cyber security Crossword Puzzles

Computer Definitions 2024-06-24

Computer Definitions crossword puzzle
Across
  1. various high-capacity transmission technologies that transmit data, voice, and video across long distances and at high speeds
  2. A type of computer virus that can spread to different computers and damage data
  3. a software program used to locate and display information on the Internet or an intranet Compatible- a Computer or other electronically device with the recommended operating system and hardware configuration as stated in the Documentation.
  4. a measure of how much information a network can transfer
  5. System- system software that manages computer hardware and software resources, and provides common services for computer programs.
  6. Joint Photographic Experts Group
  7. connected to, served by, or available through a system and especially a computer or telecommunications system Megahertz- a million cycles per second
  8. Computing includes designing and building hardware and software systems for a wide range of purposes
  9. A computer that sits between different networks or applications.
  10. Files don’t take up as much space and can be transferred to other computers quicker
  11. a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
  12. an extremely transferable programming language used across platforms and different types of devices, from smartphones to smart TVs
  13. a unit of digital information that most commonly consists of eight bits
  14. provides the instructions and processing power the computer needs to do its work
  15. a tiny wafer of semiconducting material with an embedded electronic circuit
  16. Shows how many pixels are on a computer screen
  17. a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system
  18. Any stored data
  19. any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
Down
  1. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  2. allows devices to communicate with each other without cables or wires.
  3. the smallest unit of data that a computer can process and store
  4. to shut down and restart (a computer system) or (of a computer system) to shut down and restart.
  5. t he process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
  6. a data measurement unit applied to digital computer or media storage
  7. Space- the total amount of data that a hard disk or hard drive can store Virus- a type of malicious software, or malware, that spreads between computers and causes damage to data and software Memory- the electronic components used by computers to store data and instructions that can be accessed quickly by the processor
  8. analogue computer, any of a class of devices in which continuously variable physical quantities
  9. files embedded within online communication channels such as emails, instant messages, or social network
  10. small files of information that a web server generates and sends to a web browser
  11. malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
  12. a set of rules to transmit data from different devises
  13. any unsolicited communication sent in bulk
  14. any criminal activity that involves a computer, network or networked device
  15. Security- the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.
  16. a type of malware that downloads onto a computer disguised as a legitimate program

35 Clues: Any stored dataJoint Photographic Experts Groupany unsolicited communication sent in bulkShows how many pixels are on a computer screena set of rules to transmit data from different devisesa measure of how much information a network can transferthe smallest unit of data that a computer can process and store...

ICS puzzle 2023-12-12

ICS puzzle crossword puzzle
Across
  1. the process of converting coded or encrypted data to its original form.
  2. attempts by hackers to cause harm, destroy, or access sensitive information in a computer system.
  3. Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
  4. a form of malware that distributes itself by transferring copies of itself to other computers across the network.
  5. attack swamps a website with so much traffic that it simply can’t cope
  6. a technique used by threat actors to leverage a vulnerability in order to compromise a system.
  7. a activity when cybercriminals disguise their identity as a trusted source to exploit an unassuming user.
  8. a form of malware. It is designed to block users from accessing a computer system until a sum of money has been paid.
  9. A method of accessing an obstructed device through attempting multiple combinations of numeric and/or alphanumeric passwords.
  10. an identity verification process
  11. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source
  12. A chronological record of system activities. Includes records of system accesses and operations performed in a given period.
Down
  1. a program used to prevent, identify, and remove viruses and other malicious software from your computer.
  2. A copy of files and programs made to facilitate recovery, if necessary.
  3. an email-based threat that tries to coerce the victim into clicking on a link in an email or opening an attachment that has arrived by email.
  4. perform simulated cyberattacks on computer systems and networks to help identify security vulnerabilities and weaknesses.
  5. a modern security strategy based on the principle never trust, always verify.
  6. a network security device, it creates a barrier between a trusted network and an untrustworthy network.
  7. A restricted, controlled execution environment that prevents potentially malicious software, such as mobile code, from accessing any system resources except those for which the software is authorized.
  8. A system (e.g., a Web server) or system resource (e.g., a file on a server) that is designed to be attractive to potential crackers and intruders and has no authorized users other than its administrators.
  9. Disclosure of information to unauthorized persons, or a violation of the security policy of a system.
  10. Unauthorized act of bypassing the security mechanisms of a system.
  11. Any circumstance or event with the potential to adversely impact organizational operations.
  12. an encrypted internet connection to provide a secure connection.
  13. a part of the World Wide Web only accessible through special software or tools, where keeps its users and visitors hidden.
  14. An update to an operating system, application, or other software issued specifically to correct particular problems with the software.
  15. an unintended software or hardware problem
  16. An attack on the authentication protocol run in which the Attacker positions himself in between the Claimant and Verifier so that he can intercept and alter data traveling between them.

28 Clues: an identity verification processan unintended software or hardware probleman encrypted internet connection to provide a secure connection.Unauthorized act of bypassing the security mechanisms of a system.attack swamps a website with so much traffic that it simply can’t copeA copy of files and programs made to facilitate recovery, if necessary....

Clique 2018-01-16

Clique crossword puzzle
Across
  1. Someone around the same age, grade and size.
  2. Touching a persons body or things.
  3. An exclusive group of friends that leave others out.
  4. Pushing others by things you say.
  5. Name of a Queen Bee.
Down
  1. A name of the world's greatest counselor
  2. To push.
  3. Name of a Target Bee.
  4. The best elementary school in the whole world.
  5. A way to bully using the internet.

10 Clues: To push.Name of a Queen Bee.Name of a Target Bee.Pushing others by things you say.Touching a persons body or things.A way to bully using the internet.A name of the world's greatest counselorSomeone around the same age, grade and size.The best elementary school in the whole world.An exclusive group of friends that leave others out.

Digital Citizenship 2019-06-17

Digital Citizenship crossword puzzle
Across
  1. misuse act crime to use a computer
  2. a _ _ _ or set of _ _ _ _
  3. when someone goes on a _______ without owners permission
  4. divide someone who dosent have acsess to _ _ _ _ _ _ _ _ _ _ _
Down
  1. commissioner someone who can enforce the data protection act
  2. bullying hurt someone
  3. subject _ _ _ _ about you/people
  4. intelligence human intelligence processed by a computer
  5. communication can cause distress or anxiety
  6. something that can cause problems with electronics

10 Clues: a _ _ _ or set of _ _ _ _bullying hurt someonemisuse act crime to use a computersubject _ _ _ _ about you/peoplecommunication can cause distress or anxietysomething that can cause problems with electronicsintelligence human intelligence processed by a computer...

Complexity Cross V2 2024-05-09

Complexity Cross V2 crossword puzzle
Across
  1. The youngest in the group, was merged with a
  2. Cyber taught Stratus strength of the ____, not the body
  3. The character who loves plants
  4. A rare delicacy, and Sage's prized possession
  5. The filmmaker who's everywhere
Down
  1. The character who was once a vigilante
  2. ____, the teenage goddess
  3. _____ Forest, the place where Sage grew up
  4. ____ City, the place where Stratus lives
  5. The character who can control metal

10 Clues: ____, the teenage goddessThe character who loves plantsThe filmmaker who's everywhereThe character who can control metalThe character who was once a vigilante____ City, the place where Stratus lives_____ Forest, the place where Sage grew upThe youngest in the group, was merged with aA rare delicacy, and Sage's prized possession...

The Thrilling Puzzle Climax Of K Collin's Computer Science Lessons 2023-05-04

The Thrilling Puzzle Climax Of K Collin's Computer Science Lessons crossword puzzle
Across
  1. What car manufacturer made the first modern driverless car
  2. Data should not be kept longer than
  3. Who is exempt from the data protection act
  4. All personal data should be kept
  5. The owner of the data
Down
  1. The DPA has 8
  2. Police, Government and Taxers all all ______ from the DPA
  3. A form of cyber-bullying
  4. Data must be routinely for maximum protection
  5. Data should be used

10 Clues: The DPA has 8Data should be usedThe owner of the dataA form of cyber-bullyingAll personal data should be keptData should not be kept longer thanWho is exempt from the data protection actData must be routinely for maximum protectionPolice, Government and Taxers all all ______ from the DPAWhat car manufacturer made the first modern driverless car

CYBERSECURITY 2025-02-08

CYBERSECURITY crossword puzzle
Across
  1. A person who tries to break into systems.
  2. A fake email trying to trick you.
  3. Someone you do not know online.
  4. Relating to computers and the internet.
  5. Software designed to harm your device.
Down
  1. The action of entering username/password.
  2. A secret code to keep your account safe.
  3. A way to send messages online.
  4. Keeping your personal information safe.
  5. A harmful program that damages a computer.

10 Clues: A way to send messages online.Someone you do not know online.A fake email trying to trick you.Software designed to harm your device.Keeping your personal information safe.Relating to computers and the internet.A secret code to keep your account safe.The action of entering username/password.A person who tries to break into systems....

Chapter 8 - System Access 2023-03-21

Chapter 8 - System Access crossword puzzle
Across
  1. Permissions listed on an access control list (ACL) that are granted to a user. ACEs can be Allow or Deny. They can be assigned explicitly or inherited.
  2. The level of permissions that have been granted to a user who has been authenticated to a system.
  3. An object that contains security credentials. In Windows, it includes the user's security ID (SID) as well as the SID for each security group the user is a member.
  4. A method of authentication for which the user creates an online user account with Microsoft. Each time the user signs into the local system, Windows submits the credentials over the internet to Microsoft for authentication.
  5. The generally accessible key in a cryptographic system. It is used to encrypt data and is stored within a certificate. It cannot be used to decrypt the data.
  6. The security process in which the client authenticates to the server and, before data is exchanged, the server authenticates back to the client.
  7. A security feature that can be configured in the Windows sign-in settings to automatically lock a computer when the user walks away. It requires a Bluetooth device (typically a smartphone) that can be connected to the workstation.
  8. A collection of access rights, usually connected with an employee's responsibilities in an organization.
  9. A text string or regular expression used to scan files for matches.
  10. Rules that include a condition that must be matched for permission assignments to be made.
  11. The key that is used to decrypt data in a cryptographic system. It is stored in a private certificate store and should be protected and not shared.
  12. A group of users who have complete and unrestricted access to the system and accounts.
  13. In Windows, the ability to set policies that will provide feedback on specified events within a host or network.
  14. An action a user can perform on a system. Group Policy provides a set of predefined rights.
  15. Permissions granted to files or subfolders based on the permissions assigned to a parent folder.
  16. A method of authentication that stores on the local system the usernames and passwords for each user.
Down
  1. Microsoft's virtualization machine creation software that can create software-based virtual computers within a Windows system.
  2. A setting or group of settings applied to a user or computer. Polices are configured using Group Policy on the local computer or in the domain.
  3. A process of translating data into an unreadable format or code to prevent unauthorized access to the data.
  4. A permission uses an allow or deny statement to control user access to resources.
  5. A Windows feature that uses virtualization extensions of the central processing unit. It is used to protect data in memory from malicious attacks.
  6. A feature of Windows server systems that allows the system administrator to centralize control of access to files and folders based on file and folder attributes in combination with the attributes of the user.
  7. The security process in which the client authenticates to the server before the server will send data back to the client.
  8. A method of authentication that stores the usernames and passwords on a remote computer within the network that is configured as a domain controller.
  9. A device you can buy from a retailer for authentication. It can be configured in Windows for use as an additional sign-in option.
  10. A Windows encryption feature that is used on full volumes and cannot be used on individual files or folders.
  11. In Windows auditing, a setting in an auditing policy that turns on the logging of events in a host or network.
  12. A list of permissions granted to users and groups. The permissions are associated with an NTFS file or folder.
  13. A list of central access rules that define the level of access a user has to data managed by DAC.
  14. A collection of users that, by default, has very minimal access to the system.
  15. The creator of a file or folder who, by default, has full access.
  16. A Windows sub-security process that authenticates to the local system, stores security-related information, and creates access tokens.
  17. Security features that restrict or allow user access to resources on the system.
  18. A component of the Windows operating system that helps protect the system during the start-up or boot process.
  19. A biometric logon system incorporated into Windows 10 sign-in settings.
  20. In Windows auditing, a setting that turns off an auditing policy.
  21. Verifying that an entity requesting credentials is the entity associated with the credentials. It is also called identity proofing.

37 Clues: The creator of a file or folder who, by default, has full access.In Windows auditing, a setting that turns off an auditing policy.A text string or regular expression used to scan files for matches.A biometric logon system incorporated into Windows 10 sign-in settings.A collection of users that, by default, has very minimal access to the system....

