cyber security Crossword Puzzles

『명덕고등학교 2학년』Crossword (Practice) ③ 2025-12-02

『명덕고등학교 2학년』Crossword (Practice) ③ crossword puzzle
Across
  1. 보안
  2. 생명 징후
  3. 확실
  4. 삽입하다
  5. 침입
  6. 탐지
  7. 일회용의
  8. 수분
  9. 심박수
  10. 건강함
  11. 통지하다
Down
  1. 당뇨병이 있는
  2. 걸리다
  3. 연속적인
  4. 감시하다
  5. 혈당
  6. 새다
  7. 추적 장치
  8. 배수관
  9. 경보하다

20 Clues: 보안확실침입혈당새다탐지수분걸리다배수관심박수건강함연속적인감시하다삽입하다일회용의경보하다통지하다생명 징후추적 장치당뇨병이 있는

CROSSWORD BULLYING 2021-11-30

CROSSWORD BULLYING crossword puzzle
Across
  1. when you offer your hand to someone
  2. red street sign
  3. talking to people having a conversation
  4. what you are doing if you are bullying
  5. a feeling you get when someone moves away
  6. when you get worked up trying to do something
  7. how you feel when nobody listens
  8. is another way to say angry
  9. being friendly
Down
  1. the reason we have orange shirt day
  2. when you feel like you can't do anything
  3. another word for contact
  4. bullying online is called
  5. people you hang out with at school

14 Clues: being friendlyred street signanother word for contactbullying online is calledis another way to say angryhow you feel when nobody listenspeople you hang out with at schoolthe reason we have orange shirt daywhen you offer your hand to someonewhat you are doing if you are bullyingtalking to people having a conversation...

counter anak 2006 2025-10-01

counter anak 2006 crossword puzzle
Across
  1. Bentuk perundungan melalui media sosial / internet.
  2. Tindakan yang diharapkan korban lakukan ke pihak sekolah.
  3. Perilaku perundungan di sekolah.
  4. kelompok usia yang dibahas (pelaku/korban umumnya)
  5. Pengaruh sosial yang mendorong ikut melakukan bullying.
  6. Bentuk bullying yang melukai secara jasmani.
  7. Sumber pengawasan dan penanganan di sekolah (jabatan)
Down
  1. Bentuk bullying berupa ejekan atau hinaan
  2. tempat terjadinya penelitian (kota/sekolah).
  3. Orang yang menerima tindakan bullying
  4. Jenis pendekatan penelitian yang dipakai penulis.
  5. laporan internasional yang dicatat soal perundungan (singkatan).
  6. Faktor penyebab bullying yang berkaitan dengan rumah
  7. Upaya pencegahan singkat (kata tindakan).

14 Clues: Perilaku perundungan di sekolah.Orang yang menerima tindakan bullyingBentuk bullying berupa ejekan atau hinaanUpaya pencegahan singkat (kata tindakan).tempat terjadinya penelitian (kota/sekolah).Bentuk bullying yang melukai secara jasmani.Jenis pendekatan penelitian yang dipakai penulis.kelompok usia yang dibahas (pelaku/korban umumnya)...

Cyber safety 2016-06-07

Cyber safety crossword puzzle
Across
  1. ,cyber smart
  2. something you should not press
  3. , blocks viruses
Down
  1. Makes devices sick
  2. besmean
  3. can block a virus

6 Clues: besmean,cyber smart, blocks virusescan block a virusMakes devices sicksomething you should not press

sc900 Review 2024-02-18

sc900 Review crossword puzzle
Across
  1. Federation is used to establish a ----- relationship between organisations
  2. This abbreviation is used to ensure that users have just enough access, just in time
  3. These reviews are done to evaluate group membership and role assignments to ensure that the correct users are in the correct places
  4. ......... is one of the goals of the cyber security strategy which is ensuring data or messages haven’t been tampered with
  5. This identity can be used for authentication and authorization to on-premises and cloud resources
  6. ........... access policies can be used to examine signals such as location, device, ip address and either allow or block access to Azure
  7. ........ as a Service solutions allows users to access and use applications over the internet - eg Microsoft 365
  8. .......... a file means the data in the file is only readable to users with the appropriate key
  9. This score measures an organisation's progress in completing actions that reduce risks associated with data protection and regulatory standards
Down
  1. This is the process of verifying who you are
  2. This is the abbreviation used to describe the login process when it requires users to enter more information than just a password.
  3. ........... management allows multicloud discovery, remediation, and monitoring of privileged access across Azure, AWS, and GCP
  4. This is the process of verifying whether a signed in user can access a specific resource
  5. The ---- trust model assumes each request as though it was originated from an uncontrolled network. Verify explicitly - assume breach
  6. uses an algorithm to convert the original text to a unique fixed-length hash value
  7. Microsoft is responsible for managing the physical hardware in their datacentres in a ------ responsibility model
  8. A layer of the defence in depth policy where you would find DDoS protection and Firewall
  9. This acronym allows users to reset their own passwords without involving the IT Service Desk

18 Clues: This is the process of verifying who you areFederation is used to establish a ----- relationship between organisationsuses an algorithm to convert the original text to a unique fixed-length hash valueThis abbreviation is used to ensure that users have just enough access, just in time...

Created by: Joe 2024-05-09

Created by: Joe crossword puzzle
Across
  1. A ___ is a security that pays interest over terms ranging from 2 to 10 years
  2. A ___ is a security that pays interest over terms of 10 to 30 years
  3. ______ are banks that are part of the federal reserve system
  4. A ___is a security that matures in a year or less
  5. A ___ is money that must maintain its value over time in order for it to be widely accepted
  6. The _____ is an action taken to manage the supply of money and interest rates
  7. A ___ means it can be saved and used at a later date
  8. exchange _____ can cover many areas including privacy disclosure fraud consumer rights and interest rates
Down
  1. A ____ is a process of transferring money from one individual or organization to another
  2. The _____ is themechanism a nation uses to provide and manage money
  3. A ___ is money used in exchange for goods and services needed by individuals buisiness and governments
  4. A ___ is a plastic card that allows the holder to make credit purchases up to an authorized amount
  5. The _____ is a transfer of money from one bank account to another
  6. A ___ is a type of financial investment issued by a corperation or government
  7. card ____ allows customers to pay for purchases directly from thier checking's account
  8. A ___ means that money is a common measure of the worth or price of a good or service

16 Clues: A ___is a security that matures in a year or lessA ___ means it can be saved and used at a later date______ are banks that are part of the federal reserve systemThe _____ is a transfer of money from one bank account to anotherThe _____ is themechanism a nation uses to provide and manage money...

tses 2023-10-06

tses crossword puzzle
Across
  1. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  2. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  3. A program that prevents, detects, and removes viruses or other malware from a computer system.
  4. It should be changed immediately if suspected of being compromised .
  5. _______ your data regularly and periodically check that you are able to restore them.
  6. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  7. Do not provide your _______ email account to social networks.
  8. displays annoying pop-ups to generate revenue for its authors.
  9. Always use _______ factor authentication where available.
  10. Erases user data beyond recoverability.
  11. Use a _______ password different from the passwords you use to access other sites.
Down
  1. This can slow down your computer and watch everywhere you go on the Internet.
  2. Online traces revealing user activities.
  3. A type of security incident where unauthorized access is gained to a system or data
  4. _______ your computer when left unattended.
  5. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.

16 Clues: Erases user data beyond recoverability.Online traces revealing user activities._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks.displays annoying pop-ups to generate revenue for its authors....

Cloud Computing Acronyms 2022-01-15

Cloud Computing Acronyms crossword puzzle
Across
  1. Secure Web Gateway
  2. Zero Trust Network Architecture
  3. Mobile Device Management
  4. Cloud Workload Protection Platform
  5. Software Defined WAN
  6. Anything as a Service
Down
  1. Cloud Security Posture Management
  2. Cloud Application Management for Platforms
  3. Windows Virtual Desktop
  4. Secure Access Server Edge
  5. Cloud Access Security Broker

11 Clues: Secure Web GatewaySoftware Defined WANAnything as a ServiceWindows Virtual DesktopMobile Device ManagementSecure Access Server EdgeCloud Access Security BrokerZero Trust Network ArchitectureCloud Security Posture ManagementCloud Workload Protection PlatformCloud Application Management for Platforms

Cyber bullying Crossword Puzzle 2015-04-16

Cyber bullying Crossword Puzzle crossword puzzle
Across
  1. a file on a computer that records user information when visiting a website
  2. a wireless handheld device which allows for telephone communications
  3. the most popular social networking website
  4. physical or emotional injury to someone
  5. the act of restricting access to certain web sites
  6. acronym for the company that provides an Internet connection to individuals or companies
  7. intentional and repeated harm inflicted through the use of computers, cell phones, and other electronic devices
  8. unsolicited words or actions intended to annoy, alarm, or abuse another individual
  9. short for "World Wide Web" or pages linked together via the internet
  10. the act of requesting another person to enter your social network
  11. making a statement or taking an action that indicates harm to another
  12. repeated or deliberate harassment directed by one in a position of power toward one or more
  13. a user-created web page on a social networking website
Down
  1. an electronic device that stores and processes information and also facilitates electronic communication when connected to a network
  2. allows internet users to send and receive electronic text to and from other internet issues
  3. the denial of access to particular parts of the internet
  4. worldwide network of computers communicating with others via phone lines, satellite links, wireless networks, and cable systems
  5. an intermediary web site which hides or disguises the IP address associated with the internet user
  6. interactive web journal or diary, the contents of which are posted online and then view able by some or all individuals
  7. unsolicited electronic mail sent from someone yo do not know
  8. sending angry, rude, or obscene messages directed at a person or persons privately or an online group
  9. a form of bullying where physical assaults are recorded on mobile phones or digital cameras and distributed to others
  10. the second most popular social networking site
  11. sending short messages via cell phone
  12. two or more computers connected so that they can communicate with each other

25 Clues: sending short messages via cell phonephysical or emotional injury to someonethe most popular social networking websitethe second most popular social networking sitethe act of restricting access to certain web sitesa user-created web page on a social networking websitethe denial of access to particular parts of the internet...

Cyber Safety-Hugh Fox 2016-06-07

Cyber Safety-Hugh Fox crossword puzzle
Across
  1. A saved link to a website that has been added to a list of saved links or favorite sites
  2. A scam that involves sending a fraudulent e-mail soliciting personal information from an unsuspecting user
  3. A hostile, strongly worded message that may contain obscene language
  4. Any unsolicited e-mail, or junk mail
  5. A piece of information
  6. a thing to stop viruses
  7. The name for bookmark
  8. A giant collection of computer networks
  9. A location online that allows multiple users to communicate electronically
  10. A self-replicating software program
Down
  1. Internet games
  2. Internet gamers who intentionally cause problems
  3. software installed on computers which collects information without your knowledge or consent and sends it to a spyware program
  4. The site that is the starting point on the web for a particular group or organization
  5. The World Wide Web
  6. A secret word or number that must be used to gain access to an online service
  7. a app to stop hackers
  8. The nickname a user
  9. To copy a file from one computer system to another
  10. stands for malicious software or code, which includes any harmful code

20 Clues: Internet gamesThe World Wide WebThe nickname a usera app to stop hackersThe name for bookmarkA piece of informationa thing to stop virusesA self-replicating software programAny unsolicited e-mail, or junk mailA giant collection of computer networksInternet gamers who intentionally cause problemsTo copy a file from one computer system to another...

CYBER AND DIGITAL LITERACY 2024-04-30

CYBER AND DIGITAL LITERACY crossword puzzle
Across
  1. a common form of communication used for sending text-based messages, files, and documents to individuals or groups.
  2. it refers to the qualities and responsibilities expected of individuals as members of the digital community
  3. refers to bullying behavior that occurs through electronic communication platforms such as social media, messaging apps, or online forum.
  4. Logical deductions or conclusions based on prior knowledge, observations, or evidence.
  5. Information that is collected, stored, and processed by computers.
  6. The ability to perform a task or fulfill a role effectively and efficiently, often based on a combination of knowledge, skills, and experience.
  7. refer to the competencies needed to navigate, use, and evaluate digital technologies and information effectively.
  8. used to enhance content delivery and engagement, providing visual aids to help learners understand concepts or processes.
  9. The abilities or skills that a person or thing possesses and can use or apply.
  10. To communicate or get in touch with someone or an organization, often through email, phone, or other means.
  11. Able to be believed or trusted because of being reliable, accurate, or convincing.
  12. The users who utilize the platform to access educational resources
  13. Information, data, or facts that support or justify a conclusion, claim, or argument.
  14. An individual who instructs, educates, or guides others, typically in a formal setting such as a classroom.
  15. can include traditional forms such as newspapers, television, and radio, as well as digital platforms such as websites, social media, and streaming services.
  16. the world being diverse with cultures, media, print and non-print texts, implying a wide range of cultural backgrounds, media platforms, and types of information.
  17. Pertaining to or involving the use of computer technology
  18. The process of transferring data or files from a remote computer or server to a local computer or device, typically over a network such as the Internet.
  19. can include smartphones, tablets, computers, and other electronic gadgets used for various tasks such as communication, information retrieval, and content creation.
  20. The process of exchanging information, ideas, or messages between individuals or groups, often through verbal, written, or digital means.
  21. Tools Software applications or programs used to perform specific tasks or activities in a digital environment.
  22. refers to digital devices, software, and systems used for various purposes, including communication, information retrieval, and content creation.
  23. An environment or tool used for learning activities that take place in a digital setting, providing resources, interaction, and opportunities for skill development.
  24. A collection of related web pages, typically identified by a common domain name and accessible via the Internet.
  25. The process of acquiring knowledge, skills, behaviors, or attitudes through study, experience, or teaching.
  26. The state of being free from unwanted or unauthorized intrusion, especially in regards to personal information shared online.
  27. The methods, strategies, or approaches used in teaching
  28. A particular way of viewing or understanding a situation, concept, or issue, often influenced by one's experiences, beliefs, or cultural background.
Down
  1. In the context of digital literacy, integration refers to the incorporation of one's critical point of view into interactive messages created or encountered online.
  2. To evaluate or analyze something critically
  3. Pertaining to or conforming to moral principles or standards of conduct
  4. The process of moving around or browsing through a website or other digital interface.
  5. Literacy A life skill competence needed for survival in the world of computers, involving awareness of the promises and perils of computers and the internet.
  6. Thinking The ability to objectively analyze, evaluate, and synthesize information or arguments, especially in response to complex societal issues raised by digital technologies.
  7. Newly created products, processes, or ideas resulting from human creativity and ingenuity.
  8. The beliefs, customs, practices, and social behaviors of a particular group of people or society
  9. Information, understanding, or skills
  10. The state of being responsible or answerable for one's actions.
  11. The quality of being easily usable or accessible
  12. A clickable connection between one web page and another, allowing users to navigate between different pages or resources on the internet.
  13. Presenting someone else's work, ideas, or words as one's own without proper acknowledgment or citation.
  14. Relating to or involving computers or computer networks, especially the internet.
  15. The reciprocal actions or behaviors between individuals or entities, often involving communication, engagement, or collaboration.
  16. refers to the process of searching for and locating information online, while adhering to ethical conduct and procedures
  17. The act of showing or explaining something clearly and effectively
  18. They are used for a wide range of applications, including personal use, business operations, scientific research, and entertainment.
  19. The act of understanding or grasping the meaning or significance of something,
  20. The ability to read and write.
  21. understanding ethical viewpoints, staying current on new technologies
  22. To assess or judge the value, significance, or quality of something, especially by careful appraisal or examination.

