cyber security Crossword Puzzles

Investments and Bonds 2022-11-29

Investments and Bonds crossword puzzle
Across
  1. type of bond, a corporation's promise to repay a specified amount of money with interest
  2. type of bond backed by assets of a business
  3. type of bond repaid through the income generated through the project
  4. type of bond, when multiple are issued on the same date but have different maturity dates
  5. type of bond backed by good faith of the company
  6. type of security that lasts 2-10 years
  7. a manager/third party that carries out the bond
  8. aka junk bond, type of bond that is risky but pays high interest
  9. the dollar amount the bondholder will receive at the bond's maturity
Down
  1. the ability for issuers to pay off bondholders early, if necessary
  2. type of security that lasts 30 years
  3. date on which corporate bonds are repaid
  4. investing/placing your money in more than one area
  5. document with all of the bond's information
  6. type of security that lasts 4-52 weeks
  7. type of bond that can convert from a corporate bond to equal value of a company's stock
  8. type of bond attached to a certain holder
  9. fund with annual/semiannual deposits to guarantee that companies can repay bondholders
  10. the _____ the risk, the higher the potential return
  11. type of bond issued at city, county, or state level

20 Clues: type of security that lasts 30 yearstype of security that lasts 4-52 weekstype of security that lasts 2-10 yearsdate on which corporate bonds are repaidtype of bond attached to a certain holderdocument with all of the bond's informationtype of bond backed by assets of a businessa manager/third party that carries out the bond...

Airside and Landside 2019-07-23

Airside and Landside crossword puzzle
Across
  1. passenger transfer between ground transportation and the facilities that allow them to board
  2. it’s the area where you go through security and hand your passport and departure card for inspection
  3. reach a plane at the end of a journey
  4. only travelers can go through this area when they leaving
  5. is provided as a quite place for contemplation to all travelers
  6. you go through before you leave Landside to get to the airside
  7. airport with customs and border control when passengers travel between countries
  8. if Incase fire thing happen
  9. duties levied by a government on imported goods
  10. it’s an area before departing passenger go through security
Down
  1. and beverage you go when your hungry
  2. if you need to buy multi vitamins where do you go?
  3. facilities they offer and usually have food, drinks, internet and relaxing area
  4. a strip of hard ground along which aircraft take off and land
  5. the first thing you do when you get at the airport
  6. it’s a document that you need to get on plane
  7. if you have foreign cash where do you go?
  8. if you want to buy alcohol in airside area where do you go?
  9. personal belonging you packet for traveling
  10. flight within the same country is called?

20 Clues: if Incase fire thing happenand beverage you go when your hungryreach a plane at the end of a journeyif you have foreign cash where do you go?flight within the same country is called?personal belonging you packet for travelingit’s a document that you need to get on planeduties levied by a government on imported goods...

WRS 15 & 16 - DA Puzzle 2023-12-01

WRS 15 & 16 - DA Puzzle crossword puzzle
Across
  1. data converted into a meaningful and useful context
  2. malware disguised as a trusted source that convinces the user to open a link or an attachment and install itself.
  3. using the Internet for anything other than work tasks
  4. includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network; usually requires the user to initiate by unwittingly installing the malicious software
  5. the level one exposes one's self or professional network to unethical intentions (e.g., end-user attacks, server-side attacks)
  6. pretending to be someone you trust or a system you work with, to get you to visit a fictitious site and enter your login or other private info
  7. to support with evidence or authority; to make more certain
  8. a particular preference or point of view that is personal, rather than scientific.
  9. malware that accesses or controls a device without being detected
  10. a type of virus that does not rely on users to copy and spread but can replicate itself, once inside a network/system
  11. something that furnishes proof
  12. the protection of information systems against unauthorized access (e.g., hacking, identity theft)
  13. believable; reliable
  14. a flaw or weakness that allows a threat agent to bypass security
  15. a formal document with which many organizations require employees to comply, addressing the separation of personal and workplace use of the Internet, email etiquette, and security measures and safeguards that employees must obey.
  16. using online services and social networking ethically, by being a good online citizen, by adhering to privacy and safety guidelines, and by facilitating thoughtful and considerate communication with others
  17. a website that allows people of similar interests to interact and exchange information that is typically personal
Down
  1. the ability to figure out the type of information you need, find that information, evaluate it, and properly use it
  2. connected with or related to the matter at hand
  3. unbiased; neutral
  4. using the Internet, ethically, for work-related tasks
  5. a server-side attack that allows hackers to be able to target vulnerabilities on any site you use to login, then they apply that same login information to other major consumer sites to see if you reused your login and password
  6. unethical and often unnoticed attacks by others in the public sphere when operating online (e.g., malware, phishing, Trojan horse, virus, worm, spam, rootkit)
  7. the unethical distribution of mass digital messages. This is the main way that malware is opened and spread
  8. cyber attack that targets the server side to get customer information from the database, such as credit card numbers
  9. book, article, person, or other resource consulted for information.
  10. examine and judge carefully
  11. attacks focused on the workplace Network workers access.
  12. malware that spreads by users from an infected device to the rest of the devices on a network/system

29 Clues: unbiased; neutralbelievable; reliableexamine and judge carefullysomething that furnishes proofconnected with or related to the matter at handdata converted into a meaningful and useful contextusing the Internet, ethically, for work-related tasksusing the Internet for anything other than work tasks...

Newsletter 2024-06-17

Newsletter crossword puzzle
Across
  1. What term describes an ethical hacker who uses their skills to improve cybersecurity
  2. what acts as a barrier between a trusted internal network and an untrusted external network.
  3. What small piece of data sent from a website and stored on the user's computer tracks information about their browsing activities?
  4. What term in cybersecurity is responsible for defending against simulated or real attacks.
  5. What type of cyber attack floods a network or system with a huge number of requests to disrupt normal traffic.
  6. What technology stores recently accessed data to speed up future acess
  7. What type of malware will self-replication and spread independently across networks.
  8. What term refers to a person who uses their programming skills to gain unauthorized access to computer systems?
  9. What term refers to the physical components of a computer system.
  10. What term refers to a group of interconnected computers or other devices that can communicate with each other.
  11. What term refers to testing a computer system, network, or web application to find security vulnerabilities?
  12. What term refers to a network of private computers infected with malicious software and controlled as a group without the owners' knowledge?
  13. what term refers to a collection of data or computer instructions that tell a computer how to work.
  14. What type of malicious software allows unauthorized access to a computer or network while concealing its presence?
  15. What group within an organization is responsible for simulating attacks against their own organization to test security measures.
  16. What term refers to a fixed-size output of a hash function that represents input data?
Down
  1. What term refers to a vulnerability in software that is unknown to a software vendor and has not yet been patched.
  2. What term refers to software which was designed to intentionally cause damage to the computer, server, client or computer network?
  3. What terms describes a hacker who exploits computer systems for personal gain or malicious purposes.
  4. What term refers to when someone is trying to disguise themselves as being a trusted known source.
  5. What term refers to the psychological manipulation of people into preforming actions or divulging confidential information.
  6. What type of software attaches itself to a legitimate program and spreads once the program is run.
  7. What term describes unauthorized use of someone else's computer to mine cryptocurrency?
  8. What term refers to a structured methodology or set of guidelines used to manage and improve an organization's cybersecurity posture.
  9. What type of malware encrypts a victim’s files and demands payment for the decryption key?
  10. What field of study involves techniques for secure communication in the presence of third parties?
  11. What protocol translates domain names into IP addresses?
  12. What term refers to a record of events that happen within an operating system, application or network device.
  13. What type of malicious software tricks the user by acting like a legitimate program to trick users into installing it.

29 Clues: What protocol translates domain names into IP addresses?What term refers to the physical components of a computer system.What technology stores recently accessed data to speed up future acessWhat term describes an ethical hacker who uses their skills to improve cybersecurity...

DORA christmas 2024-12-15

DORA christmas crossword puzzle
Across
  1. What must cryptographic keys be protected against throughout their lifecycle?
  2. What is the name of the Dutch IT-association that published the first DORA-control framework?
  3. "The control team lead shall select at least three ********* to conduct the TLPT, on the basis of all of the following elements: (a) the recommendation by the threat intelligence provider and the threat-led nature of each scenario; (b) the input provided by the test managers; (c) the feasibility of the proposed scenarios for execution, based on the expert judgement of the testers; (d) the size, complexity and overall risk profile of the financial entity and the nature, scale and complexity of its services, activities and operations."
  4. What technique can be used in network design to limit contagion during cyber attacks?
  5. The **** plan with a third party must be based on realistic scenarios and assumptions.
  6. Financial entities shall identify, classify and adequately document all ICT supported business functions, roles and responsibilities, the information ****** and ICT ****** supporting those functions, and their roles and dependencies in relation to ICT risk.
  7. What must financial entities use for advanced testing of ICT tools?
  8. How often per year should a review of access rights for ICT systems that support critical or important functions be performed
  9. What percentage of affected clients using a service meets the materiality threshold for major incidents?
  10. What must ICT security policies ensure regarding data?
Down
  1. Information of subcontractors should **** be in the Register of Information that effectively underpin ICT services supporting critical or important functions or material parts thereof.
  2. What is the main subject matter of DORA?
  3. Who is responsible for implementing the ICT risk management framework in financial entities?
  4. What must financial entities report to relevant authorities?
  5. "The Register of Information has six criteria: Financial entities shall ensure that the information contained in the templates referred to in paragraph 1 adhere to the following principles of data quality. Five of them are: accuracy; completeness; integrity; uniformity; validity. What is the six criteria?"
  6. What must be promptly renewed to ensure ongoing security?
  7. What is the abbreviation of " a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;"
  8. We enter the run phase of DORA. The ICT framework should be reviewed yearly. This report is quite extensive. So early start is important. Internal ***** should also start early to ***** this ICT Framework.
  9. How frequently should vulnerability scanning be performed on critical ICT assets?
  10. What should financial entities have to ensure data restoration?

20 Clues: What is the main subject matter of DORA?What must ICT security policies ensure regarding data?What must be promptly renewed to ensure ongoing security?What must financial entities report to relevant authorities?What should financial entities have to ensure data restoration?What must financial entities use for advanced testing of ICT tools?...

Information Age, Biodiversity and the Healthy Society. 2025-03-19

Information Age, Biodiversity and the Healthy Society. crossword puzzle
Across
  1. The disparity between individuals, communities, and countries in accessing and utilizing digital technologies, which affects economic opportunities, education, and social progress.
  2. The development of writing systems like cuneiform and hieroglyphics, along with postal services such as those used by the Persian and Roman empires.
  3. National parks and wildlife reserves preserve biodiversity by providing secure habitats. Their effectiveness depends on strong management, law enforcement, and community engagement, though they face challenges like habitat loss, illegal activities, and climate change.
  4. Aids conservation through remote sensing, GIS, drones, and AI for monitoring species and ecosystems. Environmental DNA (eDNA) helps detect species presence, improving conservation efficiency and accuracy.
  5. A significant environmental problem affecting air, water, and soil quality, posing serious risks to public health worldwide.
  6. Disrupts biodiversity by altering habitats, food chains, and species distribution. Rising temperatures, extreme weather, and ocean acidification threaten marine and terrestrial ecosystems.
  7. The increasing use of cloud storage, combined with poor security configurations, weak access controls, and insufficient encryption, raises vulnerability to cyber threats.
  8. Medications prescribed, managed, and delivered remotely through telehealth platforms, digital pharmacies, and e-prescription services, allowing patients to receive treatment without in-person visits.
  9. Scientists have successfully bred this species as part of efforts to restore the woolly mammoth.
  10. AI and data-driven decisions can reinforce societal biases, resulting in unfair treatment in employment, financial services, and law enforcement.
  11. Negative attitudes and stereotypes toward individuals with mental health conditions, leading to discrimination and discouraging people from seeking necessary care.
  12. The presence of diverse crops, livestock, and beneficial microorganisms that sustain farm productivity and ecosystem health, ensuring food security and environmental stability.
  13. The ability to obtain necessary medical services without financial, geographical, or systemic obstacles. Despite its importance, many individuals still struggle with healthcare accessibility.
Down
  1. The reduction of plant, animal, and microorganism species due to deforestation, pollution, climate change, and habitat destruction. Declining biodiversity weakens ecosystems, impacting air, water, and food supply. Protecting habitats and reducing pollution can help slow this loss.
  2. The introduction of printing and early mass communication, notably with Gutenberg’s printing press in the 1440s, which transformed information dissemination.
  3. The exchange of information through digital methods, including emails, text messages, social media, and video calls. It relies on electronic devices and the internet for efficient data transmission.
  4. Many users unknowingly accept data collection due to complex terms of service, raising doubts about the validity of their consent.
  5. Oral communication and symbols, including cave paintings, smoke signals, and drum beats, were early forms of conveying messages.
  6. Plays a key role in conserving and enhancing biodiversity within cities. Proper planning can prevent habitat fragmentation and support native species while benefiting human well-being.
  7. The imitation of human intelligence in machines, enabling them to learn, reason, solve problems, understand language, and make decisions.

