cyber security Crossword Puzzles

Crossword Puzzle 2022-11-27

Crossword Puzzle crossword puzzle
Across
  1. The edgier battle star
  2. famous Early 90s Kindergarten teacher
  3. “I see you enjoy Super Mario…”
  4. Your greatest cyber crime
  5. 1988’s olympic winter
  6. “Resident” Albert
  7. Metal Gear character who likes to wrestle senators
  8. An adorable name for Hershey Bars
  9. Your kind of sister
  10. A double entendre TV show
  11. A wholesome healthy breakfast
  12. An 80s themed “Vice” with plenty of white suits
  13. Lost in ’88
Down
  1. Your on a first name basis with this Galactica Admiral
  2. dating sim meets supernatural teen adventure
  3. Being ___ in Detroit is hard
  4. No___ GTA RP
  5. A fun holiday treat
  6. Themed Oreos are highly…
  7. The proper microwave wattage
  8. A rare candy bar
  9. A renowned piece of art
  10. MultiVersus competitor (this clue is sponsored by Chilis)

23 Clues: Lost in ’88No___ GTA RPA rare candy bar“Resident” AlbertA fun holiday treatYour kind of sister1988’s olympic winterThe edgier battle starA renowned piece of artThemed Oreos are highly…Your greatest cyber crimeA double entendre TV showBeing ___ in Detroit is hardThe proper microwave wattageA wholesome healthy breakfast“I see you enjoy Super Mario…”...

Happy Valentines Day! I love you! 2024-02-12

Happy Valentines Day! I love you! crossword puzzle
Across
  1. Something Mia dreams of (NOT adultery)
  2. Mia's favorite thing to see on Duncan's face
  3. Large, glittering, masculine
  4. For intellectual couples
  5. Something Duncan doesn't play with me
  6. Tinned fish for Duncan
  7. Duncan's mistress
  8. Long and short bursts of "I love you"
  9. Special meal first eaten on Cyber Monday
  10. Makes us better
Down
  1. Our first meal together
  2. Dark, night, cold, passive (plural); everyone in Pittsburgh
  3. What not to give a sick man
  4. Something I want to spend on Duncan
  5. Duncan, of Target
  6. something Mia loves to do with her boyfriend
  7. What Duncan claims he is not
  8. A drink that could be found in a china shop
  9. The best thing since Prozac
  10. Concerned with implications
  11. How much I love Duncan, with coffee

21 Clues: Makes us betterDuncan, of TargetDuncan's mistressTinned fish for DuncanOur first meal togetherFor intellectual couplesWhat not to give a sick manThe best thing since ProzacConcerned with implicationsWhat Duncan claims he is notLarge, glittering, masculineSomething I want to spend on DuncanHow much I love Duncan, with coffee...

RUU TNI Resmi jadi Undang-Undang 2025-04-04

RUU TNI Resmi jadi Undang-Undang crossword puzzle
Across
  1. kata 'cyber' dalam B.Indonesia menjadi ...
  2. pangkat dalam TNI dan Polri yang lebih rendah dari Bintara adalah ...
  3. kata kerja dari 'tangan' adalah ...
  4. kata 'article' dalam UU disebut ...
  5. sinonim kata 'pencegahan' adalah ...
  6. persamaan makna dari 'waktu itu' adalah ...
  7. sinonim dari kata 'posisi' dalam pekerjaan adalah ...
  8. kata 'ministry' dalam B.Indonesia adalah ...
  9. pangkat dalam TNI dan Polri yang berada ditengah-tengah ialah ...
  10. kata 'highlights' dalam B.Indonesia adalah ...
  11. sinonim kata 'meresmikan' adalah ...
Down
  1. kata 'secretariat' dalam B.Indonesia menjadi ...\
  2. menjalankan posisi dan tugas juga disebut ...
  3. sinonim kata 'berada dalam' adalah ...(loaded)
  4. kata 'set/define' dalam B.Indonesia adalah ...
  5. kata 'to save/rescue' dalam B.Indonesia adalah ...
  6. sinonim kata 'dasar' adalah ...
  7. kata benda dari 'mengancam' adalah ...
  8. pangkat dalam TNI dan Polri yang lebih tinggi dari bintara adalah ...
  9. sinonim kata dari 'diringkas' adalah ...

20 Clues: sinonim kata 'dasar' adalah ...kata kerja dari 'tangan' adalah ...kata 'article' dalam UU disebut ...sinonim kata 'pencegahan' adalah ...sinonim kata 'meresmikan' adalah ...kata benda dari 'mengancam' adalah ...sinonim kata dari 'diringkas' adalah ...kata 'cyber' dalam B.Indonesia menjadi ...persamaan makna dari 'waktu itu' adalah ......

GE 2025-04-13

GE crossword puzzle
Across
  1. risks of cyber threats and vulnerabilities
  2. gap to emerging technologies
  3. machine learning that perform tasks
  4. Tailored to fit the specific job you are applying
  5. leveraging principles of quantum mechanics
  6. integration of emerging technologies in industries
  7. delivery of computing services over the internet
  8. connects devices to the internet
  9. overlays digital information onto physical world
  10. refers to the innovative advancements in various field
  11. - creates immersive virtual environment
Down
  1. being updated to the innovative ways and effect on industry
  2. effect of innovations in renewable energy
  3. joining professional organization to stay informed about industry developments.
  4. - it refers to the emerging technologies in various field
  5. A distributed ledger technology
  6. advancement in biotech
  7. the purpose of emerging technologies
  8. staying flexible and adapting to changes.
  9. Not necessarily tailored for specific jobs

20 Clues: advancement in biotechgap to emerging technologiesA distributed ledger technologyconnects devices to the internetmachine learning that perform tasksthe purpose of emerging technologies- creates immersive virtual environmenteffect of innovations in renewable energystaying flexible and adapting to changes.risks of cyber threats and vulnerabilities...