50 Clues: The ability to read and write.Information, understanding, or skillsTo evaluate or analyze something criticallyThe quality of being easily usable or accessibleThe methods, strategies, or approaches used in teachingPertaining to or involving the use of computer technologyThe state of being responsible or answerable for one's actions....

cyber and digital literacy 2024-04-30

cyber and digital literacy crossword puzzle
Across
  1. to obtain or use
  2. or exchange information
  3. record or image being worked on to a storage medium
  4. literacy-ability to find evaluate and communicate
  5. easily send mass mails directly
  6. clever,secret plans that often decieve others
  7. computer program that represents information
  8. personal insults and vulgar and angry wors
  9. activity or service using internet
  10. personal area network
  11. physical parts of computer
  12. multimedia content
  13. media-infotmation in a storage medium
  14. programs that run on a device
  15. metropolitan area network
  16. computer virus
  17. of being free from danger or threat
  18. information thats converted into a machine\digital format
  19. a person or group after first gaining their trust
  20. arrange or set out
  21. technologies.virtual activities
  22. harming you on a regular basis
  23. activities using digital devices
  24. make changes or removing parts
  25. present or immediate past contemporary
Down
  1. used to locate a resource on the internet
  2. wide area network
  3. and intentionally use words or actions
  4. set on it that is either high low level
  5. working area of a computer screen
  6. unauthorized access to an account or computer system
  7. property that protects original works
  8. software intentionally designed to cause disruption
  9. of another's work words or ideas without attribution
  10. global computer network providing a variety ionformation
  11. -message distributed by electronic means
  12. used by cables,ports,
  13. representation for data visualization
  14. any name acknowledge as the author
  15. using the internet or other computer network
  16. web pages and related content
  17. local area network
  18. computer network for sharing information
  19. application for accessing websites
  20. -most important processor in a computer
  21. literate-analyze media
  22. culture of collaboration and teamwork
  23. type of data store
  24. freedom from inference or intrusion
  25. annoying but its also a threat

50 Clues: computer virusto obtain or usewide area networklocal area networkmultimedia contenttype of data storearrange or set outused by cables,ports,personal area networkliterate-analyze mediaor exchange informationmetropolitan area networkphysical parts of computerweb pages and related contentprograms that run on a deviceannoying but its also a threat...

Cyber and Digital literacy 2024-04-30

Cyber and Digital literacy crossword puzzle
Across
  1. Visual representations or pictures, often stored or transmitted electronically.
  2. Secret code or phrase used to access a secure system or account.
  3. Global network connecting computers and other devices, enabling communication and information exchange.
  4. Taking responsibility for one's actions or decisions.
  5. To create, improve, or advance something, often in the context of software or technology.
  6. Framework or infrastructure enabling the development and operation of software applications.
  7. A group of people sharing common interests or characteristics, often interacting online.
  8. Unauthorized access to computer systems or networks, often for malicious purposes.
  9. Knowledge or skill gained from direct observation or participation in events or activities.
  10. Comprehension or grasp of the meaning or significance of something.
  11. Deceptive schemes or fraud conducted via the internet.
  12. Organized and interconnected set of components or elements working together to achieve a common purpose.
  13. Tools and techniques for practical purposes, often involving machinery and equipment.
  14. Data that provides knowledge or insight about a particular subject.
  15. Information, facts, or skills acquired through learning or experience.
  16. Online platforms facilitating social interaction and content sharing.
  17. Writing and organizing instructions for computers to execute specific tasks or functions.
  18. The realm of existence shaped by digital technology, encompassing online platforms and interactions.
  19. Programs and applications used to operate computers and perform tasks.
  20. Various channels for information dissemination, like TV, radio, and the internet.
  21. Potential dangers or risks to security, often in the context of cybersecurity.
  22. Interconnected system or group, particularly in the context of computers and communication.
  23. Steps or directions for completing a task or operating a system.
  24. Working together with others to achieve a common goal or objective.
  25. Exchanges or communications between individuals or entities, often in a digital context.
  26. Written or printed words, often in electronic form.
  27. Distinctive characteristics or qualities that distinguish an individual or entity.
  28. Unsolicited or unwanted email messages, often sent in bulk.
Down
  1. Verification of the identity or legitimacy of a user or entity accessing a system or service.
  2. Protection of personal or sensitive information from unauthorized access or use.
  3. Capacity for understanding, reasoning, and adapting to new situations.
  4. Tools or instruments, particularly electronic gadgets like smartphones and computers.
  5. Sets of instructions or code designed to perform specific tasks on a computer.
  6. Criminal activities carried out using digital technology or the internet.
  7. Software or applications used to perform tasks or solve problems in the digital domain.
  8. Having the ability to read, write, and understand information in a particular context.
  9. The surroundings in which something exists or operates, including the digital landscape.
  10. Exchange of information or messages between individuals or groups.
  11. Monitoring or following the movement or behavior of something or someone, often online.
  12. Capacity to perform or achieve a task or function.
  13. Process of changing from one state, condition, or activity to another.
  14. Relating to or involving computer technology and electronic data.
  15. Shared beliefs and practices within a group.
  16. Software designed to detect and remove malicious software from computer systems.
  17. Knowledge or perception of a situation or fact.
  18. Moral principles guiding behavior and decision-making.
  19. Mental abilities related to thinking, learning, and problem-solving.
  20. Position or function assumed by an individual within a group or system.
  21. Legal regulations governing behavior and activities in the digital realm.
  22. State of being protected from harm or danger.

50 Clues: Shared beliefs and practices within a group.State of being protected from harm or danger.Knowledge or perception of a situation or fact.Capacity to perform or achieve a task or function.Written or printed words, often in electronic form.Taking responsibility for one's actions or decisions.Deceptive schemes or fraud conducted via the internet....

Cyber and Digital Literacy 2024-04-30

Cyber and Digital Literacy crossword puzzle
Across
  1. The act of understanding or grasping the meaning or significance of something,
  2. The process of transferring data or files from a remote computer or server to a local computer or device, typically over a network such as the Internet.
  3. Can include traditional forms such as newspapers, television, and radio, as well as digital platforms such as websites, social media, and streaming services.
  4. Refers to digital devices, software, and systems used for various purposes, including communication, information retrieval, and content creation.
  5. Presenting someone else's work, ideas, or words as one's own without proper acknowledgment or citation.
  6. It refers to the qualities and responsibilities expected of individuals as members of the digital community, including being digitally literate and adhering to ethical conduct while engaging in online activities.
  7. The world being diverse with cultures, media, print and non-print texts, implying a wide range of cultural backgrounds, media platforms, and types of information.
  8. To assess or judge the value, significance, or quality of something, especially by careful appraisal or examination.
  9. Information, data, or facts that support or justify a conclusion, claim, or argument.
  10. The abilities or skills that a person or thing possesses and can use or apply.
  11. Understanding ethical viewpoints, staying current on new technologies, and recognizing the responsibilities associated with using digital tools and systems.
  12. The process of moving around or browsing through a website or other digital interface.
  13. Refers to bullying behavior that occurs through electronic communication platforms such as social media, messaging apps, or online forums.
  14. The quality of being easily usable or accessible, especially for individuals with disabilities.
  15. The users who utilize the platform to access educational resources, engage in activities, and develop their digital literacy skills.
  16. Can include smartphones, tablets, computers, and other electronic gadgets used for various tasks such as communication, information retrieval, and content creation.
  17. The process of acquiring knowledge, skills, behaviors, or attitudes through study, experience, or teaching.
  18. The state of being responsible or answerable for one's actions.
  19. The state of being free from unwanted or unauthorized intrusion, especially in regards to personal information shared online.
  20. Relating to or involving computers or computer networks, especially the internet.
  21. Newly created products, processes, or ideas resulting from human creativity and ingenuity.
  22. The process of exchanging information, ideas, or messages between individuals or groups, often through verbal, written, or digital means.
  23. Information, understanding, or skills acquired through experience, education, or study.
  24. Used to enhance content delivery and engagement, providing visual aids to help learners understand concepts or processes.
  25. The methods, strategies, or approaches used in teaching, especially in formal education settings.
Down
  1. Refer to the competencies needed to navigate, use, and evaluate digital technologies and information effectively.
  2. To communicate or get in touch with someone or an organization, often through email, phone, or other means.
  3. Tools Software applications or programs used to perform specific tasks or activities in a digital environment.
  4. The act of showing or explaining something clearly and effectively, often to illustrate a point or concept.
  5. The knowledge and ability to use a range of technology tools for varied purposes.
  6. The ability to read and write, including digital literacy skills such as using, evaluating, and creating data and images in the digital environment.
  7. A collection of related web pages, typically identified by a common domain name and accessible via the Internet.
  8. The ability to objectively analyze, evaluate, and synthesize information or arguments, especially in response to complex societal issues raised by digital technologies.
  9. The beliefs, customs, practices, and social behaviors of a particular group of people or society. In the context of digital literacy
  10. A life skill competence needed for survival in the world of computers, involving awareness of the promises and perils of computers and the internet.
  11. Pertaining to or conforming to moral principles or standards of conduct, especially in relation to digital citizenship
  12. A common form of communication used for sending text-based messages, files, and documents to individuals or groups.
  13. To evaluate or analyze something critically, often by examining its strengths, weaknesses, and underlying assumptions.
  14. An individual who instructs, educates, or guides others, typically in a formal setting such as a classroom.
  15. A clickable connection between one web page and another, allowing users to navigate between different pages or resources on the internet.
  16. The ability to perform a task or fulfill a role effectively and efficiently, often based on a combination of knowledge, skills, and experience.
  17. Logical deductions or conclusions based on prior knowledge, observations, or evidence.
  18. A particular way of viewing or understanding a situation, concept, or issue, often influenced by one's experiences, beliefs, or cultural background.
  19. They are used for a wide range of applications, including personal use, business operations, scientific research, and entertainment.
  20. Pertaining to or involving the use of computer technology, especially the internet and digital devices, in various aspects of life.
  21. The reciprocal actions or behaviors between individuals or entities, often involving communication, engagement, or collaboration.
  22. An environment or tool used for learning activities that take place in a digital setting, providing resources, interaction, and opportunities for skill development.
  23. Able to be believed or trusted because of being reliable, accurate, or convincing.
  24. Refers to the process of searching for and locating information online, while adhering to ethical conduct and procedures
  25. In the context of digital literacy, integration refers to the incorporation of one's critical point of view into interactive messages created or encountered online.

50 Clues: The state of being responsible or answerable for one's actions.The act of understanding or grasping the meaning or significance of something,The abilities or skills that a person or thing possesses and can use or apply.The knowledge and ability to use a range of technology tools for varied purposes....

Operating Systems (Cyber 100) 2024-02-01

Operating Systems (Cyber 100) crossword puzzle
Across
  1. file extension for compressed files
  2. Microsoft's disk operating system that came before Windows.
  3. A cable that connects networks
  4. A graphical OS released by Google in 2007
  5. Apple's computer operating system.
  6. A computer software package that preforms a specific function directly for the end user.
  7. The OS portions that interface with hardware
  8. Eight bits make up this
  9. OS developed in the late 1960's by AT&T Bell Laboratories
  10. Memory used for short term tasks
Down
  1. The command to see your current windows version
  2. A language that can be used to style a web page
  3. The most common base version of Linux.
  4. Holds instructions and data when a program is executing.
  5. The default browser for Mac
  6. a textual language for creating web pages
  7. Bill Gate's operating system created in 1985
  8. The default browser for Windows
  9. What is the default browser for Linux?
  10. Commonly placed after a modem to route packets
  11. The way computers communicate using zeros and ones is?

21 Clues: Eight bits make up thisThe default browser for MacA cable that connects networksThe default browser for WindowsMemory used for short term tasksApple's computer operating system.file extension for compressed filesThe most common base version of Linux.What is the default browser for Linux?a textual language for creating web pages...

DOMAIN 3 CROSSWORD | CYBER 2024-03-15

DOMAIN 3 CROSSWORD | CYBER crossword puzzle
Across
  1. software that creates, runs and manages virtual machines (VMs)
  2. module(TPM) an embedded hardware chip on a motherboard that stores cryptographic keys used for encryption hardware
  3. environment an environment used to test and application and discover any bugs or errors
  4. automation the Internet connection in home appliances, such as refrigerators and coffee makers
  5. a wireless network used to provide guests with Internet access
  6. a protocol that translates public IP addresses to private IP addresses and private addresses back to public IP addresses
  7. the use of different security control types, such as technical controls (firewalls, IDSs and proxy servers); administrative controls (vulnerability assessments and penetration tests); and physical controls (security cameras and locked rooms)
  8. an OS that manages a network device; some Cisco devices use the Cisco IOS (Internetwork OS)
  9. is the hardware-based and software-based encryption of an entire disk
  10. the exposure of data by an error, such as an integer overflow or buffer overflow
  11. a combination of all the elements required to produce a product
  12. the use of implementing security controls from different vendors to increase security
  13. environment an environment that simulates the production environment and is used for late stage testing
  14. a group of SQL statements that execute as one SQL statement, like a mini-program
  15. isolation that ensures that a system isn't connected to any other system to reduce risk of being attacked
Down
  1. the analysis of code without executing it
  2. a structure of basic concepts that is used to provide guidance to professionals on how to implement security in various systems
  3. theorganization of tables and columns in a database to reduce redundant data and improve overall database performance
  4. (SDN)a network that is comprised of virtualization technologies instead of hardware routers and switches
  5. a framework that is based on relevant laws and regulations, such as HIPAA
  6. is the software-based encryption of an entire disk;
  7. the analysis of code as the code is running
  8. a framework that is not based on law, but by common standards and practices
  9. a metaphor for physical isolation, indicating that there is a gap of air between an isolated system and other systems
  10. an internal network, used to communicate and share content
  11. encryption/self-encrypting drive (FDE/SED)
  12. a group of honeypots that is within a separate network or zone, but accessible from an organization's primary network
  13. to provide a digital signature for code
  14. an OS that manages a server, such as Windows Server 2016 or the Server base environments in Linux
  15. training of users on common threats and emerging threats to help avoid these types of attacks
  16. a part of a network that can be accessed by authorized users from outside of the network, such as business partners, customers, vendors, etc.
  17. an integrated circuit that includes all the functionality of a computing system within the hardware
  18. to use an isolated area on a system (usually, a virtual machine), often for testing purpose
  19. network a bridge to a wired network; a network that provides employees access to network resources as if they were connected from a wired dest node at their desk

34 Clues: to provide a digital signature for codethe analysis of code without executing itencryption/self-encrypting drive (FDE/SED)the analysis of code as the code is runningis the software-based encryption of an entire disk;an internal network, used to communicate and share contentsoftware that creates, runs and manages virtual machines (VMs)...

Networking Concepts & Cyber Ethics 2025-06-03

Networking Concepts & Cyber Ethics crossword puzzle
Across
  1. : We use this to type on computer
  2. : We do this to find things on internet
  3. : A machine we use to study and play
  4. : A saved document, photo or game
  5. : We watch this on YouTube
  6. : Sending and receiving messages online
  7. : A place on the internet with pages and information
  8. : Do not share this with people you don’t know
  9. : We must be this on the internet
  10. : We use this to click and move cursor
Down
  1. : We look at this part of a computer
  2. : A word for things on internet
  3. : Keep this secret, do not share it
  4. : We must follow these while using computer
  5. : We should only chat with real ____ online
  6. : It helps phone or laptop to connect to internet
  7. : We should not post too many of these online
  8. : Talking to friends using computer or phone
  9. : We use this to open websites
  10. : Fun thing we play on computer or phone

20 Clues: : We watch this on YouTube: We use this to open websites: A word for things on internet: We use this to type on computer: A saved document, photo or game: We must be this on the internet: Keep this secret, do not share it: We look at this part of a computer: A machine we use to study and play: We use this to click and move cursor...

