cyber security Crossword Puzzles
Investments and Bonds 2022-11-29
Across
- type of bond, a corporation's promise to repay a specified amount of money with interest
- type of bond backed by assets of a business
- type of bond repaid through the income generated through the project
- type of bond, when multiple are issued on the same date but have different maturity dates
- type of bond backed by good faith of the company
- type of security that lasts 2-10 years
- a manager/third party that carries out the bond
- aka junk bond, type of bond that is risky but pays high interest
- the dollar amount the bondholder will receive at the bond's maturity
Down
- the ability for issuers to pay off bondholders early, if necessary
- type of security that lasts 30 years
- date on which corporate bonds are repaid
- investing/placing your money in more than one area
- document with all of the bond's information
- type of security that lasts 4-52 weeks
- type of bond that can convert from a corporate bond to equal value of a company's stock
- type of bond attached to a certain holder
- fund with annual/semiannual deposits to guarantee that companies can repay bondholders
- the _____ the risk, the higher the potential return
- type of bond issued at city, county, or state level
20 Clues: type of security that lasts 30 years • type of security that lasts 4-52 weeks • type of security that lasts 2-10 years • date on which corporate bonds are repaid • type of bond attached to a certain holder • document with all of the bond's information • type of bond backed by assets of a business • a manager/third party that carries out the bond • ...
Airside and Landside 2019-07-23
Across
- passenger transfer between ground transportation and the facilities that allow them to board
- it’s the area where you go through security and hand your passport and departure card for inspection
- reach a plane at the end of a journey
- only travelers can go through this area when they leaving
- is provided as a quite place for contemplation to all travelers
- you go through before you leave Landside to get to the airside
- airport with customs and border control when passengers travel between countries
- if Incase fire thing happen
- duties levied by a government on imported goods
- it’s an area before departing passenger go through security
Down
- and beverage you go when your hungry
- if you need to buy multi vitamins where do you go?
- facilities they offer and usually have food, drinks, internet and relaxing area
- a strip of hard ground along which aircraft take off and land
- the first thing you do when you get at the airport
- it’s a document that you need to get on plane
- if you have foreign cash where do you go?
- if you want to buy alcohol in airside area where do you go?
- personal belonging you packet for traveling
- flight within the same country is called?
20 Clues: if Incase fire thing happen • and beverage you go when your hungry • reach a plane at the end of a journey • if you have foreign cash where do you go? • flight within the same country is called? • personal belonging you packet for traveling • it’s a document that you need to get on plane • duties levied by a government on imported goods • ...
WRS 15 & 16 - DA Puzzle 2023-12-01
Across
- data converted into a meaningful and useful context
- malware disguised as a trusted source that convinces the user to open a link or an attachment and install itself.
- using the Internet for anything other than work tasks
- includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network; usually requires the user to initiate by unwittingly installing the malicious software
- the level one exposes one's self or professional network to unethical intentions (e.g., end-user attacks, server-side attacks)
- pretending to be someone you trust or a system you work with, to get you to visit a fictitious site and enter your login or other private info
- to support with evidence or authority; to make more certain
- a particular preference or point of view that is personal, rather than scientific.
- malware that accesses or controls a device without being detected
- a type of virus that does not rely on users to copy and spread but can replicate itself, once inside a network/system
- something that furnishes proof
- the protection of information systems against unauthorized access (e.g., hacking, identity theft)
- believable; reliable
- a flaw or weakness that allows a threat agent to bypass security
- a formal document with which many organizations require employees to comply, addressing the separation of personal and workplace use of the Internet, email etiquette, and security measures and safeguards that employees must obey.
- using online services and social networking ethically, by being a good online citizen, by adhering to privacy and safety guidelines, and by facilitating thoughtful and considerate communication with others
- a website that allows people of similar interests to interact and exchange information that is typically personal
Down
- the ability to figure out the type of information you need, find that information, evaluate it, and properly use it
- connected with or related to the matter at hand
- unbiased; neutral
- using the Internet, ethically, for work-related tasks
- a server-side attack that allows hackers to be able to target vulnerabilities on any site you use to login, then they apply that same login information to other major consumer sites to see if you reused your login and password
- unethical and often unnoticed attacks by others in the public sphere when operating online (e.g., malware, phishing, Trojan horse, virus, worm, spam, rootkit)
- the unethical distribution of mass digital messages. This is the main way that malware is opened and spread
- cyber attack that targets the server side to get customer information from the database, such as credit card numbers
- book, article, person, or other resource consulted for information.
- examine and judge carefully
- attacks focused on the workplace Network workers access.
- malware that spreads by users from an infected device to the rest of the devices on a network/system
29 Clues: unbiased; neutral • believable; reliable • examine and judge carefully • something that furnishes proof • connected with or related to the matter at hand • data converted into a meaningful and useful context • using the Internet, ethically, for work-related tasks • using the Internet for anything other than work tasks • ...
Newsletter 2024-06-17
Across
- What term describes an ethical hacker who uses their skills to improve cybersecurity
- what acts as a barrier between a trusted internal network and an untrusted external network.
- What small piece of data sent from a website and stored on the user's computer tracks information about their browsing activities?
- What term in cybersecurity is responsible for defending against simulated or real attacks.
- What type of cyber attack floods a network or system with a huge number of requests to disrupt normal traffic.
- What technology stores recently accessed data to speed up future acess
- What type of malware will self-replication and spread independently across networks.
- What term refers to a person who uses their programming skills to gain unauthorized access to computer systems?
- What term refers to the physical components of a computer system.
- What term refers to a group of interconnected computers or other devices that can communicate with each other.
- What term refers to testing a computer system, network, or web application to find security vulnerabilities?
- What term refers to a network of private computers infected with malicious software and controlled as a group without the owners' knowledge?
- what term refers to a collection of data or computer instructions that tell a computer how to work.
- What type of malicious software allows unauthorized access to a computer or network while concealing its presence?
- What group within an organization is responsible for simulating attacks against their own organization to test security measures.
- What term refers to a fixed-size output of a hash function that represents input data?
Down
- What term refers to a vulnerability in software that is unknown to a software vendor and has not yet been patched.
- What term refers to software which was designed to intentionally cause damage to the computer, server, client or computer network?
- What terms describes a hacker who exploits computer systems for personal gain or malicious purposes.
- What term refers to when someone is trying to disguise themselves as being a trusted known source.
- What term refers to the psychological manipulation of people into preforming actions or divulging confidential information.
- What type of software attaches itself to a legitimate program and spreads once the program is run.
- What term describes unauthorized use of someone else's computer to mine cryptocurrency?
- What term refers to a structured methodology or set of guidelines used to manage and improve an organization's cybersecurity posture.
- What type of malware encrypts a victim’s files and demands payment for the decryption key?
- What field of study involves techniques for secure communication in the presence of third parties?
- What protocol translates domain names into IP addresses?
- What term refers to a record of events that happen within an operating system, application or network device.
- What type of malicious software tricks the user by acting like a legitimate program to trick users into installing it.
29 Clues: What protocol translates domain names into IP addresses? • What term refers to the physical components of a computer system. • What technology stores recently accessed data to speed up future acess • What term describes an ethical hacker who uses their skills to improve cybersecurity • ...
DORA christmas 2024-12-15
Across
- What must cryptographic keys be protected against throughout their lifecycle?
- What is the name of the Dutch IT-association that published the first DORA-control framework?
- "The control team lead shall select at least three ********* to conduct the TLPT, on the basis of all of the following elements: (a) the recommendation by the threat intelligence provider and the threat-led nature of each scenario; (b) the input provided by the test managers; (c) the feasibility of the proposed scenarios for execution, based on the expert judgement of the testers; (d) the size, complexity and overall risk profile of the financial entity and the nature, scale and complexity of its services, activities and operations."
- What technique can be used in network design to limit contagion during cyber attacks?
- The **** plan with a third party must be based on realistic scenarios and assumptions.
- Financial entities shall identify, classify and adequately document all ICT supported business functions, roles and responsibilities, the information ****** and ICT ****** supporting those functions, and their roles and dependencies in relation to ICT risk.
- What must financial entities use for advanced testing of ICT tools?
- How often per year should a review of access rights for ICT systems that support critical or important functions be performed
- What percentage of affected clients using a service meets the materiality threshold for major incidents?
- What must ICT security policies ensure regarding data?
Down
- Information of subcontractors should **** be in the Register of Information that effectively underpin ICT services supporting critical or important functions or material parts thereof.
- What is the main subject matter of DORA?
- Who is responsible for implementing the ICT risk management framework in financial entities?
- What must financial entities report to relevant authorities?
- "The Register of Information has six criteria: Financial entities shall ensure that the information contained in the templates referred to in paragraph 1 adhere to the following principles of data quality. Five of them are: accuracy; completeness; integrity; uniformity; validity. What is the six criteria?"
- What must be promptly renewed to ensure ongoing security?
- What is the abbreviation of " a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;"
- We enter the run phase of DORA. The ICT framework should be reviewed yearly. This report is quite extensive. So early start is important. Internal ***** should also start early to ***** this ICT Framework.
- How frequently should vulnerability scanning be performed on critical ICT assets?
- What should financial entities have to ensure data restoration?
20 Clues: What is the main subject matter of DORA? • What must ICT security policies ensure regarding data? • What must be promptly renewed to ensure ongoing security? • What must financial entities report to relevant authorities? • What should financial entities have to ensure data restoration? • What must financial entities use for advanced testing of ICT tools? • ...
Information Age, Biodiversity and the Healthy Society. 2025-03-19
Across
- The disparity between individuals, communities, and countries in accessing and utilizing digital technologies, which affects economic opportunities, education, and social progress.
- The development of writing systems like cuneiform and hieroglyphics, along with postal services such as those used by the Persian and Roman empires.
- National parks and wildlife reserves preserve biodiversity by providing secure habitats. Their effectiveness depends on strong management, law enforcement, and community engagement, though they face challenges like habitat loss, illegal activities, and climate change.
- Aids conservation through remote sensing, GIS, drones, and AI for monitoring species and ecosystems. Environmental DNA (eDNA) helps detect species presence, improving conservation efficiency and accuracy.