Informatika sekarang dan Masa depan 2025-08-26

Informatika sekarang dan Masa depan crossword puzzle
Across
  1. Program berbahaya yang bisa merusak sistem komputer
  2. Ilmu tentang data besar disebut
  3. Teknologi uang digital
  4. Kendaraan tanpa pengemudi
  5. Robot dengan kecerdasan buatan
  6. Aplikasi yang memungkinkan komunikasi tatap muka secara virtual
  7. Proses mengubah data mentah menjadi informasi yang berguna
  8. Alat untuk menghubungkan komputer ke jaringan internet
  9. Jaringan perangkat saling terhubung
  10. Bahasa pemrograman popular dalam pengolahan big data
Down
  1. Sistem yang bisa belajar dari data
  2. Big data tidak akan berguna tanpa analisis
  3. Perangkat wearable yang bisa menghitung langkah kaki dan detak jantung
  4. Sistem keamanan di dunia digital
  5. Jaringan global yang menghubungkan miliaran perangkat diseluruh dunia
  6. Algotitma pembelajaran AI
  7. Konten negatif atau menyesatkan yang sering beredar di sosial media
  8. Penyimpanan data di internet
  9. Penyimpanan dan pemrosesan data besar
  10. Proses mengenali informasi dari data besar

20 Clues: Teknologi uang digitalKendaraan tanpa pengemudiAlgotitma pembelajaran AIPenyimpanan data di internetRobot dengan kecerdasan buatanIlmu tentang data besar disebutSistem keamanan di dunia digitalSistem yang bisa belajar dari dataJaringan perangkat saling terhubungPenyimpanan dan pemrosesan data besarBig data tidak akan berguna tanpa analisis...

CYBAH 2025-07-02

CYBAH crossword puzzle
Across
  1. Program du laddar ner till mobilen
  2. Hemsiodor använder dem för att samla information om di
  3. Person som gör intrång i system
  4. An cyberattack som begränaer tillkommligheten till en tjänst
  5. Skadlig kod som kräver lösensumma
  6. Bluffmail som försöker lura dig att lämna ut information
  7. Skyddar din internettrafik via en säker tunnel
  8. Hemlig kombination för inloggning
  9. Juridiskt skydd för personlig informatio online
  10. Program som upptäcker skadlig kod
  11. Automatisk programkod som kan missbrukas
Down
  1. Prefix som betyder digitalt eller internetrelaterat
  2. Vad står P:et i IP-adress för (svenska ordet)
  3. Plats där du lagrar filer online
  4. Gör information oläslig utan nyckel
  5. Något du bör skydda online
  6. En sort skod man kan skanna med mobilen
  7. Personligt Identifikations Nummer
  8. Skyddar nätverket från obehörig åtkomst
  9. Litet, portabelt lagringsminne

20 Clues: Något du bör skydda onlineLitet, portabelt lagringsminnePerson som gör intrång i systemPlats där du lagrar filer onlineSkadlig kod som kräver lösensummaPersonligt Identifikations NummerHemlig kombination för inloggningProgram som upptäcker skadlig kodProgram du laddar ner till mobilenGör information oläslig utan nyckel...

Managing User Security 2021-09-28

Managing User Security crossword puzzle
Across
  1. the two keys included are Authentication Service exchange and Ticket Granting Service exchange.
  2. essentially a database of the network resources and includes objects such as user and group accounts,computers,servers, and printers.
  3. a user can be granted additional rights to data beyond what is allowed by his or her assigned access level
  4. allows semi-independent systems to work together.
  5. the measurement and analysis of a biological feature.
  6. the point where false rejection rate and false acceptance rate are equal.
Down
  1. it’s based off “what you do” like a pattern or rhythm.
  2. all the areas that give a hacker access to a system.
  3. when biometric credentials are authorized on invalid characteristics.
  4. the process of validating a user.
  5. opposite action denying an authorized biometric credential.
  6. standard authentication protocol on all versions of Microsoft servers when using the Active Directory.
  7. user cycle through different roles.
  8. the process of reducing or eliminating vulnerabilities on a system.

14 Clues: the process of validating a user.user cycle through different roles.allows semi-independent systems to work together.all the areas that give a hacker access to a system.the measurement and analysis of a biological feature.it’s based off “what you do” like a pattern or rhythm.opposite action denying an authorized biometric credential....

ASKING AND GIVING OPINION 2024-07-26

ASKING AND GIVING OPINION crossword puzzle
Across
  1. mata pelajaran
  2. khawatir
  3. ujian
  4. keuangan
  5. keamanan
  6. pendapat
  7. menarik
  8. kejadian
  9. meminta
Down
  1. menimbulkan perdebatan
  2. mengira-ngira/bertanya-tanya
  3. menanyakan
  4. yakin
  5. menyelidiki
  6. keputusan
  7. masalah

16 Clues: yakinujianmasalahmenarikmemintakhawatirkeuangankeamananpendapatkejadiankeputusanmenanyakanmenyelidikimata pelajaranmenimbulkan perdebatanmengira-ngira/bertanya-tanya

Chapter 6 - Network Design Elements 2025-05-21

Chapter 6 - Network Design Elements crossword puzzle
Across
  1. A cloud-based delivery model for security services like antivirus and firewalls.
  2. A cloud model offering virtualized computing resources over the internet.
  3. A network state where a device defaults to open access after failure.
  4. A solution that enforces security policies before allowing network access.
  5. A method of dialing many phone numbers to find modems or unsecured lines.
  6. Impersonating a device's MAC address to bypass security.
  7. An attack that allows access to traffic on other VLANs.
  8. A network design using two firewalls to isolate a DMZ.
Down
  1. A publicly shared list of known cybersecurity vulnerabilities and exposures.
  2. A cloud model providing a platform for developers to build and deploy applications.
  3. A protocol that prevents network loops by managing redundant paths.
  4. A switch memory table that stores MAC-to-port mappings.
  5. A cloud model where applications are delivered over the internet.
  6. An attack that overwhelms a switch's memory with fake MAC addresses.
  7. A one-to-one mapping between a private and public IP address.
  8. A firewall setup with three interfaces: internal, external, and DMZ.
  9. A method that modifies IP addresses to allow private devices to access the internet.
  10. A buffer zone between internal networks and external, untrusted networks.
  11. A type of NAT that maps multiple private IPs to one public IP using port numbers.