Surfing Safety & Cyber Safety 2022-02-01

Surfing Safety & Cyber Safety crossword puzzle
Across
  1. Get _____________ from your parents or teacher before you download a file or an app. You could accidentally download a virus onto your computer, or see something that you shouldn't.
  2. Inside the computer case is the ______ drive where all of your documents are saved.
  3. programs do many different things. For example, Microsoft Word or Google Docs are both word processing programs that let you write book reports, essays, stories, and more. Examples of other application programs are Microsoft PowerPoint and Google Slides.
  4. When you are online, do not share your name, age, address, phone number, or any other ____________ information with anyone you do not know.
  5. The ___________ system is the most important program that runs on your computer. It lets the computer's hardware and software work together. Examples of operating systems are Microsoft's Windows and Apple's Mac OS.
  6. The _____ is the brains of the computer.
  7. The ______ lets you point to objects on your screen, click on them, and even move them. You can also use the mouse to scroll (or move) through different parts of your screen.
  8. The ___________ takes the text and pictures on your screen and prints them onto paper.
  9. Besides your parents, you should never share your _______________ with anyone. If you do, someone could get into your account and could even pretend to be you.
  10. Listen to your parents about what ___________ rules you should follow, such as which websites you may visit and what pictures you may post.
  11. is when a person bullies someone using technology. Social media sites, text messages, and online chats can all be used for cyberbullying.
Down
  1. The ___________ let you hear different sounds created by the computer. With speakers, you can listen to songs and videos that you play on your computer.
  2. The ________ looks like a TV screen and lets you see your work and your files.
  3. The parts of a computer that you can actually touch are called __________.
  4. software protects your computer so that it doesn't get a computer virus.
  5. If you, or someone you know, are being made fun of or __________ with hurtful words or bad pictures, tell your parents or teacher right away.
  6. is a system of many parts that work together. Computers can be used to write a paper, play games, email a friend, find information, and so much more.
  7. The ___________ is used for typing words and numbers on the computer.
  8. tells the hardware what to do and how to do it. For example, writing and reading programs, and games might be some types of software you have used before.
  9. If you have a social media account, use high ___________ settings. Ask a parent to help you if you're not sure how to do this.
  10. The ___________ case is the metal (or plastic) box that holds the 'brains' of the computer.
  11. Never meet up with an online "friend;" it can be very _________. If someone ever asks to meet with you, tell your parents or teacher right away.

22 Clues: The _____ is the brains of the computer.The ___________ is used for typing words and numbers on the computer.software protects your computer so that it doesn't get a computer virus.The parts of a computer that you can actually touch are called __________.The ________ looks like a TV screen and lets you see your work and your files....

Cyentia Institute Crossword 2022-06-14

Cyentia Institute Crossword crossword puzzle
Across
  1. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
  2. A research series dedicated to clearing away the fog of FUD (fear, uncertainty, and doubt) that has plagued cyber risk quantification for far too long.
  3. A company dedicated to building cybersecurity knowledge through data-driven research
  4. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  5. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
Down
  1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. A weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system.
  3. Relating to or characteristic of the culture of computers, information technology, and virtual reality.
  4. The hypothetical event wherein an attacker uses the vulnerability.

9 Clues: The hypothetical event wherein an attacker uses the vulnerability.A company dedicated to building cybersecurity knowledge through data-driven researchA malicious application or script that can be used to take advantage of a computer’s vulnerability.The process of encoding data to prevent theft by ensuring the data can only be accessed with a key....

Globalisation 2023-03-08

Globalisation crossword puzzle
Across
  1. I __ __ __ __ __ security software to protect against harmful cyberattacks.
  2. With the increase in foreign culture, local culture might be l __ __ __.
  3. H __ __ __ __ __ __ are people who illegally gain access to other people's computer systems.
  4. the interconnectedness of societies.
  5. C__ __ __ __ __ __ __ __ __ __ __ __ protects computers and electronic devices from cyberattacks.
Down
  1. I__ __ __ __ __ __ __ __ __ __ __ in technology contributes to Globalisation.
  2. Better economic situation can lead to b__ __ __ __ __ quality of life.
  3. Globalisation leads to economic, c__ __ __ __ __ __ __ and security impacts.
  4. Globalisation has i__ __ __ __ __ __ __ __ security threats.
  5. M__ __ __ __ __ phones have allowed us to connect with people faster.
  6. F __ __ __ __ __ __ culture has spread throughout the world, such as K-pop.
  7. G__ __ __ __ __ of Multinational Corporations (MNCs) is a factor that drives Globalisation.

12 Clues: the interconnectedness of societies.Globalisation has i__ __ __ __ __ __ __ __ security threats.M__ __ __ __ __ phones have allowed us to connect with people faster.Better economic situation can lead to b__ __ __ __ __ quality of life.With the increase in foreign culture, local culture might be l __ __ __....

Finance 2024-04-02

Finance crossword puzzle
Across
  1. Financial contract whose value is derived from the value of an underlying asset.
  2. A financial chart used to describe price movements of a security.
  3. Financial contract that gives the right, but not the obligation, to buy or sell an underlying asset at a predetermined price within a specified period.
Down
  1. Central bank of India
  2. Financial contract that that obligate the buyer to purchase an asset or the seller to sell an asset at a predetermined future date and price.
  3. The highest price that a buyer is willing to pay for security.
  4. An order to buy or sell a security at the current market price.
  5. Risk management strategy used to offset potential losses in one investment by taking an opposite position in another investment.
  6. The highest price that a seller is willing to accept for a security.
  7. An order to buy or sell a security at a specific price.

10 Clues: Central bank of IndiaAn order to buy or sell a security at a specific price.The highest price that a buyer is willing to pay for security.An order to buy or sell a security at the current market price.A financial chart used to describe price movements of a security.The highest price that a seller is willing to accept for a security....

Le plus fort du monde 2021-05-14

Le plus fort du monde crossword puzzle
Across
  1. security
  2. dad
  3. boss
  4. guardian angel
  5. studies
  6. world
  7. James Bond
  8. strong
  9. supporter
Down
  1. knight
  2. protect
  3. mom
  4. routine
  5. genius
  6. Darth Vader
  7. soldier
  8. leader
  9. parent
  10. hero
  11. movie
  12. father

21 Clues: dadmombossheroworldmovieknightgeniusleaderparentstrongfatherprotectroutinestudiessoldiersecuritysupporterJames BondDarth Vaderguardian angel

Dülmener 2022-10-05

Dülmener crossword puzzle
Across
  1. Lola rennt
  2. Ms. Piggy
  3. Kassenwart
  4. Militärfreak
  5. Nikotinwichser
  6. Mongo
  7. Schwamm
  8. Zeitungsmann
  9. Trottel
Down
  1. Boxer
  2. R.I.P.
  3. Security
  4. Frau mit News
  5. Salattante
  6. Polizist
  7. Chef
  8. Prankster
  9. Mundschenk
  10. Musikus
  11. Supersohn

20 Clues: ChefBoxerMongoR.I.P.MusikusSchwammTrottelSecurityPolizistMs. PiggyPranksterSupersohnLola renntSalattanteKassenwartMundschenkMilitärfreakZeitungsmannFrau mit NewsNikotinwichser

Travel Vocab. 2020-09-15

Travel Vocab. crossword puzzle
Across
  1. takeoff
  2. counter
  3. passport
  4. suitcase
  5. departures
  6. customs
  7. reservation
  8. track
  9. pack
  10. quarantine
Down
  1. copilot
  2. flight
  3. window
  4. security
  5. cabin
  6. flight attendant
  7. hallway
  8. tray
  9. turbulence
  10. scale
  11. landings
  12. pilot

22 Clues: traypackcabinscaletrackpilotflightwindowcopilottakeoffcounterhallwaycustomssecuritypassportsuitcaselandingsdeparturesturbulencequarantinereservationflight attendant

Diné Binidaanishígíí Natashia - 5th Hour 2023-03-06

Diné Binidaanishígíí  Natashia - 5th Hour crossword puzzle
Across
  1. Pharmacist
  2. Hairdresser
  3. Security Guard
  4. Accountant
  5. Weather Person
  6. Baker
  7. Jeweller
  8. Janitor
  9. Gardener
  10. Painter
  11. Plumber
  12. Carpenter
Down
  1. Optician
  2. Computer Programmer
  3. Mechanic
  4. Florist
  5. Tailor
  6. Butcher
  7. Repair Agent
  8. Barber

20 Clues: BakerTailorBarberFloristButcherJanitorPainterPlumberOpticianMechanicJewellerGardenerCarpenterPharmacistAccountantHairdresserRepair AgentSecurity GuardWeather PersonComputer Programmer

Measuring Emotional intelligence 2023-01-16

Measuring Emotional intelligence crossword puzzle
Across
  1. hesitant
  2. careless
  3. calm
  4. out going
  5. excessive
  6. carefree
  7. repetition
  8. modest
  9. self assured
Down
  1. inactive
  2. fast paced
  3. dominate
  4. enjoys being alone
  5. cooperative
  6. brave
  7. pressure
  8. moderate
  9. power
  10. weaknesses
  11. security

20 Clues: calmbravepowermodestinactivedominatehesitantpressuremoderatecarelesssecuritycarefreeout goingexcessivefast pacedweaknessesrepetitioncooperativeself assuredenjoys being alone

Profiles 1 text one Leo V 2014-12-03

Profiles 1 text one Leo V crossword puzzle
Across
  1. Paikallinen
  2. Lentoyhtiö
  3. Viivästys
  4. Aurinkovoide
  5. Suunta
  6. Peruutus
  7. Kaapata
  8. Hyttynen
  9. Turvallisuus
Down
  1. Matkatavarat
  2. Kaveri
  3. Hiustenkuivaaja
  4. Määränpää
  5. Miehistö
  6. Kiikarit
  7. Esine
  8. Kantaa

17 Clues: EsineKaveriSuuntaKantaaKaapataMiehistöKiikaritPeruutusHyttynenViivästysMääränpääLentoyhtiöPaikallinenMatkatavaratAurinkovoideTurvallisuusHiustenkuivaaja

Human rights 2022-11-04

Human rights crossword puzzle
Across
  1. familie
  2. demokrati
  3. rettigheder
  4. retfærdighed
  5. uddannelse
  6. lighed
  7. religion
  8. nationalitet
Down
  1. frihed
  2. ægteskab
  3. kriminalitet
  4. behandling
  5. respekt
  6. vand
  7. etnicitet
  8. sikkerhed
  9. mad

17 Clues: madvandfrihedlighedfamilierespektægteskabreligiondemokratietnicitetsikkerhedbehandlinguddannelserettighederkriminalitetretfærdighednationalitet

Browsing sefely 2025-06-17

Browsing sefely crossword puzzle
Across
  1. Password
  2. SVRUITANI
  3. RWFAIELL
  4. TDUPAE
  5. CUREESEISTS
  6. Security
  7. ERHKCA
  8. OSCLAIDAME
  9. CAYRUBNLULIG
  10. DRAWOPSS
  11. NELIONCSMA
Down
  1. SOIWPYRA
  2. RATWESFO
  3. Malware
  4. NEINLODYTNTIEI
  5. RBCYELWA
  6. Phishing

17 Clues: TDUPAEERHKCAMalwarePasswordSOIWPYRARATWESFORWFAIELLSecurityRBCYELWAPhishingDRAWOPSSSVRUITANIOSCLAIDAMENELIONCSMACUREESEISTSCAYRUBNLULIGNEINLODYTNTIEI

Digital Citizenship 2020-08-30

Digital Citizenship crossword puzzle
Across
  1. Keep it private
  2. Tell where you got your information
  3. When you post online, it's always there.
  4. Ownership of one's work has this
  5. To decide if a website is helpful for you
  6. Safety
  7. Everything you have ever posted online
  8. The kind of news When the media lie to you
  9. information
  10. Your password should be this.
  11. Harassing others online
Down
  1. Can the information be believed?
  2. Manners online
  3. What you are doing right now
  4. Facebook and Twitter are examples
  5. Places where you get information
  6. One who harasses someone online.
  7. To claim or steal someone else's work
  8. selling things online
  9. App
  10. A tendency to see things only your way
  11. _______your time online. Spend time with family

22 Clues: AppSafetyinformationManners onlineKeep it privateselling things onlineHarassing others onlineWhat you are doing right nowYour password should be this.Can the information be believed?Places where you get informationOwnership of one's work has thisOne who harasses someone online.Facebook and Twitter are examplesTell where you got your information...

Quarter Life crisis 2020-09-16

Quarter Life crisis crossword puzzle
Across
  1. location Ilyssa became famous at (YikYak)
  2. the best location to enter a car
  3. Sorry I’m late for chapter I was at _____
  4. Rachel’s favorite bad boi
  5. best footwear
  6. best broadway musical
  7. World’s newest artist
  8. best drink at Fats
  9. Carly drove here to find unrequited love
  10. law school student
Down
  1. Carly’s favorite food
  2. person who doesn’t eat vegetables
  3. 2 golden friends
  4. who Ilyssa cyber bullied
  5. movie without a sequel
  6. Ilyssas Historic Daddy
  7. Carlys first legal drinks
  8. the moon landing
  9. where Rachel turned 21
  10. Frat that Ilyssa was a member of
  11. the Ryans’ favorite teacher
  12. worlds sexiest black and yellow
  13. rachel has shared alarming videos of this being eaten
  14. Carlys relationship status

24 Clues: best footwear2 golden friendsthe moon landingbest drink at Fatslaw school studentCarly’s favorite foodbest broadway musicalWorld’s newest artistmovie without a sequelIlyssas Historic Daddywhere Rachel turned 21who Ilyssa cyber bulliedRachel’s favorite bad boiCarlys first legal drinksCarlys relationship statusthe Ryans’ favorite teacher...

We Hope You Remember Us From Grade 9 Period 4 Math! 2023-04-28

We Hope You Remember Us From Grade 9 Period 4 Math! crossword puzzle
Across
  1. Often absent but not forgotten
  2. Crusty zip up
  3. Freaky four
  4. Lost a desk mate for two weeks
  5. Provides a necklace every day
  6. Always smiling
  7. Headphones on, math done!
  8. Cool sunglasses
  9. APGA Hockey
  10. Voice can be heard from far away
  11. Name is often mispronounced
  12. When I say hello, it's mistaken for me being on my phone
  13. Wears crocs everyday
  14. Fun and fashionable
  15. Often absent but not forgotten
Down
  1. Missed two weeks
  2. Often absent but not forgotten
  3. Loves cafeteria chocolate chip cookies
  4. Used to always wear a toque
  5. Basketball
  6. Apples
  7. Doodling and art
  8. Excelled with slope
  9. Knew y=mx+b before it was taught
  10. Does things above their level
  11. Second best friend
  12. Cyber Artist
  13. Always laughing
  14. Strong but silent

29 Clues: ApplesBasketballFreaky fourAPGA HockeyCyber ArtistCrusty zip upAlways smilingCool sunglassesAlways laughingMissed two weeksDoodling and artStrong but silentSecond best friendExcelled with slopeFun and fashionableWears crocs everydayHeadphones on, math done!Used to always wear a toqueName is often mispronouncedProvides a necklace every day...

Year 8 ICT 2016-07-15

Year 8 ICT crossword puzzle
Across
  1. formatting your web page.
  2. an animation programme.
  3. somewhere that stores related information.
  4. language for creating websites.
  5. hyper link.
  6. one piece of information in a record.
  7. a question you might ask a database.
Down
  1. to bully online by sending or posting mean,hurtful, or intimidating messages usually anonymous.
  2. a character from Scratch.
  3. defines the top of a document or section in HTML.

10 Clues: hyper link.an animation programme.formatting your web page.a character from Scratch.language for creating websites.a question you might ask a database.one piece of information in a record.somewhere that stores related information.defines the top of a document or section in HTML....