20 Clues: Scientists have successfully bred this species as part of efforts to restore the woolly mammoth.A significant environmental problem affecting air, water, and soil quality, posing serious risks to public health worldwide.Oral communication and symbols, including cave paintings, smoke signals, and drum beats, were early forms of conveying messages....

At the airport vocabulary 2024-11-03

At the airport vocabulary crossword puzzle
Across
  1. Put in the trash.
  2. Document needed for international travel
  3. Airport security personnel
  4. Items that need to be placed in the tray
  5. Place to show your boarding pass
  6. Checks your travel documents
Down
  1. Leave luggage with the airline
  2. Often weighed before boarding
  3. Someone traveling on a plane
  4. What you do with your belt at security.
  5. Not international
  6. Enter the plane
  7. Where you greet arriving passengers

13 Clues: Enter the planePut in the trash.Not internationalAirport security personnelSomeone traveling on a planeChecks your travel documentsOften weighed before boardingLeave luggage with the airlinePlace to show your boarding passWhere you greet arriving passengersWhat you do with your belt at security.Document needed for international travel...

Profiles 2 text 1 Pinja 2014-12-03

Profiles 2 text 1 Pinja crossword puzzle
Across
  1. ulkomaille
  2. tuhlata
  3. lomakeskus
  4. siepata
  5. askeittain
  6. matkatavara
  7. jono
  8. majoitus
  9. lahtoselvitys
Down
  1. days nykyaan
  2. saapua
  3. matkustaa
  4. matka
  5. turvallisuus
  6. aurinkovoida
  7. hassakka

16 Clues: jonomatkasaapuatuhlatasiepatahassakkamajoitusmatkustaaulkomaillelomakeskusaskeittainmatkatavaradays nykyaanturvallisuusaurinkovoidalahtoselvitys

Human rights 2023-10-27

Human rights crossword puzzle
Across
  1. selvstændig
  2. tolerance
  3. værdighed
  4. medtagelse
  5. diskrimination
  6. rimelighed
Down
  1. menneskeværdighed
  2. frihed
  3. styrkelse
  4. privatliv
  5. social
  6. ansvarlighed
  7. retfærdighed
  8. lighed
  9. borgerrettigheder
  10. sikkerhed

16 Clues: frihedsociallighedstyrkelseprivatlivtoleranceværdighedsikkerhedmedtagelserimelighedselvstændigansvarlighedretfærdigheddiskriminationmenneskeværdighedborgerrettigheder

step 12 2016-02-17

step 12 crossword puzzle
Across
  1. in lähtöselvitys
  2. tulli
  3. herra
  4. rouva
  5. matkalaukku
  6. neiti
  7. baari
  8. häämatka
  9. portti
Down
  1. hiekkaranta
  2. sukset
  3. area tupakointialue
  4. check turvatarkastus
  5. club yökerho
  6. muistaa
  7. passintarkastus
  8. time koneeseen siirtymisaika
  9. kärryt
  10. boss entinen esimies
  11. odottaa

20 Clues: tulliherrarouvaneitibaarisuksetkärrytporttimuistaaodottaahäämatkahiekkarantamatkalaukkuclub yökerhopassintarkastusin lähtöselvitysarea tupakointialuecheck turvatarkastusboss entinen esimiestime koneeseen siirtymisaika

SPOTLIGHT8 KPL7 s.166-167 2016-02-08

SPOTLIGHT8 KPL7 s.166-167 crossword puzzle
Across
  1. salasana
  2. poissa tolaltaan
  3. ongelmat
  4. pyytää anteeksi
  5. kysyä
  6. keskustelu
  7. rasistinen
  8. kuluttaa
  9. uskoa
  10. koe
  11. molemmat
Down
  1. suukko
  2. sana
  3. halaus
  4. oppitunti
  5. lupa
  6. valehtelija
  7. luvata
  8. viesti
  9. turvallisuus
  10. tapahtua
  11. salaisuus
  12. kiusaaja

23 Clues: koesanalupakysyäuskoasuukkohalausluvataviestisalasanaongelmattapahtuakuluttaakiusaajamolemmatoppituntisalaisuuskeskustelurasistinenvalehtelijaturvallisuuspyytää anteeksipoissa tolaltaan

Psalms 23 2020-03-30

Psalms 23 crossword puzzle
Across
  1. vs5f
  2. vs4e
  3. vs4b
  4. vs4a
  5. vs4d
  6. vs4g
  7. vs4c
  8. vs6e
  9. vs3a
  10. vs6a
  11. vs5c
Down
  1. vs1a
  2. vs6d
  3. vs3b
  4. vs2b
  5. vs6b
  6. vs6c
  7. vs3c
  8. vs4f
  9. vs3d
  10. vs5b
  11. vs1b
  12. vs5e
  13. vs5d
  14. vs5a

25 Clues: vs1avs5fvs6dvs4evs3bvs4bvs2bvs6bvs6cvs3cvs4avs4dvs4fvs3dvs5bvs1bvs5evs4gvs5dvs4cvs6evs3avs6avs5avs5c

vocabulary 2025-01-08

vocabulary crossword puzzle
Across
  1. Q
  2. E
  3. M
  4. W
  5. J
  6. R
  7. X
  8. K
  9. S
Down
  1. N
  2. I
  3. T
  4. O
  5. F
  6. C
  7. A
  8. B
  9. L
  10. P
  11. D
  12. V
  13. H
  14. U
  15. G

24 Clues: NQITOFECMABLPWDVJHRXKUGS

4th Grade Spelling List #1 2025-09-17

4th Grade Spelling List #1 crossword puzzle
Across
  1. attraction
  2. expert
  3. present
  4. color
  5. handed
  6. flee
  7. day after today
  8. hoops
  9. stay
Down
  1. security
  2. heaviness
  3. midsection
  4. time past
  5. blood vessel
  6. twisting injury
  7. gift
  8. day before today
  9. collection book
  10. pass
  11. trash

20 Clues: giftfleepassstaycolortrashhoopsexperthandedpresentsecurityheavinesstime pastattractionmidsectionblood vesseltwisting injurycollection bookday after todayday before today

Travelling 2025-11-10

Travelling crossword puzzle
Across
  1. matkalaukku
  2. laiva
  3. passi
  4. lentoemäntä
  5. matkustaa
  6. lentäjä
  7. turvatarkastus
  8. kartta
  9. metro
  10. tulli
  11. taksi
  12. lähtevät
  13. loma
Down
  1. konduktööri
  2. juna
  3. pyörä
  4. lentokone
  5. helikopteri
  6. saapuvat
  7. matka
  8. turisti
  9. matkatavarat
  10. autolautta

23 Clues: junalomapyörälaivapassimatkametrotullitaksikarttalentäjäturistisaapuvatlähtevätlentokonematkustaaautolauttakonduktöörimatkalaukkulentoemäntähelikopterimatkatavaratturvatarkastus

Vocabulario #6 (es2) - write translations! 2022-10-31

Vocabulario #6 (es2) - write translations! crossword puzzle
Across
  1. – window
  2. – departure
  3. – Cancelled
  4. – counter
  5. – backpack
  6. – Passport
  7. – flight
  8. – aisle
Down
  1. – passenger
  2. – trip
  3. – seat
  4. – pilot
  5. – security
  6. - delayed
  7. – to travel
  8. – luggage

16 Clues: – trip– seat– pilot– aisle– window– flight– counter- delayed– luggage– security– backpack– Passport– passenger– departure– Cancelled– to travel

Test 2025-09-17

Test crossword puzzle
Across
  1. erwaefsrgergr
  2. awerawer ewb
  3. weafvrewbtew
Down
  1. asfdvaerbwer
  2. sgbrg ertb aw

5 Clues: asfdvaerbwerawerawer ewbweafvrewbtewerwaefsrgergrsgbrg ertb aw

PHN001 2017-06-05

PHN001 crossword puzzle
Across
  1. The process of securing a network appliance or server to protect it against hacking.
  2. Physical security domain associated with internal IT systems. (BSS)
  3. The utilization of algorithms to secure signalling.
  4. Physical security domain associated with network connections that consist of physical lines.
  5. Physical security domain associated with voice/data devices that can be used anywhere. (CDMA, GSM ie)
  6. Virus known to spread over GSM-SMS networks.
  7. Method used to physically cut into a cable and steal / divert signal.
  8. Wifi encryption method that is easy to hack
  9. Mobile technology that uses the TDMA radio signal.
Down
  1. Mobile technology that competes with GSM.
  2. Method of WPA encryption that is utilized to secure corporate network devices. WPA-_______.
  3. The process of tricking people by changing your apparenet identity.
  4. Modern wireless technology that creates homespots and hotspots.
  5. Trade name for 4G networks
  6. Attack vector utilized which the target of most fraudster. A ____ domain attack.
  7. Modern wireless technology based on local Microwave Signals
  8. The initals for the internet protocol that secures most mobile networks.
  9. Type of server resident on a GSM network and utilized to force code onto handsets.
  10. The identification number assigned to every GSM device.
  11. Wifi encryption method that is difficult to hack
  12. The item inserted into a device which holds an encryption key.

21 Clues: Trade name for 4G networksMobile technology that competes with GSM.Wifi encryption method that is easy to hackVirus known to spread over GSM-SMS networks.Wifi encryption method that is difficult to hackMobile technology that uses the TDMA radio signal.The utilization of algorithms to secure signalling....

Emergency Responce plan 2019-06-10

Emergency Responce plan crossword puzzle
Across
  1. 0124-2290192
  2. Raise the ______________ using the manual Call point
  3. Facility team will __________ for controlling the source of spill if possible
  4. Emergency handling trained associate will blow the ___________, to indicate that there is emergency situation is inside the building
  5. Support the security team to fighting the _________________
  6. After reentry into the building, debrief with Operations, Safety,________ Facility Manager & other observers to collect all pertinent information related to the emergency event.
  7. Operation manager will Maintain order and ensure that all Associates remain at the ______________.
  8. reach at the Assembly _____________
  9. Who will monitor the news and notify the site leader ?
Down
  1. During fire the operation manager will, Take charge of all persons at the evacuation point and ensure roll call is taken and is matching to the _________.
  2. Support Operation manager will move the associate to the _______________ area
  3. ,Don not Run ( Compleate the sentence )
  4. Associate should take injured Person to where, if Possible ?
  5. 0124-2292101
  6. Incident Commander will Go to the designated outside assembly point and follow the _______________ commander check sheet
  7. 011-26152801
  8. Provide appropiate __________to evacuate associate
  9. Do not leave the __________ until Asked to.
  10. security team will inform to whom, After consultation with Incident Commander about the incident ?
  11. arrange the spill kit from __________ location

20 Clues: 0124-22901920124-2292101011-26152801reach at the Assembly _____________,Don not Run ( Compleate the sentence )Do not leave the __________ until Asked to.arrange the spill kit from __________ locationProvide appropiate __________to evacuate associateRaise the ______________ using the manual Call point...

Cashless society 2024-09-04

Cashless society crossword puzzle
Across
  1. The cost associated with creating physical money
  2. what do you think orba cashless world?
  3. Electronic tool often used for payments in a cashless society
  4. A problem in a cashless society where electronic systems fail
  5. The state of financial transactions occurring without physical cash
  6. A device often used for cashless transactions while traveling
  7. The financial institution that may hire security teams to protect cash
  8. What positive effect does a cashless society have on crime?
  9. The physical form of money that is becoming less prevalent
  10. The primary risk associated with online transactions due to data breaches
  11. A type of currency that is becoming less common due to digital transactions
Down
  1. The type of fees that may increase if banks can't charge for cash withdrawals
  2. a cashless society has its own?
  3. Financial crime involving hiding the source of illegally obtained money
  4. The type of crime that may decrease in a cashless society
  5. if the source of the money is unknown, money laundering becomes much more?
  6. The term for the illegal hiding of income
  7. A major benefit of a cashless society related to the ease of carrying money
  8. A financial concept that could impact customers if all transactions are electronic
  9. What is a security concern with electronic transactions?

20 Clues: a cashless society has its own?what do you think orba cashless world?The term for the illegal hiding of incomeThe cost associated with creating physical moneyWhat is a security concern with electronic transactions?The type of crime that may decrease in a cashless societyThe physical form of money that is becoming less prevalent...