19 Clues: A network design using two firewalls to isolate a DMZ.A switch memory table that stores MAC-to-port mappings.An attack that allows access to traffic on other VLANs.Impersonating a device's MAC address to bypass security.A one-to-one mapping between a private and public IP address.A cloud model where applications are delivered over the internet....

Semester Review 2022-12-14

Semester Review crossword puzzle
Across
  1. bonds
  2. HouseNeutrality
  3. of Versailles
  4. of Nations
  5. Stiffens
  6. security
  7. Movement
  8. Speakeasies
  9. on margin
Down
  1. Jungle
  2. Raids
  3. Conservation
  4. Entente
  5. Scare
  6. Service Act
  7. Market

16 Clues: bondsRaidsScareJungleMarketEntenteStiffenssecurityMovementof Nationson marginService ActSpeakeasiesConservationof VersaillesHouseNeutrality

Network Security 2021-03-08

Network Security crossword puzzle
Across
  1. What type of malware is executed through executable files
  2. protects a network from unauthorised access, can be in hardware or software form
  3. A way of hiding incoming and outgoing messages/information from other people
  4. Controls what specific users can and cant do
  5. the intentional or unintentional release of secure or private/confidential information to an untrusted environment
Down
  1. The Process of proving who you are in order to get access to something
  2. A type of malware which is executed through a weakness in the system
  3. Keystroke logging could be used as a type of what malware?
  4. What type of malware deceives the user?

9 Clues: What type of malware deceives the user?Controls what specific users can and cant doWhat type of malware is executed through executable filesKeystroke logging could be used as a type of what malware?A type of malware which is executed through a weakness in the systemThe Process of proving who you are in order to get access to something...

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Programme, die Tastatureingaben mitprotokollieren
  2. Virus, der sich direkt über Netze verbreiten
  3. Übersetzt Passwort fischen Durch gefälschte Mails wird versucht, Zugang zu Passwörtern zu erlangen
  4. Versteckt in einem scheinbar nützlichen Programm
Down
  1. Mobbing mit Hilfe von elektronischen Medien
  2. Datenverarbeitungsregisternummer
  3. Personen die illegal in Computersysteme eindringen und Sicherheitssysteme überwinden
  4. Viren, die als Programm in ein Dokument/ Datei eingebettet sind
  5. Überbegriff für unerwünschte, schädliche Software

9 Clues: DatenverarbeitungsregisternummerMobbing mit Hilfe von elektronischen MedienVirus, der sich direkt über Netze verbreitenVersteckt in einem scheinbar nützlichen ProgrammProgramme, die Tastatureingaben mitprotokollierenÜberbegriff für unerwünschte, schädliche SoftwareViren, die als Programm in ein Dokument/ Datei eingebettet sind...

Computer Security 2024-03-22

Computer Security crossword puzzle
Across
  1. controls flow of network traffic between device and internet
  2. when unauthorized individuals access data
  3. giving of 2 pieces of personal information to access data
Down
  1. detects a physical attribute of an individual allowing/denying them access to data
  2. malware disguised as legitimate sites
  3. converts plaintext into ciphertext and vice versa
  4. detection software which detects malicious activity
  5. consequence of computer misuse
  6. data stored in an alternative location to be recovered

9 Clues: consequence of computer misusemalware disguised as legitimate siteswhen unauthorized individuals access dataconverts plaintext into ciphertext and vice versadetection software which detects malicious activitydata stored in an alternative location to be recoveredgiving of 2 pieces of personal information to access data...

food security 2024-10-17

food security crossword puzzle
Across
  1. - A plant grown by farmers to be eaten.
  2. - This nutrient is found in foods like bread and rice.
  3. - The practice of catching fish for food.
  4. - A place where animals are raised for food, like cows or chickens.
Down
  1. - The type of farming that grows crops without chemicals.
  2. - The storage place where food is kept to be sold or given.
  3. - A place where food is processed and packed before being sent to stores.
  4. - This happens when people do not have enough food to eat.
  5. - The act of distributing food to people in need.

9 Clues: - A plant grown by farmers to be eaten.- The practice of catching fish for food.- The act of distributing food to people in need.- This nutrient is found in foods like bread and rice.- The type of farming that grows crops without chemicals.- This happens when people do not have enough food to eat....

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. which is the crunchy side dish which normally has more oil?
  2. one vegetable in which we should double check while washing
  3. Good vegetable for blood nourishing
  4. Which is Non-healthy material for food wrapping ?
Down
  1. any substance which is added to look food attractive
  2. Reportadely India's less hygienic street food
  3. Which is the natural vegetable for blood sugar control ?
  4. A not so good food item for our tooth health
  5. Which is the most iron rich food ?

9 Clues: Which is the most iron rich food ?Good vegetable for blood nourishingA not so good food item for our tooth healthReportadely India's less hygienic street foodWhich is Non-healthy material for food wrapping ?any substance which is added to look food attractiveWhich is the natural vegetable for blood sugar control ?...

kuis tentang apa aja 2023-01-25

kuis tentang apa aja crossword puzzle
Across
  1. cyber threat
  2. kota besar
  3. platform goyang
Down
  1. belanja online
  2. hari raya imlek

5 Clues: kota besarcyber threatbelanja onlinehari raya imlekplatform goyang

COLSA Capabilities 2023-04-21

COLSA Capabilities crossword puzzle
Across
  1. _________ Information Services
  2. COLSA Headquarters __________, Alabama
Down
  1. System & Software
  2. Cyber and Information _______
  3. ____ Science

5 Clues: ____ ScienceSystem & SoftwareCyber and Information ________________ Information ServicesCOLSA Headquarters __________, Alabama