- A significant environmental problem affecting air, water, and soil quality, posing serious risks to public health worldwide.
- Disrupts biodiversity by altering habitats, food chains, and species distribution. Rising temperatures, extreme weather, and ocean acidification threaten marine and terrestrial ecosystems.
- The increasing use of cloud storage, combined with poor security configurations, weak access controls, and insufficient encryption, raises vulnerability to cyber threats.
- Medications prescribed, managed, and delivered remotely through telehealth platforms, digital pharmacies, and e-prescription services, allowing patients to receive treatment without in-person visits.
- Scientists have successfully bred this species as part of efforts to restore the woolly mammoth.
- AI and data-driven decisions can reinforce societal biases, resulting in unfair treatment in employment, financial services, and law enforcement.
- Negative attitudes and stereotypes toward individuals with mental health conditions, leading to discrimination and discouraging people from seeking necessary care.
- The presence of diverse crops, livestock, and beneficial microorganisms that sustain farm productivity and ecosystem health, ensuring food security and environmental stability.
- The ability to obtain necessary medical services without financial, geographical, or systemic obstacles. Despite its importance, many individuals still struggle with healthcare accessibility.
Down
- The reduction of plant, animal, and microorganism species due to deforestation, pollution, climate change, and habitat destruction. Declining biodiversity weakens ecosystems, impacting air, water, and food supply. Protecting habitats and reducing pollution can help slow this loss.
- The introduction of printing and early mass communication, notably with Gutenberg’s printing press in the 1440s, which transformed information dissemination.
- The exchange of information through digital methods, including emails, text messages, social media, and video calls. It relies on electronic devices and the internet for efficient data transmission.
- Many users unknowingly accept data collection due to complex terms of service, raising doubts about the validity of their consent.
- Oral communication and symbols, including cave paintings, smoke signals, and drum beats, were early forms of conveying messages.
- Plays a key role in conserving and enhancing biodiversity within cities. Proper planning can prevent habitat fragmentation and support native species while benefiting human well-being.
- The imitation of human intelligence in machines, enabling them to learn, reason, solve problems, understand language, and make decisions.
20 Clues: Scientists have successfully bred this species as part of efforts to restore the woolly mammoth. • A significant environmental problem affecting air, water, and soil quality, posing serious risks to public health worldwide. • Oral communication and symbols, including cave paintings, smoke signals, and drum beats, were early forms of conveying messages. • ...
At the airport vocabulary 2024-11-03
Across
- Put in the trash.
- Document needed for international travel
- Airport security personnel
- Items that need to be placed in the tray
- Place to show your boarding pass
- Checks your travel documents
Down
- Leave luggage with the airline
- Often weighed before boarding
- Someone traveling on a plane
- What you do with your belt at security.
- Not international
- Enter the plane
- Where you greet arriving passengers
13 Clues: Enter the plane • Put in the trash. • Not international • Airport security personnel • Someone traveling on a plane • Checks your travel documents • Often weighed before boarding • Leave luggage with the airline • Place to show your boarding pass • Where you greet arriving passengers • What you do with your belt at security. • Document needed for international travel • ...
Profiles 2 text 1 Pinja 2014-12-03
16 Clues: jono • matka • saapua • tuhlata • siepata • hassakka • majoitus • matkustaa • ulkomaille • lomakeskus • askeittain • matkatavara • days nykyaan • turvallisuus • aurinkovoida • lahtoselvitys
Human rights 2023-10-27
16 Clues: frihed • social • lighed • styrkelse • privatliv • tolerance • værdighed • sikkerhed • medtagelse • rimelighed • selvstændig • ansvarlighed • retfærdighed • diskrimination • menneskeværdighed • borgerrettigheder
step 12 2016-02-17
20 Clues: tulli • herra • rouva • neiti • baari • sukset • kärryt • portti • muistaa • odottaa • häämatka • hiekkaranta • matkalaukku • club yökerho • passintarkastus • in lähtöselvitys • area tupakointialue • check turvatarkastus • boss entinen esimies • time koneeseen siirtymisaika
SPOTLIGHT8 KPL7 s.166-167 2016-02-08
23 Clues: koe • sana • lupa • kysyä • uskoa • suukko • halaus • luvata • viesti • salasana • ongelmat • tapahtua • kuluttaa • kiusaaja • molemmat • oppitunti • salaisuus • keskustelu • rasistinen • valehtelija • turvallisuus • pyytää anteeksi • poissa tolaltaan
Psalms 23 2020-03-30
vocabulary 2025-01-08
4th Grade Spelling List #1 2025-09-17
20 Clues: gift • flee • pass • stay • color • trash • hoops • expert • handed • present • security • heaviness • time past • attraction • midsection • blood vessel • twisting injury • collection book • day after today • day before today
Travelling 2025-11-10
23 Clues: juna • loma • pyörä • laiva • passi • matka • metro • tulli • taksi • kartta • lentäjä • turisti • saapuvat • lähtevät • lentokone • matkustaa • autolautta • konduktööri • matkalaukku • lentoemäntä • helikopteri • matkatavarat • turvatarkastus
Vocabulario #6 (es2) - write translations! 2022-10-31
16 Clues: – trip • – seat • – pilot • – aisle • – window • – flight • – counter • - delayed • – luggage • – security • – backpack • – Passport • – passenger • – departure • – Cancelled • – to travel
Test 2025-09-17
PHN001 2017-06-05
Across
- The process of securing a network appliance or server to protect it against hacking.
- Physical security domain associated with internal IT systems. (BSS)
- The utilization of algorithms to secure signalling.
- Physical security domain associated with network connections that consist of physical lines.
- Physical security domain associated with voice/data devices that can be used anywhere. (CDMA, GSM ie)
- Virus known to spread over GSM-SMS networks.
- Method used to physically cut into a cable and steal / divert signal.
- Wifi encryption method that is easy to hack
- Mobile technology that uses the TDMA radio signal.
Down
- Mobile technology that competes with GSM.
- Method of WPA encryption that is utilized to secure corporate network devices. WPA-_______.
- The process of tricking people by changing your apparenet identity.
- Modern wireless technology that creates homespots and hotspots.
- Trade name for 4G networks
- Attack vector utilized which the target of most fraudster. A ____ domain attack.
- Modern wireless technology based on local Microwave Signals
- The initals for the internet protocol that secures most mobile networks.
- Type of server resident on a GSM network and utilized to force code onto handsets.
- The identification number assigned to every GSM device.
- Wifi encryption method that is difficult to hack
- The item inserted into a device which holds an encryption key.
21 Clues: Trade name for 4G networks • Mobile technology that competes with GSM. • Wifi encryption method that is easy to hack • Virus known to spread over GSM-SMS networks. • Wifi encryption method that is difficult to hack • Mobile technology that uses the TDMA radio signal. • The utilization of algorithms to secure signalling. • ...
Emergency Responce plan 2019-06-10
Across
- 0124-2290192
- Raise the ______________ using the manual Call point
- Facility team will __________ for controlling the source of spill if possible
- Emergency handling trained associate will blow the ___________, to indicate that there is emergency situation is inside the building
- Support the security team to fighting the _________________
- After reentry into the building, debrief with Operations, Safety,________ Facility Manager & other observers to collect all pertinent information related to the emergency event.
- Operation manager will Maintain order and ensure that all Associates remain at the ______________.
- reach at the Assembly _____________
- Who will monitor the news and notify the site leader ?
Down
- During fire the operation manager will, Take charge of all persons at the evacuation point and ensure roll call is taken and is matching to the _________.
- Support Operation manager will move the associate to the _______________ area
- ,Don not Run ( Compleate the sentence )
- Associate should take injured Person to where, if Possible ?
- 0124-2292101
- Incident Commander will Go to the designated outside assembly point and follow the _______________ commander check sheet
- 011-26152801
- Provide appropiate __________to evacuate associate
- Do not leave the __________ until Asked to.
- security team will inform to whom, After consultation with Incident Commander about the incident ?
- arrange the spill kit from __________ location
20 Clues: 0124-2290192 • 0124-2292101 • 011-26152801 • reach at the Assembly _____________ • ,Don not Run ( Compleate the sentence ) • Do not leave the __________ until Asked to. • arrange the spill kit from __________ location • Provide appropiate __________to evacuate associate • Raise the ______________ using the manual Call point • ...
Cashless society 2024-09-04
Across
- The cost associated with creating physical money
- what do you think orba cashless world?
- Electronic tool often used for payments in a cashless society
- A problem in a cashless society where electronic systems fail
- The state of financial transactions occurring without physical cash
- A device often used for cashless transactions while traveling
- The financial institution that may hire security teams to protect cash
- What positive effect does a cashless society have on crime?
- The physical form of money that is becoming less prevalent
- The primary risk associated with online transactions due to data breaches
- A type of currency that is becoming less common due to digital transactions
Down
- The type of fees that may increase if banks can't charge for cash withdrawals
- a cashless society has its own?
- Financial crime involving hiding the source of illegally obtained money
- The type of crime that may decrease in a cashless society
- if the source of the money is unknown, money laundering becomes much more?
- The term for the illegal hiding of income
- A major benefit of a cashless society related to the ease of carrying money
- A financial concept that could impact customers if all transactions are electronic
- What is a security concern with electronic transactions?
20 Clues: a cashless society has its own? • what do you think orba cashless world? • The term for the illegal hiding of income • The cost associated with creating physical money • What is a security concern with electronic transactions? • The type of crime that may decrease in a cashless society • The physical form of money that is becoming less prevalent • ...
Investment Unit 2024-03-20
Across
- the age to collect social security benefits
- The ticker for Google
- The ticker for Amazon
- the market where many people buy investments
- the market where many people sell their investments
- Expected to run short of funds by 2031.
- digital money
- don't give you ownership rights.
- when you purchase or sell a stock
- You can get more benefits if you delay retirement until what age?
- it is meant for short-term goals
- The color that means stocks are doing bad
- The increase in the value of an asset
- Social Security & Medicare together is called...
- the bigger the box in the S&P 500, the bigger the...