Investment Unit 2024-03-20

Investment Unit crossword puzzle
Across
  1. the age to collect social security benefits
  2. The ticker for Google
  3. The ticker for Amazon
  4. the market where many people buy investments
  5. the market where many people sell their investments
  6. Expected to run short of funds by 2031.
  7. digital money
  8. don't give you ownership rights.
  9. when you purchase or sell a stock
  10. You can get more benefits if you delay retirement until what age?
  11. it is meant for short-term goals
  12. The color that means stocks are doing bad
  13. The increase in the value of an asset
  14. Social Security & Medicare together is called...
  15. the bigger the box in the S&P 500, the bigger the...
Down
  1. 35 is the average age when ______ start to invest
  2. The ticker for Microsoft
  3. The ticker for Tesla
  4. 6.2% is the percent of your paycheck gets taken out for what?
  5. the age you can start investing
  6. The color that means stocks are doing good
  7. Managed by your employer.
  8. The president that created social security
  9. it is meant for long-term goals
  10. a common job that provides a pension
  11. The ticker for Meta
  12. invest a small sum regularly
  13. Invest a big sum at one go
  14. 32 is the average age when ______ start to invest
  15. physical money

30 Clues: digital moneyphysical moneyThe ticker for MetaThe ticker for TeslaThe ticker for GoogleThe ticker for AmazonThe ticker for MicrosoftManaged by your employer.Invest a big sum at one goinvest a small sum regularlythe age you can start investingit is meant for long-term goalsdon't give you ownership rights.it is meant for short-term goals...

CSC Puzzle 2021-06-09

CSC Puzzle crossword puzzle
Across
  1. Required to wear a security shirt
  2. See something, _____ something
  3. Anaheim Angels _____________
  4. OC's branch manager
  5. Common hair color abbreviation
  6. Common eye color abbreviation
  7. What does CP stand for
  8. Non-guard carded staff is _______ staff
  9. Guests are not allowed to re-________ the stadium
Down
  1. _______items include weapons, alcohol and large bags
  2. Verbal or physical
  3. Someone leaving with a subject who is being evicted
  4. Used to protect your skin from the sun
  5. What day is payday?
  6. Color of pen a security guard uses
  7. Text ___________ to 474747 to place a contactless concessions order

16 Clues: Verbal or physicalOC's branch managerWhat day is payday?What does CP stand forAnaheim Angels _____________Common eye color abbreviationSee something, _____ somethingCommon hair color abbreviationRequired to wear a security shirtColor of pen a security guard usesUsed to protect your skin from the sunNon-guard carded staff is _______ staff...

Globalization Vocabulary 1 2017-02-20

Globalization Vocabulary 1 crossword puzzle
Across
  1. Of or relating to the government
  2. Blending to sameness
  3. Operating or existing in many countries
  4. Customs, traditions, values of a group of people
  5. To rely upon each other
  6. Nations global organization for peace, security
  7. Living and nonliving things interacting together
Down
  1. The world seems smaller by Marshall McLuhan
  2. To be involved in complex ways with each other
  3. When larger systems, and everything interconnect
  4. Use, management of money
  5. In agreement
  6. System of money
  7. Organization for peace, security, political alliance
  8. Buy/sell goods/resources of a country or region
  9. Organized group of people

16 Clues: In agreementSystem of moneyBlending to samenessTo rely upon each otherUse, management of moneyOrganized group of peopleOf or relating to the governmentOperating or existing in many countriesThe world seems smaller by Marshall McLuhanTo be involved in complex ways with each otherNations global organization for peace, security...

Loan Terms 2025-11-07

Loan Terms crossword puzzle
Across
  1. person who takes out a loan
  2. Term loan length that doesn’t change
  3. property pledged as security for a loan
  4. Card linked directly to a bank account
  5. replacing an old loan with a new one
  6. length of time to repay a loan
  7. maximum amount that can be borrowed
  8. original amount of money borrowed
  9. chance of losing money
Down
  1. Card allowing borrowed payments
  2. Interest rate that changes with the market
  3. loan to buy property
  4. person or bank that gives money
  5. borrowed money that must be repaid
  6. asset pledged for repayment
  7. Interest rate that stays the same
  8. rate percentage charged on borrowed money

17 Clues: loan to buy propertychance of losing moneyperson who takes out a loanasset pledged for repaymentlength of time to repay a loanCard allowing borrowed paymentsperson or bank that gives moneyInterest rate that stays the sameoriginal amount of money borrowedborrowed money that must be repaidmaximum amount that can be borrowed...

Safety Moment - Team Building Edition 2015-04-21

Safety Moment - Team Building Edition crossword puzzle
Across
  1. 10
  2. 4
  3. 5
  4. 8
  5. 7
  6. 15
  7. 12
Down
  1. 14
  2. 1
  3. 11
  4. 9
  5. 13
  6. 3
  7. 2
  8. 6

15 Clues: 149587326141011131512

Turning adjectives into nouns using the suffix ity. 2014-12-03

Turning adjectives into nouns using the suffix ity. crossword puzzle
Across
  1. simplicity
  2. density
  3. stupidity
  4. opportunity
  5. complexity
  6. divinity
  7. nationality
  8. purity
  9. activity
Down
  1. ability
  2. security
  3. responsibility
  4. community
  5. immunity
  6. reality

15 Clues: purityabilitydensityrealitysecuritydivinityimmunityactivitystupiditycommunitysimplicitycomplexityopportunitynationalityresponsibility

Collective nouns (for people) 2024-05-19

Collective nouns (for people) crossword puzzle
Across
  1. Recruits
  2. Actors
  3. Judges
  4. Kings
  5. Politicians
  6. Sailors
  7. Experts
Down
  1. Rioters
  2. Friends
  3. Natives
  4. Security
  5. Men
  6. Soldiers
  7. Witches
  8. Tourists

15 Clues: MenKingsActorsJudgesRiotersFriendsNativesSailorsWitchesExpertsRecruitsSecuritySoldiersTouristsPoliticians

Adv. B 2024-02-05

Adv. B crossword puzzle
Across
  1. abuse
  2. crime
  3. cheat
  4. offender
  5. security
  6. guilt
  7. vandalism
  8. destroy
  9. homicide
Down
  1. kidnap
  2. bomb
  3. steal
  4. harassment
  5. defraud
  6. suspect

15 Clues: bombabusecrimecheatstealguiltkidnapdefraudsuspectdestroyoffendersecurityhomicidevandalismharassment

CyberDSA D3 2025-08-14

CyberDSA D3 crossword puzzle
Across
  1. Applying updates to fix software flaws.
  2. Method of guessing passwords by trying all possibilities.
  3. Security barrier that controls network traffic flow.
  4. Isolated environment to safely run suspicious files.
  5. System for analyzing and correlating security events.
Down
  1. Period of active connection between a user and a system.
  2. Technology that prevents sensitive data from leaving a network.
  3. Authorized simulated cyberattack to test security defenses.
  4. Algorithm for encrypting and decrypting information.
  5. Recorded events and activities on a system or network.

10 Clues: Applying updates to fix software flaws.Algorithm for encrypting and decrypting information.Security barrier that controls network traffic flow.Isolated environment to safely run suspicious files.System for analyzing and correlating security events.Recorded events and activities on a system or network....

INFO SEC PUZZLE 2024-11-11

INFO SEC PUZZLE crossword puzzle
Across
  1. SENSITIVE TYPE
  2. REQUIRED TO LOGIN
  3. LATEST MALWARE TYPE
  4. EASE OF ACCESS
  5. NETWORK SECURITY
Down
  1. REQUIRED FOR HANDLING VIRUS
  2. DATA CONFIDENTIALITY
  3. DANGEROUS FOR COMPUTER
  4. DATA SECURITY

9 Clues: DATA SECURITYSENSITIVE TYPEEASE OF ACCESSNETWORK SECURITYREQUIRED TO LOGINLATEST MALWARE TYPEDATA CONFIDENTIALITYDANGEROUS FOR COMPUTERREQUIRED FOR HANDLING VIRUS

Kibernetička sigurnost 2025-07-01

Kibernetička sigurnost crossword puzzle
Across
  1. of important data
  2. security barrier
  3. code to access account
  4. computer program
Down
  1. who breaks security
  2. demanding ransom
  3. software
  4. scrambling for safety
  5. scam to steal info

9 Clues: softwaredemanding ransomsecurity barriercomputer programof important datascam to steal infowho breaks securityscrambling for safetycode to access account

Transactions Online 2017-02-28

Transactions Online crossword puzzle
Across
  1. Cyber criminals.
  2. Online department store.
  3. You say that you are not satisfied with a product or service.
  4. Delivery of a product and its cost.
  5. Bankcard attached to your current account.
  6. The card used for paying via the Internet.
  7. Cash on delivery.
  8. You can get your money back after a wrong product or service.
  9. The name you write in the login box.
Down
  1. Consumer of a product or service.
  2. Financial manoeuver.
  3. Your personal identification code.
  4. Possibility for compensation.
  5. Ruined during delivery.
  6. You can get another product for a faulty one.
  7. To transport a product from one point to another.

16 Clues: Cyber criminals.Cash on delivery.Financial manoeuver.Ruined during delivery.Online department store.Possibility for compensation.Consumer of a product or service.Your personal identification code.Delivery of a product and its cost.The name you write in the login box.Bankcard attached to your current account....

crossword 2012-11-15

crossword crossword puzzle
Across
  1. one world many states (16)
  2. logo 1 (7)
  3. logo 4 (9)
  4. logo 2 (10)
  5. logo 3 (5)
  6. subsidiary company of adidas which makes sportswear, apparel and accessories (6)
  7. world's local bank (4)
  8. a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse (8)
Down
  1. highest grossing hollywood movie (6)
  2. full form of P&G (14)
  3. ceo of virgin atlantic (14)
  4. parent company of minute maid (8)
  5. the ultimate driving machine (3)
  6. artist with the highest number of views for his\her video on youtube (3)
  7. towards excellence (4)
  8. brand ambassador of sony cyber shot (7)

16 Clues: logo 1 (7)logo 4 (9)logo 3 (5)logo 2 (10)full form of P&G (14)towards excellence (4)world's local bank (4)one world many states (16)ceo of virgin atlantic (14)the ultimate driving machine (3)parent company of minute maid (8)highest grossing hollywood movie (6)brand ambassador of sony cyber shot (7)...

crossword 2012-11-15

crossword crossword puzzle
Across
  1. logo 3 (5)
  2. parent company of minute maid (8)
  3. logo 2 (10)
  4. the ultimate driving machine (3)
  5. one world many states (16)
  6. full form of P&G (14)
  7. artist with the highest number of views for his\her video on youtube (3)
Down
  1. brand ambassador of sony cyber shot (7)
  2. a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse (8)
  3. ceo of virgin atlantic (14)
  4. subsidiary company of adidas which makes sportswear, apparel and accessories (6)
  5. towards excellence (4)
  6. world's local bank (4)
  7. logo 1 (7)
  8. logo 4 (9)
  9. highest grossing hollywood movie (6)

16 Clues: logo 3 (5)logo 1 (7)logo 4 (9)logo 2 (10)full form of P&G (14)towards excellence (4)world's local bank (4)one world many states (16)ceo of virgin atlantic (14)the ultimate driving machine (3)parent company of minute maid (8)highest grossing hollywood movie (6)brand ambassador of sony cyber shot (7)...

Finance 2023-12-15

Finance crossword puzzle
Across
  1. of a company's earnings to its share price.
  2. borrowed or invested, excluding interest.
  3. charge for the use of borrowed assets, usually yearly.
  4. ratio (Price-to-earnings ratio)
  5. representing partial ownership of a company.
  6. portfolio value change due to interest rate shifts.
  7. investments across various assets to reduce risk.
  8. during which an investor can't sell a newly issued security.
Down
  1. at Risk (VaR)
  2. of an asset's sensitivity to interest rate changes.
  3. rate
  4. period
  5. fund
  6. mirroring a financial market index.
  7. instrument promising repayment with interest.

15 Clues: ratefundperiodat Risk (VaR)ratio (Price-to-earnings ratio)mirroring a financial market index.borrowed or invested, excluding interest.of a company's earnings to its share price.representing partial ownership of a company.instrument promising repayment with interest.investments across various assets to reduce risk....

what do you know? 2021-05-04

what do you know? crossword puzzle
Across
  1. name-calling threatening
  2. attacks physically, emotionally, or socially
  3. it happens more than once over a period of time
  4. response to feeling or an event
  5. punching,kicking,spitting
  6. what percent of students report bullying
Down
  1. there is an intent to hurt or harm
  2. something happening over and over again
  3. moment getting hurt on accident once
  4. writing mean thing on Facebook, Instagram, or Twitter
  5. in intent to make fun of someone in a playful way
  6. spreading rumors, excluding people from games and groups
  7. being far away from everything/in your own space

13 Clues: name-calling threateningpunching,kicking,spittingresponse to feeling or an eventthere is an intent to hurt or harmmoment getting hurt on accident oncesomething happening over and over againwhat percent of students report bullyingattacks physically, emotionally, or sociallyit happens more than once over a period of time...