AppSec Village @ BlueHat India 2024-01-18

AppSec Village @ BlueHat India crossword puzzle
Across
  1. A script that's cross, but not because it's angry
  2. A token of security, not a medieval pledge of fealty
  3. A case of mistaken identity, but for cloud resources
  4. A web menace that's not a cookie monster, but might use one
  5. A directory in the cloud, not a phonebook
  6. A bouncer for cloud services, checking IDs at the door
  7. A casting director for cloud access, assigning roles, not actors
Down
  1. A central hub for cloud safety, not a mall cop station
  2. Where secrets are locked away, not in a pirate's chest
  3. Not just a catwalk for risks, it's a blueprint for defense
  4. A security check that's more of a poke around than a full physical
  5. A blend of development, security, and operations - shaken, not stirred
  6. It's a scramble, but not for breakfast

13 Clues: It's a scramble, but not for breakfastA directory in the cloud, not a phonebookA script that's cross, but not because it's angryA token of security, not a medieval pledge of fealtyA case of mistaken identity, but for cloud resourcesA central hub for cloud safety, not a mall cop stationWhere secrets are locked away, not in a pirate's chest...

Cisco Enterprise Networking and Data Center Indepth 2020-07-31

Cisco Enterprise Networking and Data Center Indepth crossword puzzle
Across
  1. Routing & Switching Cisco competitor?
  2. Using multiple cloud services?
  3. SDN/SDWAN Cisco competitor?
  4. Unified intent-based networking architecture?
  5. type of switch that makes scaling the network easier?
  6. UCS Competitor of Cisco?
  7. SDN/SDWAN Cisco competitor?
  8. Common security problem with data centers?
  9. DC Storage competitor of Cisco?
Down
  1. DC Security competitor of Cisco?
  2. Routing & Switching Cisco competitor?
  3. Simplify the number of devices connected?
  4. UCS Competitor of Cisco's product line?
  5. Catalyst 3000 came from what company?
  6. Cisco's popular brand of network switches, wirleess controllers, and access points?
  7. DC Networking competitor of Cisco?

16 Clues: UCS Competitor of Cisco?SDN/SDWAN Cisco competitor?SDN/SDWAN Cisco competitor?Using multiple cloud services?DC Storage competitor of Cisco?DC Security competitor of Cisco?DC Networking competitor of Cisco?Routing & Switching Cisco competitor?Routing & Switching Cisco competitor?Catalyst 3000 came from what company?...

Computer Words 2024-06-17

Computer Words crossword puzzle
Across
  1. the smallest unit of data that a computer can process and store.
  2. Security- the practice of protecting systems, networks, and programs from digital attacks
  3. the ability of software and hardware from different sources to work together without having to be altered to do so
  4. allows devices to communicate with each other without cables or wires.
  5. a software program used to locate and display information on the Internet or an intranet.
  6. any unsolicited communication sent in bulk.
  7. small files of information that a web server generates and sends to a web browser
  8. used to refer to computer files or memory that can be read or used, but not changed or added to in any way
  9. a tiny wafer of semiconducting material with an embedded electronic circuit.
  10. a data measurement unit applied to digital computer or media storage
  11. System- the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
  12. computer systems that are connected to a network and are accessible to users from anywhere at any time
  13. a unit of data that is eight binary digits long
  14. malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
  15. a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.
  16. a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself.
  17. a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
  18. the clock speed of a central processing unit (CPU), which determines how many instructions a processor can execute per second.
  19. A zip is a file format that can contain multiple files combined and compressed into one file.
Down
  1. the capacity at which a network can transmit data.
  2. the use or operation of computers.
  3. a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
  4. to reload the operating system of a computer:
  5. an image, video, piece of information, etc. that is circulated rapidly and widely on the internet.
  6. the transmission of high-quality data of wide bandwidth.
  7. the number of pixels that are displayed per inch for an image
  8. the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
  9. a set of rules for formatting and processing data.
  10. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  11. a computer on a network that provides the interface between two applications or networks that use different protocols
  12. the logic circuitry that responds to and processes the basic instructions that drive a computer
  13. device that is used to store data or programs (sequences of instructions) on a temporary or permanent basis for use in an electronic digital computer.
  14. files embedded within online communication channels such as emails, instant messages, or social networks
  15. Any stored data.
  16. any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
  17. a type of malware that downloads onto a computer disguised as a legitimate program
  18. a computer which uses continuously changeable entities like mechanical, electrical, hydraulic, etc.
  19. Crime- any criminal activity that involves a computer, network or networked device.
  20. A computer program that can copy itself and infect a computer without permission or knowledge of the user
  21. Space- the amount of data that can reside within the disk drive or storage medium to a maximum limit.

40 Clues: Any stored data.the use or operation of computers.any unsolicited communication sent in bulk.to reload the operating system of a computer:a unit of data that is eight binary digits longthe capacity at which a network can transmit data.a set of rules for formatting and processing data.the transmission of high-quality data of wide bandwidth....

AT THE AIRPORT - Al Aeropuerto 2018-10-16

AT THE AIRPORT - Al Aeropuerto crossword puzzle
Across
  1. Pilot
  2. Luggage
  3. Departures
  4. Passport
  5. Money Exchange
  6. Check in
  7. Aeroplane
  8. Customs
Down
  1. Tickets
  2. Trolley
  3. Arrivals
  4. Security
  5. Gate
  6. Monitor (screen)
  7. Delayed
  8. Suitcase

16 Clues: GatePilotTicketsTrolleyLuggageDelayedCustomsArrivalsSecurityPassportCheck inSuitcaseAeroplaneDeparturesMoney ExchangeMonitor (screen)

Puzzle #10 – “Direct Deposit” 2025-06-29

Puzzle #10 – “Direct Deposit” crossword puzzle
Across
  1. - Agency that sets up your Social Security payments
  2. - Direct deposit is this compared to mailing checks
  3. - Electronic way to receive Social Security benefits
  4. - You must have this to receive direct deposit
  5. - Where your Social Security check is usually sent
Down
  1. - The method used instead of paper checks
  2. - How payments are delivered once direct deposit is set up
  3. - One reason direct deposit is recommended
  4. - Type of account where deposits often go
  5. - This number helps send money to the right bank

10 Clues: - The method used instead of paper checks- Type of account where deposits often go- One reason direct deposit is recommended- You must have this to receive direct deposit- This number helps send money to the right bank- Where your Social Security check is usually sent- Agency that sets up your Social Security payments...

CyberDSA D2 2025-08-14

CyberDSA D2 crossword puzzle
Across
  1. Encrypted network connection over the internet for secure communication.
  2. Software that secretly collects user information.
  3. Security Operations Center that monitors and responds to threats.
  4. Process of verifying the identity of a user or system.
  5. Copy of data kept for recovery in case of loss.
Down
  1. Process of converting data into a secure, unreadable format.
  2. Secret string used to authenticate a user.
  3. Software update designed to fix security vulnerabilities.
  4. Network security device that filters incoming and outgoing traffic.
  5. Malicious program that can copy itself and infect systems.

10 Clues: Secret string used to authenticate a user.Copy of data kept for recovery in case of loss.Software that secretly collects user information.Process of verifying the identity of a user or system.Software update designed to fix security vulnerabilities.Malicious program that can copy itself and infect systems....

Safety and Security 2016-03-15

Safety and Security crossword puzzle
Across
  1. Business names, Garda arival, coin order, cash amounts transfered
  2. Bundling/Clipping money and keeping drawer____
  3. Processes and methodologies designed to protect sensitive information
  4. Have a password protect _____ for all private information
  5. Locking your _____ anytime you walk away from station
  6. If you leave our desk/computer do this
  7. Limit for bottom drawer
  8. Keep your security codes ____
Down
  1. Limit for top drawer
  2. Before you leave at night do this to your workstation PC
  3. Handwritten notes, documents, account numbers
  4. Print, Electronic, Verbal
  5. None of these items in your drawer
  6. Email, OSI, Velocity, Online check orders

14 Clues: Limit for top drawerLimit for bottom drawerPrint, Electronic, VerbalKeep your security codes ____None of these items in your drawerIf you leave our desk/computer do thisEmail, OSI, Velocity, Online check ordersHandwritten notes, documents, account numbersBundling/Clipping money and keeping drawer____...

2021 Q4 Security 2021-12-15

2021 Q4 Security crossword puzzle
Across
  1. Use the ____ button when you receive a 'sus'email
  2. Number of people that are emailed when we call 911
  3. The company that monitors our alarms
  4. ____, hide, neutralize in an active shooter situation
  5. Packet in vault room with specific instructions
  6. ___ with all demands of the robber
Down
  1. When safe to do so press your ____ buttons
  2. To call 911 dial _-911
  3. Never write down or share _____
  4. In the event of a fire, ____ mbr sensitive info
  5. Always leave the building in ____
  6. Packet under the phone
  7. ___ parking lot is our Secondary Meeting Spot
  8. Great ___ is our best robbery deterrent

14 Clues: To call 911 dial _-911Packet under the phoneNever write down or share _____Always leave the building in _______ with all demands of the robberThe company that monitors our alarmsGreat ___ is our best robbery deterrentWhen safe to do so press your ____ buttons___ parking lot is our Secondary Meeting Spot...

Q4 Security Training 2023-12-20

Q4 Security Training crossword puzzle
Across
  1. When safe to do so, we should activate the _____ or/and observe the robber's escape route.
  2. thousand What is the amount dispensed during a robbery from the TCR?
  3. To preserve evidence of a not pass robbery, drop the note on the ____ or leave it at your station.
  4. The type of form filled out when observing a robber.
  5. Person responsible for advising members of a robbery situation.
  6. All Media inquires go to this department.
  7. Most bomb threats and extortion are received this way.
  8. These eight items around the branch can help alert security that a robbery has occurred.
Down
  1. Person responsible for shouting "I've been robbed, Lock the doors!"
  2. The practice of obtaining something, especially money, through force of threats.
  3. When calling 911, we call from an RBFCU ____ ____.
  4. This form provides the following information: Contact names, instructions for branch employees on what to do during and after a robbery, and phone numbers.
  5. Behavior to keep during a robbery is to ___ _____ and avoid sudden movements.
  6. Keys to press for dispense procedure.

14 Clues: Keys to press for dispense procedure.All Media inquires go to this department.When calling 911, we call from an RBFCU ____ ____.The type of form filled out when observing a robber.Most bomb threats and extortion are received this way.Person responsible for advising members of a robbery situation....

Information Security Awareness 2020-09-24

Information Security Awareness crossword puzzle
Across
  1. This is better and harder to crack than a password
  2. The type of email to get you to click on a fraudulent link
  3. Disclosing personal member information may be
  4. The best response to password Recovery Questions is
  5. engineering,How might someone evil try to get information from you
  6. Someone that follows closely behind you without using their badge
  7. Minimum number of characters for a network password
  8. What is not allowed in a DNA password
  9. This is better and harder to crack than a password
  10. If I click on a link I believe was malicious I should
Down
  1. How do you think most evil hackers begin to break into a company’s network?
  2. What is the default data classification
  3. The data classification for Employee Handbook, internal phone directory
  4. Best way to keep track of multiple unique passwords
  5. Who is responsible for data security

15 Clues: Who is responsible for data securityWhat is not allowed in a DNA passwordWhat is the default data classificationDisclosing personal member information may beThis is better and harder to crack than a passwordThis is better and harder to crack than a passwordThe best response to password Recovery Questions is...

The Thrilling Puzzle Climax Of K Collins' Computer Science Lessons 2023-05-04

The Thrilling Puzzle Climax Of K Collins' Computer Science Lessons crossword puzzle
Across
  1. What car manufacturer made the first modern driverless car
  2. Data should not be kept longer than
  3. Who is exempt from the data protection act
  4. All personal data should be kept
  5. The owner of the data
Down
  1. The DPA has 8
  2. Police, Government and Taxers all all ______ from the DPA
  3. A form of cyber-bullying
  4. Data must be routinely for maximum protection
  5. Data should be used

10 Clues: The DPA has 8Data should be usedThe owner of the dataA form of cyber-bullyingAll personal data should be keptData should not be kept longer thanWho is exempt from the data protection actData must be routinely for maximum protectionPolice, Government and Taxers all all ______ from the DPAWhat car manufacturer made the first modern driverless car

English Holiday HomeWork Mohamed Asharaful Part 1 2021-08-28

English Holiday HomeWork Mohamed Asharaful Part 1 crossword puzzle
Across
  1. Poverty, SDG goal against poverty.
  2. Water and Sanitization, Lacking in cleanliness and water.
  3. Responsibility, Responsible posts and appropriate posts against any sensitive topic.
  4. Education, SDG goal for good education.
  5. A chance for next generation.
  6. Life, Non polluted life for animals in land.
  7. People who use internet to bully people psychologically.
Down
  1. For the next generation.
  2. For the transportation.
  3. Life, Non-Polluted life under the water.

10 Clues: For the transportation.For the next generation.A chance for next generation.Poverty, SDG goal against poverty.Education, SDG goal for good education.Life, Non-Polluted life under the water.Life, Non polluted life for animals in land.People who use internet to bully people psychologically.Water and Sanitization, Lacking in cleanliness and water....