Zeniths Cross Word 2024-10-30

Zeniths Cross Word crossword puzzle
Across
  1. The F in two F A
  2. Don't connect to this if its public
  3. Don't click any links or ______
  4. Another form of an update
  5. When someone tries to trick you into giving personal data
Down
  1. Three random words make this password _____
  2. a good place to save passwords
  3. Don't share everything on _____ media
  4. Always have this turned on
  5. Report all cyber crime to ______ Fraud

10 Clues: The F in two F AAnother form of an updateAlways have this turned ona good place to save passwordsDon't click any links or ______Don't connect to this if its publicDon't share everything on _____ mediaReport all cyber crime to ______ FraudThree random words make this password _____When someone tries to trick you into giving personal data

Artificial Intelligence 2024-12-09

Artificial Intelligence crossword puzzle
Across
  1. AI is becoming more and more significant in a number of industries, including food, as demonstrated by the robotic tea maker developed by Hi Arya and LeewayHertz.
  2. AI is being used to assist automate labor intensive tasks in the legal sector, which saves time and enhances customer service.
  3. selecting the appropriate ai model for a project is essential
  4. provided by AI technologies, but using AI also brings up moral dilemmas as, for better or worse,
  5. Robotics integration into the workflow has been pioneered by the manufacturing sector.
  6. automation tools have the potential to increase the quantity and variety of jobs completed when combined with ai technology.
  7. AI is becoming more and more significant in a number of industries, including food, as demonstrated by the robotic tea maker developed by Hi Arya and LeewayHertz.
  8. (AI) technologies are employed in transportation to forecast aircraft delays, regulate traffic, and enhance the safety and efficiency of maritime transportation.
  9. The idea of the technological singularity
  10. customer service is being improved by the integration of machine learning.
Down
  1. Artificial intelligence (AI) is a useful tool in cyber security for anomaly identification, behavioral threat analytics, and false positive resolution.
  2. AI tools such as IBM Watson mimic human medical tasks, while NuMedii's AI-driven AIDD platform looks for medication interactions across diseases.
  3. sifting through papers during discovery phase of the legal case may be quite taxubg for people.
  4. By analyzing data from blogs, social media, and online platforms to detect trends and influencers, artificial intelligence (AI) has completely transformed the fashion business.
  5. AI may also be used to identify fraudulent activity and support strategic decision-making, which improves user engagement and experience
  6. AI-powered personalization allows marketing campaigns and product suggestions to be customized to each person's taste.
  7. It is advised to conduct further research on the effects of AI on adaptive tests, individualized learning, and creative teaching environments.
  8. Precise, timely, and consistent data is the cornerstone of artificial intelligence systems.
  9. AI is used by banking institutions to enhance loan decision-making, establish credit limits, and find investment possibilities.
  10. production of robots are the main emphasis of this branch of engineering.

20 Clues: The idea of the technological singularityselecting the appropriate ai model for a project is essentialproduction of robots are the main emphasis of this branch of engineering.customer service is being improved by the integration of machine learning.Robotics integration into the workflow has been pioneered by the manufacturing sector....

Security of Computer 2024-10-01

Security of Computer crossword puzzle
Across
  1. small text file containing user's information
  2. disrupt use of computer access to internet service
  3. official looking message to scam people.
  4. a program that detect, and remove dangerous programs.
  5. trespasses computer and network to destroy
  6. uses threat and coercion for economic gain
  7. program that replicate itself
Down
  1. politically motivated group of computer experts
  2. less skilled than cracker
  3. secretly monitors user's activity.
  4. engage in malicious act for personal thrills
  5. malicious programs that damages computer.
  6. program that hides and steals information
  7. group of infected computer known as zombies.
  8. convert readable data to encoded character

15 Clues: less skilled than crackerprogram that replicate itselfsecretly monitors user's activity.official looking message to scam people.malicious programs that damages computer.program that hides and steals informationconvert readable data to encoded charactertrespasses computer and network to destroyuses threat and coercion for economic gain...

Vincy - Food security 2024-12-18

Vincy - Food security crossword puzzle
Across
  1. A substance that helps plants grow faster
  2. Foods made from milk, like cheese or yogurt
  3. The process of collecting ripe crops
  4. Sweet food made by bees
  5. Weather patterns that affect how food grows
  6. A tall building where grains are stored
  7. Nutrient found in foods like eggs and beans
  8. A fruit that monkeys and people love
  9. A person who grows food for others
Down
  1. A large store where people buy food
  2. A system to bring water to crops
  3. A person who cooks meals for others
  4. A small area where people grow fruits and vegetables
  5. Plants grown for food like corn or wheat
  6. Food grown without chemicals

15 Clues: Sweet food made by beesFood grown without chemicalsA system to bring water to cropsA person who grows food for othersA large store where people buy foodA person who cooks meals for othersThe process of collecting ripe cropsA fruit that monkeys and people loveA tall building where grains are storedPlants grown for food like corn or wheat...

security crossword puzzle 2026-02-25

security crossword puzzle crossword puzzle
Across
  1. systematic physical search of an area to ensure it is clear of unauthorized persons or items"
  2. Accompanying a visitor or employee to ensure their safety and compliance with rules"
  3. The communications center that directs officers and coordinates responses"
  4. The officer who takes over your assignment at the end of your shift"
  5. An electronic signal indicating a breach, fire, or other urgent situation requiring response"
  6. A daily chronological record of events, visitors, and routine activities"
  7. A physical identification card worn by employees and visitors for access control"
  8. The organized process of moving people out of a building during a fire or emergency"
  9. The deliberate destruction or damage of the facility's property"
Down
  1. The specific location or assignment where a security officer is stationed"
  2. A potential source of danger, such as a spill or broken lock, that must be reported"
  3. The process of checking bags or individuals before allowing entry to a secure area"
  4. Items that are strictly prohibited from being brought onto the property"
  5. The official procedure or system of rules governing affairs of state or diplomatic occasions
  6. A short meeting before a shift to discuss pass-down information and current issues"

15 Clues: The deliberate destruction or damage of the facility's property"The officer who takes over your assignment at the end of your shift"Items that are strictly prohibited from being brought onto the property"A daily chronological record of events, visitors, and routine activities"...

Supply Chain Security Components 2018-12-05

Supply Chain Security Components crossword puzzle
Across
  1. Assessment These threats are external to the company and out of their control
  2. Security We screen employees with regulators
  3. Assessment Examination of internal security controls
  4. The Processes can affect this risk
Down
  1. I am a risk driver and can be a result from natural disasters
  2. IT Security, Physical Security, Container Security, Personnel Security
  3. Ratings We are ranked low, medium and high

7 Clues: The Processes can affect this riskRatings We are ranked low, medium and highSecurity We screen employees with regulatorsAssessment Examination of internal security controlsI am a risk driver and can be a result from natural disastersIT Security, Physical Security, Container Security, Personnel Security...

Homework 2023-02-27

Homework crossword puzzle
Across
  1. Drehbuch
  2. grade
  3. Reaction
  4. Dämpfe
  5. Line
  6. Reserve
  7. Notfall
  8. Aussprechen
Down
  1. Wüste
  2. Sonnenuntergang
  3. Sicherheit
  4. stretch
  5. ecology
  6. Process
  7. Shell
  8. Fremd
  9. Canon

17 Clues: LineWüstegradeShellFremdCanonDämpfestretchecologyProcessReserveNotfallDrehbuchReactionSicherheitAussprechenSonnenuntergang

Cyber safety 2016-06-07

Cyber  safety crossword puzzle
Across
  1. devices sick
  2. can block a virus
  3. viruses
  4. you should not press
Down
  1. besmean
  2. ,cyber smart

6 Clues: besmeanviruses,cyber smartdevices sickcan block a virusyou should not press

un 2024-11-12

un crossword puzzle
Across
  1. A group that works to protect world heritage and promote education.
  2. Council: A group of countries that keeps peace and security.
  3. A group that works to make trade fair.
  4. Assembly: A big meeting of all UN member countries.
  5. A group that works to improve food security.
  6. A group that works to protect the environment.
Down
  1. A group that works to improve global health.
  2. The leader of the UN.
  3. A group that helps refugees find safety.
  4. A group of countries working together to solve global problems.
  5. A group that helps countries develop.

11 Clues: The leader of the UN.A group that helps countries develop.A group that works to make trade fair.A group that helps refugees find safety.A group that works to improve global health.A group that works to improve food security.A group that works to protect the environment.Assembly: A big meeting of all UN member countries....

Unit 4: US History 2023-12-14

Unit 4: US History crossword puzzle
Across
  1. buried the farmers crops, giant dirt storm
  2. buying something with more than you can pay
  3. Social Security Act
  4. Agricultural Adjustment Act
  5. Federal Deposit Insurance Corp
  6. named after herbert hoover, town of homeless
  7. Civilian Conservation Corp.
  8. President bad
  9. security and exchange comission
  10. FDR won by a landslide
Down
  1. FDRs plan to fix the great depression
  2. FDRs way of getting the people to "get to know him"
  3. conducting a financial decision with risk
  4. Works Progressive Administration
  5. helped feed the hungry, one of their only meals
  6. Franklin Delano Roosevelt
  7. October 29th 1929
  8. in the 1930s' a great financial collapse
  9. When the gov spends more than it collects

19 Clues: President badOctober 29th 1929Social Security ActFDR won by a landslideFranklin Delano RooseveltAgricultural Adjustment ActCivilian Conservation Corp.Federal Deposit Insurance Corpsecurity and exchange comissionWorks Progressive AdministrationFDRs plan to fix the great depressionin the 1930s' a great financial collapse...

... 2022-08-24

... crossword puzzle
Across
  1. passport
  2. to check
  3. itinerary
  4. departure
  5. luggage
  6. monitor, screen
  7. airport
  8. arrival
  9. ticket
Down
  1. suitcase
  2. customs
  3. claim
  4. identification
  5. luggage
  6. gate
  7. to travel
  8. passenger (m)
  9. to board
  10. flight
  11. security

20 Clues: gateclaimflightticketcustomsluggageluggageairportarrivalsuitcasepassportto checkto boardsecurityitineraryto traveldeparturepassenger (m)identificationmonitor, screen

Facebook bullying 2014-11-17

Facebook bullying crossword puzzle
Across
  1. Et engelsk ord for internet/virtuel
  2. Ydmygelse hedder på engelsk
  3. The month she posted the video
  4. Amanda's last name
  5. This person found her in a ditch
  6. Amandas age when she died
  7. The bullying began when Amanda was in this grade/class
  8. Amanda came from this country
Down
  1. At slå hedder på engelsk
  2. The name of the month when she was found
  3. At undersøge hedder på engelsk (i politi sammenhæng)
  4. At omringe nogen hedder på engelsk
  5. Grøft hedder på engelsk
  6. Mave hedder på engelsk

14 Clues: Amanda's last nameMave hedder på engelskGrøft hedder på engelskAt slå hedder på engelskAmandas age when she diedYdmygelse hedder på engelskAmanda came from this countryThe month she posted the videoThis person found her in a ditchAt omringe nogen hedder på engelskEt engelsk ord for internet/virtuelThe name of the month when she was found...

The Many Sounds of Y 2023-03-06

The Many Sounds of Y crossword puzzle
Across
  1. any person at all
  2. provides access to water if a fire breaks out
  3. a dog less than a year old
  4. to make an effort
  5. the same as I or me
  6. a sweet food made from sugar
  7. something that stands for something else
Down
  1. how things change and move
  2. taking place on the internet
  3. a state of being close to being asleep
  4. fidgety and restless
  5. a traditional ancient story that is fictional
  6. a large number of persons or things
  7. wavy, curly, or spiraled shape

14 Clues: any person at allto make an effortthe same as I or mefidgety and restlesshow things change and movea dog less than a year oldtaking place on the interneta sweet food made from sugarwavy, curly, or spiraled shapea large number of persons or thingsa state of being close to being asleepsomething that stands for something else...

Bullying 2022-06-06

Bullying crossword puzzle
Across
  1. intentional repeated feels proud
  2. pointing out differences
  3. use of any electronic means to hurt someone
  4. secrecy of internet encourages those who might not otherwise bull
  5. name calling jokes offensive remarks
Down
  1. sending pictures messages information using electronic devices
  2. identity of the person who bullies can be kept secret.
  3. accidental occasional feels remorse
  4. a single significant act or a pattern of acts by one or more students
  5. excluding others from a group
  6. any physical contact that hurts a person
  7. using threats

12 Clues: using threatspointing out differencesexcluding others from a groupintentional repeated feels proudaccidental occasional feels remorsename calling jokes offensive remarksany physical contact that hurts a personuse of any electronic means to hurt someoneidentity of the person who bullies can be kept secret....

Cybersecurity Crossword Puzzle 2024-02-01

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Passwords should not contain your
  2. Sikorsky Facility Security Officer (FSO)
  3. Strategy to protect sensitive information (operational security)
  4. Assured File Transfers (AFTs) should only be performed by a trained
  5. If you see something
  6. A company's most valuable asset
Down
  1. Report all security incidents to
  2. Sikorsky Classified Cybersecurity Manager
  3. Access is granted based on clearance level and

9 Clues: If you see somethingA company's most valuable assetReport all security incidents toPasswords should not contain yourSikorsky Facility Security Officer (FSO)Sikorsky Classified Cybersecurity ManagerAccess is granted based on clearance level andStrategy to protect sensitive information (operational security)...

Gaming Engineer 2025-12-12

Gaming Engineer crossword puzzle
Across
  1. Engineer/Developer: General term for coding games.
  2. Artist: Bridges art and programming, solving technical art issues.
  3. Engineer: Focuses on visual rendering and performance.
  4. Skills & Concepts
  5. Engineer: Focuses on game security.
  6. Developer: Specializes in mobile gaming.
  7. Engineer: Implements features for designers to tune.
  8. Programmer: Writes the code for game mechanics.
Down
  1. & Hybrid Roles
  2. Intelligence (AI).
  3. Engineer: Handles sound and music implementation.
  4. Programmer: Creates internal software for other developers.
  5. Engines: Unity, Unreal Engine.
  6. Programmer: Works on the core game engine itself.
  7. Performance, Memory Management.
  8. Engineer: Develops non-player character (NPC) behaviors.
  9. Gaming Engineer: Works on streaming game technology.
  10. (User Interface/Experience).
  11. Languages: C++, C#, Python, etc..

19 Clues: & Hybrid RolesSkills & ConceptsIntelligence (AI).(User Interface/Experience).Engines: Unity, Unreal Engine.Performance, Memory Management.Languages: C++, C#, Python, etc..Engineer: Focuses on game security.Developer: Specializes in mobile gaming.Programmer: Writes the code for game mechanics.Engineer: Handles sound and music implementation....

SECURITY ENGINEERING-SCM 2022-02-05

SECURITY ENGINEERING-SCM crossword puzzle
Across
  1. physical connection between elements
  2. system vulnerability
  3. key feature in SCM
  4. determines the sw system scope
  5. possible loss or harm
  6. making part of system unavailable
  7. is accepted version of a sw configuration item
Down
  1. inserting false information
  2. Maintaining secrecy of information
  3. A weakness in a system
  4. An exploitation of a system's vulnerability
  5. are used to evaluate the state of the product
  6. increases productivity with minimal mistakes
  7. One of the SCM participant
  8. size oriented sw metric

15 Clues: key feature in SCMsystem vulnerabilitypossible loss or harmA weakness in a systemsize oriented sw metricOne of the SCM participantinserting false informationdetermines the sw system scopemaking part of system unavailableMaintaining secrecy of informationphysical connection between elementsAn exploitation of a system's vulnerability...

DCPP Security Crossword 2024-10-07

DCPP Security Crossword crossword puzzle
Across
  1. W Phonetically
  2. Road to the ISFSI
  3. Name on Exciter
  4. Mechanical Gate with Horizontal Arms
  5. Always Use This on Stairways
  6. What We Generate
  7. Mechanical Lift
Down
  1. Explosive Detector
  2. They Wear Green Pants
  3. An Early or An Over
  4. Gate Arm
  5. Checking to See If a Door is Secure
  6. Elevated Location for NSO's
  7. Briefing Sweet Treat
  8. Security Hard Hat Color

15 Clues: Gate ArmW PhoneticallyName on ExciterMechanical LiftWhat We GenerateRoad to the ISFSIExplosive DetectorAn Early or An OverBriefing Sweet TreatThey Wear Green PantsSecurity Hard Hat ColorElevated Location for NSO'sAlways Use This on StairwaysChecking to See If a Door is SecureMechanical Gate with Horizontal Arms

Normal difficulty 2018-04-07

Normal difficulty crossword puzzle
Across
  1. to give a warning
  2. not legal
  3. very big
  4. this animal is in danger of becoming extinct
  5. a person who knows everything about a subject
  6. to find something new
Down
  1. a person who buys things
  2. animals that live in the wild
  3. something related to the internet
  4. a product, animal or person that is difficult to find or see
  5. writing a letter but you don't give your name
  6. an animal that has very low numbers in the wild

12 Clues: very bignot legalto give a warningto find something newa person who buys thingsanimals that live in the wildsomething related to the internetthis animal is in danger of becoming extinctwriting a letter but you don't give your namea person who knows everything about a subjectan animal that has very low numbers in the wild...