IS and BC Cross-Up Crossword 2021-10-26

IS and BC Cross-Up Crossword crossword puzzle
Across
  1. This “yummy” treat is generated by a web server and saved to your computer after visiting a website; you can also say no, I’m on a diet.
  2. _______ Authentication requires more than just a password; usually also needs a token or a generated access code or token (two words).
  3. Harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction.
  4. Sending an email, posting photos on a social media site and using your webcam.
  5. Equipment that offers short term protection against power surges and power outages (acronym).
  6. conforming to a rule, such as a specification, policy, standard or law.
  7. Your ________ device often contains more personal information than any other source.
  8. “ This too good to be true email gives off a false sense of ______”.
  9. When calls are made by social engineering, they are called _____ .
  10. A crime where a computer is the object of the crime or is used as a tool to commit an offense.
  11. Where do UTC employee report their ICT issues (three words).
  12. Always _______your computer when you leave your desk.
  13. Facebook and TikTok are types of ________ (two words).
  14. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  15. A major business disruption; the earth moves, shifts and shakes.
  16. Who can be the target of a cyber attack.
  17. Never use your TTUTC________address for personal usage.
  18. Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc; or you could eat it.
  19. A fraudulent email purportedly from a reputable company attempting to get personal information.
  20. You can call 999, 881 or 990 for _______ services.
  21. The designated area at which employees, visitors and contractors assemble if evacuated from their building/site; The promenade for example (two words).
  22. This horse can stampede our security defenses for the bad guys and make us look sheepish too!! (two words).
  23. The address of a webpage. Check the validity of it before clicking on it (acronym).
  24. __________ setting helps control things like your Profile, Contacts, and other information relating to your account.
  25. a malicious party impersonates another device or a user in a network to launch attacks against network hosts, steal data, spread malware, or even bypass access controls.
  26. BCP's main focus is not preventing incidents but rather the __________ from it.
Down
  1. The process of adding allowed programs to a list is called_________.
  2. sometimes you ask me to use my eye or voice or finger to identify or to grant access to systems, devices or data.
  3. __________ Edwards is the Recovery Director and is in charge of BCP.
  4. An asset like other essential business assets in the Corporation.
  5. My nickname is Garbage Pail Kid .I am always _________ searching through trash to retrieve sensitive information (two words).
  6. The staff and the customers are considered.
  7. A technology that allows us to access our files through the internet from anywhere in the world.
  8. A list of entities that are blocked or denied privileges or access.
  9. The art of manipulating people to get access to sensitive information (two words.
  10. Choose a password that is easy for you to ____________ but hard for you someone to guess.
  11. information such as legal documents and contracts must be classified as __________information. - (restricted)
  12. A collection of computers that are controlled on the same network.
  13. A concept where all things are connected to the internet; household items usually (three words).
  14. A piece of code put in to correct an error.
  15. The global system of interconnected computer networks that link billions of devices.
  16. Choose the strongest password is password345 , Passw0rd123, P@$sW0rD32!, Pa$$worD562.
  17. Communication test done by teams to ensure that each person can be reached in the event of an emergency (two words).
  18. The Corporation has a _________policy which states all workspaces must be cleared of sensitive documents if unattended (two words).
  19. someone who seeks and exploits weaknesses in a computer system or computer network.
  20. The UTC hotsite is located here.
  21. Usually comprises the display device of the computer.
  22. Non-ICT Security Incidents such as unauthorized data usage and disclosure must be reported to the ______________ Department (acronym).

48 Clues: The UTC hotsite is located here.Who can be the target of a cyber attack.The staff and the customers are considered.A piece of code put in to correct an error.You can call 999, 881 or 990 for _______ services.Always _______your computer when you leave your desk.Usually comprises the display device of the computer....

Change a nouns into a verb 2023-11-30

Change a nouns into a verb crossword puzzle
Across
  1. success
  2. security
  3. attraction
  4. achievement
  5. madness
  6. distraction
  7. protection
Down
  1. description
  2. conclusion
  3. attention
  4. addition
  5. decision
  6. comparison
  7. collection

14 Clues: successmadnesssecurityadditiondecisionattentionconclusionattractioncomparisonprotectioncollectiondescriptionachievementdistraction

Change a nouns into a verb 2023-11-30

Change a nouns into a verb crossword puzzle
Across
  1. conclusion
  2. addition
  3. success
  4. attraction
  5. achievement
  6. security
Down
  1. protection
  2. comparison
  3. description
  4. decision
  5. collection
  6. distraction
  7. madness
  8. attention

14 Clues: successmadnessadditiondecisionsecurityattentionprotectioncomparisonconclusioncollectionattractiondescriptiondistractionachievement

Herzberg Two factor theory 2023-02-28

Herzberg Two factor theory crossword puzzle
Across
  1. Labour
  2. Laudation
  3. Basic Needs
  4. Germination
  5. Occupation
  6. Procurement
  7. Wage
  8. Overseeing
Down
  1. Power
  2. Head of staff
  3. Reward
  4. Instigators
  5. Psychologist
  6. Thesis
  7. Protection

15 Clues: WagePowerLabourRewardThesisLaudationOccupationOverseeingProtectionInstigatorsBasic NeedsGerminationProcurementPsychologistHead of staff

Technology Collocations 2023-10-18

Technology Collocations crossword puzzle
Across
  1. Denotes the steps and precautions taken to protect computer systems, networks, and data from cyber threats and attacks.
  2. Encompasses devices and systems that enhance the automation, control, and efficiency of various household functions, like lighting, heating, and security.
  3. Involves the process of discovering patterns and information from large sets of data, often used for business intelligence, research, and decision-making.
  4. Involves the use of remote servers on the internet to store, manage, and process data, providing on-demand access to a shared pool of computing resources.
  5. Refers to the latest and most advanced technological innovations or developments. It's often used to describe state-of-the-art products or systems.
  6. Describes the profound and rapid changes brought about by the widespread adoption and integration of digital technology in various aspects of society.
  7. Describes a design or layout of a technological system or device that is easy for users to navigate and understand without much difficulty.
  8. Involves using unique physical or behavioral characteristics, such as fingerprints or facial recognition, to verify and grant access to devices or systems.
Down
  1. Refers to the transfer of information between devices without the need for physical connections, typically using technologies like Wi-Fi or Bluetooth.
  2. Creates a simulated environment that users can interact with, often through the use of specialized headsets and equipment, providing an immersive and artificial experience.
  3. Integrates computer-generated information, such as images or data, into the user's view of the real world, enhancing their perception and interaction with the environment.
  4. Refers to fast and reliable internet connections that enable quick data transfer and efficient online activities.