Test 2024-12-16

Test crossword puzzle
Across
  1. - Software designed to damage or disrupt systems.
  2. - A cyber attack that overwhelms a server.
  3. - Simulating an attack to identify vulnerabilities.
  4. - A software update to fix vulnerabilities.
  5. - Fraudulent attempts to obtain sensitive information via email.
  6. - A group of infected computers under a hacker’s control.
Down
  1. - A hacker engaged in activism.
  2. - Software that detects and removes malware.
  3. Engineering - Manipulating people to gain confidential info.
  4. Breach - Unauthorized access to confidential data.
  5. - Software that secretly gathers information about a person.
  6. - Unsolicited messages or emails.
  7. - Malicious software disguised as legitimate software.

13 Clues: - A hacker engaged in activism.- Unsolicited messages or emails.- A cyber attack that overwhelms a server.- A software update to fix vulnerabilities.- Software that detects and removes malware.- Software designed to damage or disrupt systems.Breach - Unauthorized access to confidential data.- Simulating an attack to identify vulnerabilities....

United Nations 2023-11-19

United Nations crossword puzzle
Across
  1. It is a platform for nations to address these issues
  2. This is one of the permanent members of the Security Council
  3. The ESCO stands for Educational, Scientific and Cultural ...
  4. This universal document about human rights was adopted in 1945
  5. Created after this war
  6. Each nation gets this number of votes
  7. Members discuss issues and then vote in this group
Down
  1. The Security Council can impose these on nations who are not following UN rules
  2. There are 17 goals aimed at ending poverty, protecting the planet and ensuring this for all
  3. There are this number of permanent members in the Security Council
  4. There are 193 ________ (members)
  5. This is the acronym for the World Health Organization

12 Clues: Created after this warThere are 193 ________ (members)Each nation gets this number of votesMembers discuss issues and then vote in this groupIt is a platform for nations to address these issuesThis is the acronym for the World Health OrganizationThis is one of the permanent members of the Security Council...

Victim support crossword 2022-09-02

Victim support crossword crossword puzzle
Across
  1. istraga
  2. pritužba
  3. žalba
  4. oštećenik
  5. ovlašteni tužitelj
  6. svjedok
  7. pljačka
  8. sigurnosne mjere
Down
  1. prekršaj
  2. počinitelj
  3. državni odvjetnik
  4. optužnica
  5. žrtva
  6. kazneno djelo
  7. sud
  8. ozljeda
  9. ročište
  10. krađa
  11. napad

19 Clues: sudžalbažrtvakrađanapadistragasvjedokozljedaročištepljačkaprekršajpritužbaoptužnicaoštećenikpočiniteljkazneno djelosigurnosne mjeredržavni odvjetnikovlašteni tužitelj

Glossary of Stock Terms 2021-03-23

Glossary of Stock Terms crossword puzzle
Across
  1. program covers medical care for low income pt
  2. long-term contract sold by life insurance companies
  3. financial professional
  4. individual adds signature to loan
  5. combined security holdings of a person
  6. person names in a will to receive benefits
  7. designed investment to reduce risk
Down
  1. date debt comes due for payment
  2. debt security issued by a corporation or government
  3. written instrument used to transfer money
  4. inability to pay outstanding debt
  5. cost of borrowed money
  6. general rise in price of goods
  7. distribution of earnings to shareholders
  8. periodic payment for an insurance policy
  9. certificate representing one unit of ownership

16 Clues: cost of borrowed moneyfinancial professionalgeneral rise in price of goodsdate debt comes due for paymentinability to pay outstanding debtindividual adds signature to loandesigned investment to reduce riskcombined security holdings of a persondistribution of earnings to shareholdersperiodic payment for an insurance policy...

CW-Gavin 2021-11-18

CW-Gavin crossword puzzle
Across
  1. CLEAN AIR AND WATER ACTS regulate industrial waste disposal and other activities
  2. was the first major global supply chain
  3. ENVIRONMENTAL POLICY ACT requires the federal government to consider environment impact via
  4. AND SECURE TRADE-the FAST program is a trade initiative between the united states
  5. the most security from that and the most protection from weather
  6. SUPERFUND is the common name for a the comprehensive environmental response
  7. rail sidings are usually located from the normal shipping
  8. DOCK-are by far the most commonly used dock design in the united states
  9. available in a facility is more than just floor space
  10. workers must be able to retrieve the materials
Down
  1. any person who directly affects safely transportation
  2. SECURITY INITIATIVE-the goal of the CSI is to focus first on the ports
  3. Fences,Gates,Security,Guards,Lights
  4. volume expected to move through a warehouse
  5. DOCK- it consists of a platform that extend out from the extended building wall
  6. substance or material that the U.S department of transportation
  7. series of standards outlines a system for companies

17 Clues: Fences,Gates,Security,Guards,Lightswas the first major global supply chainvolume expected to move through a warehouseworkers must be able to retrieve the materialsseries of standards outlines a system for companiesany person who directly affects safely transportationavailable in a facility is more than just floor space...

How familiar are you with low level computer systems [university knowledge] 2024-04-09

How familiar are you with low level computer systems [university knowledge] crossword puzzle
Across
  1. Tool used for reverse engineering binaries
  2. What is the weakest link in the security chain
  3. The most common data transfer interface in Unix systems
  4. Superuser or administrator account in Unix-like operating systems
  5. A famous open-source kernel made by Linus Torvalds
  6. What software structure represents network connections? (Hint: connect, accept, bind, listen, etc.)
  7. Process of single stepping through software instructions and resolving bugs
  8. We all hate this programming language obviously
  9. Modern OS-level containerization toolset (Hint: microservices architecture)
Down
  1. Assembly is converted into computer instructions through an...
  2. Systems storing user passwords are required to hash and...
  3. What famous BSD operating-system is known to be fixated with security?
  4. Protocol whose purpose is to provide communications security over the internet (green padlock in your browser)
  5. Common locking mechanism for programs that share memory or run in parallel
  6. A reliable but slow transport protocol
  7. Interface for a program to request services from the kernel
  8. A famous distributed version control system (originally) made by Linus Torvalds, also known as the father of Linux.

17 Clues: A reliable but slow transport protocolTool used for reverse engineering binariesWhat is the weakest link in the security chainWe all hate this programming language obviouslyA famous open-source kernel made by Linus TorvaldsThe most common data transfer interface in Unix systemsSystems storing user passwords are required to hash and......

How familiar are you with low level computer systems [university knowledge] 2024-04-09

How familiar are you with low level computer systems [university knowledge] crossword puzzle
Across
  1. Tool used for reverse engineering binaries
  2. What is the weakest link in the security chain
  3. The most common data transfer interface in Unix systems
  4. Superuser or administrator account in Unix-like operating systems
  5. A famous open-source kernel made by Linus Torvalds
  6. What software structure represents network connections? (Hint: connect, accept, bind, listen, etc.)
  7. Process of single stepping through software instructions and resolving bugs
  8. We all hate this programming language obviously
  9. Modern OS-level containerization toolset (Hint: microservices architecture)
Down
  1. Assembly is converted into computer instructions through an...
  2. Systems storing user passwords are required to hash and...
  3. What famous BSD operating-system is known to be fixated with security?
  4. Protocol whose purpose is to provide communications security over the internet (green padlock in your browser)
  5. Common locking mechanism for programs that share memory or run in parallel
  6. A reliable but slow transport protocol
  7. Interface for a program to request services from the kernel
  8. A famous distributed version control system (originally) made by Linus Torvalds, also known as the father of Linux.

17 Clues: A reliable but slow transport protocolTool used for reverse engineering binariesWhat is the weakest link in the security chainWe all hate this programming language obviouslyA famous open-source kernel made by Linus TorvaldsThe most common data transfer interface in Unix systemsSystems storing user passwords are required to hash and......

Bullying 2023-03-21

Bullying crossword puzzle
Across
  1. A form of help
  2. manipulation, mimicking and intimidation
  3. A witness of the bullying
  4. Person who is being bullied
  5. use of negative words to intentionally upset someone
Down
  1. verbally, socially or psychologically bullying someone using technology
  2. Spreading rumours and repeated mimicking
  3. Pushing and shoving someone repeatedly

8 Clues: A form of helpA witness of the bullyingPerson who is being bulliedPushing and shoving someone repeatedlySpreading rumours and repeated mimickingmanipulation, mimicking and intimidationuse of negative words to intentionally upset someoneverbally, socially or psychologically bullying someone using technology

Online Communication 2023-08-07

Online Communication crossword puzzle
Across
  1. Connects global computers
  2. Exchanging information
  3. Remarks made under someone else's post
Down
  1. Social media platform founded in February 2004
  2. Message sent by computer
  3. Something involving computers or the internet
  4. social media platform bought by Facbook in 2012
  5. Software program downloaded onto a computer or phone

8 Clues: Exchanging informationMessage sent by computerConnects global computersRemarks made under someone else's postSomething involving computers or the internetSocial media platform founded in February 2004social media platform bought by Facbook in 2012Software program downloaded onto a computer or phone

Travel 2024-05-20

Travel crossword puzzle
Across
  1. flight attendant
  2. agent
  3. takeoff
  4. departure board
  5. pilot
  6. luggage
  7. landing
Down
  1. customs
  2. security checkpoint
  3. airport
  4. copilot
  5. suitcase
  6. airplane
  7. ticket
  8. taxi
  9. passport
  10. scales

17 Clues: taxiagentpilotticketscalescustomsairportcopilottakeoffluggagelandingsuitcaseairplanepassportdeparture boardflight attendantsecurity checkpoint

Sadlier Unit 11 Crossword puzzle 2023-03-15

Sadlier Unit 11 Crossword puzzle crossword puzzle
Across
  1. foolish
  2. sort
  3. pacify
  4. snuggle
  5. cascade
  6. cry
Down
  1. confidence
  2. plunge
  3. confirm
  4. standard
  5. tangy
  6. flexible
  7. picky
  8. operate
  9. sensible

15 Clues: crysorttangypickyplungepacifyconfirmfoolishsnuggleoperatecascadestandardflexiblesensibleconfidence

Chapter 5 A2 2025-05-15

Chapter 5 A2 crossword puzzle
Across
  1. beïnvloeden
  2. zeker
  3. bezorgd
  4. beveiliging
  5. beïnvloeden
  6. verlopen
Down
  1. bevredigend
  2. verwijderen
  3. aanpassen
  4. zoekopdracht
  5. onjuist
  6. onpartijdig
  7. vermoeiend
  8. reclamespot
  9. volgen
  10. opnemen

16 Clues: zekervolgenonjuistbezorgdopnemenverlopenaanpassenvermoeiendbevredigendverwijderenbeïnvloedenonpartijdigreclamespotbeveiligingbeïnvloedenzoekopdracht

15.11.2022 words 2022-11-15

15.11.2022 words crossword puzzle
Across
  1. правительство
  2. зависимость
  3. важность
  4. безопасность
  5. ученый
  6. движение
  7. выбирать
Down
  1. реклама
  2. удовольствие
  3. поймать
  4. ассистент
  5. покидать
  6. выборы
  7. терять
  8. счастье

15 Clues: выборытерятьученыйрекламапойматьсчастьепокидатьважностьдвижениевыбиратьассистентзависимостьудовольствиебезопасностьправительство

world cup news 2022-11-25

world cup news crossword puzzle
Across
  1. kärsiä
  2. lähtö
  3. osallistuminen
  4. vartija
  5. seuraamukset
  6. pysytteli
  7. väitetty
Down
  1. tarkastelu
  2. tuki
  3. pidätetty
  4. vastaan
  5. osallistujat
  6. vakava
  7. syytökset
  8. takavarikoida

15 Clues: tukilähtökärsiävakavavastaanvartijaväitettypidätettysyytöksetpysyttelitarkasteluosallistujatseuraamuksettakavarikoidaosallistuminen

Shared Services ICT 2023-07-16

Shared Services ICT crossword puzzle
Across
  1. Aplikasi ERP
  2. Platform Permintaan Layanan ICT
Down
  1. Fungsi IT Operation
  2. Jenis Cyber Attack untuk mencuri informasi pengguna
  3. Pertamina Digital Signature
  4. Multi-Factor Authentication

6 Clues: Aplikasi ERPFungsi IT OperationPertamina Digital SignatureMulti-Factor AuthenticationPlatform Permintaan Layanan ICTJenis Cyber Attack untuk mencuri informasi pengguna

Healthy Habits, Healthy You 2024-11-15

Healthy Habits, Healthy You crossword puzzle
Across
  1. what the story is mostly about
  2. tools that make tasks easier or solve problems
  3. digital technology
  4. give more information about the main idea
Down
  1. signals or clues that help recognize danger
  2. something you do regularly
  3. practices that help keep your body clean and healthy
  4. feeling well in both body and mind
  5. choosing one thing in place of another

9 Clues: digital technologysomething you do regularlywhat the story is mostly aboutfeeling well in both body and mindchoosing one thing in place of anothergive more information about the main ideasignals or clues that help recognize dangertools that make tasks easier or solve problemspractices that help keep your body clean and healthy

Cluster Ja 001 2023-03-23

Cluster Ja 001 crossword puzzle
Across
  1. The VPN app of choice of Athena
  2. Our CEO
  3. New communication platform of choice replacing Google HangOuts
  4. Athena ____ form is used to lodge tickets for finance/payroll/tools/etc
  5. ___-A-Thon
  6. Athena's HMO provider
  7. Our new COO
  8. Executive Assistant is now known as Executive ___
Down
  1. Our PH Legal Entity Name
  2. An app used to provide a US number that can be used for calls and messages
  3. ___ Value Nominations
  4. Athena uses ___ Bank for payroll
  5. Time keep tool
  6. Our Operational Name
  7. Learning Platform that houses different training modules
  8. Athena ____ Services is responsible for coordinating client gift requests
  9. MDM is a security app provided by ___

17 Clues: Our CEO___-A-ThonOur new COOTime keep toolOur Operational Name___ Value NominationsAthena's HMO providerOur PH Legal Entity NameThe VPN app of choice of AthenaAthena uses ___ Bank for payrollMDM is a security app provided by ___Executive Assistant is now known as Executive ___Learning Platform that houses different training modules...