Kaya-bullying 2022-03-04

Kaya-bullying crossword puzzle
Across
  1. online bullying
  2. making sure bullying doesn't happen
  3. Josh pushed Jim down the stairs what type of bullying is this?
  4. Natalie watches someone get bullied. what is Natalie
  5. making fun of your friend's hat
Down
  1. aggressive pressure or intimidation
  2. name calling
  3. bragging that you won and your friend lost
  4. someone seeking to harm to another person
  5. lying and spreading rumors

10 Clues: name callingonline bullyinglying and spreading rumorsmaking fun of your friend's hataggressive pressure or intimidationmaking sure bullying doesn't happensomeone seeking to harm to another personbragging that you won and your friend lostNatalie watches someone get bullied. what is Natalie...

TTS Pencegahan Kekerasan di Sekolah 2023-10-18

TTS Pencegahan Kekerasan di Sekolah crossword puzzle
Across
  1. Dampak kekerasan pada korban
  2. Tidak bisa melupakan kejadian di masa lalu
  3. Contoh kekerasan fisik
  4. Faktor penyebab kekerasan
  5. Jenis kekerasan yang terjadi di dunia maya
  6. Hal penting yang harus didapatkan oleh korban kekerasan
Down
  1. Perilaku yang merupakan bentuk kekerasan emosional
  2. Salah satu tindakan positif ketika menyaksikan kekerasan
  3. Bentuk kekerasan yang menyebabkan gesekan antar kelompok
  4. Salah satu bentuk kekerasan karena faktor pubertas

10 Clues: Contoh kekerasan fisikFaktor penyebab kekerasanDampak kekerasan pada korbanTidak bisa melupakan kejadian di masa laluJenis kekerasan yang terjadi di dunia mayaSalah satu bentuk kekerasan karena faktor pubertasPerilaku yang merupakan bentuk kekerasan emosionalHal penting yang harus didapatkan oleh korban kekerasan...

Keamanan Berinternet 2025-02-10

Keamanan Berinternet crossword puzzle
Across
  1. koneksi tanpa kabel disebut jaringan
  2. singkatan dari wireless fidelity
  3. koneksi nirkabel dipancarkan melalui gelombang
  4. Pengguna komputer
  5. orang yg memiliki kemampuan untuk membobol sistem keamanan jaringan komputer
Down
  1. istilah lain dari kata sandi
  2. prosedur untuk menyambungkan dua buah perangkat yang memiliki bluetooth
  3. kejahatan dunia maya
  4. peralatan media komunikasi yang berguna untuk menghubungkan sebuah perangkat dengan perangkat lain
  5. perangkat lunak yang dapat merusak data

10 Clues: Pengguna komputerkejahatan dunia mayaistilah lain dari kata sandisingkatan dari wireless fidelitykoneksi tanpa kabel disebut jaringanperangkat lunak yang dapat merusak datakoneksi nirkabel dipancarkan melalui gelombangprosedur untuk menyambungkan dua buah perangkat yang memiliki bluetooth...

1020 bitches 2023-10-24

1020 bitches crossword puzzle
Across
  1. Spesialtilpasset reklame
  2. Top Level Domain
  3. Laget med UDP og TCP
  4. sårbar data
  5. Protocol data unit (beskjed)
  6. Kommunikasjon mellom lag
  7. Laget som kobler sammen ende-til-ende systemer
  8. Reglement for datalagring
  9. ressurs som er åpen for rett person til rett tid
  10. Bekrefter en identitet
  11. Samling av 8 bit
  12. Laget som sikrer pålitelig overføring mellom enheter
Down
  1. Sikre at en ressurs ikke endres eller slettes
  2. Sårbarheter i et system
  3. Tilgang for kun de med rettmessige behov
  4. Karaktersett
  5. First in, first out
  6. Lag med tjenester for applikasjoner
  7. Samlebånd prinsipp, ulike prosesser skjer samtidig
  8. Laget som består av signal representasjon av bits
  9. Virtual Private Network
  10. Sikrer konfidensialitet
  11. sikkerhet Sikre sårbar informasjon via IKT
  12. Skape tillit til en identitet

24 Clues: sårbar dataKaraktersettTop Level DomainSamling av 8 bitFirst in, first outLaget med UDP og TCPBekrefter en identitetSårbarheter i et systemVirtual Private NetworkSikrer konfidensialitetSpesialtilpasset reklameKommunikasjon mellom lagReglement for datalagringProtocol data unit (beskjed)Skape tillit til en identitetLag med tjenester for applikasjoner...

CIS178 - Cybersecurity Crossword Puzzle 2023-07-13

CIS178 - Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. bring your own device
  2. code that protects data
  3. malicious software
  4. transmit information without users knowledge
  5. penetration testers
  6. wont allow changes to system’s settings
  7. illegally exploit network vulnerabilities
  8. identifies device connected to internet
  9. high traffic creates web shutdown
  10. vulnerable free wireless hotspots
  11. practicing to identify cyber threats
  12. software to carry out cyberattacks
  13. preventan d remove malware infections
  14. harrassing others over online platforms
Down
  1. propaganda to steal personal information
  2. downloaded apps disguised malicious attacks
  3. virtual private network
  4. exploits vulnerabilities in software
  5. helps remember passwords encrypted
  6. unauthorized users gain access
  7. attacks users until pay ransom
  8. clicking on hidden links
  9. tries to steal personal data
  10. software preventing access to networks
  11. scrambling sensitive data

25 Clues: malicious softwarepenetration testersbring your own devicevirtual private networkcode that protects dataclicking on hidden linksscrambling sensitive datatries to steal personal dataunauthorized users gain accessattacks users until pay ransomhigh traffic creates web shutdownvulnerable free wireless hotspotshelps remember passwords encrypted...

Cybersecurity Terms 2025-04-09

Cybersecurity Terms crossword puzzle
Across
  1. A software update to fix security flaws. (5 letters)
  2. Manipulating people to divulge confidential information. (15 letters)
  3. Granting permissions to access resources. (13 letters)
  4. System that monitors networks for suspicious activity. (3 letters)
  5. Malware that encrypts files and demands payment. (11 letters)
  6. A network security system that blocks unauthorized access. (8 letters)
  7. Weakness in a system that can be exploited. (12 letters)
  8. Securely connects a user to a network over the internet. (3 letters)
  9. Exploit targeting a previously unknown vulnerability. (8 letters)
  10. Attack that overwhelms a system with traffic to crash it. (4 letters)
Down
  1. Security method requiring two types of verification. (10 letters, hyphenated)
  2. Scrambling data to make it unreadable without a key. (10 letters)
  3. Malicious software designed to harm or exploit systems. (7 letters)
  4. Process of verifying a user’s identity. (14 letters)
  5. Deceptive emails or messages to steal sensitive data. (8 letters)

15 Clues: A software update to fix security flaws. (5 letters)Process of verifying a user’s identity. (14 letters)Granting permissions to access resources. (13 letters)Weakness in a system that can be exploited. (12 letters)Malware that encrypts files and demands payment. (11 letters)Scrambling data to make it unreadable without a key. (10 letters)...

Vocabulary at the airport 2025-07-31

Vocabulary at the airport crossword puzzle
Across
  1. สานพานรับส่งกระเป๋าในสนามบิน
  2. พนักงานขนกระเป๋า
  3. ออกเดินทาง
  4. ระบบรักษาความปลอดภัย
  5. สายการบิน
  6. ขึ้นเครื่องบิน
  7. ถอดออก
  8. ลงทะเบียนขึ้นเครื่องบิน
  9. ชั้นโดยสารราคาถูกที่สุด
Down
  1. มาถึง
  2. บัตรโดยสาร
  3. ผู้โดยสาร
  4. ความสนุกสนาน, ความเพลิดเพลิน
  5. การประกาศ
  6. ประตูทางออก
  7. เที่ยวบิน
  8. กระเป๋าเป้สะพายหลัง

17 Clues: มาถึงถอดออกผู้โดยสารสายการบินการประกาศเที่ยวบินบัตรโดยสารออกเดินทางประตูทางออกขึ้นเครื่องบินพนักงานขนกระเป๋ากระเป๋าเป้สะพายหลังระบบรักษาความปลอดภัยลงทะเบียนขึ้นเครื่องบินชั้นโดยสารราคาถูกที่สุดสานพานรับส่งกระเป๋าในสนามบินความสนุกสนาน, ความเพลิดเพลิน

Bullying 2023-03-07

Bullying crossword puzzle
Across
  1. another for the body
  2. another word for words (starts with v)
  3. the opposite of love
  4. talking about others
Down
  1. Friendship is one of the factors
  2. It happens on Instagram
  3. Face with emotion

7 Clues: Face with emotionanother for the bodythe opposite of lovetalking about othersIt happens on InstagramFriendship is one of the factorsanother word for words (starts with v)

Cyber safety- Charlotte Cameron 2016-05-25

Cyber safety- Charlotte Cameron crossword puzzle
Across
  1. could contain a virus so do not open.
  2. a large device that can be hacked.
  3. to put an picture or information on the internet.
  4. someone who steels someone's identity and uses it as them to gain money or benefits.
  5. people who login to an device and steels money , and information.
  6. they keep you safe online and give you a safe guide.
  7. people who message harmful and rude messages.
  8. allows parents to see what activities their children are using.
  9. an device many people have but can be dangerous.
  10. information about you that has to be kept safe.
Down
  1. an add that automatically comes up on your screen.
  2. enjoy seeing people getting mad at what they have put up.
  3. the first step to logging into an online game.
  4. to lure someone online to know what the are talking about.
  5. an object that is small and can be scammed and get virus's.
  6. something that comes up on your screen and tells you to login.
  7. tries to gain trust with someone and then does something mean and rude on the internet.
  8. a set of numbers or letters that gains access to an device.
  9. safe information kept in an computer to hide.
  10. can wipe an devices memory.

20 Clues: can wipe an devices memory.a large device that can be hacked.could contain a virus so do not open.people who message harmful and rude messages.safe information kept in an computer to hide.the first step to logging into an online game.information about you that has to be kept safe.an device many people have but can be dangerous....

Cyber Safety-Irene Jose 2016-05-25

Cyber Safety-Irene Jose crossword puzzle
Across
  1. program that lets you find,see and hear material
  2. bad thing that can ruin your device
  3. you can chat on with family and friends
  4. method of sending short messages
  5. small hand-controlled device for pointing and clicking
  6. send information from one computer to another computer
  7. name that a user has chosen for you
  8. program,or set of instructions
  9. website for you so you can search
  10. search engine visual for parents mostly
Down
  1. upload information to the web
  2. starting point on the web
  3. add that automatically comes onto the screen
  4. you can send to others
  5. adviser that teaches you how to use technology
  6. security system to keep your things safe
  7. secrets code that unlocks something for you
  8. giant collection of networks of networks
  9. Engine,an Internet service that helps you find information on the website
  10. Tag,the nickname a user has chosen to be identified when playing Internet Games

20 Clues: you can send to othersstarting point on the webupload information to the webprogram,or set of instructionsmethod of sending short messageswebsite for you so you can searchbad thing that can ruin your devicename that a user has chosen for youyou can chat on with family and friendssearch engine visual for parents mostly...

Thomas's Cyber Safety Crossword 2016-06-07

Thomas's Cyber Safety Crossword crossword puzzle
Across
  1. a name that is not your real name
  2. stops viruses
  3. people who bully you onLine
  4. online communities where people share information about themselves,music files and photos
  5. sharing this software enable multiple users to access the same computer
  6. the world wide web as accessed from mobile
  7. a program that protects your computer from others
  8. people who steal money from your computer
  9. a strongly word comment
  10. a program that attacks your computer
Down
  1. to upload information to the web
  2. a person who steals your credit card
  3. a method an individual uses to track,lure or harass another person online
  4. a popular computer program that enables users to video conference
  5. a program or set of instructions that runs on a computer
  6. The World Wide Web
  7. Your online identity name
  8. message from your computer or mobile devices
  9. a network that tweets online
  10. a method of sending text

20 Clues: stops virusesThe World Wide Weba strongly word commenta method of sending textYour online identity namepeople who bully you onLinea network that tweets onlineto upload information to the weba name that is not your real namea person who steals your credit carda program that attacks your computerpeople who steal money from your computer...

Cyber safety - Ella Smith 2016-05-17

Cyber safety - Ella Smith crossword puzzle
Across
  1. someone who helps you
  2. people who try and get your money
  3. distributive emails or messages
  4. how you talk
  5. information your own details
  6. a type of social media
  7. your own or other people's email or phone number
  8. a mean person
  9. something that we use everyday
  10. something that can shut down your computer
Down
  1. how you get information
  2. something that can pop up on your computer
  3. bad people who can still your belongings
  4. your own place
  5. something that you can get spams on
  6. media websites that you can communicate on
  7. about your self
  8. your own space
  9. you face on the Internet
  10. people who follow you

20 Clues: how you talka mean personyour own placeyour own spaceabout your selfsomeone who helps youpeople who follow youa type of social mediahow you get informationyou face on the Internetinformation your own detailssomething that we use everydaydistributive emails or messagespeople who try and get your moneysomething that you can get spams on...

