...kata lain untuk 'Official' adalah ...kata lain untuk 'mengawasi' adalah ...kata 'change' dalam B.Indonesia adalah ......

Karrewiet 3 2025-09-23

Karrewiet 3 crossword puzzle
Across
  1. jong van een paard
  2. op de luchthaven in Brussel was er ...-aanval
  3. hier was het WK atletiek
  4. in deze stad liep een reuzenspin
  5. naam van het programma tegen pesten: de ...
  6. hij pakte zilver op de 5000m
  7. route die de renners afleggen
  8. windrichting waaruit wind waait dinsdag
  9. dit eisen de computercriminelen
  10. werelddeel waarin Rwanda ligt
  11. verzamelnaam voor 7 atletiekonderdelen
Down
  1. zonder auto
  2. beroep Jacotte Brokken
  3. hoofdstad van Rwanda
  4. C-Bra heeft donderbruine...
  5. virtuele realiteitsbril
  6. het feest begint; het ... los
  7. een jong paard van 402000 euro is een ...
  8. aantal jongens en meisjes tijdens pestprogramma
  9. volledige naam: C-Bra van het ...
  10. familienaam van Nafissatou
  11. trommel
  12. sportpaard met lange benen
  13. familienaam Remco
  14. supporter
  15. wielerwedstrijd

26 Clues: trommelsupporterzonder autowielerwedstrijdfamilienaam Remcojong van een paardhoofdstad van Rwandaberoep Jacotte Brokkenvirtuele realiteitsbrilhier was het WK atletiekfamilienaam van Nafissatousportpaard met lange benenC-Bra heeft donderbruine...hij pakte zilver op de 5000mhet feest begint; het ... losroute die de renners afleggen...

Sample Title 2022-10-14

Sample Title crossword puzzle
Across
  1. interesting field
  2. danger
Down
  1. fake person
  2. idea
  3. person

5 Clues: ideapersondangerfake personinteresting field

ANTIBULLYING NOT MYSELF TODAY 2021-02-11

ANTIBULLYING  NOT MYSELF TODAY crossword puzzle
Across
  1. NAME-CALLING,SARCASM, TEASING
  2. MOBBING,SCAPEGOATING
  3. SHOW YOUR SUPPORT ON
  4. HITTING,POKING,PINCHING
  5. TO SHOW SUPPORT WEAR
Down
  1. RESOURCES AVAILABLE TO YOU
  2. INTERNET OR TEXT MESSAGE TO INTIMIDATE

7 Clues: MOBBING,SCAPEGOATINGSHOW YOUR SUPPORT ONTO SHOW SUPPORT WEARHITTING,POKING,PINCHINGRESOURCES AVAILABLE TO YOUNAME-CALLING,SARCASM, TEASINGINTERNET OR TEXT MESSAGE TO INTIMIDATE

yy 2022-05-06

yy crossword puzzle
Across
  1. do dream overdose snake
  2. software speatialy design
  3. looking for a fish
Down
  1. protection of cyber space
  2. piece of paper
  3. cows, hourses and dogs
  4. a men who hacks to smn elses computer

7 Clues: piece of paperlooking for a fishcows, hourses and dogsdo dream overdose snakeprotection of cyber spacesoftware speatialy designa men who hacks to smn elses computer

Cashless society 2024-09-11

Cashless society crossword puzzle
Across
  1. do you think of a cashless world?
  2. Depositing money can also be done online
  3. payments can be made by
  4. illegal. gambling is done
  5. people who need to exchange dollars for local currency
  6. Bank enriches the security team
  7. targeted by thieves
  8. of date. protect large amounts of cash
Down
  1. payments are usually made for
  2. cash makes people?
  3. bank is used for
  4. cost. of printing money or coins requires
  5. debit or credit card service used?
  6. of first profit and cashless
  7. use of cash is considere
  8. currency coins are made of

16 Clues: bank is used forcash makes people?targeted by thievespayments can be made byuse of cash is considereillegal. gambling is donecurrency coins are made ofof first profit and cashlesspayments are usually made forBank enriches the security teamdo you think of a cashless world?debit or credit card service used?of date. protect large amounts of cash...