FBI Crossword 2015-04-28

FBI Crossword crossword puzzle
Across
  1. A person who takes an active role
  2. An action that is punishable by law
  3. Practice for the field
  4. To increase strength of an army or similar force
  5. Firearm
  6. Facts or details wether a belief or proposition is true
  7. To prevent possible riots or destruction
Down
  1. A private police force
  2. Metal covering worn by security
  3. Nation, state, or community
  4. An inquiry or study
  5. A person involved in work secretly
  6. Several states in which they form a unity
  7. A police patrol car
  8. An example of something occurring

15 Clues: FirearmAn inquiry or studyA police patrol carA private police forcePractice for the fieldNation, state, or communityMetal covering worn by securityA person who takes an active roleAn example of something occurringA person involved in work secretlyAn action that is punishable by lawTo prevent possible riots or destruction...

Great Depression 2023-10-16

Great Depression crossword puzzle
Across
  1. Roosevelt's way of making america better
  2. where people stood to get food
  3. a farm live
  4. farmers that used others land
  5. to remove against their will
  6. where businesses are bought, sold, or traded
  7. using the land to much
  8. a way to help people make money
  9. a long time without water
Down
  1. making to many goods
  2. a city life
  3. clouds of dust caused by over farming
  4. a time of economic distress
  5. security to help security of elders
  6. a new way created to communicate around the world

15 Clues: a city lifea farm livemaking to many goodsusing the land to mucha long time without watera time of economic distressto remove against their willfarmers that used others landwhere people stood to get fooda way to help people make moneysecurity to help security of eldersclouds of dust caused by over farmingRoosevelt's way of making america better...

Elida vocabulary hints 2015-04-29

Elida vocabulary hints crossword puzzle
Across
  1. bully bullying online.
  2. writing that has been copied from someone else work.
  3. someone who access to your computer file.
  4. connected computers.
Down
  1. network is facebook,snapchat,instagram,twitter.
  2. a law that protects your work.
  3. network of thousands of other computer networks.
  4. use a copyright law that provides educate.

8 Clues: connected computers.bully bullying online.a law that protects your work.someone who access to your computer file.use a copyright law that provides educate.network is facebook,snapchat,instagram,twitter.network of thousands of other computer networks.writing that has been copied from someone else work.

Recent trends in accounting 2024-01-23

Recent trends in accounting crossword puzzle
Across
  1. financial data from cyber threats (13)
  2. reporting on environmental and social impact (3,4)
  3. from compliance to strategic guidance (9)
  4. in the virtual cloud (6)
Down
  1. large datasets for financial insights (12)
  2. blockchain for tamper-proof transactions (9)
  3. data entry using software (10)
  4. AI to reduce repetitive tasks (7)

8 Clues: in the virtual cloud (6)data entry using software (10)AI to reduce repetitive tasks (7)financial data from cyber threats (13)from compliance to strategic guidance (9)large datasets for financial insights (12)blockchain for tamper-proof transactions (9)reporting on environmental and social impact (3,4)

Insurance types 2022-06-27

Insurance types crossword puzzle
Across
  1. Liability (Dram), coverage for bodily injury or property damage caused by an intoxicated person who was served liquor by the business owner.
  2. Liability/Errors & Omissions, Coverage for professional services in the event of an error (does something wrong) or omission (does not do something they're supposed to) that leads to financial loss (as opposed to bodily injury or property damage)
  3. Liability, protects businesses from Internet-based risks and risks relating to information technology infrastructure, information privacy, information governance liability, etc. Keywords: Malware, Data Breaches, Cyber Security, Operational Risk, Service Risk, Cyber Attacks
  4. Risk, Specialty type of Property Insurance that protects a person's or organization's insurable interest in materials, fixtures and/or equipment awaiting installation during the construction or renovation of a building or structure, should those items sustain physical loss or damage from a covered loss.
  5. Auto, Covers the cost of an auto accident if the business owner or an employee is at fault.
  6. Marine, Specialty type of Property Insurance that protects moveable equipment away from the business owner's premises.
  7. Insurance, Coverage for a flying vehicle Business Owners Policy, Combination of General Liability and Property
  8. Liability, Umbrella insurance refers to liability insurance that is in excess of specified other policies and also potentially primary insurance for losses not covered by the other policies.
  9. Covers the business owner's building and contents in case of a covered loss such as water/fire damage or theft.
  10. provides coverage against all risks of physical loss or damage to freight during the shipment from any external cause during shipping.
  11. Insurance, Coverage for a boat
  12. Risk, Lessor's Risk Only (LRO) Insurance, also known as the Landlord's Insurance, is a specific type of property and liability coverage designed for building owners.
  13. Insurance, livestock owned by the business.
Down
  1. Personal Property, Business Personal Property covers everything inside of a building. If you were to open the door and shake everything out, everything that came out would be covered under Business Personal Property.
  2. Interruption Insurance, replaces income lost in the event that business is halted for some reason, such as a fire or a natural disaster.
  3. pays to repair or replace a vehicle you don't own if it is damaged by a collision, fire, theft, explosion, or vandalism while you are towing or hauling.
  4. Insurance, protects a property owner against damage caused by fires, severe storms, hail/sleet, or other natural events (hazards).
  5. Liability / Unladen Liability, provides coverage for truck drivers when they are operating their trucks in a non-trucking capacity BOB Tail- covers your return trip after delivering the freight trailer to its destination. Without the trailer attached,
  6. Liability, Protects the business owner from any claims for bodily injury property damage and personal/advertising injuries. Also covers products and completed operations (means that the work done is still covered even after the job has been completed).
  7. Practices Liability, often referred to as EPLI or EPL, covers businesses against claims by workers that their legal rights as employees of the company have been violated (i.e. Claims of Sexual harassment, Discrimination, Wrongful termination.)
  8. Liability, manufactures/sells/relabels a product that has a defect and that defect causes injury or property damage, your business could be held liable. This insurance type covers the risk of defects, in case your product is faulty.
  9. Insurance, Insurance for crops grown by an agricultural business. If the customer is looking for coverage while the crops are being transported, please use Commercial Auto (Cargo) and use the correct trucking category.
  10. Liability, Media liability is a type of Professional Liability. It covers the Personal/Advertising injuries (e.g. libel, slander, and copyright infringement) just like a normal Commercial General Liability policy would except typically the General Liability's policy coverage for Personal/Advertising injuries would exclude these types of injuries for businesses primarily engaged in advertising, publishing, broadcasting, or similar activities. Media liability exists to fill in those gaps. It's extra coverage for these types of businesses.
  11. , type of professional liability insurance intended to cover medical practitioners, lawyers, or public officials.
  12. Keepers Liability, auto dealers/repair shops. This will cover vehicles (not belonging to the business owner) in case of damage from unforeseen circumstances (like a natural disaster).
  13. and Officers Liability, protects the personal assets of company directors and officers in the event they were sued while acting in their capacity as a director or officer. Most commonly requested by non-profit companies.

26 Clues: Insurance, Coverage for a boatInsurance, livestock owned by the business.Auto, Covers the cost of an auto accident if the business owner or an employee is at fault.Insurance, Coverage for a flying vehicle Business Owners Policy, Combination of General Liability and Property...

CAB 2021-05-05

CAB crossword puzzle
Across
  1. Writing mean things on peoples Facebook, Instagram etc.
  2. What is the B of bullying?
  3. Someone that stood up for themselves/ other people.
  4. No one is having fun.
  5. What is the A of bullying?
  6. Spreading rumors, excluding people from games and groups.
  7. Someone that hits people or calls them names.
  8. Someone that watched bullying happen.
Down
  1. Someone is being hurt on purpose.
  2. Name calling, threating.
  3. Everyone is having fun.
  4. What is the D of bullying?
  5. What is the C of bullying?
  6. Punching, kicking, and spitting.
  7. Attacked physically, socially, or emotionally.
  8. Someone that got hit or gets called names.

16 Clues: No one is having fun.Everyone is having fun.Name calling, threating.What is the B of bullying?What is the D of bullying?What is the C of bullying?What is the A of bullying?Punching, kicking, and spitting.Someone is being hurt on purpose.Someone that watched bullying happen.Someone that got hit or gets called names....

Cells 2013-09-17

Cells crossword puzzle
Across
  1. 'Brain' of the cell
  2. Protein Producers
  3. Contains digestive enzymes
  4. Jellylike substance
  5. 'Powerhouse' of the cell
  6. Transports materials through the cell from the Golgi Body
  7. Gives it the most structure and strength
  8. 'Security Guard' of the Nucleus
  9. Transports materials through the cell and produces protein
  10. 'Garbage disposer' of the cell
  11. Contains DNA of the cell
Down
  1. The Skeleton of the Cell
  2. 'Security Guard' of the Cell
  3. Only found in animal cells and are located near the nucleus
  4. Transports materials through the cell
  5. Photosynthesis happens in, and contains chlorophyll
  6. Surrounded by only a single membrane, doesn't contain DNA or Ribosomes

17 Clues: Protein Producers'Brain' of the cellJellylike substanceThe Skeleton of the Cell'Powerhouse' of the cellContains DNA of the cellContains digestive enzymes'Security Guard' of the Cell'Garbage disposer' of the cell'Security Guard' of the NucleusTransports materials through the cellGives it the most structure and strength...

Security Awareness Campaign 2025 2025-10-28

Security Awareness Campaign 2025 crossword puzzle
Across
  1. phishing via sms/text messages
  2. copy of data for recovery
  3. browser add-ons that pose a supply chain risk
  4. what should you do if you suspect a security incident?
  5. malware that locks files for money
  6. access rights granted to a user
  7. phishing via voice/phone call
  8. malicious software
Down
  1. If a customer asks for security documents or compliance information, where should you direct them?
  2. policy for how long data is kept
  3. tool to store and generate credentials
  4. virtual private network (acronym)
  5. unauthorized physical entry
  6. uncontrolled spread of data copies
  7. records keystrokes to steal passwords
  8. adherence to rules/regulations
  9. social engineering via email

17 Clues: malicious softwarecopy of data for recoveryunauthorized physical entrysocial engineering via emailphishing via voice/phone callphishing via sms/text messagesadherence to rules/regulationsaccess rights granted to a userpolicy for how long data is keptvirtual private network (acronym)uncontrolled spread of data copies...

Reflexions Crossword Puzzle 2019-11-18

Reflexions Crossword Puzzle crossword puzzle
Across
  1. Where have most of Reflex’s Yes 4 Youth Team been placed?
  2. Reflex received the Gold Partner award for __________.
  3. Making your own cappuccino/hot chocolate/espresso is like ________________ writing poetry.
  4. The SOC offering revolves around four key services: Managed Security Services, Security Assessments, Security _________ and Security Compliance.
Down
  1. Which of our clients recently hosted a golf day?
  2. Cobus and Andrew installed switches, patched all links and configured all equipment at 16 KZN sites in ___________ days.
  3. How many people can our new kitchen cater for?
  4. The combined experience of Reflex and Page Automation in the logistics and motor industries has secured us this client.
  5. What is the name of our new Voice Engineer?
  6. The scope of work for our new client,______, includes VoIP, LAN, Connectivity.