CYBER AND DIGITAL LITERACY 2024-04-30

CYBER AND DIGITAL LITERACY crossword puzzle
Across
  1. security, is a multidimensional discipline aimed at safeguarding digital assets, data, and systems from unauthorized access, attacks, disclosure, or destruction.
  2. YouTube is a video sharing service where users can watch, like, share, comment and upload their own videos.
  3. "learning facilitated by technology that gives students some element of control over time, place, path and/or pace.
  4. creating, sharing and discovering short videos. The app is used by young people as an outlet to express themselves through singing, dancing, comedy, and lip-syncing, and allows users to create videos and share them across a community.
  5. Social media are interactive technologies that facilitate the creation, sharing and aggregation of content, ideas, interests, and other forms of expression through virtual communities and networks.
  6. defined as the ability to effectively navigate, critically analyze, and produce information using digital technology as well as the ability to create new tools for navigating, analyzing, and producing information.
  7. refers to technology, ranging from computers and the internet to technological objects and programs such as cellphones, smart home systems, check-in kiosks at airports and more.
  8. the ability to consume and communicate information ethically online.
  9. a variety of skills associated with using ICT (information and communication technologies) to find, evaluate, create and communicate information.
  10. This element kind of goes without saying. The digital world can be a very scary place
  11. the ability to derive meaningful information from data.
  12. the tendency to generate or recognize ideas, alternatives, or possibilities that may be useful in solving problems, communicating with others, and entertaining ourselves and others.
  13. Instagram is a free photo and video sharing app available on iPhone and Android. People can upload photos or videos to our service and share them with their followers or with a select group of friends.
  14. the ability to locate and consume, create, and communicate digital content, while simultaneously employing a process of critical evaluation.
  15. Understanding of Data. Educational technology is often powerful because of the precise data that it can provide on each student's performance.
  16. Information is an abstract concept that refers to something which has the power to inform.
  17. Research is "creative and systematic work undertaken to increase the stock of knowledge".
  18. the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring both cognitive and technical skills.
  19. equipping people with ICT concepts, methods and skills to enable them to use and exploit ICTs.
  20. Digital literacy is the ability to access, manage, understand, integrate, communicate, evaluate and create information safely and appropriately through digital technologies for employment, decent jobs and entrepreneurship.
  21. a website which allows users, who sign-up for free profiles, to connect with friends, work colleagues or people they don't know, online.
  22. equipping people with ICT concepts, methods and skills to enable them to use and exploit ICTs.
  23. Providing curriculum support and additional information to students. Promoting better organization: Laptops help students keep track of their assignments and utilize an online school calendar.
  24. Being online means having a computer connected to the internet.
Down
  1. a secure and easy way to prove who you are online. You can create your Digital Identity, such as myGovID, using Australian identity documents like your driver's licence and your passport. Find out more information about Digital Identity on the Digital Identity website.
  2. to work jointly with others or together especially in an intellectual endeavor
  3. proficiency in using digital devices (smartphones, laptops, tablets) to access the Internet to discover, create, review, evaluate, and use information via different digital platforms.
  4. an interactive web-based student-response system (also available through iOS, Android, and Chrome apps) that can help teachers spark conversation and learning through polls and quizzes.
  5. to connect its users and allow them to share their thoughts with their followers and others through the use of hashtags.
  6. platform that makes it easy to create, share and play learning games or trivia quizzes in minutes.
  7. digital well-being, but some key components include being able to set boundaries around our use of technology, such as limiting screen time or not using devices in bed, being aware of how technology affects our emotions, and taking steps to manage any negative effects, taking breaks
  8. can enhance digital literacy by providing access to thousands of IT and Digital Skills Training courses to ensure the right people
  9. The privacy and security domain covers competences such as effectively managing information shared online and using tools
  10. The related concept of information literacy consists of providing people with concepts and training in order to process data and transform them into information, knowledge and decisions.
  11. Technology is the application of conceptual knowledge for achieving practical goals, especially in a reproducible way.
  12. It is a combination of both technical and cognitive abilities in using information and communication technologies to create, evaluate, and share information.
  13. it's about effectively navigating a world that has been transformed by technology, whether in your personal, cultural, educational, or professional life.
  14. This is probably the easiest element of digital literacy to teach/demonstrate in the classroom.
  15. providing people with concepts and training in order to process data and transform them into information, knowledge and decisions.
  16. Mobile literacy, then, is a macroliteracy, which requires us to be able to master all the afore-mentioned literacies.
  17. acts as a filter in a digital space brimming with information, opinions, and messages, helping us discern fact from fiction and valuable data from noise.
  18. the behaviors, practices and values that develop from the use of digital technologies.
  19. Being digitally literate is essential as many employers expect that you possess certain IT skills to perform your duties effectively.
  20. Media literacy focuses on understanding and interpreting various forms of digital media, including images, videos, and online articles.
  21. process that involves sending and receiving messages through the verbal and non-verbal methods.
  22. an individual's ability to find, evaluate, and communicate information using typing or digital media platforms.
  23. platform can create and analyse data, providing real time support to a learning experience. This is relevant at both personal and collective levels.
  24. we are constantly bombarded with information, and being able to discern reliable sources from misinformation is crucial.
  25. Personal computers are general purpose computing devices like desktops and laptops.
  26. the goal of evaluation is to make sure you use resources that are reliable, authoritative, truthful and appropriate for academic research.
  27. refers to a particular set of skills that help us navigate the digital space, understand the implications of our actions, and protect ourselves from cyber threats.

51 Clues: the ability to derive meaningful information from data.Being online means having a computer connected to the internet.the ability to consume and communicate information ethically online.to work jointly with others or together especially in an intellectual endeavorPersonal computers are general purpose computing devices like desktops and laptops....

Cyber and Digital Literacy 2024-05-13

Cyber and Digital Literacy crossword puzzle
Across
  1. The reciprocal actions or behaviors between individuals or entities, often involving communication, engagement, or collaboration.
  2. The act of showing or explaining something clearly and effectively, often to illustrate a point or concept.
  3. A particular way of viewing or understanding a situation, concept, or issue, often influenced by one's experiences, beliefs, or cultural background.
  4. the users who utilize the platform to access educational resources, engage in activities, and develop their digital literacy skills.
  5. A collection of related web pages, typically identified by a common domain name and accessible via the Internet.
  6. The ability to perform a task or fulfill a role effectively and efficiently, often based on a combination of knowledge, skills, and experience.
  7. The process of transferring data or files from a remote computer or server to a local computer or device, typically over a network such as the Internet.
  8. refers to bullying behavior that occurs through electronic communication platforms such as social media, messaging apps, or online forums.
  9. The act of understanding or grasping the meaning or significance of something,
  10. The state of being free from unwanted or unauthorized intrusion, especially in regards to personal information shared online.
  11. To evaluate or analyze something critically, often by examining its strengths, weaknesses, and underlying assumptions.
  12. can include smartphones, tablets, computers, and other electronic gadgets used for various tasks such as communication, information retrieval, and content creation.
  13. Able to be believed or trusted because of being reliable, accurate, or convincing.
  14. refer to the competencies needed to navigate, use, and evaluate digital technologies and information effectively.
  15. The abilities or skills that a person or thing possesses and can use or apply.
  16. Tools Software applications or programs used to perform specific tasks or activities in a digital environment.
  17. can include traditional forms such as newspapers, television, and radio, as well as digital platforms such as websites, social media, and streaming services.
  18. Literacy A life skill competence needed for survival in the world of computers, involving awareness of the promises and perils of computers and the internet.
  19. refers to digital devices, software, and systems used for various purposes, including communication, information retrieval, and content creation.
  20. The beliefs, customs, practices, and social behaviors of a particular group of people or society. In the context of digital literacy
  21. Thinking The ability to objectively analyze, evaluate, and synthesize information or arguments, especially in response to complex societal issues raised by digital technologies.
  22. The knowledge and ability to use a range of technology tools for varied purposes.
  23. The process of acquiring knowledge, skills, behaviors, or attitudes through study, experience, or teaching.
  24. The process of moving around or browsing through a website or other digital interface.
  25. it refers to the qualities and responsibilities expected of individuals as members of the digital community, including being digitally literate and adhering to ethical conduct while engaging in online activities.
Down
  1. understanding ethical viewpoints, staying current on new technologies, and recognizing the responsibilities associated with using digital tools and systems.
  2. the world being diverse with cultures, media, print and non-print texts, implying a wide range of cultural backgrounds, media platforms, and types of information.
  3. Pertaining to or conforming to moral principles or standards of conduct, especially in relation to digital citizenship
  4. They are used for a wide range of applications, including personal use, business operations, scientific research, and entertainment.
  5. Logical deductions or conclusions based on prior knowledge, observations, or evidence.
  6. Newly created products, processes, or ideas resulting from human creativity and ingenuity.
  7. Information, understanding, or skills acquired through experience, education, or study.
  8. Information, data, or facts that support or justify a conclusion, claim, or argument.
  9. a common form of communication used for sending text-based messages, files, and documents to individuals or groups.
  10. The methods, strategies, or approaches used in teaching, especially in formal education settings.
  11. The process of exchanging information, ideas, or messages between individuals or groups, often through verbal, written, or digital means.
  12. refers to the process of searching for and locating information online, while adhering to ethical conduct and procedures
  13. To communicate or get in touch with someone or an organization, often through email, phone, or other means.
  14. The quality of being easily usable or accessible, especially for individuals with disabilities.
  15. An environment or tool used for learning activities that take place in a digital setting, providing resources, interaction, and opportunities for skill development.
  16. To assess or judge the value, significance, or quality of something, especially by careful appraisal or examination.
  17. A clickable connection between one web page and another, allowing users to navigate between different pages or resources on the internet.
  18. An individual who instructs, educates, or guides others, typically in a formal setting such as a classroom.
  19. The state of being responsible or answerable for one's actions.
  20. The ability to read and write, including digital literacy skills such as using, evaluating, and creating data and images in the digital environment.
  21. Pertaining to or involving the use of computer technology, especially the internet and digital devices, in various aspects of life.
  22. Relating to or involving computers or computer networks, especially the internet.
  23. used to enhance content delivery and engagement, providing visual aids to help learners understand concepts or processes.
  24. Presenting someone else's work, ideas, or words as one's own without proper acknowledgment or citation.
  25. In the context of digital literacy, integration refers to the incorporation of one's critical point of view into interactive messages created or encountered online.

50 Clues: The state of being responsible or answerable for one's actions.The act of understanding or grasping the meaning or significance of something,The abilities or skills that a person or thing possesses and can use or apply.Relating to or involving computers or computer networks, especially the internet....

Cyber Physical Systems-2 2025-03-20

Cyber Physical Systems-2 crossword puzzle
Across
  1. Using data to forecast and prevent equipment failures.
  2. Self-driving cars and intelligent transportation systems.
  3. A predictable system behavior under given conditions.
  4. The delay between input and response in a system.
  5. An intelligent electricity network with automated controls.
  6. The use of technology to control industrial processes.
  7. Ensuring processes operate in a coordinated manner.
  8. The ability to continue operation despite component failures.
Down
  1. Smart healthcare devices with embedded intelligence.
  2. The creation of mathematical representations of systems.
  3. The ability of a system to function under expected conditions.
  4. The process of improving system performance.
  5. The capacity of a system to handle growth efficiently.
  6. Urban areas that integrate technology for improved efficiency.
  7. Monitoring and optimizing energy consumption.
  8. Farming with IoT and AI for better productivity.
  9. The production of goods using machines and automation.
  10. The management of materials and goods from production to delivery.
  11. Duplication of critical components to increase reliability.
  12. The capacity of a system to recover from disruptions.

20 Clues: The process of improving system performance.Monitoring and optimizing energy consumption.Farming with IoT and AI for better productivity.The delay between input and response in a system.Ensuring processes operate in a coordinated manner.Smart healthcare devices with embedded intelligence.A predictable system behavior under given conditions....

Cyber Physical Systems-2 2025-03-20

Cyber Physical Systems-2 crossword puzzle
Across
  1. Using data to forecast and prevent equipment failures.
  2. Self-driving cars and intelligent transportation systems.
  3. A predictable system behavior under given conditions.
  4. The delay between input and response in a system.
  5. An intelligent electricity network with automated controls.
  6. The use of technology to control industrial processes.
  7. Ensuring processes operate in a coordinated manner.
  8. The ability to continue operation despite component failures.
Down
  1. Smart healthcare devices with embedded intelligence.
  2. The creation of mathematical representations of systems.
  3. The ability of a system to function under expected conditions.
  4. The process of improving system performance.
  5. The capacity of a system to handle growth efficiently.
  6. Urban areas that integrate technology for improved efficiency.
  7. Monitoring and optimizing energy consumption.
  8. Farming with IoT and AI for better productivity.
  9. The production of goods using machines and automation.
  10. The management of materials and goods from production to delivery.
  11. Duplication of critical components to increase reliability.
  12. The capacity of a system to recover from disruptions.

20 Clues: The process of improving system performance.Monitoring and optimizing energy consumption.Farming with IoT and AI for better productivity.The delay between input and response in a system.Ensuring processes operate in a coordinated manner.Smart healthcare devices with embedded intelligence.A predictable system behavior under given conditions....

Cyber Ethics Crossword Puzzle 2025-06-14

Cyber Ethics Crossword Puzzle crossword puzzle
Across
  1. : Blocks harmful or unauthorized access
  2. : Fake emails used to steal information
  3. : Malicious software disguised as useful
  4. : Secret code used to access accounts
  5. : Tracks your activity without permission
  6. : Preventing unauthorized access to data
  7. : A crime committed using computers
  8. : Good behavior and manners online
  9. Factor : Extra layer of login security
Down
  1. : Protects data by making it unreadable without a key
  2. : Making a copy of data for safety
  3. : Unwanted or junk emails
  4. : Using someone’s work without giving credit
  5. : Your trace left behind online
  6. : Digital version of bad behavior
  7. : Where most cyberbullying happens
  8. : Permission before collecting personal data
  9. : Illegally accessing someone’s computer
  10. : Software to detect and remove malware
  11. Theft : Stealing someone’s personal info online

20 Clues: : Unwanted or junk emails: Your trace left behind online: Digital version of bad behavior: Making a copy of data for safety: Where most cyberbullying happens: Good behavior and manners online: A crime committed using computers: Secret code used to access accountsFactor : Extra layer of login security: Blocks harmful or unauthorized access...

Cyber Ethics Crosswords Puzzle 2025-06-05

Cyber Ethics Crosswords Puzzle crossword puzzle
Across
  1. Criminal activity involving computer
  2. Using others original works
  3. Unwanted emails from a unknown sources
  4. Copied and distributed illegally
  5. Converting encrypted data into readable form
  6. Appropriately using the Internet
  7. A type of Spamming
  8. Sending emails to user to get their information
  9. A security system
  10. A criminal practice on social influence
Down
  1. Attackers send mails to make server full
  2. Illegal intrusion in a computer system
  3. Harassing a person in a deliberate manner
  4. Disrupts normal functioning of a Computer
  5. Protecting original ideas
  6. Keep it secret and change periodically
  7. Set of procedures and moral principles
  8. Secretly breaks into a computer system
  9. Convert data into a code
  10. Prevent Plagiarism

20 Clues: A security systemPrevent PlagiarismA type of SpammingConvert data into a codeProtecting original ideasUsing others original worksCopied and distributed illegallyAppropriately using the InternetCriminal activity involving computerIllegal intrusion in a computer systemKeep it secret and change periodicallyUnwanted emails from a unknown sources...

PassoverCyber 2026-03-28

PassoverCyber crossword puzzle
Across
  1. State of a system that has been thoroughly checked
  2. A model that trusts nothing by default, even inside the network
  3. System that does "bedikat chametz" and looks for vulnerabilities (a bit like “” for code)
  4. Bread eaten at Passover
  5. mechanism that records attempts to access systems and security events
  6. Security practice of regularly updating software to fix known weaknesses
  7. The Policy book we read at the Seder
  8. Type of malware that encrypts files and demands payment
Down
  1. Holiday commemorating the Exodus
  2. Process of proving you are who you claim to be
  3. Type of attack that floods a system with traffic (like locusts)
  4. Protection that scrambles data so only authorized parties can read it
  5. Principle that says users should only have the permissions they need
  6. Common method attackers use to trick users into revealing passwords
  7. Security layer added after a password (like an extra doorpost protection)

15 Clues: Bread eaten at PassoverHoliday commemorating the ExodusThe Policy book we read at the SederProcess of proving you are who you claim to beState of a system that has been thoroughly checkedType of malware that encrypts files and demands paymentType of attack that floods a system with traffic (like locusts)...

Star Trek: Deep Space Nine: Characters 2025-02-20

Star Trek: Deep Space Nine: Characters crossword puzzle
Across
  1. Bajoran Freedom Fighter and Sisko's First In Command
  2. DS9's Doctor
  3. Former Teacher Of The Former DS9 School
  4. Ferengi Bar Owner
  5. Freighter Captain Currently Dating Benjamin Sisko
  6. Chief Of Security On Deep Space 9
  7. Brother Of The Bar Owner
  8. Ferengi In Starfleet Academy
Down
  1. Jake Sisko's Dad; Captain Of Deep Space Nine
  2. Current Trill Symbiant Host
  3. Son Of The Captain
  4. Klingon Formerly Of USS Enterprise
  5. High Officer On Cardassia; Garak's Nemesis
  6. Another Security Officer On Deep Space 9
  7. Cardassian Tailor
  8. Kira's Former Lover Who Died In A StarShip Accident
  9. Bajor's Spiritual Leader
  10. Chief Of Operations On Deep Space Nine

18 Clues: DS9's DoctorCardassian TailorFerengi Bar OwnerSon Of The CaptainBajor's Spiritual LeaderBrother Of The Bar OwnerCurrent Trill Symbiant HostFerengi In Starfleet AcademyChief Of Security On Deep Space 9Klingon Formerly Of USS EnterpriseChief Of Operations On Deep Space NineFormer Teacher Of The Former DS9 School...

Bullying 2022-06-06

Bullying crossword puzzle
Across
  1. intentional repeated feels proud
  2. pointing out differences
  3. use of any electronic means to hurt someone
  4. secrecy of internet encourages those who might not otherwise bull
  5. name calling jokes offensive remarks
Down
  1. sending pictures messages information using electronic devices
  2. identity of the person who bullies can be kept secret.
  3. accidental occasional feels remorse
  4. a single significant act or a pattern of acts by one or more students
  5. excluding others from a group
  6. any physical contact that hurts a person
  7. using threats

12 Clues: using threatspointing out differencesexcluding others from a groupintentional repeated feels proudaccidental occasional feels remorsename calling jokes offensive remarksany physical contact that hurts a personuse of any electronic means to hurt someoneidentity of the person who bullies can be kept secret....