7cf nachhol 2024-01-13

7cf nachhol crossword puzzle
Across
  1. a group of people who sing
  2. to suddenly talk to somebody in a aggressive way: to ...
  3. verb for behaviour: to ...
  4. something you can carry injured people with
  5. to say something nasty about someone online: cyber ...
Down
  1. a very high building
  2. ... to a survey, children use their mobile phones too often
  3. English for "besonders"
  4. another word for "most of the time"
  5. noun of "to use"

10 Clues: noun of "to use"a very high buildingEnglish for "besonders"a group of people who singverb for behaviour: to ...another word for "most of the time"something you can carry injured people withto say something nasty about someone online: cyber ...to suddenly talk to somebody in a aggressive way: to ......

social media and mental health 2024-04-19

social media and mental health crossword puzzle
Across
  1. platform made by meta
  2. online, perhaps
  3. mean action done by one or more people to another group or person
  4. a feeling related to sunshine and the color yellow
  5. slow exercise that helps with flexibility and calming
Down
  1. people use this to talk about their feelings
  2. social media users make these
  3. prolonged sadness
  4. quiet activity to help clear and calm the mind
  5. severe worrying

10 Clues: online, perhapssevere worryingprolonged sadnessplatform made by metasocial media users make thesepeople use this to talk about their feelingsquiet activity to help clear and calm the minda feeling related to sunshine and the color yellowslow exercise that helps with flexibility and calming...

Technogley 2025-01-16

Technogley crossword puzzle
Across
  1. the brain of your computer
  2. it capulises your words
  3. it makes your computer have sound
  4. it can tern your computer on and of
  5. bullying
Down
  1. it macks your crombook eseer or harder to here
  2. helps you find things you don't know
  3. it deletes letters of your screens
  4. how you connect internet to a phone, tablet or computer
  5. saver photos and words and letters

10 Clues: bullyingit capulises your wordsthe brain of your computerit makes your computer have soundit deletes letters of your screenssaver photos and words and lettersit can tern your computer on and ofhelps you find things you don't knowit macks your crombook eseer or harder to herehow you connect internet to a phone, tablet or computer

Hass im Netz 2025-05-16

Hass im Netz crossword puzzle
Across
  1. Vorsilbe für alles, was im Internet passiert.
  2. So nennt man einen Beitrag in sozialen Netzwerken.
  3. Person, die im Netz absichtlich provoziert.
  4. Damit sichert man Beweise bei Cybermobbing.
  5. Beleidigende oder hetzerische Sprache im Netz.
Down
  1. Diese sollte man auch im Netz schützen.
  2. Im Internet oft ohne echten Namen unterwegs.
  3. Welle negativer Kommentare im Netz.
  4. So schützt man sich vor Belästigung online.
  5. Online-Kommunikation in Echtzeit.

10 Clues: Online-Kommunikation in Echtzeit.Welle negativer Kommentare im Netz.Diese sollte man auch im Netz schützen.So schützt man sich vor Belästigung online.Person, die im Netz absichtlich provoziert.Damit sichert man Beweise bei Cybermobbing.Im Internet oft ohne echten Namen unterwegs.Vorsilbe für alles, was im Internet passiert....

3 ja 3.1 2025-02-25

3 ja 3.1 crossword puzzle
Across
  1. nuoriso
  2. konflikti
  3. ilahtunut
  4. puolestapuhuja
  5. intohimo
  6. vuosittainen
  7. tasa-arvo
  8. yhteishenki
  9. tehtävä
Down
  1. monikielisyys
  2. tulkki
  3. turvallisuus
  4. kunnia
  5. arvokkuus
  6. väkivalta

15 Clues: tulkkikunnianuorisotehtäväintohimokonfliktiilahtunutarvokkuusväkivaltatasa-arvoyhteishenkiturvallisuusvuosittainenmonikielisyyspuolestapuhuja

Algorithms 2024-09-12

Algorithms crossword puzzle
Across
  1. a common port smaller than USB
  2. safety the practice of protecting yourself online
  3. the action you take with your mouse
  4. a programming concept that allows you to repeat a set of instructions
  5. the smallest unit of data a computer can process (1/0)
  6. another word for software
  7. a list of steps needed to complete a task
Down
  1. The most common type of port
  2. the practice of protecting computer systems
  3. The language that tells a computer what to do
  4. a single simple instruction
  5. a person who writes code
  6. A programming error

13 Clues: A programming errora person who writes codeanother word for softwarea single simple instructionThe most common type of porta common port smaller than USBthe action you take with your mousea list of steps needed to complete a taskthe practice of protecting computer systemsThe language that tells a computer what to do...

Documents: Lesson 7 2021-10-01

Documents: Lesson 7 crossword puzzle
Across
  1. Also located within Documents Section
  2. Position or _____ Trustee, Sponsor etc when they sign
  3. where coding is located in mainframe
  4. Only these SCNs can Esign Documents
  5. shows who and when documents was signed in the document ______
  6. _________ Preferences are made by each ER
  7. OneNote for EDS
  8. Where you view document history
  9. section in Manage security where esign rights are located
Down
  1. Which tab are the forms located in?
  2. Esignature but not Trustee, fiduciary or Adopting Employer?
  3. Grants access to Secondary to esign
  4. "...Employer" signature role
  5. E stands for in Esignature
  6. Where the notifications for tasks go to ER
  7. ToDOList Item
  8. Esignature Role
  9. Where the Signor goes to Esign documents (3 words)
  10. ________ Security to assign Esig Rights to SCNs

19 Clues: ToDOList ItemEsignature RoleOneNote for EDSE stands for in Esignature"...Employer" signature roleWhere you view document historyWhich tab are the forms located in?Grants access to Secondary to esignOnly these SCNs can Esign Documentswhere coding is located in mainframeAlso located within Documents Section_________ Preferences are made by each ER...

Thanksgiving V2 2023-10-30

Thanksgiving V2 crossword puzzle
Across
  1. Typical pie for fall.
  2. How many days did the first Thanksgiving last
  3. Ornamental container shaped like a goat's horn
  4. Another typical side dish, loved by rabbits.
  5. Monday after Thanksgiving
  6. Often the main course of a meal on Thanksgiving
  7. Attended the first Thanksgiving with the Indigenous American tribe
Down
  1. Indigenous American tribe that celebrated the first Thanksgiving
  2. Food comes in a sauce or a jelly
  3. Site of first Thanksgiving
  4. Dish either can be sweet or mashed
  5. Friday after Thanksgiving
  6. Typical Southern side dish
  7. Green, French, string are types of these.
  8. Typically "stuffed" inside a turkey
  9. Side dish that is cooked slowly in an oven
  10. Typically poured over mashed potatoes

17 Clues: Typical pie for fall.Friday after ThanksgivingMonday after ThanksgivingSite of first ThanksgivingTypical Southern side dishFood comes in a sauce or a jellyDish either can be sweet or mashedTypically "stuffed" inside a turkeyTypically poured over mashed potatoesGreen, French, string are types of these.Side dish that is cooked slowly in an oven...

Stock Market Terms 2020-05-19

Stock Market Terms crossword puzzle
Across
  1. is a period of sustained increases in the prices of stocks, bonds or indexes. [ 1 wrd]
  2. the price a seller is willing to accept for a security [1 wrd]
  3. is a basket of securities that tracks an underlying index , can contain various investments including stocks, commodities, and bonds. [acronym]
  4. is a request by an investor – usually made through a broker or brokerage service – to buy or sell a security at the best available price in the current market [2wds]
  5. a company that typically has a large market cap, a sterling reputation and many years of success in the business world.[3 wds]
  6. is an aggressively managed portfolio of investments that uses leveraged, long, short and derivative positions. [2wds]
  7. a group of companies that operate in the same segment of the economy or share a similar business type. [1 wrd]
  8. to obtain in exchange for payment[1 wrd]
  9. the availability of liquid assets to a market or company [1 wrd]
  10. an order an investor may place to buy or sell a security that remains active until either the order is filled or the investor cancels it [4 wds]
  11. is the completion of a buy or sell order for a security. [1 wrd]
  12. is the last price at which a security or commodity traded [1 wrd]
  13. is a portmanteau of foreign currency and exchange. [1wds]
  14. A bear market is when a market experiences prolonged price declines. [2wds]
  15. refers to the earnings generated and realized on an investment over a particular period of time.[1 wrd]
  16. give or hand over something in exchange for currency [ 1 wrd]
  17. is defined as the purchase and sale of a security within a single trading day. [2 wds]
  18. is a negotiable certificate issued by a U.S. depository bank representing a specified number of shares—or as little as one share—investment in a foreign company's stock. [acronym]
  19. is the total quantity of shares or contracts traded for a specified security. [2wds]
  20. refers to the process of offering shares of a private corporation to the public in a new stock issuance.[3 wds]
Down
  1. is the amount by which the ask price exceeds the bid price for an asset in the market [3 wds]
  2. an individual or firm that charges a fee or commission for executing buy and sell orders submitted by an investor. [1 wds]
  3. sale of new or closely held shares of a company that has already made an initial public offering .[2wds]
  4. is a widely used indicator in technical analysis that helps smooth out price action by filtering out the “noise” from random short-term price fluctuations. [2 wds]
  5. is a unique series of letters assigned to a security for trading purposes. [1 wrd]
  6. the number of shares that a corporation is legally allowed to issue[2 wds]
  7. is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]
  8. is an order to purchase an asset at or below a specified price, allowing traders to control how much they pay [ 2wds]
  9. refers to the difference between the seller's cost for acquiring products and the selling price.[1 wrd]
  10. refers to the shares of a company that can be publicly traded and are not restricted [2 wds]
  11. involves investing additional amounts in a financial instrument or asset if it declines significantly in price after the original investment is made.[2wds]
  12. is a statistical measure of the dispersion of returns for a given security or market index.[1 wrd]
  13. is a financial market of a group of securities in which prices are rising or are expected to rise [2 wds]
  14. a range of investments held by a person or organization. [1 wrd]
  15. is an accounting method in which a cost is included in the value of an asset and expensed over the useful life of that asset.[1 wds]
  16. offer a certain price for something especially at an auction [ 1wrd]
  17. is a measurement of market risk or volatility .[1 wds]
  18. A day order is a direction to a broker to execute a trade at a specific price that expires at the end of the trading day if it is not completed [2wds]
  19. the buying of a stock, commodity, or currency with the expectation that it will rise in value. [2 wds]
  20. is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]

40 Clues: to obtain in exchange for payment[1 wrd]is a measurement of market risk or volatility .[1 wds]is a portmanteau of foreign currency and exchange. [1wds]give or hand over something in exchange for currency [ 1 wrd]the price a seller is willing to accept for a security [1 wrd]the availability of liquid assets to a market or company [1 wrd]...

Stock Market Terms 2020-05-21

Stock Market Terms crossword puzzle
Across
  1. is a period of sustained increases in the prices of stocks, bonds or indexes. [ 1 wrd]
  2. the price a seller is willing to accept for a security [1 wrd]
  3. is a basket of securities that tracks an underlying index , can contain various investments including stocks, commodities, and bonds. [acronym]
  4. is a request by an investor – usually made through a broker or brokerage service – to buy or sell a security at the best available price in the current market [2wds]
  5. a company that typically has a large market cap, a sterling reputation and many years of success in the business world.[3 wds]
  6. is an aggressively managed portfolio of investments that uses leveraged, long, short and derivative positions. [2wds]
  7. a group of companies that operate in the same segment of the economy or share a similar business type. [1 wrd]
  8. to obtain in exchange for payment[1 wrd]
  9. the availability of liquid assets to a market or company [1 wrd]
  10. an order an investor may place to buy or sell a security that remains active until either the order is filled or the investor cancels it [4 wds]
  11. is the completion of a buy or sell order for a security. [1 wrd]
  12. is the last price at which a security or commodity traded [1 wrd]
  13. is a portmanteau of foreign currency and exchange. [1wds]
  14. A bear market is when a market experiences prolonged price declines. [2wds]
  15. refers to the earnings generated and realized on an investment over a particular period of time.[1 wrd]
  16. give or hand over something in exchange for currency [ 1 wrd]
  17. is defined as the purchase and sale of a security within a single trading day. [2 wds]
  18. is a negotiable certificate issued by a U.S. depository bank representing a specified number of shares—or as little as one share—investment in a foreign company's stock. [acronym]
  19. is the total quantity of shares or contracts traded for a specified security. [2wds]
  20. refers to the process of offering shares of a private corporation to the public in a new stock issuance.[3 wds]
Down
  1. is the amount by which the ask price exceeds the bid price for an asset in the market [3 wds]
  2. an individual or firm that charges a fee or commission for executing buy and sell orders submitted by an investor. [1 wds]
  3. sale of new or closely held shares of a company that has already made an initial public offering .[2wds]
  4. is a widely used indicator in technical analysis that helps smooth out price action by filtering out the “noise” from random short-term price fluctuations. [2 wds]
  5. is a unique series of letters assigned to a security for trading purposes. [1 wrd]
  6. the number of shares that a corporation is legally allowed to issue[2 wds]
  7. is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]
  8. is an order to purchase an asset at or below a specified price, allowing traders to control how much they pay [ 2wds]
  9. refers to the difference between the seller's cost for acquiring products and the selling price.[1 wrd]
  10. refers to the shares of a company that can be publicly traded and are not restricted [2 wds]
  11. involves investing additional amounts in a financial instrument or asset if it declines significantly in price after the original investment is made.[2wds]
  12. is a statistical measure of the dispersion of returns for a given security or market index.[1 wrd]
  13. is a financial market of a group of securities in which prices are rising or are expected to rise [2 wds]
  14. a range of investments held by a person or organization. [1 wrd]
  15. is an accounting method in which a cost is included in the value of an asset and expensed over the useful life of that asset.[1 wds]
  16. offer a certain price for something especially at an auction [ 1wrd]
  17. is a measurement of market risk or volatility .[1 wds]
  18. A day order is a direction to a broker to execute a trade at a specific price that expires at the end of the trading day if it is not completed [2wds]
  19. the buying of a stock, commodity, or currency with the expectation that it will rise in value. [2 wds]
  20. is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]

40 Clues: to obtain in exchange for payment[1 wrd]is a measurement of market risk or volatility .[1 wds]is a portmanteau of foreign currency and exchange. [1wds]give or hand over something in exchange for currency [ 1 wrd]the price a seller is willing to accept for a security [1 wrd]the availability of liquid assets to a market or company [1 wrd]...