10 Clues: What is the name of our new Voice Engineer?How many people can our new kitchen cater for?Which of our clients recently hosted a golf day?Reflex received the Gold Partner award for __________.Where have most of Reflex’s Yes 4 Youth Team been placed?The scope of work for our new client,______, includes VoIP, LAN, Connectivity....

Cyber Physical Systems - 1 2025-03-20

Cyber Physical Systems - 1 crossword puzzle
Across
  1. The coordination of processes to operate in unison.
  2. Protection of digital and cyber-physical systems from threats.
  3. Processing data closer to the source rather than a central server.
  4. Study of control and communication in machines and living beings.
  5. A highly automated, connected, and intelligent manufacturing system.
  6. Internet-based computing providing storage and processing power.
  7. A network of connected devices that communicate over the internet.
  8. Using models to replicate real-world behaviors.
  9. Devices that detect and respond to physical changes.
  10. The ability of different systems to work together.
  11. Large volumes of data used for analytics and decision-making.
Down
  1. A decentralized and secure digital ledger technology.
  2. Combining different subsystems into a unified system.
  3. A virtual replica of a physical system for monitoring and analysis.
  4. A computing system integrated into a larger system.
  5. The capability of a system to function independently.
  6. Devices that convert electrical signals into mechanical motion.
  7. Related to manufacturing and production systems.
  8. The process of making systems operate without human intervention.

19 Clues: Using models to replicate real-world behaviors.Related to manufacturing and production systems.The ability of different systems to work together.The coordination of processes to operate in unison.A computing system integrated into a larger system.Devices that detect and respond to physical changes....

PRE TEST AWARENESS 2014 2014-10-13

PRE TEST AWARENESS 2014 crossword puzzle
Across
  1. defines have the overall process flows for the service /Product
  2. Extent to which planned activities are realized and planned results achieved can be termed as _____
  3. Document where all non-conformance are identified in the process and opportunities to improve process
  4. Customer Satisfaction is customer’s ________ of the degree to which the customer’s requirements have been fulfilled
  5. Quality Management System
Down
  1. _______ Action to eliminate the cause of a potential nonconformity
  2. An ISO standard is a ____________ agreement containing technical specifications or other precise criteria to be used consistently
  3. One of the benefit of ISO Certification is it Strengthens business ________
  4. Information Security Management System
  5. Information Security ___ is -An identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of safeguards, or a previously unknown situation that may be security relevant
  6. Is a systematic approach to managing sensitive company information so that it remains secure

11 Clues: Quality Management SystemInformation Security Management Systemdefines have the overall process flows for the service /Product_______ Action to eliminate the cause of a potential nonconformityOne of the benefit of ISO Certification is it Strengthens business ________...

Housekeeping Safety & Security 2015-02-26

Housekeeping Safety & Security crossword puzzle
Across
  1. stealing from others
  2. not being personally injured
  3. group of employees that develop and monitor security programs
  4. prevention of incidents like theft or fire
  5. lost items should be recorded in this
  6. leaving the hotel premises
  7. what to do before entering guest room
Down
  1. opens even double-locked doors
  2. when slips and falls happen
  3. bend the knees before doing this
  4. where to meet after exiting the hotel
  5. opens all guestroom doors
  6. cleaners that may be harmful
  7. best cure for emergencies

14 Clues: stealing from othersopens all guestroom doorsbest cure for emergenciesleaving the hotel premiseswhen slips and falls happennot being personally injuredcleaners that may be harmfulopens even double-locked doorsbend the knees before doing thiswhere to meet after exiting the hotellost items should be recorded in this...

Wireless Technology 2024-04-26

Wireless Technology crossword puzzle
Across
  1. Device allowing wireless connection to a wired network.
  2. Network divided into geographic cells.
  3. Short-range wireless technology.
  4. Device connecting multiple devices to the internet.
  5. Network of interconnected nodes.
  6. Transmission of data without physical cables or wires.
Down
  1. Long-distance wireless communication via orbiting objects.
  2. Early wireless security protocol.
  3. Localized network of devices.
  4. Range of frequencies used for wireless communication.
  5. Organization that standardized Wi-Fi.
  6. Latest Wi-Fi security protocol.
  7. Identifier for wireless networks.
  8. IEEE standard for wireless networking.

14 Clues: Localized network of devices.Latest Wi-Fi security protocol.Short-range wireless technology.Network of interconnected nodes.Early wireless security protocol.Identifier for wireless networks.Organization that standardized Wi-Fi.Network divided into geographic cells.IEEE standard for wireless networking....

Cyber safety 2015-02-24

Cyber safety crossword puzzle
Across
  1. environment where electronic communication occurs
  2. people you don't know
  3. relating to electronic communication
  4. pinching people information from the Internet
Down
  1. something you use to keep things safe.
  2. harassment by electronic communication
  3. a crime that is committed on the Internet
  4. being safe from risk or danger

8 Clues: people you don't knowbeing safe from risk or dangerrelating to electronic communicationsomething you use to keep things safe.harassment by electronic communicationa crime that is committed on the Internetpinching people information from the Internetenvironment where electronic communication occurs

security in e-commerce 2024-05-17

security in e-commerce crossword puzzle
Across
  1. crime happened in cyber
  2. Virus has similar neme of Tarzon
  3. fire is on the walls
  4. hide the identity by using fake e-mails
Down
  1. ___________ is to protect data.
  2. these biscuits are baked in computers
  3. monitors information travelling over a network
  4. unauthorised access to computer system

8 Clues: fire is on the wallscrime happened in cyber___________ is to protect data.Virus has similar neme of Tarzonthese biscuits are baked in computersunauthorised access to computer systemhide the identity by using fake e-mailsmonitors information travelling over a network

Building Singapore's Defence 2025-05-26

Building Singapore's Defence crossword puzzle
Across
  1. – What we need as a nation to stand strong.
  2. – A type of defence involving emergency preparedness.
  3. – A goal of all types of defence.
  4. – Practising for emergencies.
Down
  1. – Singapore's military force.
  2. – Short for National Service.
  3. – The kind of defence that involves everyone.
  4. – Defence against online threats.

8 Clues: – Singapore's military force.– Short for National Service.– Practising for emergencies.– Defence against online threats.– A goal of all types of defence.– What we need as a nation to stand strong.– The kind of defence that involves everyone.– A type of defence involving emergency preparedness.

ISSN Day 2 2024-09-09

ISSN Day 2 crossword puzzle
Across
  1. Entry-level certification for IT technicians (2 words)
  2. Career path for someone with CCNA (2 words)
  3. Network certification from Cisco (acronym)
  4. Type of device covered in A+ certification, besides computers
Down
  1. Career path for someone with A+ (2 words)
  2. Network topic covered in CCNA
  3. Security topic covered in Security+ certification
  4. Cybersecurity certification from CompTIA
  5. Operating system topic covered in A+ certification

9 Clues: Network topic covered in CCNACybersecurity certification from CompTIACareer path for someone with A+ (2 words)Network certification from Cisco (acronym)Career path for someone with CCNA (2 words)Security topic covered in Security+ certificationOperating system topic covered in A+ certificationEntry-level certification for IT technicians (2 words)...

The United Nations 2024-11-07

The United Nations crossword puzzle
Across
  1. Member of the Security Council
  2. Universal Declaration of _______ Rights
  3. Main area where all uN members meet
  4. legal power to say no to an official lawmaking body
  5. One hundred and ninety ______ members
Down
  1. UN ________ council is responsible for peacekeeping
  2. Arm of te UN that looks after cultural/scientfic places
  3. The year the UN was founded
  4. UN forces try to maintain _______ and security

9 Clues: The year the UN was foundedMember of the Security CouncilMain area where all uN members meetOne hundred and ninety ______ membersUniversal Declaration of _______ RightsUN forces try to maintain _______ and securityUN ________ council is responsible for peacekeepinglegal power to say no to an official lawmaking body...

Public transport 2021-01-26

Public transport crossword puzzle
Across
  1. autópálya
  2. villamos
  3. repülőgép
  4. vonat
  5. jegy
  6. állomás
  7. távolsági busz
  8. biztonsági ellenőrzés
  9. metró
  10. menettérti
  11. egyirányú
  12. utazás
Down
  1. repülőtér
  2. borravaló
  3. előcsarnok
  4. vágány,peron
  5. vasút
  6. utas
  7. előre
  8. indulás
  9. vezető
  10. kapu
  11. megálló

23 Clues: utasjegykapuvonatvasútelőremetróvezetőutazásállomásindulásmegállóvillamosautópályarepülőtérborravalórepülőgépegyirányúelőcsarnokmenettértivágány,perontávolsági buszbiztonsági ellenőrzés

Lau 2014-10-03

Lau crossword puzzle
Across
  1. 18
  2. 3
  3. 24
  4. 12
  5. 25
  6. 14
  7. 5
  8. 9
  9. 21
  10. 13
  11. 23
  12. 20
  13. 26
  14. 17
Down
  1. 15
  2. 2
  3. 7
  4. 1
  5. 16
  6. 22
  7. 4
  8. 6
  9. 19
  10. 11
  11. 27
  12. 8

26 Clues: 2371465981518241216222519141127211323202617

German vocab unit 10 feminine words 2023-11-14

German vocab unit 10 feminine words crossword puzzle
Across
  1. culture
  2. anthem
  3. unity
  4. economic crisis
  5. harmony
  6. accomplishment
  7. diversity
  8. flag
  9. meaning
  10. adoption, acquisition
Down
  1. quality of life
  2. identity
  3. vision
  4. enrichment
  5. discovery
  6. security
  7. group identity
  8. transparency
  9. history
  10. support
  11. recognition
  12. language

22 Clues: flagunityvisionanthemculturehistorysupportharmonymeaningidentitysecuritylanguagediscoverydiversityenrichmentrecognitiontransparencygroup identityaccomplishmentquality of lifeeconomic crisisadoption, acquisition

Spanish Travel Words 2023-12-18

Spanish Travel Words crossword puzzle
Across
  1. inner tube
  2. engineer
  3. bench
  4. recline
  5. streetcar
  6. ferry
  7. to silde
  8. national park
  9. snacks
  10. security
  11. luggage claim
Down
  1. anemone
  2. subway
  3. seat belt
  4. turnstile
  5. In-flight service
  6. starfish
  7. arriving from
  8. platform
  9. grotto

20 Clues: benchferrysubwaysnacksgrottoanemonereclineengineerstarfishplatformto sildesecurityseat beltturnstilestreetcarinner tubearriving fromnational parkluggage claimIn-flight service

Spanish Vocabulary 2023-12-18

Spanish Vocabulary crossword puzzle
Across
  1. recline
  2. tide
  3. baggage
  4. bus stop
  5. dune
  6. sled
  7. conductor
  8. engineer
  9. to pack
  10. post office
  11. terminal
  12. crosswalk
  13. pickpockets
Down
  1. to slide
  2. subway
  3. security
  4. suitcase
  5. seaweed
  6. snacks
  7. platform
  8. turnstile
  9. lobby

22 Clues: tidedunesledlobbysubwaysnacksreclineseaweedbaggageto packto slidesecuritysuitcaseplatformbus stopengineerterminalturnstileconductorcrosswalkpost officepickpockets

Woordjes kader 2 pagina 70 en 71 2025-10-01

Woordjes kader 2 pagina 70 en 71 crossword puzzle
Across
  1. zonnebrandcrème
  2. mogelijk
  3. hoeveelheid
  4. vochtig
  5. stromen
  6. voertuig
  7. volgepakt
  8. orkaan
  9. gesprek
  10. eng
  11. koptelefoon
  12. paspoort
  13. ramp
Down
  1. bestemming
  2. recht tegenover
  3. bewaking, beveiliging
  4. grens
  5. rij
  6. volwassen
  7. omhelzen, omarmen
  8. lijst
  9. meerdere
  10. geweldig

23 Clues: rijengrampgrenslijstorkaanvochtigstromengesprekmogelijkvoertuigmeerderegeweldigpaspoortvolwassenvolgepaktbestemminghoeveelheidkoptelefoonrecht tegenoverzonnebrandcrèmeomhelzen, omarmenbewaking, beveiliging

Security Issues in Informatics 2024-11-25

Security Issues in Informatics crossword puzzle
Across
  1. the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  2. a type of malware that disguises itself as a legitimate program or file to gain access to a computer system
  3. when personal information is accessed, disclosed, or lost without authorization
  4. tricking someone into giving away sensitive information, like passwords or credit card details, by manipulating them psychologically, often by pretending to be someone they trust, like a company or a colleague, to gain access to systems or data
  5. a malicious cyber attack that targets cloud-based systems, services, or data
Down
  1. a security risk that occurs when someone with authorized access to an organization's resources misuses that access to cause harm
  2. a secret word or phrase that must be used to gain admission to something. in this case,easily guessable or crackable by hackers, typically due to its short length, use of common words, personal information like names or birthdates, or predictable patterns
  3. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  4. a type of malicious software designed to block access to a computer system until a sum of money is paid
  5. irrelevant or inappropriate messages sent on the internet to a large number of people

10 Clues: a malicious cyber attack that targets cloud-based systems, services, or datawhen personal information is accessed, disclosed, or lost without authorizationirrelevant or inappropriate messages sent on the internet to a large number of peoplea type of malicious software designed to block access to a computer system until a sum of money is paid...