Bullying 2022-06-06

Bullying crossword puzzle
Across
  1. intentional repeated feels proud
  2. pointing out differences
  3. use of any electronic means to hurt someone
  4. secrecy of internet encourages those who might not otherwise bull
  5. name calling jokes offensive remarks
Down
  1. sending pictures messages information using electronic devices
  2. identity of the person who bullies can be kept secret.
  3. accidental occasional feels remorse
  4. a single significant act or a pattern of acts by one or more students
  5. excluding others from a group
  6. any physical contact that hurts a person
  7. using threats

12 Clues: using threatspointing out differencesexcluding others from a groupintentional repeated feels proudaccidental occasional feels remorsename calling jokes offensive remarksany physical contact that hurts a personuse of any electronic means to hurt someoneidentity of the person who bullies can be kept secret....

Back to school 2025-09-28

Back to school crossword puzzle
Across
  1. the best autumnal beverage
  2. the animal embedded in a conkers real name
  3. pythagoras’ theorem applies to right angle…
  4. septembers seasonal fruit
  5. famous for his one armed strut
  6. uniform colour if nobody obeys the dress code
Down
  1. name of sixth form cafe
  2. otherwise known as sodium chloride
  3. wrote the book from the “book review section”
  4. studying technique named after an italian tomato
  5. september 22nd is the autumn…

11 Clues: name of sixth form cafeseptembers seasonal fruitthe best autumnal beverageseptember 22nd is the autumn…famous for his one armed strutotherwise known as sodium chloridethe animal embedded in a conkers real namepythagoras’ theorem applies to right angle…wrote the book from the “book review section”uniform colour if nobody obeys the dress code...

Trend Micro Mobile Security 2024-05-06

Trend Micro Mobile Security crossword puzzle
Across
  1. Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i)
  2. Trend Micro regularly releases ____ for it's mobile security products to address new threats and vulnerabilities. (Starts with u)
  3. Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e)
  4. Users are encouraged to keep their Trend Micro Mobile Security app ____ to ensure they have the latest security features and protections.
Down
  1. Trend Micro regular updates help to enhance ____ capabilities (Starts with p)
  2. Trend Micro Mobile Security provides ____ security protection. (Starts with c)
  3. Trend Micro Mobile Security optimizes ____ usage to ensure minimal disruption to device performance. (Starts with r)

7 Clues: Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e)Trend Micro regular updates help to enhance ____ capabilities (Starts with p)Trend Micro Mobile Security provides ____ security protection. (Starts with c)Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i)...

Departments of the US government 2021-01-05

Departments of the US government crossword puzzle
Across
  1. promotes job creation and economic growth by ensuing fair and reciprocal trade
  2. regulating food products and new pharmaceutical drugs, implementing healthcare programs and preventing the spread of disease
  3. responsible for providing military forces needed to deter war and protect the security of our country
  4. Responsible for providing vital services to Americas veterans including healthcare, and other benefits programs
  5. oversees farming, ranching and forestry as well as regulates food quality and safety and nutritional labeling
  6. in charge of country
  7. Responsible for managing federal finance, collection of taxes, duties and monies paid to and due to the U.S and paying of all bills
Down
  1. 2nd to the president
  2. Governments lead agency for planning and support of the nations land, air and sea-based travel systems
  3. responsible for national policy programs that address America's housing needs and enforce fair housing laws
  4. responsible for counterterrorism, cybersecurity, aviation security, border security etc.
  5. uses sound science to manage and sustain Americas lands, water, wildlife, and energy resources and honors ur nations responsibilities to tribal nations
  6. enforce the law and defend the interest of the United States according to the law
  7. establishes administrator policy, coordinates most federal educational assistance, collects data on U.S schools and enforce educational laws
  8. department responsible for advancing the energy, environmental, and nuclear security of the United States
  9. promotes the welfare of the job seekers, wage-earners and retirees of the United States

16 Clues: 2nd to the presidentin charge of countrypromotes job creation and economic growth by ensuing fair and reciprocal tradeenforce the law and defend the interest of the United States according to the lawpromotes the welfare of the job seekers, wage-earners and retirees of the United States...

We're All Cyber Superheroes! 2023-02-14

We're All Cyber Superheroes! crossword puzzle
Across
  1. A form of malware that when executed, changes, corrupts, or destroys information in a system, then it passes on to other systems and damages those as well
  2. A network of computers that have been infected with a virus and now continuously work to create security breaches
  3. A hacking strategy that relies on user manipulation and exploiting human psychology to carry out attacks (two words)
  4. A form of malware that hijacks your system, encrypts your files, and denies you access until you send a payment to unlock them
  5. Threat detection technology designed to shield users from viruses, spyware, trojans, and worms (two words)
  6. A form of ethical hacking that simulates a cyberattack to look for weaknesses that malicious actors may be able to exploit (two words)
  7. A part of the computer system designed to block unauthorized access and keep intruders out
  8. A term for a wide variety of malicious software used to infect and/or damage systems
  9. The use of unique biological features for digital authentication and access control
  10. Protection from potential harm caused by others
  11. An acronym for a tool that gives a user privacy and anonymity online by connecting to a secure server
  12. Use this to access resources, software, and databases over the Internet and outside the confines of local hardware restrictions
Down
  1. A type of scam where a threat actor poses as a legitimate business or organization in order to trick a victim into clicking on a malicious link or attachment
  2. When a hacker changes the email address or Wi-Fi network name so that it appears to be a trusted source
  3. Someone who uses their information technology knowledge and skill to gain unauthorized access to computers, systems, and data
  4. Converting raw data, known as plaintext, into a code, known as ciphertext, to prevent hackers from being able to understand it if they gain access to it
  5. A group of applications that instruct a computer to carry out a task
  6. Occurs when a hacker successfully breaks into a system, takes control of a network, or exposes personal information (two words)
  7. A piece of audio or video that has been altered to make it seem authentic, often used maliciously to spread false information
  8. An acronym for an authentication tool that requires a combination of two or more credentials to verify a user’s identity for login
  9. A form of malware that replicates itself in order to spread to other computers
  10. A code that takes advantage of a software vulnerability or flaw
  11. A form of malware that throws up unwanted advertisements on your screen
  12. A form of malware used to spy on you and your computer activity
  13. Concerning the proper handling of sensitive data to protect its confidentiality and meet regulatory requirements

25 Clues: Protection from potential harm caused by othersA code that takes advantage of a software vulnerability or flawA form of malware used to spy on you and your computer activityA group of applications that instruct a computer to carry out a taskA form of malware that throws up unwanted advertisements on your screen...

Cyber safety-Charlotte Cameron 2016-05-21

Cyber safety-Charlotte Cameron crossword puzzle
Across
  1. could contain a virus so do not open.
  2. they keep you safe online and give you a safe guide.
  3. to put a picture or information on the internet.
  4. up, an add that automatically comes up on your screen.
  5. tries to gain trust and then does something mean and rude.
  6. can wipe a devices memory.
  7. safe information kept in computer to hide.
  8. bulling, people who message harmful and rude messages.
  9. a device many people have but can be dangerous.
  10. theft,someone who steels someones identity and uses it as them to gain money or benefits.
  11. the first step to logging into a online game.
Down
  1. people who login to an device and steels money, and information.
  2. something that comes up on your screen and tells you to login.
  3. enjoy seeing people getting mad of what the have put up.
  4. information about you that has to be kept safe.
  5. to lure someone online to know what they are talking about.
  6. a set of numbers or letters that has to be kept secret.
  7. a large device that can be hacked.
  8. lock, allows parents to see what activities their children are using.
  9. a object that is small and can be scammed and get virus'.

20 Clues: can wipe a devices memory.a large device that can be hacked.could contain a virus so do not open.safe information kept in computer to hide.the first step to logging into a online game.information about you that has to be kept safe.a device many people have but can be dangerous.to put a picture or information on the internet....

Cyber safety -Madeline Ween 2016-06-07

Cyber safety -Madeline Ween crossword puzzle
Across
  1. mean people who are not nice
  2. copying notes from the website
  3. can impact on actions
  4. a thing that is very important on the iPad
  5. chatting to strangers
  6. a trick or a lie
  7. you can search about everything
  8. people that can take care of you on the websites
  9. for work and play
Down
  1. A bad thing that can ruin your device
  2. people who are the opposite of bullies
  3. people that get a hold of your password
  4. following people on or off line
  5. photos or videos that can be bad or good
  6. apps or other things
  7. can be inappropriate or sensible
  8. chatting to contacts
  9. some games are inappropriate for little kids
  10. how we conect
  11. sending things

20 Clues: how we conectsending thingsa trick or a liefor work and playapps or other thingschatting to contactscan impact on actionschatting to strangersmean people who are not nicecopying notes from the websitefollowing people on or off lineyou can search about everythingcan be inappropriate or sensibleA bad thing that can ruin your device...

Cyber safety -Tessa Griffin 2016-05-24

Cyber safety -Tessa Griffin crossword puzzle
Across
  1. an app you've used to look up things
  2. You can get a lot of apps on it
  3. How we connect like Telstra
  4. you look at it when you are watching a movie
  5. an app you use to text people
  6. People that can track you down
  7. something Lawyers work on a lot
  8. you use them on iPads
  9. It starts with a L and you play on it
  10. Chatting to Stranges
  11. an app you use to watch videos
  12. They are everywhere
  13. They can cause a virus
Down
  1. a person that supervisors you
  2. another word for concentrate
  3. something bad you get on a computer
  4. I device do you use to talk to another person
  5. Another Word for safe
  6. They can cause the virus
  7. you use it to get apps
  8. You use it to get onto a iPad (some people don't have it)
  9. Bad people on the Internet

22 Clues: They are everywhereyou use them on iPadsyou use it to get appsChatting to StrangesThey can cause a virusAnother Word for safeThey can cause the virusHow we connect like TelstraBad people on the Internetanother word for concentratean app you use to text peoplea person that supervisors youPeople that can track you down...

Cyber safety Sienna Finau 2016-05-25

Cyber safety     Sienna Finau crossword puzzle
Across
  1. Something that pops up on your screen
  2. A . .of some one
  3. Too make your screen smaller
  4. A thing adults use to post thing on
  5. A website the you can post stuff on it
  6. A texts file
  7. Something you must always protect
  8. If some one is watching you
  9. something you don't want on your computer
  10. Sending a letter on line
  11. A place to keep things
Down
  1. To see some one on a phone or iPad
  2. If you want to send something to some one
  3. So wing you keep private
  4. What to do is to keep something to yourself
  5. If some one is being mean
  6. Some one who is finding out your password
  7. On the Internet
  8. Someone that tricks you in to buying things that are not real
  9. Cordless Internet

20 Clues: A texts fileOn the InternetCordless InternetA . .of some oneA place to keep thingsSending a letter on lineSo wing you keep privateIf some one is being meanIf some one is watching youToo make your screen smallerSomething you must always protectTo see some one on a phone or iPadA thing adults use to post thing on...

Cyber safety Sienna Finau 2016-05-25

Cyber safety     Sienna Finau crossword puzzle
Across
  1. Something that pops up on your screen
  2. A . .of some one
  3. Too make your screen smaller
  4. A thing adults use to post thing on
  5. A website the you can post stuff on it
  6. A texts file
  7. Something you must always protect
  8. If some one is watching you
  9. something you don't want on your computer
  10. Sending a letter on line
  11. A place to keep things
Down
  1. To see some one on a phone or iPad
  2. If you want to send something to some one
  3. So wing you keep private
  4. What to do is to keep something to yourself
  5. If some one is being mean
  6. Some one who is finding out your password
  7. On the Internet
  8. Someone that tricks you in to buying things that are not real
  9. Cordless Internet

20 Clues: A texts fileOn the InternetCordless InternetA . .of some oneA place to keep thingsSending a letter on lineSo wing you keep privateIf some one is being meanIf some one is watching youToo make your screen smallerSomething you must always protectTo see some one on a phone or iPadA thing adults use to post thing on...

Cyber safety - Ella Smith 2016-05-17

Cyber safety - Ella Smith crossword puzzle
Across
  1. someone who helps you
  2. people who try and get your money
  3. distributive emails or messages
  4. how you talk
  5. information your own details
  6. a type of social media
  7. your own or other people's email or phone number
  8. a mean person
  9. something that we use everyday
  10. something that can shut down your computer
Down
  1. how you get information
  2. something that can pop up on your computer
  3. bad people who can still your belongings
  4. your own place
  5. something that you can get spams on
  6. media websites that you can communicate on
  7. about your self
  8. your own space
  9. you face on the Internet
  10. people who follow you

20 Clues: how you talka mean personyour own placeyour own spaceabout your selfsomeone who helps youpeople who follow youa type of social mediahow you get informationyou face on the Internetinformation your own detailssomething that we use everydaydistributive emails or messagespeople who try and get your moneysomething that you can get spams on...

Cyber Ethics Crossword Puzzle 2025-06-14

Cyber Ethics Crossword Puzzle crossword puzzle
Across
  1. : Secret code used to access accounts
  2. : Blocks harmful or unauthorized access
  3. : Software to detect and remove malware
  4. : Fake emails used to steal information
  5. : Unwanted or junk emails
  6. : Permission before collecting personal data
  7. Factor : Extra layer of login security
  8. : A crime committed using computers
  9. : Your trace left behind online
Down
  1. : Malicious software disguised as useful
  2. : Making a copy of data for safety
  3. : Using someone’s work without giving credit
  4. : Protects data by making it unreadable without a key
  5. : Where most cyberbullying happens
  6. : Digital version of bad behavior
  7. Theft : Stealing someone’s personal info online
  8. : Good behavior and manners online
  9. : Preventing unauthorized access to data
  10. : Illegally accessing someone’s computer
  11. : Tracks your activity without permission

20 Clues: : Unwanted or junk emails: Your trace left behind online: Digital version of bad behavior: Making a copy of data for safety: Where most cyberbullying happens: Good behavior and manners online: A crime committed using computers: Secret code used to access accountsFactor : Extra layer of login security: Blocks harmful or unauthorized access...

Networking concepts & Cyber ethics 2025-06-18

Networking concepts & Cyber ethics crossword puzzle
Across
  1. a small message sent over the internet.
  2. the unique number assigned to every device on a network.
  3. a group of connected computers in a small area.
  4. the illegal act of stealing someone’s personal data.
  5. keeping your data safe and private online.
  6. a place to store web pages.
  7. a physical device used to connect computers in a network.
  8. software that blocks harmful websites.
  9. acting kindly and respectfully online.
Down
  1. harmful links or attachments often sent via email.
  2. a global system of interconnected networks.
  3. software used to browse the web.
  4. rule-breaking activity on a computer.
  5. another word for cyber cheating or copying someone’s work.
  6. a strong word used to protect accounts.
  7. someone who uses the internet to bully others.
  8. unwanted software that harms your system.
  9. a document that explains acceptable computer use.
  10. the right to control how your personal information is used.
  11. connecting two or more computers.

20 Clues: a place to store web pages.software used to browse the web.connecting two or more computers.rule-breaking activity on a computer.software that blocks harmful websites.acting kindly and respectfully online.a small message sent over the internet.a strong word used to protect accounts.unwanted software that harms your system....