Down
- 35 is the average age when ______ start to invest
- The ticker for Microsoft
- The ticker for Tesla
- 6.2% is the percent of your paycheck gets taken out for what?
- the age you can start investing
- The color that means stocks are doing good
- Managed by your employer.
- The president that created social security
- it is meant for long-term goals
- a common job that provides a pension
- The ticker for Meta
- invest a small sum regularly
- Invest a big sum at one go
- 32 is the average age when ______ start to invest
- physical money
30 Clues: digital money • physical money • The ticker for Meta • The ticker for Tesla • The ticker for Google • The ticker for Amazon • The ticker for Microsoft • Managed by your employer. • Invest a big sum at one go • invest a small sum regularly • the age you can start investing • it is meant for long-term goals • don't give you ownership rights. • it is meant for short-term goals • ...
CSC Puzzle 2021-06-09
Across
- Required to wear a security shirt
- See something, _____ something
- Anaheim Angels _____________
- OC's branch manager
- Common hair color abbreviation
- Common eye color abbreviation
- What does CP stand for
- Non-guard carded staff is _______ staff
- Guests are not allowed to re-________ the stadium
Down
- _______items include weapons, alcohol and large bags
- Verbal or physical
- Someone leaving with a subject who is being evicted
- Used to protect your skin from the sun
- What day is payday?
- Color of pen a security guard uses
- Text ___________ to 474747 to place a contactless concessions order
16 Clues: Verbal or physical • OC's branch manager • What day is payday? • What does CP stand for • Anaheim Angels _____________ • Common eye color abbreviation • See something, _____ something • Common hair color abbreviation • Required to wear a security shirt • Color of pen a security guard uses • Used to protect your skin from the sun • Non-guard carded staff is _______ staff • ...
Globalization Vocabulary 1 2017-02-20
Across
- Of or relating to the government
- Blending to sameness
- Operating or existing in many countries
- Customs, traditions, values of a group of people
- To rely upon each other
- Nations global organization for peace, security
- Living and nonliving things interacting together
Down
- The world seems smaller by Marshall McLuhan
- To be involved in complex ways with each other
- When larger systems, and everything interconnect
- Use, management of money
- In agreement
- System of money
- Organization for peace, security, political alliance
- Buy/sell goods/resources of a country or region
- Organized group of people
16 Clues: In agreement • System of money • Blending to sameness • To rely upon each other • Use, management of money • Organized group of people • Of or relating to the government • Operating or existing in many countries • The world seems smaller by Marshall McLuhan • To be involved in complex ways with each other • Nations global organization for peace, security • ...
Loan Terms 2025-11-07
Across
- person who takes out a loan
- Term loan length that doesn’t change
- property pledged as security for a loan
- Card linked directly to a bank account
- replacing an old loan with a new one
- length of time to repay a loan
- maximum amount that can be borrowed
- original amount of money borrowed
- chance of losing money
Down
- Card allowing borrowed payments
- Interest rate that changes with the market
- loan to buy property
- person or bank that gives money
- borrowed money that must be repaid
- asset pledged for repayment
- Interest rate that stays the same
- rate percentage charged on borrowed money
17 Clues: loan to buy property • chance of losing money • person who takes out a loan • asset pledged for repayment • length of time to repay a loan • Card allowing borrowed payments • person or bank that gives money • Interest rate that stays the same • original amount of money borrowed • borrowed money that must be repaid • maximum amount that can be borrowed • ...
Safety Moment - Team Building Edition 2015-04-21
Turning adjectives into nouns using the suffix ity. 2014-12-03
15 Clues: purity • ability • density • reality • security • divinity • immunity • activity • stupidity • community • simplicity • complexity • opportunity • nationality • responsibility
Collective nouns (for people) 2024-05-19
Adv. B 2024-02-05
CyberDSA D3 2025-08-14
Across
- Applying updates to fix software flaws.
- Method of guessing passwords by trying all possibilities.
- Security barrier that controls network traffic flow.
- Isolated environment to safely run suspicious files.
- System for analyzing and correlating security events.
Down
- Period of active connection between a user and a system.
- Technology that prevents sensitive data from leaving a network.
- Authorized simulated cyberattack to test security defenses.
- Algorithm for encrypting and decrypting information.
- Recorded events and activities on a system or network.
10 Clues: Applying updates to fix software flaws. • Algorithm for encrypting and decrypting information. • Security barrier that controls network traffic flow. • Isolated environment to safely run suspicious files. • System for analyzing and correlating security events. • Recorded events and activities on a system or network. • ...
INFO SEC PUZZLE 2024-11-11
9 Clues: DATA SECURITY • SENSITIVE TYPE • EASE OF ACCESS • NETWORK SECURITY • REQUIRED TO LOGIN • LATEST MALWARE TYPE • DATA CONFIDENTIALITY • DANGEROUS FOR COMPUTER • REQUIRED FOR HANDLING VIRUS
Kibernetička sigurnost 2025-07-01
9 Clues: software • demanding ransom • security barrier • computer program • of important data • scam to steal info • who breaks security • scrambling for safety • code to access account
Transactions Online 2017-02-28
Across
- Cyber criminals.
- Online department store.
- You say that you are not satisfied with a product or service.
- Delivery of a product and its cost.
- Bankcard attached to your current account.
- The card used for paying via the Internet.
- Cash on delivery.
- You can get your money back after a wrong product or service.
- The name you write in the login box.
Down
- Consumer of a product or service.
- Financial manoeuver.
- Your personal identification code.
- Possibility for compensation.
- Ruined during delivery.
- You can get another product for a faulty one.
- To transport a product from one point to another.
16 Clues: Cyber criminals. • Cash on delivery. • Financial manoeuver. • Ruined during delivery. • Online department store. • Possibility for compensation. • Consumer of a product or service. • Your personal identification code. • Delivery of a product and its cost. • The name you write in the login box. • Bankcard attached to your current account. • ...
crossword 2012-11-15
Across
- one world many states (16)
- logo 1 (7)
- logo 4 (9)
- logo 2 (10)
- logo 3 (5)
- subsidiary company of adidas which makes sportswear, apparel and accessories (6)
- world's local bank (4)
- a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse (8)
Down
- highest grossing hollywood movie (6)
- full form of P&G (14)
- ceo of virgin atlantic (14)
- parent company of minute maid (8)
- the ultimate driving machine (3)
- artist with the highest number of views for his\her video on youtube (3)
- towards excellence (4)
- brand ambassador of sony cyber shot (7)
16 Clues: logo 1 (7) • logo 4 (9) • logo 3 (5) • logo 2 (10) • full form of P&G (14) • towards excellence (4) • world's local bank (4) • one world many states (16) • ceo of virgin atlantic (14) • the ultimate driving machine (3) • parent company of minute maid (8) • highest grossing hollywood movie (6) • brand ambassador of sony cyber shot (7) • ...
crossword 2012-11-15
Across
- logo 3 (5)
- parent company of minute maid (8)
- logo 2 (10)
- the ultimate driving machine (3)
- one world many states (16)
- full form of P&G (14)
- artist with the highest number of views for his\her video on youtube (3)
Down
- brand ambassador of sony cyber shot (7)
- a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse (8)
- ceo of virgin atlantic (14)
- subsidiary company of adidas which makes sportswear, apparel and accessories (6)
- towards excellence (4)
- world's local bank (4)
- logo 1 (7)
- logo 4 (9)
- highest grossing hollywood movie (6)
16 Clues: logo 3 (5) • logo 1 (7) • logo 4 (9) • logo 2 (10) • full form of P&G (14) • towards excellence (4) • world's local bank (4) • one world many states (16) • ceo of virgin atlantic (14) • the ultimate driving machine (3) • parent company of minute maid (8) • highest grossing hollywood movie (6) • brand ambassador of sony cyber shot (7) • ...
Finance 2023-12-15
Across
- of a company's earnings to its share price.
- borrowed or invested, excluding interest.
- charge for the use of borrowed assets, usually yearly.
- ratio (Price-to-earnings ratio)
- representing partial ownership of a company.
- portfolio value change due to interest rate shifts.
- investments across various assets to reduce risk.
- during which an investor can't sell a newly issued security.
Down
- at Risk (VaR)
- of an asset's sensitivity to interest rate changes.
- rate
- period
- fund
- mirroring a financial market index.
- instrument promising repayment with interest.
15 Clues: rate • fund • period • at Risk (VaR) • ratio (Price-to-earnings ratio) • mirroring a financial market index. • borrowed or invested, excluding interest. • of a company's earnings to its share price. • representing partial ownership of a company. • instrument promising repayment with interest. • investments across various assets to reduce risk. • ...
what do you know? 2021-05-04
Across
- name-calling threatening
- attacks physically, emotionally, or socially
- it happens more than once over a period of time
- response to feeling or an event
- punching,kicking,spitting
- what percent of students report bullying
Down
- there is an intent to hurt or harm
- something happening over and over again
- moment getting hurt on accident once
- writing mean thing on Facebook, Instagram, or Twitter
- in intent to make fun of someone in a playful way
- spreading rumors, excluding people from games and groups
- being far away from everything/in your own space
13 Clues: name-calling threatening • punching,kicking,spitting • response to feeling or an event • there is an intent to hurt or harm • moment getting hurt on accident once • something happening over and over again • what percent of students report bullying • attacks physically, emotionally, or socially • it happens more than once over a period of time • ...
Test 2024-12-16
Across
- - Software designed to damage or disrupt systems.
- - A cyber attack that overwhelms a server.
- - Simulating an attack to identify vulnerabilities.
- - A software update to fix vulnerabilities.
- - Fraudulent attempts to obtain sensitive information via email.
- - A group of infected computers under a hacker’s control.
Down
- - A hacker engaged in activism.
- - Software that detects and removes malware.
- Engineering - Manipulating people to gain confidential info.
- Breach - Unauthorized access to confidential data.
- - Software that secretly gathers information about a person.
- - Unsolicited messages or emails.
- - Malicious software disguised as legitimate software.