Taylor's Crossword 2023-05-19

Taylor's Crossword crossword puzzle
Across
  1. providing security, political and peace building support, prevents conflict in the UN
  2. allowed residents of Canada to have a citizenship despite not being of Canadian origin
  3. Egyptian canal problems leading to Israeli/Egyptian war
  4. bill providing canadians with certain rights in federal law
  5. abbreviation for international organization to maintain peace and security among nations
  6. plan to develop economically and socially in Asian countries
  7. political barrier dividing Europe during Cold War
  8. war from 1955 to 1975, between communists and anti-communists
  9. state of hostility between Soviets and western powers
  10. abbreviation for security alliance of 30 countries across NA + EU
  11. plan that intended to provide economic assistance in European infrastructure
  12. fallout shelter created to house government staff and military in event of nuclear attack on Canada
Down
  1. first premier of newfoundland, influenced newfoundland to join canada
  2. defected cipher clerk from Russia
  3. international financial organization that supplies monetary assistance to lower income countries
  4. group of 56 members, maintains association between countries that were previously under British Empire
  5. national health insuance run by federal law
  6. highest court in canadian judicial system
  7. aircraft that was intended to be RCAFs, then PM requested all to be destroyed
  8. abbreviation for organization between US + Canada for air protection

20 Clues: defected cipher clerk from Russiahighest court in canadian judicial systemnational health insuance run by federal lawpolitical barrier dividing Europe during Cold Warstate of hostility between Soviets and western powersEgyptian canal problems leading to Israeli/Egyptian warbill providing canadians with certain rights in federal law...

a 2021-11-27

a crossword puzzle
Across
  1. , Virus known to spread over GSM-SMS networks.
  2. , Mobile technology that competes with GSM.
  3. , The utilization of algorithms to secure signalling.
  4. , The process of tricking people by changing your apparenet identity.
  5. , Wifi encryption method that is easy to hack
  6. , Trade name for 4G networks
  7. , Modern wireless technology that creates homespots and hotspots.
  8. , Wifi encryption method that is difficult to hack
  9. , Method of WPA encryption that is utilized to secure corporate network devices. WPA-_______.
  10. , The item inserted into a device which holds an encryption key.
  11. , Mobile technology that uses the TDMA radio signal.
Down
  1. , Type of server resident on a GSM network and utilized to force code onto handsets.
  2. , The process of securing a network appliance or server to protect it against hacking.
  3. , Physical security domain associated with voice/data devices that can be used anywhere. (CDMA, GSM ie)
  4. , Method used to physically cut into a cable and steal / divert signal.
  5. , Physical security domain associated with network connections that consist of physical lines.
  6. , Physical security domain associated with internal IT systems. (BSS)
  7. , The identification number assigned to every GSM device.
  8. , Modern wireless technology based on local Microwave Signals
  9. , Attack vector utilized which the target of most fraudster. A ____ domain attack.
  10. , The initals for the internet protocol that secures most mobile networks.

21 Clues: , Trade name for 4G networks, Mobile technology that competes with GSM., Wifi encryption method that is easy to hack, Virus known to spread over GSM-SMS networks., Wifi encryption method that is difficult to hack, Mobile technology that uses the TDMA radio signal., The utilization of algorithms to secure signalling....

Foundation of Security and Cybercrime 2024-11-19

Foundation of Security and Cybercrime crossword puzzle
Across
  1. anticipation of security incidents and planning for measures to be taken.
  2. an individualwho breaks into computer systems to steal, change, or destroy information
  3. unauthorized access of or interference with computer systems, servers, or other information and communication systems
  4. the use of electronic communication to bully a person
  5. an act or instance of using/closely imitating the language and thoughts of another author without authorization
  6. personnel, hardware, programs, networks, and data
  7. malicious program disguised as or embedded within legitimate software
  8. state of wel-being of information or infrastructure
  9. action taken in advance to protect the system against potential threats or dangers.
Down
  1. common type of online fraud
  2. applications on the computers and operating systems
  3. fraudulent practice of sending emails purporting to be someone reputable
  4. ensuring that the information is accessible to authorized persons when required without delay
  5. includes creating backup copies, malware management, and ensuring sufficient space and memory.
  6. malicious software
  7. wireless fidelity
  8. an assurance for which someone cannot deny something
  9. an action or event with potential to compromise and/or violate security.
  10. exclusive legal right to print, publish, perform, film, or record, and to authorize others to do the same.
  11. mass distribution of unsolicited messages, advertisements, and/or pornogaphy

20 Clues: wireless fidelitymalicious softwarecommon type of online fraudpersonnel, hardware, programs, networks, and dataapplications on the computers and operating systemsstate of wel-being of information or infrastructurean assurance for which someone cannot deny somethingthe use of electronic communication to bully a person...

Module 3 - Peace & Security 2025-02-12

Module 3 - Peace & Security crossword puzzle
Across
  1. IMF and World bank emerged out of ........ in 1944.
  2. In UN, there are 193 member countries in its which organ?
  3. In UN security council, there are ....... number of members in total.
  4. The head quarters of this IA is in Bangkok founded in 1967.
  5. This organ of UN focusses on peace and security.
  6. Quota and embargo is an example of ...... barrier.
  7. ICJ is also called as ......
  8. The largest trade bloc in the world.
  9. This organization is focus on macro economic stability and provide finance to its 190 member countries.
  10. Upliftment of developing and under developed countries is the focus area.
  11. This organization creates international policies related to workers.
Down
  1. China, India, Russia, Brazil has a trade block. Which is it?
  2. In UN, this organ is not presently functioning.
  3. Intergovernmental organization to eliminate trade and tariff barriers.
  4. UN peace keeping force is called as .......
  5. The largest international organization in the world.
  6. Import duty and excise duty is an example of ........ barrier.
  7. Environment protection is the ultimatum of this funding project.
  8. Children protection is the focus area of this funding project.
  9. It is a variant of trade block but more focus is on peace and security.
  10. The investment done by one country in another country in form of an organization.

21 Clues: ICJ is also called as ......The largest trade bloc in the world.UN peace keeping force is called as .......In UN, this organ is not presently functioning.This organ of UN focusses on peace and security.Quota and embargo is an example of ...... barrier.IMF and World bank emerged out of ........ in 1944....

Cashless society 2024-09-04

Cashless society crossword puzzle
Across
  1. Electronic tool often used for payments in a cashless society
  2. The type of crime that may decrease in a cashless society
  3. A financial concept that could impact customers if all transactions are electronic
  4. What is a security concern with electronic transactions?
  5. The financial institution that may hire security teams to protect cash
  6. what do you think orba cashless world?
  7. Financial crime involving hiding the source of illegally obtained money
  8. A major benefit of a cashless society related to the ease of carrying money
  9. The term for the illegal hiding of income
  10. The physical form of money that is becoming less prevalent
  11. The primary risk associated with online transactions due to data breaches
Down
  1. a cashless society has its own?
  2. A problem in a cashless society where electronic systems fail
  3. if the source of the money is unknown, money laundering becomes much more?
  4. A device often used for cashless transactions while traveling
  5. The cost associated with creating physical money
  6. The type of fees that may increase if banks can't charge for cash withdrawals
  7. What positive effect does a cashless society have on crime?
  8. The state of financial transactions occurring without physical cash
  9. A type of currency that is becoming less common due to digital transactions

20 Clues: a cashless society has its own?what do you think orba cashless world?The term for the illegal hiding of incomeThe cost associated with creating physical moneyWhat is a security concern with electronic transactions?The type of crime that may decrease in a cashless societyThe physical form of money that is becoming less prevalent...

Cyber safety Samson kelly 2016-06-01

Cyber safety  Samson kelly crossword puzzle
Across
  1. Where only you can go on it.
  2. Where you send a message.
  3. Something that blocks people from getting on you device.
  4. bully Being mean on the emailS.
  5. It's bits of information.
  6. You put stuff on it to show people.
  7. You ask to do it.
  8. A female who helps you at home.
  9. ages You don't have your own age.
Down
  1. A sick device.
  2. You put photos on it.
  3. A electronic with a keyboard.
  4. media you give information away.
  5. It blocks virusus.
  6. A large amount of Data not wanted.
  7. You make one when you get emails.
  8. A person who helps you at school.
  9. A website persuades you.
  10. A male who helps you at home.

19 Clues: A sick device.You ask to do it.It blocks virusus.You put photos on it.A website persuades you.Where you send a message.It's bits of information.Where only you can go on it.A electronic with a keyboard.A male who helps you at home.A female who helps you at home.media you give information away.bully Being mean on the emailS....

Holidays 2022-10-26

Holidays crossword puzzle
Across
  1. horn of plenty
  2. Unstitched her arm to escape her creator
  3. gobbles
  4. fermented juice of apples
  5. android who has scissors for hands
  6. Red, shining nose
  7. Pocus black flame candle lit by Californian transplant
  8. Stole Christmas
  9. natural sleep aid
  10. Got on the wrong plane after searching for batteries in his dad’s bag
Down
  1. Fall back an hour
  2. Monday online sales after a weekend of feast
  3. shed leaves seasonally
  4. essential amino acid found in poultry
  5. Frost Old man winter’s variant
  6. Friday camp out for a deal, after holiday meal
  7. penny pincher who doesn’t want to help Tiny Tim
  8. tart red fruit of the holidays
  9. Alone Movie franchise where the solo protagonist outsmarts bad people

19 Clues: gobbleshorn of plentyStole ChristmasFall back an hourRed, shining nosenatural sleep aidshed leaves seasonallyfermented juice of applesFrost Old man winter’s varianttart red fruit of the holidaysandroid who has scissors for handsessential amino acid found in poultryUnstitched her arm to escape her creatorMonday online sales after a weekend of feast...

Holidays 2022-10-26

Holidays crossword puzzle
Across
  1. Alone Movie franchise where the solo protagonist outsmarts bad people
  2. gobbles
  3. Red, shining nose
  4. Friday camp out for a deal, after holiday meal
  5. Pocus black flame candle lit by Californian transplant
  6. natural sleep aid
  7. android who has scissors for hands
  8. Frost Old man winter’s variant
  9. essential amino acid found in poultry
  10. tart red fruit of the holidays
Down
  1. shed leaves seasonally
  2. Monday online sales after a weekend of feast
  3. Stole Christmas
  4. horn of plenty
  5. penny pincher who doesn’t want to help Tiny Tim
  6. fermented juice of apples
  7. Unstitched her arm to escape her creator
  8. Got on the wrong plane after searching for batteries in his dad’s bag
  9. Fall back an hour

19 Clues: gobbleshorn of plentyStole ChristmasRed, shining nosenatural sleep aidFall back an hourshed leaves seasonallyfermented juice of applesFrost Old man winter’s varianttart red fruit of the holidaysandroid who has scissors for handsessential amino acid found in poultryUnstitched her arm to escape her creatorMonday online sales after a weekend of feast...

9Health Crossword Bullying 2024-09-15

9Health Crossword Bullying crossword puzzle
Across
  1. Do not
  2. What should you not do back?
  3. When someone doesn't include you
  4. Bullying someone can ruin someone self
  5. Spreading lies about people
  6. Bullying Online
  7. Someone who stands up for others
  8. Bullying someone by their skin colour
  9. Bullying someone because of their mental and physical condition
Down
  1. Age group that gets bullied the most
  2. Using private information to get something from someone
  3. A place where most bullying takes place at
  4. Using Words
  5. People go here to feel better
  6. Someone who just watches people being bullied
  7. making others do stuff they don't want to do
  8. When your getting bullied tell a trusted
  9. Bullying that ruins someones reputation
  10. what is the person being bullied called
  11. What is the person bullying called

20 Clues: Do notUsing WordsBullying OnlineSpreading lies about peopleWhat should you not do back?People go here to feel betterWhen someone doesn't include youSomeone who stands up for othersWhat is the person bullying calledAge group that gets bullied the mostBullying someone by their skin colourBullying someone can ruin someone self...