12 Clues: Refers to fast and reliable internet connections that enable quick data transfer and efficient online activities.Denotes the steps and precautions taken to protect computer systems, networks, and data from cyber threats and attacks....

career 2019-01-19

career crossword puzzle
Across
  1. นักเขียน
  2. นักเรียน
  3. ช่างประปา
  4. นักบินอวกาศ
  5. บรรณาธิการ
  6. ช่างถ่ายรูป
  7. เสมียน
  8. guard ยามรักษาความปลอดภัย
Down
  1. หมอฟัน
  2. ช่างตัดผม
  3. ทหาร
  4. นักสืบ
  5. ช่างไฟ
  6. doctor หมอตา
  7. พ่อครัว

15 Clues: ทหารหมอฟันนักสืบช่างไฟเสมียนพ่อครัวนักเขียนนักเรียนช่างตัดผมช่างประปาบรรณาธิการนักบินอวกาศช่างถ่ายรูปdoctor หมอตาguard ยามรักษาความปลอดภัย

funny stuff for the 8.1 2020-03-02

funny stuff for the 8.1 crossword puzzle
Across
  1. eingängig (Melodie,Slogen)
  2. möglich
  3. Entdeckung
  4. Sender
  5. glänzend
  6. Zutat
  7. Sicherheit
  8. Genehmigung
Down
  1. flamme
  2. vergleichen
  3. Lagerfeuer
  4. unaufhaltsam
  5. Ursache
  6. verbrannt
  7. Dürre

15 Clues: DürreZutatflammeSendermöglichUrsacheglänzendverbranntLagerfeuerEntdeckungSicherheitvergleichenGenehmigungunaufhaltsameingängig (Melodie,Slogen)

IT English Homework 2020-04-20

IT English Homework crossword puzzle
Across
  1. jelkód
  2. zárolt
  3. biometrikus adatok
  4. ujjlenyomat
  5. biztonság
  6. frissítés
Down
  1. hamis
  2. sütik
  3. igazi
  4. támogatás
  5. rendőrség
  6. memória
  7. csaló
  8. ellenőrzés
  9. kicsi programhibák

15 Clues: hamissütikigazicsalójelkódzároltmemóriatámogatásrendőrségbiztonságfrissítésellenőrzésujjlenyomatbiometrikus adatokkicsi programhibák

Chapter 7 Vocab Eng 4 2025-11-17

Chapter 7 Vocab Eng 4 crossword puzzle
Across
  1. clear
  2. plants
  3. height
  4. trip
  5. pure
  6. fancy
  7. security
Down
  1. abundance
  2. tiny
  3. cruuuuuuuzer
  4. sparkle
  5. jack
  6. to the world
  7. barnowl
  8. mustache

15 Clues: tinyjacktrippureclearfancyplantsheightsparklebarnowlmustachesecurityabundancecruuuuuuuzerto the world

Q2 Week 6 Groups 4 and 5 2021-12-08

Q2 Week 6 Groups 4 and 5 crossword puzzle
Across
  1. Being able to do something
  2. More than one familiarity
  3. More than one accuracy
  4. More than one agency
  5. Being exact about something
Down
  1. More than one security
  2. More than one ability
  3. Being familiar with someone or something
  4. Being safe
  5. A type of business

10 Clues: Being safeA type of businessMore than one agencyMore than one abilityMore than one securityMore than one accuracyMore than one familiarityBeing able to do somethingBeing exact about somethingBeing familiar with someone or something

Tecnología 2023-03-22

Tecnología crossword puzzle
Across
  1. message
  2. social-media
  3. device
  4. screen
  5. computer
  6. respond
  7. technology
  8. mail
  9. to enjoy
Down
  1. password
  2. security
  3. risk
  4. to have a good time
  5. access
  6. spend time
  7. send
  8. advice
  9. cell-phone

18 Clues: risksendmaildevicescreenaccessadvicemessagerespondpasswordsecuritycomputerto enjoyspend timetechnologycell-phonesocial-mediato have a good time

CYBERSECURITY AWARENESS - C40 2024-10-22

CYBERSECURITY AWARENESS - C40 crossword puzzle
Across
  1. The process of analyzing systems for vulnerabilities (8 LETTERS)
  2. A program that replicates itself to spread malware (4 LETTERS)
  3. A security method where each user has specific privileges (6 LETTERS)
  4. Cybercriminals often use this method to monitor network activity (8 LETTERS)
  5. Using multiple types of information to verify identity (14 LETTERS)
  6. Security strategy that requires users to change this regularly (8 LETTERS)
Down
  1. Common method used to protect sensitive data (10 LETTERS)
  2. Fake emails claiming to be from trusted sources (8 LETTERS)
  3. A phrase longer than a password for added security (9 LETTERS)
  4. Network of infected computers controlled remotely (6 LETTERS)
  5. Program designed to prevent unauthorized access (8 LETTERS)

11 Clues: Common method used to protect sensitive data (10 LETTERS)Fake emails claiming to be from trusted sources (8 LETTERS)Program designed to prevent unauthorized access (8 LETTERS)Network of infected computers controlled remotely (6 LETTERS)A phrase longer than a password for added security (9 LETTERS)...

Lesson 30 Vocabulary 2015-05-18

Lesson 30 Vocabulary crossword puzzle
Across
  1. Hackers using spyware to control your browser.
  2. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  3. Deciphers the information in an SSL Certificate.
  4. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
  5. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  6. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
Down
  1. Complex and secure,containing at least eight characters and at least one letter,one number,and one special character.
  2. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  3. A malicious program that records keystrokes.
  4. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
  5. Encrypts the information in an SSL Certificate.
  6. A program that hackers use to capture IDs and passwords on a network.
  7. security feature used for larger networks that controls computers from one point.