13 Clues: - A hacker engaged in activism. • - Unsolicited messages or emails. • - A cyber attack that overwhelms a server. • - A software update to fix vulnerabilities. • - Software that detects and removes malware. • - Software designed to damage or disrupt systems. • Breach - Unauthorized access to confidential data. • - Simulating an attack to identify vulnerabilities. • ...
United Nations 2023-11-19
Across
- It is a platform for nations to address these issues
- This is one of the permanent members of the Security Council
- The ESCO stands for Educational, Scientific and Cultural ...
- This universal document about human rights was adopted in 1945
- Created after this war
- Each nation gets this number of votes
- Members discuss issues and then vote in this group
Down
- The Security Council can impose these on nations who are not following UN rules
- There are 17 goals aimed at ending poverty, protecting the planet and ensuring this for all
- There are this number of permanent members in the Security Council
- There are 193 ________ (members)
- This is the acronym for the World Health Organization
12 Clues: Created after this war • There are 193 ________ (members) • Each nation gets this number of votes • Members discuss issues and then vote in this group • It is a platform for nations to address these issues • This is the acronym for the World Health Organization • This is one of the permanent members of the Security Council • ...
Victim support crossword 2022-09-02
19 Clues: sud • žalba • žrtva • krađa • napad • istraga • svjedok • ozljeda • ročište • pljačka • prekršaj • pritužba • optužnica • oštećenik • počinitelj • kazneno djelo • sigurnosne mjere • državni odvjetnik • ovlašteni tužitelj
Glossary of Stock Terms 2021-03-23
Across
- program covers medical care for low income pt
- long-term contract sold by life insurance companies
- financial professional
- individual adds signature to loan
- combined security holdings of a person
- person names in a will to receive benefits
- designed investment to reduce risk
Down
- date debt comes due for payment
- debt security issued by a corporation or government
- written instrument used to transfer money
- inability to pay outstanding debt
- cost of borrowed money
- general rise in price of goods
- distribution of earnings to shareholders
- periodic payment for an insurance policy
- certificate representing one unit of ownership
16 Clues: cost of borrowed money • financial professional • general rise in price of goods • date debt comes due for payment • inability to pay outstanding debt • individual adds signature to loan • designed investment to reduce risk • combined security holdings of a person • distribution of earnings to shareholders • periodic payment for an insurance policy • ...
CW-Gavin 2021-11-18
Across
- CLEAN AIR AND WATER ACTS regulate industrial waste disposal and other activities
- was the first major global supply chain
- ENVIRONMENTAL POLICY ACT requires the federal government to consider environment impact via
- AND SECURE TRADE-the FAST program is a trade initiative between the united states
- the most security from that and the most protection from weather
- SUPERFUND is the common name for a the comprehensive environmental response
- rail sidings are usually located from the normal shipping
- DOCK-are by far the most commonly used dock design in the united states
- available in a facility is more than just floor space
- workers must be able to retrieve the materials
Down
- any person who directly affects safely transportation
- SECURITY INITIATIVE-the goal of the CSI is to focus first on the ports
- Fences,Gates,Security,Guards,Lights
- volume expected to move through a warehouse
- DOCK- it consists of a platform that extend out from the extended building wall
- substance or material that the U.S department of transportation
- series of standards outlines a system for companies
17 Clues: Fences,Gates,Security,Guards,Lights • was the first major global supply chain • volume expected to move through a warehouse • workers must be able to retrieve the materials • series of standards outlines a system for companies • any person who directly affects safely transportation • available in a facility is more than just floor space • ...
How familiar are you with low level computer systems [university knowledge] 2024-04-09
Across
- Tool used for reverse engineering binaries
- What is the weakest link in the security chain
- The most common data transfer interface in Unix systems
- Superuser or administrator account in Unix-like operating systems
- A famous open-source kernel made by Linus Torvalds
- What software structure represents network connections? (Hint: connect, accept, bind, listen, etc.)
- Process of single stepping through software instructions and resolving bugs
- We all hate this programming language obviously
- Modern OS-level containerization toolset (Hint: microservices architecture)
Down
- Assembly is converted into computer instructions through an...
- Systems storing user passwords are required to hash and...
- What famous BSD operating-system is known to be fixated with security?
- Protocol whose purpose is to provide communications security over the internet (green padlock in your browser)
- Common locking mechanism for programs that share memory or run in parallel
- A reliable but slow transport protocol
- Interface for a program to request services from the kernel
- A famous distributed version control system (originally) made by Linus Torvalds, also known as the father of Linux.
17 Clues: A reliable but slow transport protocol • Tool used for reverse engineering binaries • What is the weakest link in the security chain • We all hate this programming language obviously • A famous open-source kernel made by Linus Torvalds • The most common data transfer interface in Unix systems • Systems storing user passwords are required to hash and... • ...
How familiar are you with low level computer systems [university knowledge] 2024-04-09
Across
- Tool used for reverse engineering binaries
- What is the weakest link in the security chain
- The most common data transfer interface in Unix systems
- Superuser or administrator account in Unix-like operating systems
- A famous open-source kernel made by Linus Torvalds
- What software structure represents network connections? (Hint: connect, accept, bind, listen, etc.)
- Process of single stepping through software instructions and resolving bugs
- We all hate this programming language obviously
- Modern OS-level containerization toolset (Hint: microservices architecture)
Down
- Assembly is converted into computer instructions through an...
- Systems storing user passwords are required to hash and...
- What famous BSD operating-system is known to be fixated with security?
- Protocol whose purpose is to provide communications security over the internet (green padlock in your browser)
- Common locking mechanism for programs that share memory or run in parallel
- A reliable but slow transport protocol
- Interface for a program to request services from the kernel
- A famous distributed version control system (originally) made by Linus Torvalds, also known as the father of Linux.
17 Clues: A reliable but slow transport protocol • Tool used for reverse engineering binaries • What is the weakest link in the security chain • We all hate this programming language obviously • A famous open-source kernel made by Linus Torvalds • The most common data transfer interface in Unix systems • Systems storing user passwords are required to hash and... • ...
Bullying 2023-03-21
Across
- A form of help
- manipulation, mimicking and intimidation
- A witness of the bullying
- Person who is being bullied
- use of negative words to intentionally upset someone
Down
- verbally, socially or psychologically bullying someone using technology
- Spreading rumours and repeated mimicking
- Pushing and shoving someone repeatedly
8 Clues: A form of help • A witness of the bullying • Person who is being bullied • Pushing and shoving someone repeatedly • Spreading rumours and repeated mimicking • manipulation, mimicking and intimidation • use of negative words to intentionally upset someone • verbally, socially or psychologically bullying someone using technology
Online Communication 2023-08-07
Across
- Connects global computers
- Exchanging information
- Remarks made under someone else's post
Down
- Social media platform founded in February 2004
- Message sent by computer
- Something involving computers or the internet
- social media platform bought by Facbook in 2012
- Software program downloaded onto a computer or phone
8 Clues: Exchanging information • Message sent by computer • Connects global computers • Remarks made under someone else's post • Something involving computers or the internet • Social media platform founded in February 2004 • social media platform bought by Facbook in 2012 • Software program downloaded onto a computer or phone
Travel 2024-05-20
17 Clues: taxi • agent • pilot • ticket • scales • customs • airport • copilot • takeoff • luggage • landing • suitcase • airplane • passport • departure board • flight attendant • security checkpoint
Sadlier Unit 11 Crossword puzzle 2023-03-15
Chapter 5 A2 2025-05-15
16 Clues: zeker • volgen • onjuist • bezorgd • opnemen • verlopen • aanpassen • vermoeiend • bevredigend • verwijderen • beïnvloeden • onpartijdig • reclamespot • beveiliging • beïnvloeden • zoekopdracht
15.11.2022 words 2022-11-15
15 Clues: выборы • терять • ученый • реклама • поймать • счастье • покидать • важность • движение • выбирать • ассистент • зависимость • удовольствие • безопасность • правительство
world cup news 2022-11-25
15 Clues: tuki • lähtö • kärsiä • vakava • vastaan • vartija • väitetty • pidätetty • syytökset • pysytteli • tarkastelu • osallistujat • seuraamukset • takavarikoida • osallistuminen
Shared Services ICT 2023-07-16
6 Clues: Aplikasi ERP • Fungsi IT Operation • Pertamina Digital Signature • Multi-Factor Authentication • Platform Permintaan Layanan ICT • Jenis Cyber Attack untuk mencuri informasi pengguna
Healthy Habits, Healthy You 2024-11-15
Across
- what the story is mostly about
- tools that make tasks easier or solve problems
- digital technology
- give more information about the main idea
Down
- signals or clues that help recognize danger
- something you do regularly
- practices that help keep your body clean and healthy
- feeling well in both body and mind
- choosing one thing in place of another
9 Clues: digital technology • something you do regularly • what the story is mostly about • feeling well in both body and mind • choosing one thing in place of another • give more information about the main idea • signals or clues that help recognize danger • tools that make tasks easier or solve problems • practices that help keep your body clean and healthy
Cluster Ja 001 2023-03-23
Across
- The VPN app of choice of Athena
- Our CEO
- New communication platform of choice replacing Google HangOuts
- Athena ____ form is used to lodge tickets for finance/payroll/tools/etc
- ___-A-Thon
- Athena's HMO provider
- Our new COO
- Executive Assistant is now known as Executive ___
Down
- Our PH Legal Entity Name
- An app used to provide a US number that can be used for calls and messages
- ___ Value Nominations
- Athena uses ___ Bank for payroll
- Time keep tool
- Our Operational Name
- Learning Platform that houses different training modules
- Athena ____ Services is responsible for coordinating client gift requests
- MDM is a security app provided by ___
17 Clues: Our CEO • ___-A-Thon • Our new COO • Time keep tool • Our Operational Name • ___ Value Nominations • Athena's HMO provider • Our PH Legal Entity Name • The VPN app of choice of Athena • Athena uses ___ Bank for payroll • MDM is a security app provided by ___ • Executive Assistant is now known as Executive ___ • Learning Platform that houses different training modules • ...