8th Oct.2015 (Thu.) 중3 5:20 독해 2015-10-07

8th Oct.2015 (Thu.) 중3 5:20 독해 crossword puzzle
Across
  1. 침략
  2. 안전
  3. 근육
  4. 신경
  5. 훌륭한
  6. 의존하다, 의지하다
  7. 고대의
Down
  1. 검사하다, 조사하다
  2. 분석하다
  3. 건설하다
  4. 경우, 때
  5. (곡식 등을 잘게) 갈다
  6. 단서
  7. 방어하다
  8. 완성하다
  9. ~인지 아닌지
  10. 즐기다
  11. 흡수하다

18 Clues: 침략안전근육단서신경훌륭한즐기다고대의분석하다건설하다방어하다완성하다흡수하다경우, 때~인지 아닌지검사하다, 조사하다의존하다, 의지하다(곡식 등을 잘게) 갈다

krustvārdu mikla 2022-10-13

krustvārdu mikla crossword puzzle
Across
  1. galdnieks
  2. viesmīlis
  3. zinātnieks
  4. technician datortehniķis
  5. teacher skolotaja
  6. medmāsa
  7. guard zemessargs
  8. driver taksists
  9. friziere
Down
  1. pardevejs
  2. dizainere
  3. fotografers
  4. manikīre
  5. guard apsargs
  6. zurnalists
  7. setnieks
  8. grāmatvede
  9. mechanic automehāniķis
  10. doctor dakters

19 Clues: medmāsamanikīresetnieksfrizierepardevejsdizaineregaldnieksviesmīliszinātniekszurnalistsgrāmatvedefotografersguard apsargsdoctor daktersdriver taksistsguard zemessargsteacher skolotajamechanic automehāniķistechnician datortehniķis

MEDIMUN Crossword 2022-03-24

MEDIMUN Crossword crossword puzzle
Across
  1. every committee has 2 … and many delegates
  2. the theme of this year’s MEDIMUN is Global …
  3. games that relieve tension between students before the debate
  4. GA2 focuses on …, financial and economic development
  5. the annual session of MEDIMUN is also referred to as the annual …
  6. One of the themes of the … council is the situation in Afghanistan
  7. delegates can make speeches for and …
  8. an instance of declining to vote for or against a proposal or motion.
Down
  1. the … members are the team of reporters that put this issue together
  2. the security historical … discussed the Sino-Vietnamese war this year
  3. Delegates can make a …of information
  4. this is the 17th … of MediNews
  5. the name of the wonderful disease that caused a change in venue this year
  6. delegates can form … with other delegates
  7. the name of the country which is a permanent member of the UN security council and has crepes
  8. a formal discussion on a particular matter in which opposing arguments are put forward
  9. the name of the newly formed committee on the topic of crime

17 Clues: this is the 17th … of MediNewsDelegates can make a …of informationdelegates can make speeches for and …delegates can form … with other delegatesevery committee has 2 … and many delegatesthe theme of this year’s MEDIMUN is Global …GA2 focuses on …, financial and economic developmentthe name of the newly formed committee on the topic of crime...

Infosec 2013-05-30

Infosec crossword puzzle
Across
  1. Your system can remain secured only if it has the latest __________.
  2. potential that an action or activity will lead to a loss
  3. A group of your colleagues who assists you in securely evacuating in any emergency situation.
  4. FAI Information security documents are made available to users on
  5. important in computers and networks
  6. a breach in security, such as unauthorized access to data
  7. or malware is a file or program other then a virus that is potentially harmful.
  8. Entering premises without swiping your access card by following someone else.
  9. any information about an individual which can be used to uniquely identify that person, e.g. name, date and place of birth, mother’s maiden name, social security number is ............. Identifiable Information
  10. is software designed specifically to detect, disable, and remove viruses, worms, and Trojans before they infect a computer
  11. Ensure that authorised user have access to information & associated assets when required.
  12. emailID to report security incidents
  13. list of permissions that tells an operating system which users have access rights to objects, and what operation they are allowed to perfom on those objects
  14. is a self-replicating program that is harmful to networks.
  15. is a form of attack that prevents users from accessing normal services, such as e-mail and a web server
  16. who is responsible for security
  17. I am not authorized to install applications and software that are
Down
  1. Independent review of how well you are following and complying with the standards and policies.
  2. visitors need to be
  3. Organization’s preparedness program for handling disruptions.
  4. of death is a series of repeated, larger than normal pings that crash the receiving computer.
  5. If you access a computer systems without the owner’s knowledge and approval, you are committing a _____
  6. is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
  7. is used to discard hard copies of confidential data.
  8. Password must be always kept _______ .
  9. is ensuring the accuracy and completeness of Information.
  10. Ensuring the information is accessible only to those authorised have access.
  11. is a program written with malicious intent and sent out by attackers.
  12. Programming language that allows applets to run within a web browser.
  13. The scrambling of data into a secret code that can be read only by software set to decode the information.
  14. Your activities on the network can be ____________ by the company.
  15. is a software program that displays advertising on your computer.
  16. these set out the technical controls required to achieve the policy objeclives
  17. Social Media provides an efficient means for criminals to mine both personal and company data. Social ______ work to gain based on information they have obtained from these social networks or victim themselves
  18. abbreviation for voice communications over internet networks
  19. anything of value, such as source code, processes, hardware, people etc.

36 Clues: visitors need to bewho is responsible for securityimportant in computers and networksemailID to report security incidentsPassword must be always kept _______ .is used to discard hard copies of confidential data.potential that an action or activity will lead to a lossis ensuring the accuracy and completeness of Information....

Housekeeping Safety & Security 2013-04-23

Housekeeping Safety & Security crossword puzzle
Across
  1. leaving the hotel premises
  2. best cure for emergencies
  3. what to do before entering guest room
  4. prevention of incidents like theft or fire
  5. group of employees that develop and monitor security programs
  6. cleaners that may be harmful
Down
  1. not being personally injured
  2. opens even double-locked doors
  3. where to meet after exiting hotel
  4. stealing from others
  5. opens all guestroom doors
  6. lost items should be recorded in this
  7. when slips and falls happen
  8. bend the knees before doing this

14 Clues: stealing from othersbest cure for emergenciesopens all guestroom doorsleaving the hotel premiseswhen slips and falls happennot being personally injuredcleaners that may be harmfulopens even double-locked doorsbend the knees before doing thiswhere to meet after exiting hotellost items should be recorded in thiswhat to do before entering guest room...

Crossword 2019-03-14

Crossword crossword puzzle
Across
  1. what is Los Angeles city code?
  2. protected access to an aircraft from terminal?
  3. get on a plane
  4. area of airport public has access too?
  5. area a aircraft parks?
  6. word for pax?
  7. who checks your passport and departue cards?
Down
  1. staff that makes meals for sircraft
  2. who can access airside facilities?
  3. what is Hongkongs city code?
  4. Flys aircraft?
  5. a flight originating and terminating in the same country
  6. shorter term for Aviation Security
  7. where do you purchase your departure card?

14 Clues: word for pax?get on a planeFlys aircraft?area a aircraft parks?what is Hongkongs city code?what is Los Angeles city code?who can access airside facilities?shorter term for Aviation Securitystaff that makes meals for sircraftarea of airport public has access too?where do you purchase your departure card?who checks your passport and departue cards?...

Domestic & International Airport 2019-06-04

Domestic & International Airport crossword puzzle
Across
  1. A location with a runway?
  2. City Code?
  3. These are located throughout the airport?
  4. Everything before security?
  5. How long does the airport operate for?
  6. Clock used at the airport?
  7. Another word for this?
  8. Terminal when not leaving the country?
  9. What is the symbol for the help desk?
Down
  1. Everything after security?
  2. Bags
  3. City Code?
  4. How many Air Bridges are there?
  5. What is one of the free facilities available for transit passengers?
  6. Terminal used when travelling overseas?

15 Clues: BagsCity Code?City Code?Another word for this?A location with a runway?Everything after security?Clock used at the airport?Everything before security?How many Air Bridges are there?What is the symbol for the help desk?How long does the airport operate for?Terminal when not leaving the country?Terminal used when travelling overseas?...

Wireless Technology 2024-04-26

Wireless Technology crossword puzzle
Across
  1. Range of frequencies used for wireless communication.
  2. Network divided into geographic cells.
  3. Early wireless security protocol.
  4. Identifier for wireless networks.
  5. Network of interconnected nodes.
  6. Long-distance wireless communication via orbiting objects.
  7. Latest Wi-Fi security protocol.
  8. IEEE standard for wireless networking.
  9. Localized network of devices.
Down
  1. Transmission of data without physical cables or wires.
  2. Device connecting multiple devices to the internet.
  3. Device allowing wireless connection to a wired network.
  4. Short-range wireless technology.
  5. Organization that standardized Wi-Fi.

14 Clues: Localized network of devices.Latest Wi-Fi security protocol.Short-range wireless technology.Network of interconnected nodes.Early wireless security protocol.Identifier for wireless networks.Organization that standardized Wi-Fi.Network divided into geographic cells.IEEE standard for wireless networking....

FINTURA - FUN IN FINANCE 2025-02-22

FINTURA - FUN IN FINANCE crossword puzzle
Across
  1. Loan for poor credit scores.
  2. Difference between portfolio returns and its benchmark.
  3. Rating indicating low credit risk.
  4. Trust relationship involving asset management.
  5. Increase in the number of outstanding shares.
  6. Failure to repay a loan.
Down
  1. Debt that is subordinate to senior note.
  2. Security that can be exchanged.
  3. Measure of a company's short-term liquidity.
  4. Measure of company's financial leverage.
  5. Security giving purchase rights.
  6. Cost of insurance.
  7. Fixed payment made at intervals.
  8. Range of income subject to a certain tax rate.

14 Clues: Cost of insurance.Failure to repay a loan.Loan for poor credit scores.Security that can be exchanged.Security giving purchase rights.Fixed payment made at intervals.Rating indicating low credit risk.Debt that is subordinate to senior note.Measure of company's financial leverage.Measure of a company's short-term liquidity....

Adam and Dee's Shindig 2022-09-08

Adam and Dee's Shindig crossword puzzle
Across
  1. name of the groom.
  2. What do horses like to eat?
  3. The bride and groom exchange these at a wedding
  4. What were the dogs pulled down the aisle with?
  5. How many dogs were in the wedding?
  6. Color of bride's roses.
  7. Name of security dog's brother.
  8. Number of bridesmaids at the wedding?
  9. Number of groomsmen at the wedding?
  10. Name of the bride.
Down
  1. Security dog's name.
  2. What do the bride and groom say?
  3. Color of bride's dress.
  4. Who is taller, the bride or the groom?
  5. The ___ walks the bride down the aisle.
  6. Yard game with 2 paddles.
  7. Name of the baby in the wedding
  8. Number of flower girls in the wedding.
  9. What color was the the wagon?
  10. Who plays music at a wedding?

20 Clues: name of the groom.Name of the bride.Security dog's name.Color of bride's dress.Color of bride's roses.Yard game with 2 paddles.What do horses like to eat?What color was the the wagon?Who plays music at a wedding?Name of security dog's brother.Name of the baby in the weddingWhat do the bride and groom say?How many dogs were in the wedding?...

Campaigns In Outsource Global 2021-02-11

Campaigns In Outsource Global crossword puzzle
Across
  1. Daily Transport
  2. EMR
  3. Hospital docs
  4. Cleaning
  5. National
  6. Payment platform
  7. CRM
  8. Oldest company in Nigeria
  9. Interviews
  10. hardware
Down
  1. Proposal
  2. Marketers
  3. ID Cards
  4. Salary
  5. Vulcaniser
  6. Specialists
  7. Domestic
  8. Wig & black gown
  9. Sick
  10. B2B

20 Clues: EMRCRMB2BSickSalaryProposalID CardsCleaningNationalDomestichardwareMarketersVulcaniserInterviewsSpecialistsHospital docsDaily TransportPayment platformWig & black gownOldest company in Nigeria

Cassino 2023-01-06

Cassino crossword puzzle
Across
  1. what saint Patrick's day is all about
  2. don't tell
  3. you do it at a casino
  4. you use it to unlock your hotel room
  5. they steal
  6. you use to pay
Down
  1. something that holds valuables in a public space
  2. a funny card from the deck
  3. keeps things shut tight
  4. a form of security
  5. guards that watch
  6. made of karats

12 Clues: don't tellthey stealmade of karatsyou use to payguards that watcha form of securityyou do it at a casinokeeps things shut tighta funny card from the deckyou use it to unlock your hotel roomwhat saint Patrick's day is all aboutsomething that holds valuables in a public space

CMS Bygg 3 2021-05-31

CMS Bygg 3 crossword puzzle
Across
  1. approved
  2. clean
  3. Important
  4. Danger
  5. Scaffolding
  6. Immediately
  7. accordance
  8. Planning
  9. Safety/Security
Down
  1. use
  2. Safety Equipment
  3. Dangerous
  4. Necessary
  5. Measures
  6. Assembling
  7. Stairs

16 Clues: usecleanDangerStairsapprovedMeasuresPlanningDangerousNecessaryImportantaccordanceAssemblingScaffoldingImmediatelySafety/SecuritySafety Equipment