13 Clues: A malicious program that records keystrokes.Hackers using spyware to control your browser.Encrypts the information in an SSL Certificate.Deciphers the information in an SSL Certificate.A program that hackers use to capture IDs and passwords on a network.security feature used for larger networks that controls computers from one point....

2024 OSCE Scholarship for Peace and Security - Crossword puzzle 2024-11-26

2024 OSCE Scholarship for Peace and Security - Crossword puzzle crossword puzzle
Across
  1. Agreement allowing for the conduct oh short-notice, unarmed, observation flights by its States Parties over the territories of other States Parties
  2. A key OSCE arms control agreement outlining provisions on annual military information exchange among the OSCE participating States
  3. UN Security Council Resolution on Women, Peace and Security (Acronym)
Down
  1. Cornerstone rule guiding OSCE decision-making processes
  2. The world's foremost intergovernmental forum for scientific and technical cooperation in the peaceful use of nuclear energy (Acronym)
  3. UN Security Council Resolution on the non-proliferation of weapons of mass destruction and their means of delivery (Acronym)
  4. Agreement which prohibits the possession of nuclear weapons (Acronym)
  5. The world's largest regional security organization (Acronym)
  6. One of the two fissile materials used in nuclear weapons (Abbreviation)
  7. Synonym for firearms (Acronym)

10 Clues: Synonym for firearms (Acronym)Cornerstone rule guiding OSCE decision-making processesThe world's largest regional security organization (Acronym)Agreement which prohibits the possession of nuclear weapons (Acronym)UN Security Council Resolution on Women, Peace and Security (Acronym)...

Police - Unit 2 2014-09-24

Police - Unit 2 crossword puzzle
Across
  1. Flugzeug
  2. Befehl
  3. verhaften
  4. Polizist
  5. stehlen
  6. Fingerabdruck
  7. Dieb
  8. losgehen
Down
  1. Pistole
  2. Blut
  3. wichtig
  4. einbrechen
  5. Sicherheit
  6. Wache

14 Clues: BlutDiebWacheBefehlPistolewichtigstehlenFlugzeugPolizistlosgehenverhafteneinbrechenSicherheitFingerabdruck

Security Awareness Effectiveness 2021-06-21

Security Awareness Effectiveness crossword puzzle
Across
  1. Don’t share your user
  2. before you throw something in the _____, ask yourself, “Is this something I would give to an unauthorized person or want it to become publicly available?
  3. __________ is making and storing another copy of data
  4. A _____ is a program that can sneak onto your computer – often through an email attachment – and then make copies of itself, quickly using up all available memory
  5. the IT security Policies are uploaded on _______
  6. Facts and statistics collected for reference or analysis.
  7. How to safeguard the information stored in laptop; Keep it ______ , when you are not available at desk.
Down
  1. Smishing is related to _____________
  2. The gaining of unauthorized access to data in a system or computer is __________. Down
  3. ________ is a scam that involves Internet fraudsters who send spam or pop-up messages to get the personal information (credit card numbers, bank account information, Social Security number, passwords, or other sensitive information) from unsuspecting victims
  4. A _______ Password contains at least 3 of the 4 following characters: Lowercase Alpha (e.g. abc), Uppercase Alpha (e.g. ABC), Numeric (e.g. 123), Special/Non-Alphanumeric (e.g. ! $ # %)
  5. Permitted by law is _________
  6. Software ______ is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation software products or unauthorized versions of software products.
  7. 123456 is ___________ password

14 Clues: Don’t share your userPermitted by law is _________123456 is ___________ passwordSmishing is related to _____________the IT security Policies are uploaded on _________________ is making and storing another copy of dataFacts and statistics collected for reference or analysis....

Social Security Terminology 2022-12-02

Social Security Terminology crossword puzzle
Across
  1. When a tic comes through Barcode that someone has this SSI pay status, the SSIF team usually celebrates!
  2. The SSA program that is required to be filed by ABD
  3. The opposite of approved
  4. The agreement signed by clients to "repay" their ABD with SSA earnings
  5. The Social Security _____
  6. The SSA-3373 form is the _____ Report
Down
  1. If someone's claim is denied, they can request this kind of appeal
  2. The SSA-3369 form is the _____ History Report
  3. A lot of claims get denied for "failure to _____"
  4. This State Date Exchange program
  5. This type of appeal goes before an Administrative Law Judge
  6. The highest level of appeal recognized by both SSA and DSHS is the Appeals Council _____
  7. The other program offered by SSA
  8. This is the first level of filing for SSA benefits

14 Clues: The opposite of approvedThe Social Security _____This State Date Exchange programThe other program offered by SSAThe SSA-3373 form is the _____ ReportThe SSA-3369 form is the _____ History ReportA lot of claims get denied for "failure to _____"This is the first level of filing for SSA benefitsThe SSA program that is required to be filed by ABD...

Information Security Awareness 2020-09-24

Information Security Awareness crossword puzzle
Across
  1. What is not allowed in a DNA password?
  2. Best way to keep track of multiple unique passwords?
  3. The data classification for Employee Handbook, internal phone directory?
  4. This is better and harder to crack than a password
  5. How do you think most evil hackers begin to break into a company’s network?
  6. The best response to password Recovery Questions is a
  7. Minimum number of characters for a network password?
  8. What is the default data? classification
  9. Who is responsible for data security?
Down
  1. The type of email to get you to click on a fraudulent link
  2. Disclosing personal member information may be
  3. Someone that follows closely behind you without using their badge?
  4. If I click on a link I believe was malicious I should
  5. This is better and harder to crack than a password
  6. How might someone evil try to get information from you?

15 Clues: Who is responsible for data security?What is not allowed in a DNA password?What is the default data? classificationDisclosing personal member information may beThis is better and harder to crack than a passwordThis is better and harder to crack than a passwordBest way to keep track of multiple unique passwords?...