FBI Crossword 2015-04-28
Across
- A person who takes an active role
- An action that is punishable by law
- Practice for the field
- To increase strength of an army or similar force
- Firearm
- Facts or details wether a belief or proposition is true
- To prevent possible riots or destruction
Down
- A private police force
- Metal covering worn by security
- Nation, state, or community
- An inquiry or study
- A person involved in work secretly
- Several states in which they form a unity
- A police patrol car
- An example of something occurring
15 Clues: Firearm • An inquiry or study • A police patrol car • A private police force • Practice for the field • Nation, state, or community • Metal covering worn by security • A person who takes an active role • An example of something occurring • A person involved in work secretly • An action that is punishable by law • To prevent possible riots or destruction • ...
Great Depression 2023-10-16
Across
- Roosevelt's way of making america better
- where people stood to get food
- a farm live
- farmers that used others land
- to remove against their will
- where businesses are bought, sold, or traded
- using the land to much
- a way to help people make money
- a long time without water
Down
- making to many goods
- a city life
- clouds of dust caused by over farming
- a time of economic distress
- security to help security of elders
- a new way created to communicate around the world
15 Clues: a city life • a farm live • making to many goods • using the land to much • a long time without water • a time of economic distress • to remove against their will • farmers that used others land • where people stood to get food • a way to help people make money • security to help security of elders • clouds of dust caused by over farming • Roosevelt's way of making america better • ...
Elida vocabulary hints 2015-04-29
Across
- bully bullying online.
- writing that has been copied from someone else work.
- someone who access to your computer file.
- connected computers.
Down
- network is facebook,snapchat,instagram,twitter.
- a law that protects your work.
- network of thousands of other computer networks.
- use a copyright law that provides educate.
8 Clues: connected computers. • bully bullying online. • a law that protects your work. • someone who access to your computer file. • use a copyright law that provides educate. • network is facebook,snapchat,instagram,twitter. • network of thousands of other computer networks. • writing that has been copied from someone else work.
Recent trends in accounting 2024-01-23
Across
- financial data from cyber threats (13)
- reporting on environmental and social impact (3,4)
- from compliance to strategic guidance (9)
- in the virtual cloud (6)
Down
- large datasets for financial insights (12)
- blockchain for tamper-proof transactions (9)
- data entry using software (10)
- AI to reduce repetitive tasks (7)
8 Clues: in the virtual cloud (6) • data entry using software (10) • AI to reduce repetitive tasks (7) • financial data from cyber threats (13) • from compliance to strategic guidance (9) • large datasets for financial insights (12) • blockchain for tamper-proof transactions (9) • reporting on environmental and social impact (3,4)
Insurance types 2022-06-27
Across
- Liability (Dram), coverage for bodily injury or property damage caused by an intoxicated person who was served liquor by the business owner.
- Liability/Errors & Omissions, Coverage for professional services in the event of an error (does something wrong) or omission (does not do something they're supposed to) that leads to financial loss (as opposed to bodily injury or property damage)
- Liability, protects businesses from Internet-based risks and risks relating to information technology infrastructure, information privacy, information governance liability, etc. Keywords: Malware, Data Breaches, Cyber Security, Operational Risk, Service Risk, Cyber Attacks
- Risk, Specialty type of Property Insurance that protects a person's or organization's insurable interest in materials, fixtures and/or equipment awaiting installation during the construction or renovation of a building or structure, should those items sustain physical loss or damage from a covered loss.
- Auto, Covers the cost of an auto accident if the business owner or an employee is at fault.
- Marine, Specialty type of Property Insurance that protects moveable equipment away from the business owner's premises.
- Insurance, Coverage for a flying vehicle Business Owners Policy, Combination of General Liability and Property
- Liability, Umbrella insurance refers to liability insurance that is in excess of specified other policies and also potentially primary insurance for losses not covered by the other policies.
- Covers the business owner's building and contents in case of a covered loss such as water/fire damage or theft.
- provides coverage against all risks of physical loss or damage to freight during the shipment from any external cause during shipping.
- Insurance, Coverage for a boat
- Risk, Lessor's Risk Only (LRO) Insurance, also known as the Landlord's Insurance, is a specific type of property and liability coverage designed for building owners.
- Insurance, livestock owned by the business.
Down
- Personal Property, Business Personal Property covers everything inside of a building. If you were to open the door and shake everything out, everything that came out would be covered under Business Personal Property.
- Interruption Insurance, replaces income lost in the event that business is halted for some reason, such as a fire or a natural disaster.
- pays to repair or replace a vehicle you don't own if it is damaged by a collision, fire, theft, explosion, or vandalism while you are towing or hauling.
- Insurance, protects a property owner against damage caused by fires, severe storms, hail/sleet, or other natural events (hazards).
- Liability / Unladen Liability, provides coverage for truck drivers when they are operating their trucks in a non-trucking capacity BOB Tail- covers your return trip after delivering the freight trailer to its destination. Without the trailer attached,
- Liability, Protects the business owner from any claims for bodily injury property damage and personal/advertising injuries. Also covers products and completed operations (means that the work done is still covered even after the job has been completed).
- Practices Liability, often referred to as EPLI or EPL, covers businesses against claims by workers that their legal rights as employees of the company have been violated (i.e. Claims of Sexual harassment, Discrimination, Wrongful termination.)
- Liability, manufactures/sells/relabels a product that has a defect and that defect causes injury or property damage, your business could be held liable. This insurance type covers the risk of defects, in case your product is faulty.
- Insurance, Insurance for crops grown by an agricultural business. If the customer is looking for coverage while the crops are being transported, please use Commercial Auto (Cargo) and use the correct trucking category.
- Liability, Media liability is a type of Professional Liability. It covers the Personal/Advertising injuries (e.g. libel, slander, and copyright infringement) just like a normal Commercial General Liability policy would except typically the General Liability's policy coverage for Personal/Advertising injuries would exclude these types of injuries for businesses primarily engaged in advertising, publishing, broadcasting, or similar activities. Media liability exists to fill in those gaps. It's extra coverage for these types of businesses.
- , type of professional liability insurance intended to cover medical practitioners, lawyers, or public officials.
- Keepers Liability, auto dealers/repair shops. This will cover vehicles (not belonging to the business owner) in case of damage from unforeseen circumstances (like a natural disaster).
- and Officers Liability, protects the personal assets of company directors and officers in the event they were sued while acting in their capacity as a director or officer. Most commonly requested by non-profit companies.
26 Clues: Insurance, Coverage for a boat • Insurance, livestock owned by the business. • Auto, Covers the cost of an auto accident if the business owner or an employee is at fault. • Insurance, Coverage for a flying vehicle Business Owners Policy, Combination of General Liability and Property • ...
CAB 2021-05-05
Across
- Writing mean things on peoples Facebook, Instagram etc.
- What is the B of bullying?
- Someone that stood up for themselves/ other people.
- No one is having fun.
- What is the A of bullying?
- Spreading rumors, excluding people from games and groups.
- Someone that hits people or calls them names.
- Someone that watched bullying happen.
Down
- Someone is being hurt on purpose.
- Name calling, threating.
- Everyone is having fun.
- What is the D of bullying?
- What is the C of bullying?
- Punching, kicking, and spitting.
- Attacked physically, socially, or emotionally.
- Someone that got hit or gets called names.
16 Clues: No one is having fun. • Everyone is having fun. • Name calling, threating. • What is the B of bullying? • What is the D of bullying? • What is the C of bullying? • What is the A of bullying? • Punching, kicking, and spitting. • Someone is being hurt on purpose. • Someone that watched bullying happen. • Someone that got hit or gets called names. • ...
Cells 2013-09-17
Across
- 'Brain' of the cell
- Protein Producers
- Contains digestive enzymes
- Jellylike substance
- 'Powerhouse' of the cell
- Transports materials through the cell from the Golgi Body
- Gives it the most structure and strength
- 'Security Guard' of the Nucleus
- Transports materials through the cell and produces protein
- 'Garbage disposer' of the cell
- Contains DNA of the cell
Down
- The Skeleton of the Cell
- 'Security Guard' of the Cell
- Only found in animal cells and are located near the nucleus
- Transports materials through the cell
- Photosynthesis happens in, and contains chlorophyll
- Surrounded by only a single membrane, doesn't contain DNA or Ribosomes
17 Clues: Protein Producers • 'Brain' of the cell • Jellylike substance • The Skeleton of the Cell • 'Powerhouse' of the cell • Contains DNA of the cell • Contains digestive enzymes • 'Security Guard' of the Cell • 'Garbage disposer' of the cell • 'Security Guard' of the Nucleus • Transports materials through the cell • Gives it the most structure and strength • ...
Security Awareness Campaign 2025 2025-10-28
Across
- phishing via sms/text messages
- copy of data for recovery
- browser add-ons that pose a supply chain risk
- what should you do if you suspect a security incident?
- malware that locks files for money
- access rights granted to a user
- phishing via voice/phone call
- malicious software
Down
- If a customer asks for security documents or compliance information, where should you direct them?
- policy for how long data is kept
- tool to store and generate credentials
- virtual private network (acronym)
- unauthorized physical entry
- uncontrolled spread of data copies
- records keystrokes to steal passwords
- adherence to rules/regulations
- social engineering via email
17 Clues: malicious software • copy of data for recovery • unauthorized physical entry • social engineering via email • phishing via voice/phone call • phishing via sms/text messages • adherence to rules/regulations • access rights granted to a user • policy for how long data is kept • virtual private network (acronym) • uncontrolled spread of data copies • ...
Reflexions Crossword Puzzle 2019-11-18
Across
- Where have most of Reflex’s Yes 4 Youth Team been placed?
- Reflex received the Gold Partner award for __________.
- Making your own cappuccino/hot chocolate/espresso is like ________________ writing poetry.
- The SOC offering revolves around four key services: Managed Security Services, Security Assessments, Security _________ and Security Compliance.
Down
- Which of our clients recently hosted a golf day?
- Cobus and Andrew installed switches, patched all links and configured all equipment at 16 KZN sites in ___________ days.
- How many people can our new kitchen cater for?
- The combined experience of Reflex and Page Automation in the logistics and motor industries has secured us this client.
- What is the name of our new Voice Engineer?
- The scope of work for our new client,______, includes VoIP, LAN, Connectivity.