Women and The New Deal 2020-02-27

Women and The New Deal crossword puzzle
Across
  1. There was still a belief that men were the rightful _______
  2. Most ND programmes were designed to help men. Only 8000 women were involved in this program
  3. The Social Security Act benefited women with families as it provided what type of benefits?
  4. This person encouraged the formation of the Black Cabinet as well as championing the concept of a living wage
  5. The Wagner Act allowed women to join what along with men?
  6. There was discrimination against which group of women working
  7. This group of women were encouraged to pursue domestic work and higher education
  8. More women were doing this in 1940 than in 1933?
Down
  1. There was still a belief that women only worked for this type of money
  2. This 1935 act benefited single working-class women with young families who were unable to work.
  3. Who tried to avoid paying social security payments to women by introducing special qualifications and conditions?
  4. The 1936 Gallup Poll revealed that 4/5 people thought what type of women should not work?
  5. This person executed many aspects of the ND including the CCC, PWA and the Social Security Act
  6. Gladys Tantaquidgeon studied this subject at the University of Pennsylvania and was offered a position as social worker on a South Dakota reservation by John Collier.
  7. This group of women were ignored in the social security act as they were mainly employed as domestic workers
  8. Frances Perkins became the first female US Secretary of ___

16 Clues: More women were doing this in 1940 than in 1933?The Wagner Act allowed women to join what along with men?There was still a belief that men were the rightful _______Frances Perkins became the first female US Secretary of ___There was discrimination against which group of women working...

Delirium (section 2) 2015-05-07

Delirium (section 2) crossword puzzle
Across
  1. Lena's pretty best friend.
  2. The color of a storm cloud.
  3. A house on a farmstead.
  4. The name for the disease of love.
  5. A word for security watching people.
  6. Library of approved books.
  7. Lena's aunt's name.
  8. A live music show.
Down
  1. People who live in the wilds.
  2. Separation of people based on prejudice.
  3. A vision you have while sleeping.
  4. A certain time for someone to be home.
  5. Where Alex takes his classes(University of Portland).
  6. People who patrol the streets after curfew.
  7. A place where science experiments are conducted.
  8. A solution to a sickness.
  9. Main character.
  10. Security gaur who Hana and Lena get caught by.
  11. Alex has a 3 pronged _____ on the side of his head.
  12. Library of authorized music.

20 Clues: Main character.A live music show.Lena's aunt's name.A house on a farmstead.A solution to a sickness.Lena's pretty best friend.Library of approved books.The color of a storm cloud.Library of authorized music.People who live in the wilds.A vision you have while sleeping.The name for the disease of love.A word for security watching people....

Compliance Division 2024-02-07

Compliance Division crossword puzzle
Across
  1. Elevated __________
  2. Plays in a band
  3. Wrong 50% of the time
  4. Must agree on 3-way
  5. Email requiring action
  6. Where to send outstanding transactions
  7. Warning
  8. AKA True-up
  9. A monthly charge
  10. Fitness Enthusiast
  11. May hold Security Deposits
  12. For owner or tenant
  13. Where the bad ones go
  14. Loves Indy
  15. OK if Agreed to in PMA
  16. Part I _______
  17. Software
  18. Type of account
Down
  1. Often missing from Check Register
  2. Monthly Requirement
  3. When all three parts equal
  4. Often refundable
  5. Rentals we don't want to see in a CTA
  6. Money holder
  7. Pays the security deposit
  8. Makes the best cookies
  9. Mixed funds
  10. When records are not received
  11. Take me to your leader
  12. Not allowed to come out of a CTA

30 Clues: WarningSoftwareLoves IndyAKA True-upMixed fundsMoney holderPart I _______Plays in a bandType of accountOften refundableA monthly chargeFitness EnthusiastElevated __________Monthly RequirementMust agree on 3-wayFor owner or tenantWrong 50% of the timeWhere the bad ones goEmail requiring actionMakes the best cookiesOK if Agreed to in PMA...

LIVEABILITY CROSSWORD 2025-03-17

LIVEABILITY CROSSWORD crossword puzzle
Across
  1. A community need for teenagers.
  2. Contaminates in the air, water or land.
  3. Commerce, trade and enterprise.
  4. Dentists, hospital, ambulance availability
  5. Train transport.
  6. Weather patterns and conditions. Temperature.
  7. A good government that is stable provides...
  8. Most people's preferred climate.
  9. Essentials structures and systems for a community
Down
  1. Childcare, TAFE, university, schools.
  2. The way people do life and experiences together
  3. Protection, security, well-being
  4. A place for healing and caring for the sick.
  5. Breaking of laws that make areas unsafe to live in.
  6. Purity of the air and atmosphere in a community.
  7. The qualities of a place that make it comfortable and suitable for living
  8. Leadership of communities.
  9. The business of selling goods to the public.
  10. Used for domestic and international travel.
  11. Worship, prayer, gathering

20 Clues: Train transport.Leadership of communities.Worship, prayer, gatheringA community need for teenagers.Commerce, trade and enterprise.Protection, security, well-beingMost people's preferred climate.Childcare, TAFE, university, schools.Contaminates in the air, water or land.Dentists, hospital, ambulance availability...

IT Terms 2025-05-15

IT Terms crossword puzzle
Across
  1. Internet-based delivery of IT resources.
  2. Software to manage customer interactions.
  3. Two-symbol system used by computers.
  4. Computer system within a larger system.
  5. Plan for continuing business during disruption.
  6. Simulates human intelligence in machines.
  7. Processes and executes instructions (abbr).
  8. Network of physical devices sharing data.
  9. Unique address for a device on a network.
  10. Device connected to a network.
  11. Visual interface with icons and menus.
  12. Tech and strategy for analyzing business data.
Down
  1. Stores data temporarily for quick access.
  2. Organized collection of electronic data.
  3. Protects systems from digital threats.
  4. Converts data into code for security.
  5. Group of connected computers sharing rules.
  6. Security device that filters traffic.
  7. Finding and fixing code issues.
  8. Set of rules for communication between software components.

20 Clues: Device connected to a network.Finding and fixing code issues.Two-symbol system used by computers.Converts data into code for security.Security device that filters traffic.Protects systems from digital threats.Visual interface with icons and menus.Computer system within a larger system.Internet-based delivery of IT resources....

Safer Internet 2020-04-01

Safer Internet crossword puzzle
Across
  1. Person die sich als eine andre ausgibt.
  2. Beweise zu sichern wäre auch sehr vorteilhaft
  3. niedrige Preise heißen auch .....preise.
  4. Gegenteil von offline.
  5. Es gibt Vorteile im Internet, aber auch ....
Down
  1. Beim Phishing versucht man deine .... zu bekommen.
  2. Deine ...... solltest du schützen.
  3. Unter Cyber-Mobbing versteht man das ......,Bedrohen,Belästigen und Bloßstellen einer Person
  4. Damit bezahlst du in bar.

9 Clues: Gegenteil von offline.Damit bezahlst du in bar.Deine ...... solltest du schützen.Person die sich als eine andre ausgibt.niedrige Preise heißen auch .....preise.Es gibt Vorteile im Internet, aber auch ....Beweise zu sichern wäre auch sehr vorteilhaftBeim Phishing versucht man deine .... zu bekommen....

KI-Betrug: Die neuen Tricks der Cyberkriminellen 2025-03-28

KI-Betrug: Die neuen Tricks der Cyberkriminellen crossword puzzle
Across
  1. - Was Phishing-E-Mails verwenden, um Sie auszutricksen.
  2. – Das solltest du tun, bevor du jemandem vertraust.
  3. - Fälschen einer E-Mail oder Telefonnummer.
  4. - Die Technologie hinter diesen neuen Betrügereien.
Down
  1. – Wenn geheime Daten plötzlich öffentlich sind.
  2. - Eine Sicherheitsfalle für Cyber-Kriminelle (engl.).
  3. - Ein realistisches, aber gefälschtes Video.
  4. - KI kann dies mit Stimmen tun.
  5. – Wenn jemand dich absichtlich täuscht.

9 Clues: - KI kann dies mit Stimmen tun.– Wenn jemand dich absichtlich täuscht.- Fälschen einer E-Mail oder Telefonnummer.- Ein realistisches, aber gefälschtes Video.– Wenn geheime Daten plötzlich öffentlich sind.– Das solltest du tun, bevor du jemandem vertraust.- Die Technologie hinter diesen neuen Betrügereien....

Literasi Digital 2024-08-15

Literasi Digital crossword puzzle
Across
  1. Nama lain dari kata sandi
  2. Aktivitas yang dilakukan seseorang secara daring untuk mengganggu atau menyakiti orang lain
  3. Kejahatan didunia digital disebut cyber
  4. Keamanan sangat penting untuk menjaga
Down
  1. Nama lain dari perangkat lunak
  2. Manfaat literasi digital untuk menambah
  3. Negara yang memiliki tingkat literasi digital yang tinggi
  4. HAKI terbagi menjadi berapa bagian
  5. Tombol untuk membatalkan tindakan di komputer

9 Clues: Nama lain dari kata sandiNama lain dari perangkat lunakHAKI terbagi menjadi berapa bagianKeamanan sangat penting untuk menjagaManfaat literasi digital untuk menambahKejahatan didunia digital disebut cyberTombol untuk membatalkan tindakan di komputerNegara yang memiliki tingkat literasi digital yang tinggi...

Technology Vocabulary 2022-01-21

Technology Vocabulary crossword puzzle
Across
  1. involving,using,or relating to the internet
  2. a person who has grown up with digital tech
  3. someone who dislikes new technology
  4. a discovery that really improves a situation
  5. to move something forward,or improve something
  6. a way something can be used for a purpose
Down
  1. important change in the way people do things
  2. to cause a change in someone or something
  3. the most modern stage of development
  4. the use of a new idea or method
  5. to start to happen or exist
  6. to continue gradually

12 Clues: to continue graduallyto start to happen or existthe use of a new idea or methodsomeone who dislikes new technologythe most modern stage of developmentto cause a change in someone or somethinga way something can be used for a purposeinvolving,using,or relating to the interneta person who has grown up with digital tech...

malware 2023-06-19

malware crossword puzzle
Across
  1. sending emails or messages as fake company
  2. a word to keep your things safe
  3. fishing pretending to be a different person
  4. control lets parents set the settings on a device
  5. fraud a scam online
  6. a type of malware that downloads onto a computer
  7. mail emails that a useless
Down
  1. a program that breaks your device
  2. A computer program that can run independently
  3. allows users to convert information
  4. leaving a trace online
  5. when a person winds another up online

12 Clues: fraud a scam onlineleaving a trace onlinemail emails that a uselessa word to keep your things safea program that breaks your deviceallows users to convert informationwhen a person winds another up onlinesending emails or messages as fake companyfishing pretending to be a different personA computer program that can run independently...

Digital Strategy 2025-11-03

Digital Strategy crossword puzzle
Across
  1. predicting future demand for products
  2. software for managing business processes.
  3. Raw facts and figures used for analytics
  4. the process of sourcing and purchasing goods or services.
  5. monitoring the movement of goods.
  6. operating on an international scale
Down
  1. Network of suppliers, manufacturers and costumers
  2. Protecting systems and data from cyber threats
  3. Technology enabling remote access to computing resources
  4. a measurable value to evaluate performance.
  5. Automated tool that interacts with users via text or voice
  6. Step-by-step procedure for solving a problem

12 Clues: monitoring the movement of goods.operating on an international scalepredicting future demand for productsRaw facts and figures used for analyticssoftware for managing business processes.a measurable value to evaluate performance.Step-by-step procedure for solving a problemProtecting systems and data from cyber threats...