preslyns crossword 2025-02-06

preslyns crossword crossword puzzle
Across
  1. insurance information
  2. or Sensitive Data
  3. which may arise from employment-related physicals, drug tests and
  4. in the Workplace
  5. of espionage conducted for commercial purposes rather than security;
  6. Espionage
  7. Data
  8. religion, etc.
  9. employee, customer and client information private
  10. actions, supervisory notations
Down
  1. Data
  2. work history, date of birth, social security number, criminal record,
  3. involves individuals hired to steal trade secrets, new products or
  4. information
  5. about an employee prior to employment such as a résumé,
  6. of information
  7. of rules or promises which limits access or places restrictions on certain
  8. of an employee’s performance on the job such as performance reports,

18 Clues: DataDataEspionageinformationof informationreligion, etc.in the Workplaceor Sensitive Datainsurance informationactions, supervisory notationsemployee, customer and client information privateabout an employee prior to employment such as a résumé,which may arise from employment-related physicals, drug tests and...

Sustainable Biomes 2024-07-25

Sustainable Biomes crossword puzzle
Across
  1. The average weather conditions over a long period.
  2. Security The condition in which all people have reliable access to sufficient, safe, and nutritious food.
  3. The natural environment where a species lives and grows.
  4. Footprint The total amount of carbon dioxide emissions caused by human activities.
  5. The process by which soil and rock are worn away by wind or water.
  6. The capacity to maintain environmental balance over time.
  7. A system of living organisms interacting with their environment.
  8. Resources - Resources that can be naturally replenished.
  9. The deterioration of environmental quality.
  10. Efforts to protect and manage natural resources.
  11. Security Measures and policies to safeguard ecosystems and natural resources from harm.
Down
  1. The clearing of forests for non-forest use, impacting ecosystems.
  2. The process of returning degraded ecosystems to a healthier state.
  3. The protection and stability of systems or resources from threats or risks.
  4. A large area with distinct climate and plant/animal life.
  5. The introduction of harmful substances into the environment.
  6. The variety of different species in an area.
  7. Footprint The measure of human impact on the environment.

18 Clues: The deterioration of environmental quality.The variety of different species in an area.Efforts to protect and manage natural resources.The average weather conditions over a long period.The natural environment where a species lives and grows.Resources - Resources that can be naturally replenished....

SyncUp Crossword 2024-03-20

SyncUp Crossword crossword puzzle
Across
  1. One of Synchrony's larger clients
  2. This site has all your HR needs
  3. SYF CEO
  4. This team monitors Synchrony's physical and cyber defenses.
  5. Used to purchase with a loan (2words)
Down
  1. SYF CIO
  2. This team always tries new ideas to further the organization
  3. You can deposit money here
  4. Synchrony Headquarters is located here

9 Clues: SYF CIOSYF CEOYou can deposit money hereThis site has all your HR needsOne of Synchrony's larger clientsUsed to purchase with a loan (2words)Synchrony Headquarters is located hereThis team monitors Synchrony's physical and cyber defenses.This team always tries new ideas to further the organization

Jobs of the Future by 2030 2025-04-16

Jobs of the Future by 2030 crossword puzzle
Across
  1. : Defends against cyber threats
  2. : Builds self-driving vehicle systems
  3. : Designs and builds intelligent machines
  4. : Studies climate change and global warming
  5. : Helps businesses go green
Down
  1. : Provides medical care remotely
  2. : Interprets big data to find patterns
  3. : Uses AI to diagnose and treat patients

8 Clues: : Helps businesses go green: Defends against cyber threats: Provides medical care remotely: Builds self-driving vehicle systems: Interprets big data to find patterns: Uses AI to diagnose and treat patients: Designs and builds intelligent machines: Studies climate change and global warming