10 Clues: What is the name of our new Voice Engineer? • How many people can our new kitchen cater for? • Which of our clients recently hosted a golf day? • Reflex received the Gold Partner award for __________. • Where have most of Reflex’s Yes 4 Youth Team been placed? • The scope of work for our new client,______, includes VoIP, LAN, Connectivity. • ...
Cyber Physical Systems - 1 2025-03-20
Across
- The coordination of processes to operate in unison.
- Protection of digital and cyber-physical systems from threats.
- Processing data closer to the source rather than a central server.
- Study of control and communication in machines and living beings.
- A highly automated, connected, and intelligent manufacturing system.
- Internet-based computing providing storage and processing power.
- A network of connected devices that communicate over the internet.
- Using models to replicate real-world behaviors.
- Devices that detect and respond to physical changes.
- The ability of different systems to work together.
- Large volumes of data used for analytics and decision-making.
Down
- A decentralized and secure digital ledger technology.
- Combining different subsystems into a unified system.
- A virtual replica of a physical system for monitoring and analysis.
- A computing system integrated into a larger system.
- The capability of a system to function independently.
- Devices that convert electrical signals into mechanical motion.
- Related to manufacturing and production systems.
- The process of making systems operate without human intervention.
19 Clues: Using models to replicate real-world behaviors. • Related to manufacturing and production systems. • The ability of different systems to work together. • The coordination of processes to operate in unison. • A computing system integrated into a larger system. • Devices that detect and respond to physical changes. • ...
PRE TEST AWARENESS 2014 2014-10-13
Across
- defines have the overall process flows for the service /Product
- Extent to which planned activities are realized and planned results achieved can be termed as _____
- Document where all non-conformance are identified in the process and opportunities to improve process
- Customer Satisfaction is customer’s ________ of the degree to which the customer’s requirements have been fulfilled
- Quality Management System
Down
- _______ Action to eliminate the cause of a potential nonconformity
- An ISO standard is a ____________ agreement containing technical specifications or other precise criteria to be used consistently
- One of the benefit of ISO Certification is it Strengthens business ________
- Information Security Management System
- Information Security ___ is -An identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of safeguards, or a previously unknown situation that may be security relevant
- Is a systematic approach to managing sensitive company information so that it remains secure
11 Clues: Quality Management System • Information Security Management System • defines have the overall process flows for the service /Product • _______ Action to eliminate the cause of a potential nonconformity • One of the benefit of ISO Certification is it Strengthens business ________ • ...
Housekeeping Safety & Security 2015-02-26
Across
- stealing from others
- not being personally injured
- group of employees that develop and monitor security programs
- prevention of incidents like theft or fire
- lost items should be recorded in this
- leaving the hotel premises
- what to do before entering guest room
Down
- opens even double-locked doors
- when slips and falls happen
- bend the knees before doing this
- where to meet after exiting the hotel
- opens all guestroom doors
- cleaners that may be harmful
- best cure for emergencies
14 Clues: stealing from others • opens all guestroom doors • best cure for emergencies • leaving the hotel premises • when slips and falls happen • not being personally injured • cleaners that may be harmful • opens even double-locked doors • bend the knees before doing this • where to meet after exiting the hotel • lost items should be recorded in this • ...
Wireless Technology 2024-04-26
Across
- Device allowing wireless connection to a wired network.
- Network divided into geographic cells.
- Short-range wireless technology.
- Device connecting multiple devices to the internet.
- Network of interconnected nodes.
- Transmission of data without physical cables or wires.
Down
- Long-distance wireless communication via orbiting objects.
- Early wireless security protocol.
- Localized network of devices.
- Range of frequencies used for wireless communication.
- Organization that standardized Wi-Fi.
- Latest Wi-Fi security protocol.
- Identifier for wireless networks.
- IEEE standard for wireless networking.
14 Clues: Localized network of devices. • Latest Wi-Fi security protocol. • Short-range wireless technology. • Network of interconnected nodes. • Early wireless security protocol. • Identifier for wireless networks. • Organization that standardized Wi-Fi. • Network divided into geographic cells. • IEEE standard for wireless networking. • ...
Cyber safety 2015-02-24
Across
- environment where electronic communication occurs
- people you don't know
- relating to electronic communication
- pinching people information from the Internet
Down
- something you use to keep things safe.
- harassment by electronic communication
- a crime that is committed on the Internet
- being safe from risk or danger
8 Clues: people you don't know • being safe from risk or danger • relating to electronic communication • something you use to keep things safe. • harassment by electronic communication • a crime that is committed on the Internet • pinching people information from the Internet • environment where electronic communication occurs
security in e-commerce 2024-05-17
8 Clues: fire is on the walls • crime happened in cyber • ___________ is to protect data. • Virus has similar neme of Tarzon • these biscuits are baked in computers • unauthorised access to computer system • hide the identity by using fake e-mails • monitors information travelling over a network
Building Singapore's Defence 2025-05-26
Across
- – What we need as a nation to stand strong.
- – A type of defence involving emergency preparedness.
- – A goal of all types of defence.
- – Practising for emergencies.
Down
- – Singapore's military force.
- – Short for National Service.
- – The kind of defence that involves everyone.
- – Defence against online threats.
8 Clues: – Singapore's military force. • – Short for National Service. • – Practising for emergencies. • – Defence against online threats. • – A goal of all types of defence. • – What we need as a nation to stand strong. • – The kind of defence that involves everyone. • – A type of defence involving emergency preparedness.
ISSN Day 2 2024-09-09
Across
- Entry-level certification for IT technicians (2 words)
- Career path for someone with CCNA (2 words)
- Network certification from Cisco (acronym)
- Type of device covered in A+ certification, besides computers
Down
- Career path for someone with A+ (2 words)
- Network topic covered in CCNA
- Security topic covered in Security+ certification
- Cybersecurity certification from CompTIA
- Operating system topic covered in A+ certification
9 Clues: Network topic covered in CCNA • Cybersecurity certification from CompTIA • Career path for someone with A+ (2 words) • Network certification from Cisco (acronym) • Career path for someone with CCNA (2 words) • Security topic covered in Security+ certification • Operating system topic covered in A+ certification • Entry-level certification for IT technicians (2 words) • ...
The United Nations 2024-11-07
Across
- Member of the Security Council
- Universal Declaration of _______ Rights
- Main area where all uN members meet
- legal power to say no to an official lawmaking body
- One hundred and ninety ______ members
Down
- UN ________ council is responsible for peacekeeping
- Arm of te UN that looks after cultural/scientfic places
- The year the UN was founded
- UN forces try to maintain _______ and security
9 Clues: The year the UN was founded • Member of the Security Council • Main area where all uN members meet • One hundred and ninety ______ members • Universal Declaration of _______ Rights • UN forces try to maintain _______ and security • UN ________ council is responsible for peacekeeping • legal power to say no to an official lawmaking body • ...
Public transport 2021-01-26
23 Clues: utas • jegy • kapu • vonat • vasút • előre • metró • vezető • utazás • állomás • indulás • megálló • villamos • autópálya • repülőtér • borravaló • repülőgép • egyirányú • előcsarnok • menettérti • vágány,peron • távolsági busz • biztonsági ellenőrzés
Lau 2014-10-03
German vocab unit 10 feminine words 2023-11-14
22 Clues: flag • unity • vision • anthem • culture • history • support • harmony • meaning • identity • security • language • discovery • diversity • enrichment • recognition • transparency • group identity • accomplishment • quality of life • economic crisis • adoption, acquisition
Spanish Travel Words 2023-12-18
20 Clues: bench • ferry • subway • snacks • grotto • anemone • recline • engineer • starfish • platform • to silde • security • seat belt • turnstile • streetcar • inner tube • arriving from • national park • luggage claim • In-flight service
Spanish Vocabulary 2023-12-18
22 Clues: tide • dune • sled • lobby • subway • snacks • recline • seaweed • baggage • to pack • to slide • security • suitcase • platform • bus stop • engineer • terminal • turnstile • conductor • crosswalk • post office • pickpockets
Woordjes kader 2 pagina 70 en 71 2025-10-01
23 Clues: rij • eng • ramp • grens • lijst • orkaan • vochtig • stromen • gesprek • mogelijk • voertuig • meerdere • geweldig • paspoort • volwassen • volgepakt • bestemming • hoeveelheid • koptelefoon • recht tegenover • zonnebrandcrème • omhelzen, omarmen • bewaking, beveiliging
Security Issues in Informatics 2024-11-25
Across
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- a type of malware that disguises itself as a legitimate program or file to gain access to a computer system
- when personal information is accessed, disclosed, or lost without authorization
- tricking someone into giving away sensitive information, like passwords or credit card details, by manipulating them psychologically, often by pretending to be someone they trust, like a company or a colleague, to gain access to systems or data
- a malicious cyber attack that targets cloud-based systems, services, or data
Down
- a security risk that occurs when someone with authorized access to an organization's resources misuses that access to cause harm
- a secret word or phrase that must be used to gain admission to something. in this case,easily guessable or crackable by hackers, typically due to its short length, use of common words, personal information like names or birthdates, or predictable patterns
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- a type of malicious software designed to block access to a computer system until a sum of money is paid
- irrelevant or inappropriate messages sent on the internet to a large number of people
10 Clues: a malicious cyber attack that targets cloud-based systems, services, or data • when personal information is accessed, disclosed, or lost without authorization • irrelevant or inappropriate messages sent on the internet to a large number of people • a type of malicious software designed to block access to a computer system until a sum of money is paid • ...