Faculty 2025-10-16

Faculty crossword puzzle
Across
  1. Engineering
  2. Graphic design
  3. Principal
  4. Admissions Coodinator
  5. AP English
  6. Marketing Director
  7. Lab
  8. Israel Guidence
  9. Ivrit
Down
  1. Gym
  2. Security
  3. Associate Principal
  4. 9th Bio
  5. Spanish
  6. Art
  7. Activities Director
  8. Ramabam
  9. History
  10. College Advisory

19 Clues: GymArtLabIvrit9th BioSpanishRamabamHistorySecurityPrincipalAP EnglishEngineeringGraphic designIsrael GuidenceCollege AdvisoryMarketing DirectorAssociate PrincipalActivities DirectorAdmissions Coodinator

Acronym 2021-11-21

Acronym crossword puzzle
Across
  1. joe Biden
  2. founder
  3. quickly
  4. teacher
  5. security
  6. army
  7. confusion
Down
  1. spaceship
  2. fun
  3. crime
  4. money
  5. important
  6. chicken
  7. disorder
  8. offline

15 Clues: funarmycrimemoneyfounderquicklychickenteacherofflinesecuritydisorderspaceshipjoe Bidenimportantconfusion

Puzle 2023-10-13

Puzle crossword puzzle
Across
  1. przepłynąć
  2. wyprzedzić
  3. chodnik
  4. ciężarówka
  5. peron
  6. rejs
  7. furgonetka
  8. motocykl
Down
  1. dogodny
  2. jacht
  3. bramka
  4. przybyć
  5. bagażnik
  6. za granicą
  7. ochrona

15 Clues: rejsjachtperonbramkadogodnychodnikprzybyćochronabagażnikmotocyklprzepłynąćwyprzedzićciężarówkaza granicąfurgonetka

Favorite ways to travel 2023-06-12

Favorite ways to travel crossword puzzle
Across
  1. exploring
  2. safety
  3. compartment
  4. airfield
  5. shadier
  6. confined
  7. drawbacks
  8. indefinitely
Down
  1. premium
  2. elegant
  3. choice
  4. advantages
  5. opulence
  6. journey
  7. dreadful

15 Clues: choicesafetypremiumelegantjourneyshadieropulencedreadfulairfieldconfinedexploringdrawbacksadvantagescompartmentindefinitely

Stay Smart Online 2023-01-05

Stay Smart Online crossword puzzle
Across
  1. Stay _________ in Cyberspace.
  2. Always remember to ______ your accounts from other's devices.
  3. Do not share your ______ with anyone.
  4. Report any cases of _______ to Cyber crime department.
Down
  1. Respect the _________ laws
  2. Never share personal details on __________
  3. Be aware of _____ while shopping online.
  4. Apply _______ settings in Whatsapp to safeguard your data.

8 Clues: Respect the _________ lawsStay _________ in Cyberspace.Do not share your ______ with anyone.Be aware of _____ while shopping online.Never share personal details on __________Report any cases of _______ to Cyber crime department.Apply _______ settings in Whatsapp to safeguard your data.Always remember to ______ your accounts from other's devices.

DE TOPIC 1 2025-08-03

DE TOPIC 1 crossword puzzle
Across
  1. utilising software and digital and technologies
  2. Operates online
  3. Follow islamic principles and ethics
  4. Focus on physical good and services
Down
  1. Create positive societal impact
  2. Integration of cyber-physical systems, IoT, AI and data analitics
  3. Focused on mass production and global market
  4. Focused on sustainability and environment conservation

8 Clues: Operates onlineCreate positive societal impactFocus on physical good and servicesFollow islamic principles and ethicsFocused on mass production and global marketutilising software and digital and technologiesFocused on sustainability and environment conservationIntegration of cyber-physical systems, IoT, AI and data analitics

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord 21CSE492T CYBERCRIMES  AND CYBERSECURITY IV Year / VII Sem  FT3 -17.10.25 SET A Duration :15 mins  Marks:20 crossword puzzle
Across
  1. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  2. Data describing other data, such as timestamps or authors
  3. Firewall type that provides unified policy across distributed networks
  4. Unauthorized email scams that trick users into revealing information
  5. Potential events or circumstances that can cause harm to an organization's assets.
  6. Network tool for capturing and analyzing traffic
  7. A central security resource where multiple virtual traps are monitored (One word).
  8. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  9. Technology used by NGFW to detect and block malware
Down
  1. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  2. An illegal intrusion into a computer system or network
  3. The verification procedure to demonstrate that the network meets security requirements
  4. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  5. Legal process of collecting and analyzing digital evidence
  6. Process of identifying, assessing, and mitigating threats
  7. Malicious software specifically designed to disrupt or damage computer systems
  8. Programs designed to record personal information, typically undesired software
  9. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  10. Software that records keystrokes, potentially capturing sensitive login credentials.
  11. Deceptive emails or messages impersonating trusted entities to steal sensitive information

20 Clues: Network tool for capturing and analyzing trafficTechnology used by NGFW to detect and block malwareAn illegal intrusion into a computer system or networkData describing other data, such as timestamps or authorsProcess of identifying, assessing, and mitigating threatsLegal process of collecting and analyzing digital evidence...

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET D Duration :15 mins Marks:20 2025-10-16

CrossWord 21CSE492T CYBERCRIMES  AND CYBERSECURITY IV Year / VII Sem  FT3 -17.10.25 SET D Duration :15 mins  Marks:20 crossword puzzle
Across
  1. Data describing other data, such as timestamps or authors
  2. An illegal intrusion into a computer system or network
  3. Legal process of collecting and analyzing digital evidence
  4. Unauthorized email scams that trick users into revealing information
  5. The verification procedure to demonstrate that the network meets security requirements
  6. Software that records keystrokes, potentially capturing sensitive login credentials.
  7. Deceptive emails or messages impersonating trusted entities to steal sensitive information
  8. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  9. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  10. Network tool for capturing and analyzing traffic
  11. Potential events or circumstances that can cause harm to an organization's assets.
  12. Technology used by NGFW to detect and block malware
Down
  1. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  2. A central security resource where multiple virtual traps are monitored (One word).
  3. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  4. Process of identifying, assessing, and mitigating threats
  5. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  6. Programs designed to record personal information, typically undesired software
  7. Malicious software specifically designed to disrupt or damage computer systems
  8. Firewall Firewall type that provides unified policy across distributed networks

20 Clues: Network tool for capturing and analyzing trafficTechnology used by NGFW to detect and block malwareAn illegal intrusion into a computer system or networkData describing other data, such as timestamps or authorsProcess of identifying, assessing, and mitigating threatsLegal process of collecting and analyzing digital evidence...

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET D Duration :15 mins Marks:20 2025-10-16

CrossWord 21CSE492T CYBERCRIMES  AND CYBERSECURITY IV Year / VII Sem  FT3 -17.10.25 SET D Duration :15 mins  Marks:20 crossword puzzle
Across
  1. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  2. Data describing other data, such as timestamps or authors
  3. Firewall type that provides unified policy across distributed networks
  4. Unauthorized email scams that trick users into revealing information
  5. Potential events or circumstances that can cause harm to an organization's assets.
  6. Network tool for capturing and analyzing traffic
  7. A central security resource where multiple virtual traps are monitored (One word).
  8. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  9. Technology used by NGFW to detect and block malware
Down
  1. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  2. An illegal intrusion into a computer system or network
  3. The verification procedure to demonstrate that the network meets security requirements
  4. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  5. Legal process of collecting and analyzing digital evidence
  6. Process of identifying, assessing, and mitigating threats
  7. Malicious software specifically designed to disrupt or damage computer systems
  8. Programs designed to record personal information, typically undesired software
  9. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  10. Software that records keystrokes, potentially capturing sensitive login credentials.
  11. Deceptive emails or messages impersonating trusted entities to steal sensitive information

20 Clues: Network tool for capturing and analyzing trafficTechnology used by NGFW to detect and block malwareAn illegal intrusion into a computer system or networkData describing other data, such as timestamps or authorsProcess of identifying, assessing, and mitigating threatsLegal process of collecting and analyzing digital evidence...

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET F Duration :15 mins Marks:20 2025-10-23

CrossWord 21CSE492T CYBERCRIMES  AND CYBERSECURITY IV Year / VII Sem  FT3 -17.10.25 SET F Duration :15 mins  Marks:20 crossword puzzle
Across
  1. Data describing other data, such as timestamps or authors
  2. Process of identifying, assessing, and mitigating threats
  3. The verification procedure to demonstrate that the network meets security requirements
  4. Technology used by NGFW to detect and block malware
  5. Unauthorized email scams that trick users into revealing information
  6. An illegal intrusion into a computer system or network
  7. A central security resource where multiple virtual traps are monitored (One word).
  8. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  9. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  10. Malicious software specifically designed to disrupt or damage computer systems
Down
  1. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  2. Network tool for capturing and analyzing traffic
  3. Programs designed to record personal information, typically undesired software
  4. Deceptive emails or messages impersonating trusted entities to steal sensitive information
  5. Potential events or circumstances that can cause harm to an organization's assets.
  6. Legal process of collecting and analyzing digital evidence
  7. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  8. Firewall Firewall type that provides unified policy across distributed networks
  9. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  10. Software that records keystrokes, potentially capturing sensitive login credentials.

20 Clues: Network tool for capturing and analyzing trafficTechnology used by NGFW to detect and block malwareAn illegal intrusion into a computer system or networkData describing other data, such as timestamps or authorsProcess of identifying, assessing, and mitigating threatsLegal process of collecting and analyzing digital evidence...

Phish 2024-09-18

Phish crossword puzzle
Across
  1. : “Too good to be true”
  2. : Familiar ___ are often faked by scammers
  3. Link : Imposter website
  4. for help : Sense danger?
  5. : Who should learn how to recognize and avoid (phishing)?
  6. Breach : Exposes business secrets and confidential data
Down
  1. Criminal : A stranger in a dark alley is much like a _____ in your inbox.
  2. : Where to find additional information on the different types of (phishing)
  3. : Malicious email attack
  4. : Compromises computer and files
  5. Credentials : Never send these via email
  6. : “Think Before You ___”
  7. Phish : Who do you report suspicious email to?

13 Clues: : “Too good to be true”Link : Imposter website: Malicious email attack: “Think Before You ___”for help : Sense danger?: Compromises computer and filesCredentials : Never send these via email: Familiar ___ are often faked by scammersPhish : Who do you report suspicious email to?Breach : Exposes business secrets and confidential data...

Spanish Review 2016-02-16

Spanish Review crossword puzzle
Across
  1. una silla
  2. madrugada
  3. una calculadora
  4. camisa
  5. una tiza
  6. una rega
  7. calcetines
  8. un lapiz
  9. estudio
  10. la gorra
Down
  1. una computadora
  2. avion
  3. entender
  4. seguridad
  5. una mochhlia
  6. un libro
  7. una mesa
  8. pantalones cortos
  9. quince
  10. dibujar

20 Clues: avioncamisaquinceestudiodibujarentenderun librouna mesauna tizauna regaun lapizla gorrauna sillamadrugadaseguridadcalcetinesuna mochhliauna computadorauna calculadorapantalones cortos

Politica 2018-03-04

Politica crossword puzzle
Across
  1. economia
  2. paz
  3. Campaña
  4. estrategia
  5. presidente
  6. seguridad
  7. gobierno
  8. libertad
  9. líder
  10. argumento
  11. impuesto
Down
  1. inversión
  2. crimen
  3. sociedad
  4. consejo
  5. opinión
  6. nacional
  7. guerra
  8. seguridad
  9. ejército
  10. demanda
  11. progreso
  12. deuda
  13. tribunal
  14. votación
  15. ley

26 Clues: pazleydeudalídercrimenguerraconsejoopinióndemandaCampañaeconomiasociedadnacionalejércitoprogresotribunalgobiernovotaciónlibertadimpuestoinversiónseguridadseguridadargumentoestrategiapresidente

Student Vocab Crossword puzzle 2023-04-26

Student Vocab Crossword puzzle crossword puzzle
Across
  1. towalk
  2. trick
  3. bomb
  4. candy
  5. door
  6. image
  7. weather
  8. hotel
  9. simple
  10. plane
  11. bathingsuit
  12. clothingstore
  13. skier
  14. airport
Down
  1. security
  2. waterbottle
  3. tofly
  4. gum
  5. cliffjump
  6. turtle
  7. avacado
  8. energy
  9. perchance
  10. baggage
  11. boat

25 Clues: gumbombdoorboattoflytrickcandyimagehotelplaneskiertowalkturtleenergysimpleavacadobaggageweatherairportsecuritycliffjumpperchancewaterbottlebathingsuitclothingstore

Student Vocab Crossword puzzle 2023-04-26

Student Vocab Crossword puzzle crossword puzzle
Across
  1. towalk
  2. trick
  3. bomb
  4. candy
  5. door
  6. image
  7. weather
  8. hotel
  9. simple
  10. plane
  11. bathingsuit
  12. clothingstore
  13. skier
  14. airport
Down
  1. security
  2. waterbottle
  3. tofly
  4. gum
  5. cliffjump
  6. turtle
  7. avacado
  8. energy
  9. perchance
  10. baggage
  11. boat