Information Security Challenge 2025-12-02

Information Security Challenge crossword puzzle
Across
  1. A privacy principle that limits the collection, processing, and retention of personal data to only what is strictly necessary for a specific purpose.
  2. A formal review of systems and processes to ensure security and compliance.
  3. A type of cyberattack where multiple systems flood a target with traffic, causing service disruption.
  4. In data security, this process replaces sensitive information with a unique identifier or symbol, making the original data inaccessible without a secure mapping.
  5. A security risk that originates from within an organization, often involving employees or contractors who misuse their access to harm systems or data.
Down
  1. Following laws, regulations, and internal policies to ensure proper governance and avoid legal or security risks.
  2. An unexpected event that compromises the integrity or availability of data.
  3. Security Protecting data and systems hosted on remote servers.
  4. A type of malicious software that can replicate and spread.
  5. this principle ensures that data remains accurate, consistent, and unaltered except by authorized processes.

10 Clues: A type of malicious software that can replicate and spread.Security Protecting data and systems hosted on remote servers.An unexpected event that compromises the integrity or availability of data.A formal review of systems and processes to ensure security and compliance....

Just for fun 2015-10-12

Just for fun crossword puzzle
Across
  1. Where your emails go if they are deemed unsafe
  2. You should do this to your PC when you leave it unattended
  3. This type of security prevents or hinders access
  4. This has a risk of exploitation
  5. This type of email account should not be used for personal purposes
  6. All instances of this should be reported to the IT Security Team
  7. Care should be take with this type of device in case of loss or theft
Down
  1. This should be in place on devices containing personal data
  2. The biggest security threat
  3. NCG policy that governs the use of IT equipment
  4. This type of waste should be stored securely until collected
  5. This should be positioned away from visitors
  6. All corporate laptops and desktop machines should have this protective software installed
  7. Something of yours which you should never share with other people
  8. Filing cabinets containing personal data should be in this state

15 Clues: The biggest security threatThis has a risk of exploitationThis should be positioned away from visitorsWhere your emails go if they are deemed unsafeNCG policy that governs the use of IT equipmentThis type of security prevents or hinders accessYou should do this to your PC when you leave it unattended...

Sentinels Crossword game 2024-07-15

Sentinels Crossword game crossword puzzle
Across
  1. Act of using key to protect data (10)
  2. Moving data from one place to another (8)
  3. Restoring lost data (8)
  4. Prioritizing incidents (6)
  5. Finding threats (9)
  6. Adhering to laws and regulations (10)
  7. Act of stopping something (10)
Down
  1. Event affecting data security (8)
  2. Copy of data for safety (6)
  3. Private and secret information (12)
  4. Easily affected data (9)
  5. Watching and checking data movement (10)
  6. Breaking through security (6)
  7. Measurements for evaluation (7)
  8. Visual display of data (9)

15 Clues: Finding threats (9)Restoring lost data (8)Easily affected data (9)Prioritizing incidents (6)Visual display of data (9)Copy of data for safety (6)Breaking through security (6)Act of stopping something (10)Measurements for evaluation (7)Event affecting data security (8)Private and secret information (12)Act of using key to protect data (10)...

Individual Rights vs. Communal Safety 2023-07-26

Individual Rights vs. Communal Safety crossword puzzle
Across
  1. Permission or agreement
  2. Monitoring for security purposes
  3. Rules and controls imposed by authorities
  4. A group of people living in the same area
  5. Expressing objection or dissent
  6. Fair treatment and equal rights for different people
  7. Personal freedom and autonomy
  8. Restricting or controlling information
Down
  1. Giving up something for someone else
  2. Right to keep personal information secret
  3. Absence of conflict or war
  4. Protection from harm or danger
  5. Being accountable for one's actions
  6. Acceptance of different beliefs and practices
  7. Fairness and impartiality in decisions

15 Clues: Permission or agreementAbsence of conflict or warPersonal freedom and autonomyProtection from harm or dangerExpressing objection or dissentMonitoring for security purposesBeing accountable for one's actionsGiving up something for someone elseFairness and impartiality in decisionsRestricting or controlling information...