Taylor's Crossword 2023-05-19
Across
- providing security, political and peace building support, prevents conflict in the UN
- allowed residents of Canada to have a citizenship despite not being of Canadian origin
- Egyptian canal problems leading to Israeli/Egyptian war
- bill providing canadians with certain rights in federal law
- abbreviation for international organization to maintain peace and security among nations
- plan to develop economically and socially in Asian countries
- political barrier dividing Europe during Cold War
- war from 1955 to 1975, between communists and anti-communists
- state of hostility between Soviets and western powers
- abbreviation for security alliance of 30 countries across NA + EU
- plan that intended to provide economic assistance in European infrastructure
- fallout shelter created to house government staff and military in event of nuclear attack on Canada
Down
- first premier of newfoundland, influenced newfoundland to join canada
- defected cipher clerk from Russia
- international financial organization that supplies monetary assistance to lower income countries
- group of 56 members, maintains association between countries that were previously under British Empire
- national health insuance run by federal law
- highest court in canadian judicial system
- aircraft that was intended to be RCAFs, then PM requested all to be destroyed
- abbreviation for organization between US + Canada for air protection
20 Clues: defected cipher clerk from Russia • highest court in canadian judicial system • national health insuance run by federal law • political barrier dividing Europe during Cold War • state of hostility between Soviets and western powers • Egyptian canal problems leading to Israeli/Egyptian war • bill providing canadians with certain rights in federal law • ...
a 2021-11-27
Across
- , Virus known to spread over GSM-SMS networks.
- , Mobile technology that competes with GSM.
- , The utilization of algorithms to secure signalling.
- , The process of tricking people by changing your apparenet identity.
- , Wifi encryption method that is easy to hack
- , Trade name for 4G networks
- , Modern wireless technology that creates homespots and hotspots.
- , Wifi encryption method that is difficult to hack
- , Method of WPA encryption that is utilized to secure corporate network devices. WPA-_______.
- , The item inserted into a device which holds an encryption key.
- , Mobile technology that uses the TDMA radio signal.
Down
- , Type of server resident on a GSM network and utilized to force code onto handsets.
- , The process of securing a network appliance or server to protect it against hacking.
- , Physical security domain associated with voice/data devices that can be used anywhere. (CDMA, GSM ie)
- , Method used to physically cut into a cable and steal / divert signal.
- , Physical security domain associated with network connections that consist of physical lines.
- , Physical security domain associated with internal IT systems. (BSS)
- , The identification number assigned to every GSM device.
- , Modern wireless technology based on local Microwave Signals
- , Attack vector utilized which the target of most fraudster. A ____ domain attack.
- , The initals for the internet protocol that secures most mobile networks.
21 Clues: , Trade name for 4G networks • , Mobile technology that competes with GSM. • , Wifi encryption method that is easy to hack • , Virus known to spread over GSM-SMS networks. • , Wifi encryption method that is difficult to hack • , Mobile technology that uses the TDMA radio signal. • , The utilization of algorithms to secure signalling. • ...
Foundation of Security and Cybercrime 2024-11-19
Across
- anticipation of security incidents and planning for measures to be taken.
- an individualwho breaks into computer systems to steal, change, or destroy information
- unauthorized access of or interference with computer systems, servers, or other information and communication systems
- the use of electronic communication to bully a person
- an act or instance of using/closely imitating the language and thoughts of another author without authorization
- personnel, hardware, programs, networks, and data
- malicious program disguised as or embedded within legitimate software
- state of wel-being of information or infrastructure
- action taken in advance to protect the system against potential threats or dangers.
Down
- common type of online fraud
- applications on the computers and operating systems
- fraudulent practice of sending emails purporting to be someone reputable
- ensuring that the information is accessible to authorized persons when required without delay
- includes creating backup copies, malware management, and ensuring sufficient space and memory.
- malicious software
- wireless fidelity
- an assurance for which someone cannot deny something
- an action or event with potential to compromise and/or violate security.
- exclusive legal right to print, publish, perform, film, or record, and to authorize others to do the same.
- mass distribution of unsolicited messages, advertisements, and/or pornogaphy
20 Clues: wireless fidelity • malicious software • common type of online fraud • personnel, hardware, programs, networks, and data • applications on the computers and operating systems • state of wel-being of information or infrastructure • an assurance for which someone cannot deny something • the use of electronic communication to bully a person • ...
Module 3 - Peace & Security 2025-02-12
Across
- IMF and World bank emerged out of ........ in 1944.
- In UN, there are 193 member countries in its which organ?
- In UN security council, there are ....... number of members in total.
- The head quarters of this IA is in Bangkok founded in 1967.
- This organ of UN focusses on peace and security.
- Quota and embargo is an example of ...... barrier.
- ICJ is also called as ......
- The largest trade bloc in the world.
- This organization is focus on macro economic stability and provide finance to its 190 member countries.
- Upliftment of developing and under developed countries is the focus area.
- This organization creates international policies related to workers.
Down
- China, India, Russia, Brazil has a trade block. Which is it?
- In UN, this organ is not presently functioning.
- Intergovernmental organization to eliminate trade and tariff barriers.
- UN peace keeping force is called as .......
- The largest international organization in the world.
- Import duty and excise duty is an example of ........ barrier.
- Environment protection is the ultimatum of this funding project.
- Children protection is the focus area of this funding project.
- It is a variant of trade block but more focus is on peace and security.
- The investment done by one country in another country in form of an organization.
21 Clues: ICJ is also called as ...... • The largest trade bloc in the world. • UN peace keeping force is called as ....... • In UN, this organ is not presently functioning. • This organ of UN focusses on peace and security. • Quota and embargo is an example of ...... barrier. • IMF and World bank emerged out of ........ in 1944. • ...
Cashless society 2024-09-04
Across
- Electronic tool often used for payments in a cashless society
- The type of crime that may decrease in a cashless society
- A financial concept that could impact customers if all transactions are electronic
- What is a security concern with electronic transactions?
- The financial institution that may hire security teams to protect cash
- what do you think orba cashless world?
- Financial crime involving hiding the source of illegally obtained money
- A major benefit of a cashless society related to the ease of carrying money
- The term for the illegal hiding of income
- The physical form of money that is becoming less prevalent
- The primary risk associated with online transactions due to data breaches
Down
- a cashless society has its own?
- A problem in a cashless society where electronic systems fail
- if the source of the money is unknown, money laundering becomes much more?
- A device often used for cashless transactions while traveling
- The cost associated with creating physical money
- The type of fees that may increase if banks can't charge for cash withdrawals
- What positive effect does a cashless society have on crime?
- The state of financial transactions occurring without physical cash
- A type of currency that is becoming less common due to digital transactions
20 Clues: a cashless society has its own? • what do you think orba cashless world? • The term for the illegal hiding of income • The cost associated with creating physical money • What is a security concern with electronic transactions? • The type of crime that may decrease in a cashless society • The physical form of money that is becoming less prevalent • ...
Cyber safety Samson kelly 2016-06-01
Across
- Where only you can go on it.
- Where you send a message.
- Something that blocks people from getting on you device.
- bully Being mean on the emailS.
- It's bits of information.
- You put stuff on it to show people.
- You ask to do it.
- A female who helps you at home.
- ages You don't have your own age.
Down
- A sick device.
- You put photos on it.
- A electronic with a keyboard.
- media you give information away.
- It blocks virusus.
- A large amount of Data not wanted.
- You make one when you get emails.
- A person who helps you at school.
- A website persuades you.
- A male who helps you at home.
19 Clues: A sick device. • You ask to do it. • It blocks virusus. • You put photos on it. • A website persuades you. • Where you send a message. • It's bits of information. • Where only you can go on it. • A electronic with a keyboard. • A male who helps you at home. • A female who helps you at home. • media you give information away. • bully Being mean on the emailS. • ...
Holidays 2022-10-26
Across
- horn of plenty
- Unstitched her arm to escape her creator
- gobbles
- fermented juice of apples
- android who has scissors for hands
- Red, shining nose
- Pocus black flame candle lit by Californian transplant
- Stole Christmas
- natural sleep aid
- Got on the wrong plane after searching for batteries in his dad’s bag
Down
- Fall back an hour
- Monday online sales after a weekend of feast
- shed leaves seasonally
- essential amino acid found in poultry
- Frost Old man winter’s variant
- Friday camp out for a deal, after holiday meal
- penny pincher who doesn’t want to help Tiny Tim
- tart red fruit of the holidays
- Alone Movie franchise where the solo protagonist outsmarts bad people
19 Clues: gobbles • horn of plenty • Stole Christmas • Fall back an hour • Red, shining nose • natural sleep aid • shed leaves seasonally • fermented juice of apples • Frost Old man winter’s variant • tart red fruit of the holidays • android who has scissors for hands • essential amino acid found in poultry • Unstitched her arm to escape her creator • Monday online sales after a weekend of feast • ...
Holidays 2022-10-26
Across
- Alone Movie franchise where the solo protagonist outsmarts bad people
- gobbles
- Red, shining nose
- Friday camp out for a deal, after holiday meal
- Pocus black flame candle lit by Californian transplant
- natural sleep aid
- android who has scissors for hands
- Frost Old man winter’s variant
- essential amino acid found in poultry
- tart red fruit of the holidays
Down
- shed leaves seasonally
- Monday online sales after a weekend of feast
- Stole Christmas
- horn of plenty
- penny pincher who doesn’t want to help Tiny Tim
- fermented juice of apples
- Unstitched her arm to escape her creator
- Got on the wrong plane after searching for batteries in his dad’s bag
- Fall back an hour
19 Clues: gobbles • horn of plenty • Stole Christmas • Red, shining nose • natural sleep aid • Fall back an hour • shed leaves seasonally • fermented juice of apples • Frost Old man winter’s variant • tart red fruit of the holidays • android who has scissors for hands • essential amino acid found in poultry • Unstitched her arm to escape her creator • Monday online sales after a weekend of feast • ...
9Health Crossword Bullying 2024-09-15
Across
- Do not
- What should you not do back?
- When someone doesn't include you
- Bullying someone can ruin someone self
- Spreading lies about people
- Bullying Online
- Someone who stands up for others
- Bullying someone by their skin colour
- Bullying someone because of their mental and physical condition
Down
- Age group that gets bullied the most
- Using private information to get something from someone
- A place where most bullying takes place at
- Using Words
- People go here to feel better
- Someone who just watches people being bullied
- making others do stuff they don't want to do
- When your getting bullied tell a trusted
- Bullying that ruins someones reputation
- what is the person being bullied called
- What is the person bullying called
20 Clues: Do not • Using Words • Bullying Online • Spreading lies about people • What should you not do back? • People go here to feel better • When someone doesn't include you • Someone who stands up for others • What is the person bullying called • Age group that gets bullied the most • Bullying someone by their skin colour • Bullying someone can ruin someone self • ...