25 Clues: gumbombdoorboattoflytrickcandyimagehotelplaneskiertowalkturtleenergysimpleavacadobaggageweatherairportsecuritycliffjumpperchancewaterbottlebathingsuitclothingstore

Student Vocab Crossword puzzle 2023-04-26

Student Vocab Crossword puzzle crossword puzzle
Across
  1. towalk
  2. trick
  3. bomb
  4. candy
  5. door
  6. image
  7. weather
  8. hotel
  9. simple
  10. plane
  11. bathingsuit
  12. clothingstore
  13. skier
  14. airport
Down
  1. security
  2. waterbottle
  3. tofly
  4. gum
  5. cliffjump
  6. turtle
  7. avacado
  8. energy
  9. perchance
  10. baggage
  11. boat

25 Clues: gumbombdoorboattoflytrickcandyimagehotelplaneskiertowalkturtleenergysimpleavacadobaggageweatherairportsecuritycliffjumpperchancewaterbottlebathingsuitclothingstore

Prefix Crossword - Grade 8 Language Worksheet 2023-11-06

Prefix Crossword - Grade 8 Language Worksheet crossword puzzle
Across
  1. behaviour
  2. probability
  3. comfort
  4. convenience
  5. honesty
  6. advantage
  7. similar
  8. truth
  9. even
  10. approve
  11. regular
Down
  1. possible
  2. behave
  3. do
  4. natural
  5. maturity
  6. legible
  7. agree
  8. expensive
  9. mortality
  10. security
  11. relevant
  12. connect
  13. wind
  14. pack

25 Clues: dowindpackevenagreetruthbehavenaturallegiblecomforthonestysimilarconnectapproveregularpossiblematuritysecurityrelevantbehaviourexpensivemortalityadvantageprobabilityconvenience

Politics 2016-03-01

Politics crossword puzzle
Across
  1. : an attractive rather than coercive type of power
  2. : using laws to fairly judge and punish crimes and criminals
  3. : Politics as "master scienc"
  4. : ASEAN observer (Acronym)
  5. : evolved as science and art
  6. : another term for "security"
  7. : "city-state"
  8. : defense of the state and its citizens
  9. : quantitative and descriptive approach approach
  10. : persons and institutions that make and enforce laws
Down
  1. : in charge of internal security
  2. : limitation and regulation
  3. : Civil Society Organization
  4. : a subdiscipline of polisci that compares governments and political systems
  5. : International Relations
  6. : a qualitative approach that tries to find out what is best for the people
  7. : power of politicians and individuals to act out law
  8. : the act of influencing the government to do what you want
  9. : the currency of politics
  10. : military or economic type of power

20 Clues: : "city-state": International Relations: ASEAN observer (Acronym): the currency of politics: limitation and regulation: Civil Society Organization: evolved as science and art: Politics as "master scienc": another term for "security": in charge of internal security: military or economic type of power: defense of the state and its citizens...

Fun while you learn. 2020-06-09

Fun while you learn. crossword puzzle
Across
  1. Physiological effect of rapid decompression.
  2. Also called the Silent review.
  3. The flight deck during critical phases.
  4. Mental review, Stop____ Review..
  5. In case of decompression, Put on the nearest Oxygen _ ?
  6. Command “Cabin crew Arm doors for departure and ___ ?
  7. Content of polar kit.
  8. Which crew does transit security search ?
  9. You must check this on a passenger’s boarding card.
  10. One of the hijacker profiles.
  11. Used for pax showing disruptive behavior.
Down
  1. Critical Phases of the flight, “Take off,__,landing.”
  2. This follows, CSD to the flight deck - 2.
  3. Adopt this position to preserve body temperature.
  4. You shout this 30 seconds before crash landing.
  5. Security form used ONLY for outstation.
  6. Decompression is ? ___ of cabin pressure.
  7. Element of fire triangle.
  8. The one who fights the fire.
  9. Command, “ ___initiate controlled disembarkation.”

20 Clues: Content of polar kit.Element of fire triangle.The one who fights the fire.One of the hijacker profiles.Also called the Silent review.Mental review, Stop____ Review..The flight deck during critical phases.Security form used ONLY for outstation.This follows, CSD to the flight deck - 2.Decompression is ? ___ of cabin pressure....

NETWORKING REQUIREMENTS 2024-08-06

NETWORKING REQUIREMENTS crossword puzzle
Across
  1. A negotiator between networks
  2. Relies on a server for services
  3. Common example is connecting a Bluetooth device with smartphone
  4. Devices connected in 1 physical environment
  5. Connects with cables
  6. Communication over a ranged distance
  7. A term for describing hubs and switches
  8. Divided in 7 layers allowing communication
  9. Security that controls input and output limitations
  10. Enables communication between physical devices
  11. Connection of 2 nodes
Down
  1. Technology for the speed of a desktop
  2. Practices to detect unauthorized access
  3. Facilitates communication between networks
  4. The maximum amount of capacity in a network
  5. Coming together for specific tasks
  6. Allows wireless devices to connect to wired networks
  7. Can be connected without cables
  8. Computers are linked by this device
  9. Rules on how data is transmitted

20 Clues: Connects with cablesConnection of 2 nodesA negotiator between networksRelies on a server for servicesCan be connected without cablesRules on how data is transmittedComing together for specific tasksComputers are linked by this deviceCommunication over a ranged distanceTechnology for the speed of a desktopPractices to detect unauthorized access...

spanish 2023-01-27

spanish crossword puzzle
Across
  1. security does this to luggage
  2. not taking off but
  3. getting checked aka
  4. when your getting on the plane
  5. in order to board you have to
  6. the people riding the plane
  7. the person who walks around planes
  8. you go here to get your bags
  9. you have to buy one of these
  10. what takes you from place to place
  11. not landing but
Down
  1. your plan for the trip
  2. what you put all your stuff in
  3. they open the ... to the plane
  4. making sure your flight is still on
  5. they scan your boarding pass on
  6. you take this from place to place
  7. you have to show security this
  8. to go in the air
  9. where you go to get on the plane
  10. what your suitcase is called

21 Clues: not landing butto go in the airnot taking off butgetting checked akayour plan for the tripthe people riding the planeyou go here to get your bagsyou have to buy one of thesewhat your suitcase is calledsecurity does this to luggagein order to board you have towhat you put all your stuff inthey open the ... to the planewhen your getting on the plane...

RCY Marvel Crossword 2022-12-07

RCY Marvel Crossword crossword puzzle
Across
  1. Dr Erik Selvig joined SHIELD to study this
  2. Librarian of Kamar Taj
  3. Dora Milaje Security chief
  4. Co founder of X-Con security
  5. Smallest Avenger
  6. King of Asgard
  7. King Laufeys son
  8. queen of Asgard
  9. Scott Langs cellmate
  10. Avenging archer
  11. Hydra Leader
  12. Scientific sister of Tchalla
  13. Had mind stone in forehead
Down
  1. Helps Howard Stark create SHIELD
  2. Odins oldest child
  3. Military rank held by Nick Fury
  4. one of Thanos adopted children
  5. Friend of Thor
  6. Nickname of Timothy Dugan
  7. Surname of Howard Starks business partner
  8. Assists Thor to defeat Hela
  9. Where Bucky finds sanctuary
  10. Bruce Banners alter ego
  11. First name of agent Natasha Romanoff alias at Stark Industries
  12. SHIELD agent who helped design Capt America shield

25 Clues: Hydra LeaderFriend of ThorKing of Asgardqueen of AsgardAvenging archerSmallest AvengerKing Laufeys sonOdins oldest childScott Langs cellmateLibrarian of Kamar TajBruce Banners alter egoNickname of Timothy DuganDora Milaje Security chiefHad mind stone in foreheadAssists Thor to defeat HelaWhere Bucky finds sanctuaryCo founder of X-Con security...

Cybersecurity Awareness Month 2023 2023-08-29

Cybersecurity Awareness Month 2023 crossword puzzle
Across
  1. The individuals who control access to people, data, and systems
  2. Kwiktrip's password policy requires that coworkers change their passwords __days
  3. You can help fight cybercrime by becoming a __________
  4. What is the common hacking method
  5. These are designed to maintain the security of everyone associated with an organization
  6. This attack occurs when cybercriminals research and track which sites employees visit the most
Down
  1. _____are the last line of defense
  2. Failure to run these equals failure to patch security vulnerabilities
  3. This security tool identified and removes malicious programs
  4. This dangerous attack targets specific people or organization, often with custom made email or messages
  5. Stealing money is the main goal behind this type of malware
  6. Any scenario that triggers emotions should also trigger your ______
  7. This attack occurs when someone sneaks into a secured area behind someone else
  8. What should you do when a workstation or device is no longer in use
  9. The future of security is_____, not machines

15 Clues: _____are the last line of defenseWhat is the common hacking methodThe future of security is_____, not machinesYou can help fight cybercrime by becoming a __________Stealing money is the main goal behind this type of malwareThis security tool identified and removes malicious programsThe individuals who control access to people, data, and systems...

Foreign Policy Making Chapter 18 2025-04-15

Foreign Policy Making Chapter 18 crossword puzzle
Across
  1. is the policy of avoiding involvement in foreign affairs.
  2. North Atlantic Treaty Organization
  3. Fees for importing goods into the United States from other countries.
  4. has the power to declare war and control funding for foreign policy
  5. is a Cold War strategy to stop the spread of communism.
  6. represent the U.S. abroad in negotiations and embassies
  7. Establishment emphasized freedom from military threat and political coercion.
Down
  1. agency that gathers foreign intelligence for National Security in the U.S.
  2. the policy that involves decisions about relations with the rest of the world
  3. hostility between the United States and Soviet Union.
  4. is the policy of becoming involved in foreign affairs
  5. the president, the diplomats, congress, and the national security establishment are all what?
  6. An organization created in 1945 to promote international peace, security, and cooperation.
  7. is the use of violence to demoralize and frighten a country's population or government

14 Clues: North Atlantic Treaty Organizationhostility between the United States and Soviet Union.is the policy of becoming involved in foreign affairsis a Cold War strategy to stop the spread of communism.represent the U.S. abroad in negotiations and embassiesis the policy of avoiding involvement in foreign affairs....

JOBS 2022-04-13

JOBS crossword puzzle
Across
  1. imbianchino
  2. poliziotto
  3. idraulico
  4. parrucchiera
  5. cuoco
  6. pasticciere
  7. giardiniere
  8. muratore
Down
  1. pescatore
  2. fotografo
  3. gommista
  4. guardia di sicurezza
  5. meccanico
  6. pilota
  7. postino
  8. barbiere
  9. elettricista

17 Clues: cuocopilotapostinogommistabarbieremuratorepescatorefotografomeccanicoidraulicopoliziottoimbianchinopasticcieregiardiniereparrucchieraelettricistaguardia di sicurezza

Pre school age shows 2021-08-17

Pre school age shows crossword puzzle
Across
  1. patrol boy and his dogs fight crime and help other people
  2. repair man and tools
  3. the builder guy who builds stuff
  4. boy with friends and family
Down
  1. and friends purple dinosaur
  2. the expolor boots backpack the map also includes Spanish
  3. umzoomi the tiny team who helps kids
  4. chase kids who fight hacker
  5. and friends into the city Dora when she’s a teenager
  6. clues Steve joe use handy dandy notebooks

10 Clues: repair man and toolsand friends purple dinosaurchase kids who fight hackerboy with friends and familythe builder guy who builds stuffumzoomi the tiny team who helps kidsclues Steve joe use handy dandy notebooksand friends into the city Dora when she’s a teenagerthe expolor boots backpack the map also includes Spanish...

Islington Crosswords. 2024-12-15

Islington Crosswords. crossword puzzle
Across
  1. has solved different national and int'l cyber cases
  2. where classes are named after alumni
  3. cozy smaller lecture place
Down
  1. A record of the books you have borrowed
  2. A long-running cinema hall located in Kathmandu, named after a goddess
  3. Pops when heated
  4. Classes named after cities in Nepal
  5. biggest lecture place
  6. holds an old memory of the college

9 Clues: Pops when heatedbiggest lecture placecozy smaller lecture placeholds an old memory of the collegeClasses named after cities in Nepalwhere classes are named after alumniA record of the books you have borrowedhas solved different national and int'l cyber casesA long-running cinema hall located in Kathmandu, named after a goddess

FITE: Technology Terms 2013-05-14

FITE: Technology Terms crossword puzzle
Across
  1. speed of computer
  2. Comcast, xfinity, Dish, etc.
  3. how you behave online
  4. short term storage
Down
  1. an upgrade that lets you have more slots to plug in
  2. another software similar to Powerpoint
  3. another word for online
  4. what you do to give credit to the website,book, author, poet etc.