Cyber and Digital Literacy 2024-04-30

Cyber and Digital Literacy crossword puzzle
Across
  1. is a digital space that lets educators pull lots of different rich media types into in one easy-to-access place
  2. any creative element, for example, text, applications, images, archived e-mail messages, data, e-services, audio and video files, and so on
  3. are small files of information that a web server generates and sends to a web browser
  4. is the practical application of knowledge especially in a particular area
  5. is a digital reference to data that the user can follow or be guided to by clicking or tapping
  6. media refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
  7. is a generic term used to refer to applications, scripts and programs that run on a device
  8. the imparting of knowledge in general
  9. is a free online encyclopedia, created and edited by volunteers around the world
  10. is used to give users quick access to all of their essential programs, applications, settings, and notifications
  11. is a game-based learning platform that makes it easy to create, share and play learning games or trivia quizzes in minutes
  12. it means having the skills to be able to read, write and speak to understand and create meaning
  13. is an online tool for teachers to give quizzes and on-the-fly assessments to students
  14. is a software program used to locate and display information on the Internet or an intranet
  15. to transfer the data from one computer to another
  16. is a group of two or more computers or other electronic devices that are interconnected for the purpose of exchanging data and sharing resources
  17. it means to receive data from a remote system, typically a server such as a web server, an FTP server, an email server, or other similar systems
  18. is a reference to a source
  19. is information that is set up for easy access, management and updating
  20. is a collection of web pages and related content that is identified by a common domain name and published on at least one web server
  21. an excessive quantity or fullness
  22. are the communication outlets or tools used to store and deliver information or data
  23. a prefix that means “computer” or “computer network”
Down
  1. to produce printed matter
  2. is any hardware or software used to host an application or service
  3. a program used for software development or system maintenance
  4. is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission or storage
  5. It is brand-specific original content curated and published by customers on any social media platform
  6. is a computer program or device that provides a service to another computer program and its user, also known as the client
  7. is an electronic device that manipulates information, or data
  8. refers to the computer's tangible components or delivery systems that store and run the written instructions provided by the software
  9. is a global collection of documents and other resources, linked by hyperlinks and URIs
  10. are software programs developed for end-users to accomplish specific computing tasks
  11. refers to both the delivery system and individual messages that are sent and received
  12. it is to connect its users and allow them to share their thoughts with their followers and others through the use of hashtags
  13. is a popular internet search engine
  14. is a global network of billions of computers and other electronic devices
  15. is being such in essence or effect though not formally recognized or admitted
  16. is the process of translating printed words into speech
  17. the activity of exploring various websites and webpages using a web browser
  18. is a free web browser used for accessing the internet and running web-based applications
  19. is a sequence or set of instructions in a programming language for a computer to execute
  20. connected to, served by, or available through a system and especially a computer or telecommunications system
  21. a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment
  22. facts and statistics collected together for reference or analysis
  23. refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication
  24. is a media platform made by Mark Zuckerberg
  25. relating to, or utilizing devices constructed or working by the methods or principles of electronics
  26. engine is a software program that helps people find the information they are looking for online using keywords or phrases
  27. is the technology that connects your offices, data centers, cloud applications, and cloud storage together

50 Clues: to produce printed matteris a reference to a sourcean excessive quantity or fullnessis a popular internet search enginethe imparting of knowledge in generalis a media platform made by Mark Zuckerbergto transfer the data from one computer to anothera prefix that means “computer” or “computer network”...

Cyber Awareness Month Crossword 2025-10-10

Cyber Awareness Month Crossword crossword puzzle
Across
  1. Malware disguised as legitimate software
  2. A second layer of security for logging in
  3. Tricking people into revealing confidential info
  4. A software fix for security vulnerabilities
  5. A saved copy of your data in case of loss
  6. Good habits to stay safe online
  7. Malware that locks your files and demands payment
  8. Misleading links designed to get your attention
  9. Verifying your identity before granting access
  10. Software that detects and removes malicious programs
  11. A secure connection that hides your online activity
  12. Malicious software designed to harm or exploit systems
Down
  1. Software that automatically displays unwanted ads
  2. Protocol that encrypts data between websites and browsers
  3. Malware that hides deep in your system
  4. Scrambling data so only authorized users can read it
  5. Software that secretly monitors your activity
  6. A hidden part of the internet not indexed by search engines
  7. A network of infected devices controlled remotely
  8. Unauthorized access to data or systems
  9. Fake emails trying to trick you into giving personal info
  10. A flaw exploited before developers can fix it
  11. Pretending to be someone else online
  12. A secret word or phrase used to access accounts
  13. A digital barrier that blocks unauthorized access

25 Clues: Good habits to stay safe onlinePretending to be someone else onlineMalware that hides deep in your systemUnauthorized access to data or systemsMalware disguised as legitimate softwareA second layer of security for logging inA saved copy of your data in case of lossA software fix for security vulnerabilities...

FLM NOVEMBER Crossword 2025-11-05

FLM NOVEMBER Crossword crossword puzzle
Across
  1. color for many discounts on this Friday
  2. tree associated with Canada
  3. bird with red chin
  4. "glad I get to enjoy this" *feeling*
  5. to trip & ____
  6. holiday on the fourth Thursday in November
  7. "rhymes with door hinge"
  8. accumulation of rain
Down
  1. online sale name for this Monday
  2. protects from sky's showers
  3. sport played on ice with brooms
  4. what Mariah Carey is frozen in until November 1st
  5. boil them, mash them, put them in a stew
  6. the color a popular song about demon hunting
  7. who you feel at home with
  8. what you go to Devil's lake to do in the fall
  9. changing colors seasonally
  10. popular fall gourd

18 Clues: to trip & ____bird with red chinpopular fall gourdaccumulation of rain"rhymes with door hinge"who you feel at home withchanging colors seasonallyprotects from sky's showerstree associated with Canadasport played on ice with broomsonline sale name for this Monday"glad I get to enjoy this" *feeling*color for many discounts on this Friday...

40 Limited Edition 3IT 2014-09-30

40 Limited Edition 3IT crossword puzzle
Across
  1. food
  2. self-centered&egoistic
  3. orange bag
  4. batman
  5. never iron shirt
  6. socks on the floor
  7. upsized Lee
  8. last girl before boys
  9. bird nest
  10. rolling in the deep
  11. tallest girl
  12. the queen
  13. TicTac Santa
  14. 18/17
  15. Mr Tay's darling
  16. 154cm
  17. Keep calm and study
  18. opp. of white
  19. broken finger
Down
  1. wood
  2. bimbo
  3. bad hair day
  4. Ritchie
  5. keep calm and take MC
  6. sleeping beast
  7. 우빈
  8. 10+9 on the list
  9. downsized Han
  10. football team
  11. The devil
  12. Ting Xie artist
  13. name list
  14. Loudest girl
  15. hair very nice boy
  16. tallest boy
  17. his girlfriend
  18. cyber rapist
  19. wushu
  20. chatterbox
  21. ( x,y )

40 Clues: 우빈woodfoodbimbo18/17154cmwushubatmanRitchie( x,y )The devilname listbird nestthe queenorange bagchatterboxupsized Leetallest boybad hair dayLoudest girltallest girlTicTac Santacyber rapistdownsized Hanfootball teamopp. of whitebroken fingersleeping beasthis girlfriendTing Xie artistnever iron shirt10+9 on the listMr Tay's darlingsocks on the floor...

5 2024-07-06

5 crossword puzzle
Across
  1. Warrior Princess TV show.
  2. Classic arcade game.
  3. Pop princess Spears.
  4. Alternative rock band Pumpkins.
  5. Cult classic superhero movie.
  6. Cult classic cyber thriller.
  7. Popular khaki pants brand.
  8. James Cameron's epic romance.
  9. Virtual pet keychains.
  10. Early wireless handheld computer.
  11. Boy band New Kids on the Block.
  12. Scifi film with Keanu Reeves.
Down
  1. Pop icon with many hits.
  2. 3D optical illusion books.
  3. Early pagers for communication.
  4. Collectible milk caps game.
  5. Dark comedy crime film.
  6. Paranormal investigation TV show.
  7. Rapper known for "Gangsta's Paradise".
  8. Band fronted by Gwen Stefani.
  9. Collectible toy cars.
  10. TV show about a working-class family.
  11. Mitsubishi sports car model.
  12. Purple dinosaur children's show.
  13. Pop-punk band.

25 Clues: Pop-punk band.Classic arcade game.Pop princess Spears.Collectible toy cars.Virtual pet keychains.Dark comedy crime film.Pop icon with many hits.Warrior Princess TV show.3D optical illusion books.Popular khaki pants brand.Collectible milk caps game.Cult classic cyber thriller.Mitsubishi sports car model.Cult classic superhero movie....

Teka-Teki Silang kata serapan dan konjungsi 2025-09-15

Teka-Teki Silang kata serapan dan konjungsi crossword puzzle
Across
  1. salah satu di dari klausa itu adalah anak
  2. kata"sebelumnya"merupakan konjungsi
  3. memperkaya kosakata merupakan fungsi dari
  4. bisnis berasal dari bahasa
  5. peramban merupakan serapan dari kata
  6. kata"tetapi, melainkan"merupakan kata hubung
  7. kata"atau" merupakan konjungsi
  8. konjungsi merupakan kata...dalam suatu kalimat
  9. kata"terakhir" merupakan konjungsi
Down
  1. kata angka diserap dari bahasa
  2. adaptasi merupakan unsur serapan yang disesuaikan pada ejaan dan lafal
  3. kata siber diserap dari kata
  4. biarpun San meskipun termasuk subordinatif
  5. rekening adalah contoh kata serapan
  6. kata yang digunakan untuk menghubungkan frasa/klausa disebut konjungsi
  7. adi suka baca buku. Baca merupakan jenis kata serapan
  8. seperti dan seolah-olah termasuk subordinatif
  9. kata"guna"merupakan konjungsi
  10. dosen berasal dari bahasa Belanda yaitu
  11. bola berasal dari bahasa

20 Clues: bola berasal dari bahasabisnis berasal dari bahasakata siber diserap dari katakata"guna"merupakan konjungsikata angka diserap dari bahasakata"atau" merupakan konjungsikata"terakhir" merupakan konjungsirekening adalah contoh kata serapankata"sebelumnya"merupakan konjungsiperamban merupakan serapan dari katadosen berasal dari bahasa Belanda yaitu...

Year 8 ICT 2016-07-15

Year 8 ICT crossword puzzle
Across
  1. a question you might ask a database.
  2. somewhere that stores related information.
  3. an animation programme.
  4. hyper link.
  5. a character from Scratch.
Down
  1. defines the top of a document or section in HTML.
  2. to bully online by sending or posting mean,hurtful, or intimidating messages usually anonymous.
  3. language for creating websites.
  4. one piece of information in a record.
  5. formatting your web page.

10 Clues: hyper link.an animation programme.formatting your web page.a character from Scratch.language for creating websites.a question you might ask a database.one piece of information in a record.somewhere that stores related information.defines the top of a document or section in HTML....

cybersecurity 2024-02-21

cybersecurity crossword puzzle
Across
  1. Cyber-attack
  2. Action that guarantee the identity of a computer
  3. Error checking method
  4. Hash function
Down
  1. Unpredictable number generated by an algorithm
  2. Systems that are connected by each others
  3. Technological process for telling a computer which tasks to perform in order to solve problems
  4. One way encryption
  5. Internet protocol part of the transport layer
  6. Reference model of system interconnection

10 Clues: Cyber-attackHash functionOne way encryptionError checking methodSystems that are connected by each othersReference model of system interconnectionInternet protocol part of the transport layerUnpredictable number generated by an algorithmAction that guarantee the identity of a computer...

Online bulling 2024-06-11

Online bulling crossword puzzle
Across
  1. Someone you can talk to at school.
  2. You go to the police to write a report.
  3. If someone sends you this don’t share it.
  4. Harassing someone.
  5. A place to report crime.
Down
  1. Something you can talk and text on.
  2. Do not share what isn’t yours.
  3. Only share things with people you.
  4. You can always get help.
  5. An online internet word.

10 Clues: Harassing someone.You can always get help.An online internet word.A place to report crime.Do not share what isn’t yours.Someone you can talk to at school.Only share things with people you.Something you can talk and text on.You go to the police to write a report.If someone sends you this don’t share it.

AZKA HEYRA MAULIDHIA 2024-09-30

AZKA HEYRA MAULIDHIA crossword puzzle
Across
  1. kerja sama antar kelompok disebut
  2. perangkat lunak presentasi untuk mengeksplorasi berbagai ide
  3. sesuatu yang dapat dilihat dengan indra penglihatan
  4. data yang berupa angka
  5. berbicara atau berkomunikasi dengan banyak orang
  6. bentuk penyajian data atau informasi dalam bentuk grafis
Down
  1. kepanjangan dari AD adalah
  2. fenomena mengolaborasikan teknologi cyber dan teknologi otomatis
  3. sistem komputer dan informasi
  4. aplikasi yang sering dimainkan oleh anak" adalah

10 Clues: data yang berupa angkakepanjangan dari AD adalahsistem komputer dan informasikerja sama antar kelompok disebutberbicara atau berkomunikasi dengan banyak orangaplikasi yang sering dimainkan oleh anak" adalahsesuatu yang dapat dilihat dengan indra penglihatanbentuk penyajian data atau informasi dalam bentuk grafis...

Sosiologi Tentang Globalisasi 2025-08-25

Sosiologi Tentang Globalisasi crossword puzzle
Across
  1. proses pembelajaran yang berpusat pada siswaLea
  2. nilai-nilai yang dianut oleh suatu masyarakat
  3. bahasa pemrograman yang populer
  4. domestik bruto indikator keberhasilan ekonomi suatu negara
  5. metode pembelajaran yang menggunakan teknologi
  6. jenis serangan cyber yang berbahaya
Down
  1. sistem ekonomi yang berdasarkan pada kepemilikan swasta
  2. bentuk kemonukasi yang tidak langsung
  3. perusahaan teknologi yang terkenal
  4. jenis teknologi yang digunakan untuk mengakses internet

10 Clues: bahasa pemrograman yang populerperusahaan teknologi yang terkenaljenis serangan cyber yang berbahayabentuk kemonukasi yang tidak langsungnilai-nilai yang dianut oleh suatu masyarakatmetode pembelajaran yang menggunakan teknologiproses pembelajaran yang berpusat pada siswaLeasistem ekonomi yang berdasarkan pada kepemilikan swasta...

Technology Γ'1 2026-03-11

Technology Γ'1 crossword puzzle
Across
  1. information sent to someone
  2. online spaces where people can send messages
  3. small electronic devices
  4. Anything connected with computers, networks, or the online world
  5. worldwide network that connects devices
Down
  1. process of sharing information
  2. secret word or combination
  3. Programs and instructions that tell a computer what to do
  4. a record used to track money or access a service
  5. A recording

10 Clues: A recordingsmall electronic devicessecret word or combinationinformation sent to someoneprocess of sharing informationworldwide network that connects devicesonline spaces where people can send messagesa record used to track money or access a servicePrograms and instructions that tell a computer what to do...

Security Exercise 06MAR23 2023-03-03

Security Exercise 06MAR23 crossword puzzle
Across
  1. all in organization should know them
  2. official list of approved shredders
  3. Security coordinator familiarization course
  4. if arrested for DUI
  5. minimum surveillances per month
  6. security coordinators must be
Down
  1. bonafide NOFORN unsecured
  2. on SACB, clear for SECRET on submarine
  3. required before allowed to photograph
  4. designation of documents below CUI
  5. no view inside from outside
  6. Camera inside CIA
  7. must be secure when not in use

13 Clues: Camera inside CIAif arrested for DUIbonafide NOFORN unsecuredno view inside from outsidesecurity coordinators must bemust be secure when not in useminimum surveillances per monthdesignation of documents below CUIofficial list of approved shreddersall in organization should know themrequired before allowed to photograph...

Executive Protection 2013-03-09

Executive Protection crossword puzzle
Across
  1. Needed to want to harm the client
  2. What you provide for a client
  3. Type of method to reduce security problems; a way to look for faults in a plan
  4. The difference between Bodyguards and Executive Protection
  5. The level of a relationship to avoid between client and protector
Down
  1. Needed to be able to provide proper protection (HINT: Security problems that exist)
  2. When E.P. observes another person who is observing the client
  3. Third step to take when preparing for the mission
  4. Important person - time period 1850
  5. What a potentially dangerous subject exhibits when they are nervous (HINT: what happens when you workout)
  6. the highest level of protection
  7. Outlines the security guards responsibilities and licensing
  8. Who qualifies to receive E.P.

13 Clues: What you provide for a clientWho qualifies to receive E.P.the highest level of protectionNeeded to want to harm the clientImportant person - time period 1850Third step to take when preparing for the missionThe difference between Bodyguards and Executive ProtectionOutlines the security guards responsibilities and licensing...