Security Crossword Challenge 2015-02-17

Security Crossword Challenge crossword puzzle
Across
  1. Cash or Valuables in Transit
  2. 7th President of the United States
  3. Funny money
  4. First Ambassador to France
  5. Director of Security
  6. 1st President
Down
  1. Opens many doors
  2. Taking of items
  3. 3rd President
  4. Unusual Behavior
  5. 18th President
  6. Secures your money
  7. 7th President
  8. Used to make change

14 Clues: Funny money3rd President7th President1st President18th PresidentTaking of itemsOpens many doorsUnusual BehaviorSecures your moneyUsed to make changeDirector of SecurityFirst Ambassador to FranceCash or Valuables in Transit7th President of the United States

Security Crossword Puzzle 2016-09-26

Security Crossword Puzzle crossword puzzle
Across
  1. / Name of the Site Security Supervisor
  2. / GSK to become _________ neutral by 2050
  3. / GSK Value 4: Operate with ___________
  4. / Last name of newly appointed CEO of GSK
  5. / 4141 is the extension for this?
  6. / Using someone else's badge is a _______ violation.
Down
  1. / Someone you register in Passage Point
  2. / GSK Value 1: Be _______ focused
  3. / Place to pick up visitors?
  4. / Last name of the GSK Security Operations Manager
  5. / GSK Value 2: Act with __________
  6. / What should be displayed at all times?
  7. / GSK Value 3: Demonstrate _________ for people
  8. / First name of the Navy Yard Site Director

14 Clues: / Place to pick up visitors?/ GSK Value 1: Be _______ focused/ 4141 is the extension for this?/ GSK Value 2: Act with __________/ Name of the Site Security Supervisor/ Someone you register in Passage Point/ GSK Value 4: Operate with ___________/ What should be displayed at all times?/ GSK to become _________ neutral by 2050...

Safety and Security 2023-11-14

Safety and Security crossword puzzle
Across
  1. ATM check.
  2. where fire extinguisher is located.
  3. drawer counted if gone for _ days.
  4. how to close day with no computer
  5. if away from drawer, it should be?
  6. where first aid kit is located
  7. where we meet in emergency.
Down
  1. medical note required for any work __
  2. radio station that reports closing
  3. what should be posted on the door for emergency closure.
  4. please call if you are more than _ minutes late.
  5. branch will be audited by whom yearly?
  6. record for opening vault.
  7. grants permission to close bank

14 Clues: ATM check.record for opening vault.where we meet in emergency.where first aid kit is locatedgrants permission to close bankhow to close day with no computerradio station that reports closingdrawer counted if gone for _ days.if away from drawer, it should be?where fire extinguisher is located.medical note required for any work __...

Forensic science charlie 2019-09-25

Forensic science charlie crossword puzzle
Across
  1. $27 million - Dollar amount that is written in illegitimate checks every day
  2. forensics - (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.
  3. vouchers/ WIC coupons, Certain bonds, Postage stamps
  4. questioned documents - Checks, Certificates, Wills, Passports, Licenses, Money, Letters, Contracts, Suicide Notes, Receipts, and Even Lottery Tickets
  5. block - Charlie
  6. documents - Any signature, handwriting, typewriting, or other written mark whose source or authenticity is in dispute of uncertain
  7. Spectroscopy - an analytical technique that measures the mass-to-charge ratio of charged particles.
  8. Pressure - Check for pressure on the downward and upward strokes Compare how capital letters are joined to lowercase letters
  9. documents include: - Checks, employment records, legal agreements, licenses, and wills
  10. chemical wash detection systems that change color when a check is altered
  11. analysis comparison - "Learns" to recognize how a person signs; Evaluates speed, pressure, and rhythm of the signatures; Recognizes forgeries by the detection of even slight differences
  12. - A substance that accelerates the rate of a chemical reaction but is not itself permanently changed by the reaction.
  13. - A technique for separating molecules through their migration on a support medium under the influence of an electrical potential
  14. commonly forged today - Currency/paper money, Traveler's checks
  15. resolution borders that are difficult to copy
  16. - writing over top to smear or make original writing unreadable
  17. as well as around the portrait; When the bill is tilted, the number in the lower right-hand corner makes a color shift from copper to green
  18. testing - also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
  19. years - maximum prison term for forgery. Forgery is a federal felony
  20. - a branch of bioscience dealing with the study of the form and structure of organisms and their specific structural features.
  21. case of the 1930s - What was the first known case in which handwriting analysis played a role?
  22. consistency /Ratio - What are the overall height, width, and size of the letters?
  23. composition - the individual chemicals that make up a substance
  24. - any prewritten handwriting samples from a suspect(s)
  25. ninety nine - The year the US Court of Appeals determine that handwriting analysis qualifies as a form of expert testimony
  26. Hat Hackers - are a blend of both black hat and white hat activities. Often, grey hat hackers will look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers will post the newly found exploit online for the world to see.
  27. color patterns on paper
  28. Security Features in US currency - Portrait stands out and appears raised off the paper; Contains clear red and blue fibers woven throughout the bill; Has clear, distinct border edges; Treasury seal is shown with clear, sharp saw-tooth points; Watermark appears on the right side of the bill in the light; The security thread is evident—a thin embedded vertical strip with the denomination of the bill printed in it; There is minute printing on the security
  29. - making, altering, or falsifying a person's signature or any other aspect of a document with the intent to deceive another
  30. Check Techniques - Directly altering a check; intercepting someone's check, altering it, and cashing it; creating forged checks from scratch; by ordering someone else's checks from a deposit slip.
  31. phosphatase - An enzyme found in high concentration in semen.
Down
  1. signature pads - stores handwriting samples in databases
  2. - any long connecting marks and or swooshes added to letters
  3. hat hackers - usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.
  4. - forgery for material gain
  5. analysis - the examination and comparison of questioned documents with known material
  6. taken to prevent check forgery - Chemically sensitive paper
  7. font size requires more ink and makes alterations more difficult
  8. - any extra caricatures or pictures added to words
  9. - When false documents or other items are copied for the purpose of deception
  10. handwriting - handwriting is difficult to disguise and forge
  11. of documents detection - any changes, erasures, or obliterations that may have occurred
  12. hackers (White hat hackers) - White hat hackers choose to use their powers for good rather than evil. Also known as "ethical hackers," white hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.
  13. accounting, forensic accountancy or financial forensics - the specialty practice area of accounting that describes engagements that result from actual or anticipated disputes or litigation.
  14. and personalized handwriting habits - Similar to fingerprints, every person's handwriting is what it is
  15. Fibers - fiber created from natural materials or by chemical processes, a man-made fiber
  16. Habits (aka. Baseline characteristics) - Does the writing tend to follow a straight line, move downward, or move upward? Is it above or below the line?
  17. - a material that changes the color of reflected or transmitted light as the result of wavelength-selective absorption.
  18. Service - the agency that investigates forgery cases
  19. - a computer or computer system intended to mimic likely targets of cyberattacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cybercriminals operate.
  20. - Does the writing tilt to the left or right, or is it straight up and down? Are some letters consistently tilted more or less than others?
  21. - A protein that acts as a catalyst for certain specific reactions.
  22. - Examine the average amount of area between words and letter formation. Are the letters and margins the same/similar? Are the letters equally spaced or crowded?
  23. Chromatography - Dye or ink is applied to filter or chromatography paper placed in a solvent and pigments are separated
  24. Fibers - fiber derived from plants or animals
  25. - A compound capable of donating a hydrogen ion (H+) to another compound.
  26. fibers that glow under different light
  27. Chromatography - a common type of chromatography used in analytical chemistry for separating and analyzing compounds