8 Clues: speed of computershort term storagehow you behave onlineanother word for onlineComcast, xfinity, Dish, etc.another software similar to Powerpointan upgrade that lets you have more slots to plug inwhat you do to give credit to the website,book, author, poet etc.

Les mots-croisés PlayStation #4 2022-08-01

Les mots-croisés PlayStation #4 crossword puzzle
Across
  1. Une ville du futur
  2. S'éloigner en toute hâte
  3. Qui va de côté et d'autre, qui n'est pas fixé
  4. Quand on ne trouve pas son chemin
Down
  1. Suite à une flèche dans le genou nous sommes...
  2. L'antagoniste historique du chien
  3. PlayStation...
  4. Quand on n'est pas à plusieurs

8 Clues: PlayStation...Une ville du futurS'éloigner en toute hâteQuand on n'est pas à plusieursL'antagoniste historique du chienQuand on ne trouve pas son cheminQui va de côté et d'autre, qui n'est pas fixéSuite à une flèche dans le genou nous sommes...

Networking and Cyber Ethics 2025-06-11

Networking and Cyber Ethics crossword puzzle
Across
  1. Sending unwanted emails or advertisements
  2. Speech Avoiding this keeps others safe from harm online
  3. Misleading information shared online
  4. A program designed to harm a computer
  5. Using someone else's work without giving credit
  6. The act of bullying others using digital devices
  7. These guide our behavior on the internet
  8. Taking credit for someone else's work
  9. The illegal copying of software
Down
  1. When someone pretends to be someone else online
  2. A person who uses technology to harm or steal
  3. Making changes to software without permission
  4. Strong word or phrase used to protect accounts
  5. Being honest and fair online
  6. Using fake identity to cheat or harm online users
  7. Using the internet in a respectful and legal way
  8. Keeping your personal data safe
  9. You should always think before you do this on social media
  10. Theft Type of theft involving personal data

19 Clues: Being honest and fair onlineKeeping your personal data safeThe illegal copying of softwareMisleading information shared onlineA program designed to harm a computerTaking credit for someone else's workThese guide our behavior on the internetSending unwanted emails or advertisementsTheft Type of theft involving personal data...

vocabulary unit 11 2024-02-26

vocabulary unit 11 crossword puzzle
Across
  1. rule
  2. safety
  3. landslide
  4. silly
  5. to order
  6. visible
  7. tyrant
  8. sharp
  9. moveable
Down
  1. guide
  2. neighborhood
  3. request
  4. snuggle
  5. choosy
  6. to make sure
  7. sensible

16 Clues: ruleguidesillysharpsafetychoosytyrantrequestsnugglevisibleto ordersensiblemoveablelandslideneighborhoodto make sure

pedro crossword puzzle 2015-04-28

pedro crossword puzzle crossword puzzle
Across
  1. harmful attachment that latches unknowingly to your computer
  2. common place people cyber bullied
Down
  1. only taking a little of someone's work
  2. law to stop people from copying someone else's work
  3. copying word for word
  4. having manners online
  5. people being mean online
  6. a site anyone can edit or express opinion

8 Clues: copying word for wordhaving manners onlinepeople being mean onlinecommon place people cyber bulliedonly taking a little of someone's worka site anyone can edit or express opinionlaw to stop people from copying someone else's workharmful attachment that latches unknowingly to your computer

Encryption 2022-01-10

Encryption crossword puzzle
Across
  1. Decoding machine used at Bletchley Park during
  2. an algorithm for performing encryption and
  3. appear
  4. Type of analysis used to determine how often
Down
  1. Code used during WW1/2 comprising dots and dashes
  2. Organisation responsible for UK cyber defence
  3. Person responsible for the first substitution cipher
  4. an encryption method used by the ancient

8 Clues: appearan encryption method used by the ancientan algorithm for performing encryption andType of analysis used to determine how oftenOrganisation responsible for UK cyber defenceDecoding machine used at Bletchley Park duringCode used during WW1/2 comprising dots and dashesPerson responsible for the first substitution cipher

pretty cute and smart 2025-02-19

pretty cute and smart crossword puzzle
Across
  1. wary
  2. kind
  3. magnetic pull
  4. truth
  5. finish
  6. amie
  7. harsh
  8. study
  9. pastor
  10. hot out
  11. sponge
Down
  1. sing loudly
  2. doorway
  3. risky
  4. people who protect you
  5. another person
  6. drunk
  7. best friends forever
  8. %

19 Clues: %warykindamieriskytruthharshdrunkstudyfinishpastorspongedoorwayhot outsing loudlymagnetic pullanother personbest friends foreverpeople who protect you

Occupations 2021-02-03

Occupations crossword puzzle
Across
  1. Students
  2. Songs
  3. hospital
  4. Security
  5. Tables and dishes
  6. Tools
  7. Cake
Down
  1. Tooth
  2. Trial
  3. Colors
  4. Wood
  5. Kitchen
  6. Fire
  7. Airplane
  8. Car

15 Clues: CarWoodFireCakeToothTrialSongsToolsColorsKitchenStudentshospitalSecurityAirplaneTables and dishes

Heathrow 2025-11-06

Heathrow crossword puzzle
Across
  1. tualett
  2. kõrvaklapid
  3. kõrvatropid
  4. sihtkoht
  5. ratastega kohver
  6. kohver
Down
  1. kaelapadi
  2. pardakaart
  3. rahakott
  4. väljumine, lahkumine
  5. pass
  6. pagas
  7. nimesilt
  8. seljakott
  9. turva

15 Clues: passpagasturvakohvertualettrahakottnimesiltsihtkohtkaelapadiseljakottpardakaartkõrvaklapidkõrvatropidratastega kohverväljumine, lahkumine

Vocabulario 2017-12-03

Vocabulario crossword puzzle
Across
  1. suitcase
  2. son
  3. aisle
  4. to board
  5. luggage
  6. ticket
Down
  1. cousins
  2. flight
  3. airplane
  4. customs
  5. arrival
  6. security
  7. chess
  8. seat
  9. grandson

15 Clues: sonseataislechessflightticketcousinscustomsarrivalluggageairplanesuitcasesecurityto boardgrandson

Profiles 2 text 1 Sandra 2014-12-03

Profiles 2 text 1 Sandra crossword puzzle
Across
  1. varata
  2. liioitella
  3. milloin tahansa
  4. toimittaa
  5. kilpailu
  6. aurinkovoide
  7. esine
  8. elinaika
Down
  1. vastakkainen
  2. matkatavarat
  3. lomakeskus
  4. ulkomailla
  5. varaus
  6. hyttynen
  7. turvallisuus

15 Clues: esinevaratavaraushyttynenkilpailuelinaikatoimittaalomakeskusulkomaillaliioitellavastakkainenmatkatavarataurinkovoideturvallisuusmilloin tahansa

ena2 3-3.1 2025-02-25

ena2 3-3.1 crossword puzzle
Across
  1. ilahtunut
  2. puolestapuhuja
  3. rauha
  4. tasa-arvo
  5. vuosittainen
  6. omistautuminen
  7. viihde
  8. turvallisuus
  9. kiusaaminen
Down
  1. vähäosainen
  2. juhla
  3. delegaatti
  4. muistojuhla
  5. rahat
  6. vuosipäivä

15 Clues: juhlarauharahatviihdeilahtunuttasa-arvodelegaattivuosipäivävähäosainenmuistojuhlakiusaaminenvuosittainenturvallisuuspuolestapuhujaomistautuminen

Digital citizenship 2022-02-16

Digital citizenship crossword puzzle
Across
  1. something you don't share online
  2. a technology device where you can download social media apps
  3. a mode which you can put your account on
  4. something where you can post videos or pictures on
  5. a social media app
  6. a form of communicating to someone
Down
  1. a form of texting
  2. something you leave behind on the internet
  3. something which is private
  4. an app where you can talk to people online
  5. a crime
  6. an app where you can watch videos
  7. people who want information from you

13 Clues: a crimea form of textinga social media appsomething which is privatesomething you don't share onlinean app where you can watch videosa form of communicating to someonepeople who want information from youa mode which you can put your account onsomething you leave behind on the internetan app where you can talk to people online...

CIP,C11-5,2018 2020-10-28

CIP,C11-5,2018 crossword puzzle
Across
  1. responsible for overseeing privacy legislation in a province or territory
  2. oversees provincial licensing
  3. The Insurance ____________ Act gives power to OSFI
  4. measure of financial stability for an insurance company
  5. a type of data breach where personal information is hacked
Down
  1. a condition formed from legislation
  2. supervisor of insurance companies
  3. an insurance company makes money this way
  4. a federal privacy act
  5. foreign insurance companies are regulated at this level of government
  6. files a report with the federal regulator
  7. the regulator in Quebec
  8. a type of computer liability insurance

13 Clues: a federal privacy actthe regulator in Quebecoversees provincial licensingsupervisor of insurance companiesa condition formed from legislationa type of computer liability insurancean insurance company makes money this wayfiles a report with the federal regulatorThe Insurance ____________ Act gives power to OSFI...

Bullying 2024-12-19

Bullying crossword puzzle
Across
  1. The act of copying
  2. Harming another person's reputation
  3. The act of physically harming another person
  4. Provoking or making fun of someone playfully
  5. Using the body or an object to harm others
  6. The act of pushing someone
  7. Using words to threaten, harm, or hurt another person
Down
  1. Use of offensive names
  2. Conversations about people that are not proven to be true
  3. Acting threatening, or frightening another
  4. To hit someone with a closed fist
  5. Abusing and/or insulting another person regularly
  6. Using the internet to bully another person

13 Clues: The act of copyingUse of offensive namesThe act of pushing someoneTo hit someone with a closed fistHarming another person's reputationActing threatening, or frightening anotherUsing the internet to bully another personUsing the body or an object to harm othersThe act of physically harming another personProvoking or making fun of someone playfully...

computer 2023-10-11

computer crossword puzzle
Across
  1. электронное письмо
  2. монитор
  3. флешка
  4. сеть
  5. искать информацию
  6. обмениваться
  7. компьютерная сеть
  8. сведения (информация)
Down
  1. сканер
  2. принтер
  3. ксерокс
  4. коврик для мыши
  5. мышка
  6. ноутбук
  7. безопасность
  8. клавиатура
  9. взламывать

17 Clues: сетьмышкасканерфлешкапринтерксероксноутбукмониторклавиатуравзламыватьбезопасностьобмениватьсяковрик для мышиискать информациюкомпьютерная сетьэлектронное письмосведения (информация)

Sip N Solve 2025-10-26

Sip N Solve crossword puzzle
Across
  1. What Month Is the Groom’s Birthday?
  2. What is the Best Man’s Name?
  3. What Did The Bride Study At University?
  4. What Town Do They Live In?
  5. How Many Venues Did They Visit?
  6. What Month Is The Bride’s Birthday?
  7. Where Did They Go On Their First Holiday Abroad? (Italian City)
  8. Where Did They Get Engaged?
  9. What Number House Do They Live At?
  10. What Trade Does The Groom Work In?
Down
  1. Where Are They Going On Honeymoon?
  2. What is the Groom’s Middle Name?
  3. Who Said ‘I Love You’ First? Bride or Groom?
  4. Groom’s Hobby
  5. What Month Did They Get Engaged?
  6. What is the Maid of Honour’s Name
  7. Bride’s Middle Name?

17 Clues: Groom’s HobbyBride’s Middle Name?What Town Do They Live In?Where Did They Get Engaged?What is the Best Man’s Name?How Many Venues Did They Visit?What is the Groom’s Middle Name?What Month Did They Get Engaged?What is the Maid of Honour’s NameWhere Are They Going On Honeymoon?What Number House Do They Live At?What Trade Does The Groom Work In?...

Praetorian 2020-07-01

Praetorian crossword puzzle
Across
  1. This tool graphs relationships in AD environments
  2. Our Friday retroactive meeting where we take a look at all of the exciting things we accomplished that week
  3. The open source tool that Diana uses to identify flaws in containers
  4. This AWS service sometimes allows you to fetch API credentials from instances
  5. Publicly known exploits and weaknesses often get designated one of these
  6. The protocol used in TLS to exchange keys
  7. Each services team's name starts with this
Down
  1. The cow in the Austin Office is covered with graphics from this song
  2. The reporting CLI tool that allows us to edit reports
  3. Praetorian's product that helps secure our client's software through continuous security analysis
  4. a governance model that helps evaluate cybersecurity practices, establish or improve a cybersecurity program, and inform your security roadmap and buying decisions
  5. Integrating security into the entirety of software's lifetime, from plan to monitor
  6. _SRF
  7. Carbonated yerba mate drink for all your energy needs
  8. New hires build these during their first week at Praetorian

15 Clues: _SRFThe protocol used in TLS to exchange keysEach services team's name starts with thisThis tool graphs relationships in AD environmentsThe reporting CLI tool that allows us to edit reportsCarbonated yerba mate drink for all your energy needsNew hires build these during their first week at Praetorian...