Cybersecurity crossword 2026-04-02

Cybersecurity crossword crossword puzzle
Across
  1. Overloads a system to shut it down
  2. Converting data into a fixed code for security
  3. Update that fixes security flaws
  4. Harmful software
  5. Verifying a user’s identity
  6. Converting encrypted data back to normal
  7. Locks data and demands payment
Down
  1. Newly discovered, unpatched vulnerability
  2. Fake messages to steal sensitive info
  3. Filters network traffic to block threats
  4. Granting access to resources
  5. Scrambling data to keep it secure
  6. Secures internet connection privately
  7. Detects and removes malicious software
  8. Secretly monitors user activity

15 Clues: Harmful softwareVerifying a user’s identityGranting access to resourcesLocks data and demands paymentSecretly monitors user activityUpdate that fixes security flawsScrambling data to keep it secureOverloads a system to shut it downFake messages to steal sensitive infoSecures internet connection privatelyDetects and removes malicious software...

confidentiality test 2025-02-06

confidentiality test crossword puzzle
Across
  1. insurance information
  2. or Sensitive Data
  3. which may arise from employment-related physicals, drug tests and
  4. in the Workplace
  5. of espionage conducted for commercial purposes rather than security;
  6. Espionage
  7. Data
  8. religion, etc.
  9. employee, customer and client information private
  10. actions, supervisory notations
Down
  1. Data
  2. work history, date of birth, social security number, criminal record,
  3. involves individuals hired to steal trade secrets, new products or
  4. information
  5. about an employee prior to employment such as a résumé,
  6. of information
  7. of rules or promises which limits access or places restrictions on certain
  8. of an employee’s performance on the job such as performance reports,

18 Clues: DataDataEspionageinformationof informationreligion, etc.in the Workplaceor Sensitive Datainsurance informationactions, supervisory notationsemployee, customer and client information privateabout an employee prior to employment such as a résumé,which may arise from employment-related physicals, drug tests and...

Sustainable Biomes 2024-07-25

Sustainable Biomes crossword puzzle
Across
  1. The variety of different species in an area.
  2. The introduction of harmful substances into the environment.
  3. The protection and stability of systems or resources from threats or risks.
  4. Efforts to protect and manage natural resources.
  5. The deterioration of environmental quality.
  6. The average weather conditions over a long period.
  7. A system of living organisms interacting with their environment.
  8. Resources - Resources that can be naturally replenished.
  9. Security Measures and policies to safeguard ecosystems and natural resources from harm.
  10. The process of returning degraded ecosystems to a healthier state.
  11. Security The condition in which all people have reliable access to sufficient, safe, and nutritious food.
Down
  1. Footprint The measure of human impact on the environment.
  2. A large area with distinct climate and plant/animal life.
  3. The capacity to maintain environmental balance over time.
  4. Footprint The total amount of carbon dioxide emissions caused by human activities.
  5. The process by which soil and rock are worn away by wind or water.
  6. The natural environment where a species lives and grows.
  7. The clearing of forests for non-forest use, impacting ecosystems.

18 Clues: The deterioration of environmental quality.The variety of different species in an area.Efforts to protect and manage natural resources.The average weather conditions over a long period.The natural environment where a species lives and grows.Resources - Resources that can be naturally replenished....

At the Airport 2023-10-01

At the Airport crossword puzzle
Across
  1. ankommande
  2. bagage
  3. avgång
  4. flygmaskin
  5. inrikes
  6. landgräns
  7. flygbolag
  8. luftfart
  9. pass*
Down
  1. tull
  2. flygplan(amE)
  3. försenad
  4. säkerhetsbälte*
  5. skör
  6. påstigning
  7. säkerhet
  8. stiga på
  9. mittgång*
  10. landningsbana*
  11. bagagevagn
  12. lyfta*

21 Clues: tullskörpass*bagageavgånglyfta*inrikesförsenadsäkerhetstiga påluftfartmittgång*landgränsflygbolagankommandepåstigningflygmaskinbagagevagnflygplan(amE)landningsbana*säkerhetsbälte*