8th Oct.2015 (Thu.) 중3 5:20 독해 2015-10-07
krustvārdu mikla 2022-10-13
19 Clues: medmāsa • manikīre • setnieks • friziere • pardevejs • dizainere • galdnieks • viesmīlis • zinātnieks • zurnalists • grāmatvede • fotografers • guard apsargs • doctor dakters • driver taksists • guard zemessargs • teacher skolotaja • mechanic automehāniķis • technician datortehniķis
MEDIMUN Crossword 2022-03-24
Across
- every committee has 2 … and many delegates
- the theme of this year’s MEDIMUN is Global …
- games that relieve tension between students before the debate
- GA2 focuses on …, financial and economic development
- the annual session of MEDIMUN is also referred to as the annual …
- One of the themes of the … council is the situation in Afghanistan
- delegates can make speeches for and …
- an instance of declining to vote for or against a proposal or motion.
Down
- the … members are the team of reporters that put this issue together
- the security historical … discussed the Sino-Vietnamese war this year
- Delegates can make a …of information
- this is the 17th … of MediNews
- the name of the wonderful disease that caused a change in venue this year
- delegates can form … with other delegates
- the name of the country which is a permanent member of the UN security council and has crepes
- a formal discussion on a particular matter in which opposing arguments are put forward
- the name of the newly formed committee on the topic of crime
17 Clues: this is the 17th … of MediNews • Delegates can make a …of information • delegates can make speeches for and … • delegates can form … with other delegates • every committee has 2 … and many delegates • the theme of this year’s MEDIMUN is Global … • GA2 focuses on …, financial and economic development • the name of the newly formed committee on the topic of crime • ...
Infosec 2013-05-30
Across
- Your system can remain secured only if it has the latest __________.
- potential that an action or activity will lead to a loss
- A group of your colleagues who assists you in securely evacuating in any emergency situation.
- FAI Information security documents are made available to users on
- important in computers and networks
- a breach in security, such as unauthorized access to data
- or malware is a file or program other then a virus that is potentially harmful.
- Entering premises without swiping your access card by following someone else.
- any information about an individual which can be used to uniquely identify that person, e.g. name, date and place of birth, mother’s maiden name, social security number is ............. Identifiable Information
- is software designed specifically to detect, disable, and remove viruses, worms, and Trojans before they infect a computer
- Ensure that authorised user have access to information & associated assets when required.
- emailID to report security incidents
- list of permissions that tells an operating system which users have access rights to objects, and what operation they are allowed to perfom on those objects
- is a self-replicating program that is harmful to networks.
- is a form of attack that prevents users from accessing normal services, such as e-mail and a web server
- who is responsible for security
- I am not authorized to install applications and software that are
Down
- Independent review of how well you are following and complying with the standards and policies.
- visitors need to be
- Organization’s preparedness program for handling disruptions.
- of death is a series of repeated, larger than normal pings that crash the receiving computer.
- If you access a computer systems without the owner’s knowledge and approval, you are committing a _____
- is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- is used to discard hard copies of confidential data.
- Password must be always kept _______ .
- is ensuring the accuracy and completeness of Information.
- Ensuring the information is accessible only to those authorised have access.
- is a program written with malicious intent and sent out by attackers.
- Programming language that allows applets to run within a web browser.
- The scrambling of data into a secret code that can be read only by software set to decode the information.
- Your activities on the network can be ____________ by the company.
- is a software program that displays advertising on your computer.
- these set out the technical controls required to achieve the policy objeclives
- Social Media provides an efficient means for criminals to mine both personal and company data. Social ______ work to gain based on information they have obtained from these social networks or victim themselves
- abbreviation for voice communications over internet networks
- anything of value, such as source code, processes, hardware, people etc.
36 Clues: visitors need to be • who is responsible for security • important in computers and networks • emailID to report security incidents • Password must be always kept _______ . • is used to discard hard copies of confidential data. • potential that an action or activity will lead to a loss • is ensuring the accuracy and completeness of Information. • ...
Housekeeping Safety & Security 2013-04-23
Across
- leaving the hotel premises
- best cure for emergencies
- what to do before entering guest room
- prevention of incidents like theft or fire
- group of employees that develop and monitor security programs
- cleaners that may be harmful
Down
- not being personally injured
- opens even double-locked doors
- where to meet after exiting hotel
- stealing from others
- opens all guestroom doors
- lost items should be recorded in this
- when slips and falls happen
- bend the knees before doing this
14 Clues: stealing from others • best cure for emergencies • opens all guestroom doors • leaving the hotel premises • when slips and falls happen • not being personally injured • cleaners that may be harmful • opens even double-locked doors • bend the knees before doing this • where to meet after exiting hotel • lost items should be recorded in this • what to do before entering guest room • ...
Crossword 2019-03-14
Across
- what is Los Angeles city code?
- protected access to an aircraft from terminal?
- get on a plane
- area of airport public has access too?
- area a aircraft parks?
- word for pax?
- who checks your passport and departue cards?
Down
- staff that makes meals for sircraft
- who can access airside facilities?
- what is Hongkongs city code?
- Flys aircraft?
- a flight originating and terminating in the same country
- shorter term for Aviation Security
- where do you purchase your departure card?
14 Clues: word for pax? • get on a plane • Flys aircraft? • area a aircraft parks? • what is Hongkongs city code? • what is Los Angeles city code? • who can access airside facilities? • shorter term for Aviation Security • staff that makes meals for sircraft • area of airport public has access too? • where do you purchase your departure card? • who checks your passport and departue cards? • ...
Domestic & International Airport 2019-06-04
Across
- A location with a runway?
- City Code?
- These are located throughout the airport?
- Everything before security?
- How long does the airport operate for?
- Clock used at the airport?
- Another word for this?
- Terminal when not leaving the country?
- What is the symbol for the help desk?
Down
- Everything after security?
- Bags
- City Code?
- How many Air Bridges are there?
- What is one of the free facilities available for transit passengers?
- Terminal used when travelling overseas?
15 Clues: Bags • City Code? • City Code? • Another word for this? • A location with a runway? • Everything after security? • Clock used at the airport? • Everything before security? • How many Air Bridges are there? • What is the symbol for the help desk? • How long does the airport operate for? • Terminal when not leaving the country? • Terminal used when travelling overseas? • ...
Wireless Technology 2024-04-26
Across
- Range of frequencies used for wireless communication.
- Network divided into geographic cells.
- Early wireless security protocol.
- Identifier for wireless networks.
- Network of interconnected nodes.
- Long-distance wireless communication via orbiting objects.
- Latest Wi-Fi security protocol.
- IEEE standard for wireless networking.
- Localized network of devices.
Down
- Transmission of data without physical cables or wires.
- Device connecting multiple devices to the internet.
- Device allowing wireless connection to a wired network.
- Short-range wireless technology.
- Organization that standardized Wi-Fi.
14 Clues: Localized network of devices. • Latest Wi-Fi security protocol. • Short-range wireless technology. • Network of interconnected nodes. • Early wireless security protocol. • Identifier for wireless networks. • Organization that standardized Wi-Fi. • Network divided into geographic cells. • IEEE standard for wireless networking. • ...
FINTURA - FUN IN FINANCE 2025-02-22
Across
- Loan for poor credit scores.
- Difference between portfolio returns and its benchmark.
- Rating indicating low credit risk.
- Trust relationship involving asset management.
- Increase in the number of outstanding shares.
- Failure to repay a loan.
Down
- Debt that is subordinate to senior note.
- Security that can be exchanged.
- Measure of a company's short-term liquidity.
- Measure of company's financial leverage.
- Security giving purchase rights.
- Cost of insurance.
- Fixed payment made at intervals.
- Range of income subject to a certain tax rate.
14 Clues: Cost of insurance. • Failure to repay a loan. • Loan for poor credit scores. • Security that can be exchanged. • Security giving purchase rights. • Fixed payment made at intervals. • Rating indicating low credit risk. • Debt that is subordinate to senior note. • Measure of company's financial leverage. • Measure of a company's short-term liquidity. • ...
Adam and Dee's Shindig 2022-09-08
Across
- name of the groom.
- What do horses like to eat?
- The bride and groom exchange these at a wedding
- What were the dogs pulled down the aisle with?
- How many dogs were in the wedding?
- Color of bride's roses.
- Name of security dog's brother.
- Number of bridesmaids at the wedding?
- Number of groomsmen at the wedding?
- Name of the bride.
Down
- Security dog's name.
- What do the bride and groom say?
- Color of bride's dress.
- Who is taller, the bride or the groom?
- The ___ walks the bride down the aisle.
- Yard game with 2 paddles.
- Name of the baby in the wedding
- Number of flower girls in the wedding.
- What color was the the wagon?
- Who plays music at a wedding?
20 Clues: name of the groom. • Name of the bride. • Security dog's name. • Color of bride's dress. • Color of bride's roses. • Yard game with 2 paddles. • What do horses like to eat? • What color was the the wagon? • Who plays music at a wedding? • Name of security dog's brother. • Name of the baby in the wedding • What do the bride and groom say? • How many dogs were in the wedding? • ...
Campaigns In Outsource Global 2021-02-11
20 Clues: EMR • CRM • B2B • Sick • Salary • Proposal • ID Cards • Cleaning • National • Domestic • hardware • Marketers • Vulcaniser • Interviews • Specialists • Hospital docs • Daily Transport • Payment platform • Wig & black gown • Oldest company in Nigeria
Cassino 2023-01-06
12 Clues: don't tell • they steal • made of karats • you use to pay • guards that watch • a form of security • you do it at a casino • keeps things shut tight • a funny card from the deck • you use it to unlock your hotel room • what saint Patrick's day is all about • something that holds valuables in a public space
CMS Bygg 3 2021-05-31
16 Clues: use • clean • Danger • Stairs • approved • Measures • Planning • Dangerous • Necessary • Important • accordance • Assembling • Scaffolding • Immediately • Safety/Security • Safety Equipment