IC3 Lesson 30 Vocabulary 2015-05-18

IC3 Lesson 30 Vocabulary crossword puzzle
Across
  1. Security feature used for larger networks that controls computers from one point
  2. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  4. Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
  5. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
  1. Encrypts the information in an SSL Certificate
  2. Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
  3. Hackers using spyware to control your browser
  4. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
  5. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
  6. A malicious program that records keystrokes
  7. Deciphers the information in an SSL Certificate
  8. A program that hackers use to capture IDs and passwords on a network

13 Clues: A malicious program that records keystrokesHackers using spyware to control your browserEncrypts the information in an SSL CertificateDeciphers the information in an SSL CertificateA program that hackers use to capture IDs and passwords on a networkSecurity feature used for larger networks that controls computers from one point...

Lesson 30 Vocabulary 2015-05-22

Lesson 30 Vocabulary crossword puzzle
Across
  1. A program that hackers use to capture IDs and passwords on a network.
  2. A malicious program that records keystrokes.
  3. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
  4. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  5. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  6. Hackers using spyware to control your browser.
  7. security feature used for larger networks that controls computers from one point.
  8. installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
  9. Encrypts the information in an SSL Certificate.
Down
  1. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
  2. attacks Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  4. Deciphers the information in an SSL Certificate.

13 Clues: A malicious program that records keystrokes.Hackers using spyware to control your browser.Encrypts the information in an SSL Certificate.Deciphers the information in an SSL Certificate.A program that hackers use to capture IDs and passwords on a network.security feature used for larger networks that controls computers from one point....

Theories of global politics 2021-03-24

Theories of global politics crossword puzzle
Across
  1. The word Immanuel Kant used to describe a situation of constant peace
  2. A theory of global politics which emphasises the importance of states cooperating with each other to achieve shared goals
  3. The idea that each state's security and prosperity is now linked to those of others
  4. Council The body within the United Nations with the authority to approve military action against other states
  5. The idea that there is no supreme power to police the global political system
  6. A term to describe realist concerns about security; in the effort to maximise one's own military strength, states encourage their rivals to do the same
Down
  1. Each state has sole power within its own border and no other state should attempt to intervene in their affairs
  2. City in France where the last major climate change agreement was signed.
  3. 46th President of the United States; re-entered the Paris Climate agreement
  4. A non-governmental oganisation concerned with protecting the environment
  5. An intergovernmental organisation concerned with encouraging a free market approach to economic development
  6. 45th President of the United States; withdrew from the Paris climate agreement
  7. A theory of global politics which emphasises each state's desire for power and security

13 Clues: The word Immanuel Kant used to describe a situation of constant peaceCity in France where the last major climate change agreement was signed.A non-governmental oganisation concerned with protecting the environment46th President of the United States; re-entered the Paris Climate agreement...

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord 21CSE492T CYBERCRIMES  AND CYBERSECURITY IV Year / VII Sem  FT3 -17.10.25 SET A Duration :15 mins  Marks:20 crossword puzzle
Across
  1. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  2. Data describing other data, such as timestamps or authors
  3. Firewall type that provides unified policy across distributed networks
  4. Unauthorized email scams that trick users into revealing information
  5. Potential events or circumstances that can cause harm to an organization's assets.
  6. Network tool for capturing and analyzing traffic
  7. A central security resource where multiple virtual traps are monitored (One word).
  8. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  9. Technology used by NGFW to detect and block malware
Down
  1. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  2. An illegal intrusion into a computer system or network
  3. The verification procedure to demonstrate that the network meets security requirements
  4. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  5. Legal process of collecting and analyzing digital evidence
  6. Process of identifying, assessing, and mitigating threats
  7. Malicious software specifically designed to disrupt or damage computer systems
  8. Programs designed to record personal information, typically undesired software
  9. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  10. Software that records keystrokes, potentially capturing sensitive login credentials.
  11. Deceptive emails or messages impersonating trusted entities to steal sensitive information

20 Clues: Network tool for capturing and analyzing trafficTechnology used by NGFW to detect and block malwareAn illegal intrusion into a computer system or networkData describing other data, such as timestamps or authorsProcess of identifying, assessing, and mitigating threatsLegal process of collecting and analyzing digital evidence...

crossword puzzle 2021-05-20

crossword puzzle crossword puzzle
Across
  1. cyber hub is located in
  2. tourism provides changes which causes
  3. teet ka achar is a pickle made from which tree?
  4. women cover their head by
Down
  1. traditional headgear worn by men
  2. old custom of people which is still followed
  3. famous epic mahabharata was written in this state
  4. cultural tourism may effect
  5. famous bird santuary is located in

9 Clues: cyber hub is located inwomen cover their head bycultural tourism may effecttraditional headgear worn by menfamous bird santuary is located intourism provides changes which causesold custom of people which is still followedteet ka achar is a pickle made from which tree?famous epic mahabharata was written in this state

F.P.S digital realities 2023-05-09

F.P.S digital realities crossword puzzle
Across
  1. mix of all online realities
  2. response from and computer application
  3. a virtual model of the users body in VR
  4. a system or environment
Down
  1. mix of two or more elements
  2. nausea or sickness from VR
  3. Extra devices eg headset monster etc.
  4. using game play to help an activity
  5. using a device without your hands

9 Clues: a system or environmentnausea or sickness from VRmix of two or more elementsmix of all online realitiesusing a device without your handsusing game play to help an activityExtra devices eg headset monster etc.response from and computer applicationa virtual model of the users body in VR

F.P.S digital realities 2023-05-09

F.P.S digital realities crossword puzzle
Across
  1. mix of all online realities
  2. response from and computer application
  3. a virtual model of the users body in VR
  4. a system or environment
Down
  1. mix of two or more elements
  2. nausea or sickness from VR
  3. Extra devices eg headset monster etc.
  4. using game play to help an activity
  5. using a device without your hands

9 Clues: a system or environmentnausea or sickness from VRmix of two or more elementsmix of all online realitiesusing a device without your handsusing game play to help an activityExtra devices eg headset monster etc.response from and computer applicationa virtual model of the users body in VR

Engagement Crossword One 2025-11-04

Engagement Crossword One crossword puzzle
Across
  1. Who speaks fluent French?
  2. Who is a football coach?
  3. Who has had two postings in MoD?
  4. Who is on the DDaT/Cyber scheme?
Down
  1. Who does a strategic planning and performance role?
  2. Who is based in the Midlands?
  3. Who currently works in DEFRA?
  4. Who has a desire to learn?
  5. Who used to work in private office?

9 Clues: Who is a football coach?Who speaks fluent French?Who has a desire to learn?Who is based in the Midlands?Who currently works in DEFRA?Who has had two postings in MoD?Who is on the DDaT/Cyber scheme?Who used to work in private office?Who does a strategic planning and performance role?

NATO Crossword 2023-08-04

NATO Crossword crossword puzzle
Across
  1. This ability enables Allied forces and equipment from different countries to work together
  2. This is the section of NATO's founding treaty that explains how new members can join
  3. The overall guiding document for NATO, revised about once a decade, is known as the Strategic ___
  4. PermReps sit on the NAC, or North Atlantic ___
  5. Allies contribute money to fund NATO programs. This is known as ___ funding.
  6. This is one of NATO's closest partners, and its headquarters are right downtown
  7. NATO Air Base Geilenkirchen, Germany is home to 14 of these aircraft, known as NATO's eyes in the sky
  8. US General Christopher Cavoli currently holds this position, the second-highest military position within NATO
  9. This country is an official Invitee, but not yet a member
  10. NATO's current Secretary General is from this country
  11. Last month's NATO Summit took place in this city
  12. Allies pledged to devote this much of their GDP to defense spending
  13. This kind of threat typically does not involve violence, but can include disinformation, interference in politics, and cyber operations
Down
  1. The principle that if one Ally is attacked, all Allies are attacked, is known as ___ defense
  2. He was the first SACEUR, and was later the 34th President of the United States
  3. Countries that wish to join NATO usually, but not always, have a MAP, or Membership ___ Plan
  4. The length statement released at NATO Summits is often called this
  5. This Italian city is home to a NATO military command
  6. NATO's largest partnership group is the Partnership for ___
  7. NATO's maritime security operation in the Mediterranean is called Operation Sea ___
  8. NATO's founding treaty is known as the North Atlantic Treaty or the ___ Treaty
  9. NATO's military headquarters in Mons, Belgium
  10. NATO has led a peace support operation in this country since June 1999
  11. NATO's full name is the North ___ Treaty Organization
  12. This Virginia city is home to Allied Command Transformation (ACT)
  13. All 31 Allies must agree for NATO to do anything. This is known as ___ decision making.

26 Clues: NATO's military headquarters in Mons, BelgiumPermReps sit on the NAC, or North Atlantic ___Last month's NATO Summit took place in this cityThis Italian city is home to a NATO military commandNATO's current Secretary General is from this countryNATO's full name is the North ___ Treaty Organization...

Security Crossword Challenge 2015-02-17

Security Crossword Challenge crossword puzzle
Across
  1. Cash or Valuables in Transit
  2. 7th President of the United States
  3. Funny money
  4. First Ambassador to France
  5. 1st President
  6. Secures your money
  7. 16th President
Down
  1. Taking of items
  2. 3rd President
  3. Unusual Behavior
  4. Director of Security
  5. 7th President
  6. Used to make change
  7. First Secretary of State
  8. Opens many doors
  9. 18th President

16 Clues: Funny money3rd President7th President1st President18th President16th PresidentTaking of itemsUnusual BehaviorOpens many doorsSecures your moneyUsed to make changeDirector of SecurityFirst Secretary of StateFirst Ambassador to FranceCash or Valuables in Transit7th President of the United States

career 2019-01-19

career crossword puzzle
Across
  1. ช่างประปา
  2. นักสืบ
  3. guard ยามรักษาความปลอดภัย
  4. ช่างไฟ
  5. เสมียน
  6. นักบินอวกาศ
  7. ทหาร
  8. ช่างตัดผม
Down
  1. นักเขียน
  2. ช่างถ่ายรูป
  3. หมอฟัน
  4. พ่อครัว
  5. นักเรียน
  6. บรรณาธิการ
  7. doctor หมอตา

15 Clues: ทหารนักสืบช่างไฟหมอฟันเสมียนพ่อครัวนักเขียนนักเรียนช่างประปาช่างตัดผมบรรณาธิการช่างถ่ายรูปนักบินอวกาศdoctor หมอตาguard ยามรักษาความปลอดภัย

career 2019-01-19

career crossword puzzle
Across
  1. ช่างตัดผม
  2. ช่างประปา
  3. ทหาร
  4. หมอฟัน
  5. ช่างไฟ
  6. doctor หมอตา
  7. นักเขียน
  8. guard ยามรักษาความปลอดภัย
  9. พ่อครัว
Down
  1. บรรณาธิการ
  2. ช่างถ่ายรูป
  3. นักบินอวกาศ
  4. นักสืบ
  5. นักเรียน
  6. เสมียน

15 Clues: ทหารนักสืบหมอฟันช่างไฟเสมียนพ่อครัวนักเรียนนักเขียนช่างตัดผมช่างประปาบรรณาธิการช่างถ่ายรูปนักบินอวกาศdoctor หมอตาguard ยามรักษาความปลอดภัย

Block 2 & 4 - Common Words 2014-01-17

Block 2 & 4 - Common Words crossword puzzle
Across
  1. ugly
  2. last name
  3. compare
  4. sound
  5. filled, complete, drunk
  6. pronunciation
  7. ID
  8. how
Down
  1. guy
  2. old
  3. driver's license
  4. social security number
  5. born
  6. girl
  7. first name
  8. spell
  9. cost

17 Clues: IDguyoldhowuglyborngirlcostsoundspellcomparelast namefirst namepronunciationdriver's licensesocial security numberfilled, complete, drunk

Information Security Management System (ISMS) 2014-03-14

Information Security Management System (ISMS) crossword puzzle
Across
  1. HR personnel is assigned to prepare access request for HRIS and ______.
  2. A default folder where essential corporate documents must be stored
  3. ____________is everyone's responsibility
  4. A secret word or phrase that are to be treated as sensitive, confidential information
Down
  1. Signifies that asset is highly confidential/critical
  2. A document that defines the accountability and responsibility of the Asset Owner (custodian) and records the status of the asset.
  3. He signed the Information Security Policy
  4. Is the official name of the repository of ISMS Policies, Standards, Procedures and Guidelines
  5. New program launched in relation to ISMS where updates of which are shown through comic strips.
  6. Strong password should be at least ____ characters long.
  7. Also known as a confidentiality agreement
  8. Information security events or incidents must immediately be reported to____________.
  9. Aspects of Information Security
  10. IT system used when requesting access or raising any IT requests
  11. Recommended action for paper and printed material containing confidential information prior to disposal

15 Clues: Aspects of Information Security____________is everyone's responsibilityHe signed the Information Security PolicyAlso known as a confidentiality agreementSignifies that asset is highly confidential/criticalStrong password should be at least ____ characters long.IT system used when requesting access or raising any IT requests...