58 Clues: block - Charliecolor patterns on paper- forgery for material gainfibers that glow under different lightresolution borders that are difficult to copyFibers - fiber derived from plants or animals- any extra caricatures or pictures added to wordsvouchers/ WIC coupons, Certain bonds, Postage stampsService - the agency that investigates forgery cases...

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Programme, die Tastatureingaben mitprotokollieren
  2. Mobbing mit Hilfe von elektronischen Medien
  3. Personen die illegal in Computersysteme eindringen und Sicherheitssysteme überwinden
Down
  1. Übersetzt Passwort fischen Durch gefälschte Mails wird versucht, Zugang zu Passwörtern zu erlangen
  2. Versteckt in einem scheinbar nützlichen Programm
  3. Viren, die als Programm in ein Dokument/ Datei eingebettet sind
  4. Datenverarbeitungsregisternummer
  5. Virus, der sich direkt über Netze verbreiten
  6. Überbegriff für unerwünschte, schädliche Software

9 Clues: DatenverarbeitungsregisternummerMobbing mit Hilfe von elektronischen MedienVirus, der sich direkt über Netze verbreitenVersteckt in einem scheinbar nützlichen ProgrammProgramme, die Tastatureingaben mitprotokollierenÜberbegriff für unerwünschte, schädliche SoftwareViren, die als Programm in ein Dokument/ Datei eingebettet sind...

Food Security 2018-11-08

Food Security crossword puzzle
Across
  1. Inequality "if women had the same access to resources as men" is an example of ________.
  2. one major problem, with only one third of food being consumed.
  3. Disease stress and poor nutrition can lead to this accumulating in families.
  4. Single largest employer in the world.
  5. 281 million undernourished people live on this continent.
Down
  1. Security A condition related to the availability of food, and an individuals accessibility and affordability to it.
  2. Four billion people worldwide have no access to _______.
  3. the world needs to rethink their _______ on how we are growing, sharing and consuming our food.
  4. Programs support your school ___________ to help food security in your community.

9 Clues: Single largest employer in the world.Four billion people worldwide have no access to _______.281 million undernourished people live on this continent.one major problem, with only one third of food being consumed.Disease stress and poor nutrition can lead to this accumulating in families....

Network Security 2024-07-08

Network Security crossword puzzle
Across
  1. Malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
  2. The process of protecting information or data by scrambling it so only those with the key can unscramble it
  3. A malicious computer program which is used to hack into a computer by misleading users as to its true intentions. They are often hidden in downloads such as free online computer games
  4. A simple program made to harm a computer system. It spreads by duplicating and attaching itself to files
  5. A tool that monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it
Down
  1. An attack where a series of a computers repeatedly send requests to a server to overload a system
  2. The process of a user confirming that they are who they say they are on a computer system
  3. Trying to trick someone into giving out information over email
  4. A computer program that makes lots of copies of itself,

9 Clues: A computer program that makes lots of copies of itself,Trying to trick someone into giving out information over emailThe process of a user confirming that they are who they say they are on a computer systemAn attack where a series of a computers repeatedly send requests to a server to overload a system...

Security Crossword 2023-05-18

Security Crossword crossword puzzle
Across
  1. badge color for a NON U.S citizen that requires an escort
  2. who do you email for foreign travel concerns
  3. what visitors must do when they arrive onsite (contains a dash)
  4. the form that is filled out after foreign travel
Down
  1. what you earn when completing this puzzle
  2. when you notify security about a visitor or foreign travel
  3. color badge for U.S citizen no escort required
  4. color badge for visitors that require an escort
  5. who you contact for any security questions, concerns, incidents

9 Clues: what you earn when completing this puzzlewho do you email for foreign travel concernscolor badge for U.S citizen no escort requiredcolor badge for visitors that require an escortthe form that is filled out after foreign travelbadge color for a NON U.S citizen that requires an escortwhen you notify security about a visitor or foreign travel...

Y8 Security 2021-12-15

Y8 Security crossword puzzle
Across
  1. self replicate without any user help meaning they can spread very quickly.
  2. when data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it.
  3. Monitor user actions such as key presses and then send the information back to the hacker
  4. emails that try to trick you into giving away personal information such as bank details
  5. attach themselves to files by copying themselves. They are then spread by users who open them and activate them.
Down
  1. malicious software. A program designed to cause harm to your computer
  2. malware which is disguised as legitimate software
  3. two or more devices connected together
  4. tell the victim their computer has lots of viruses and scare them into paying for the problem to be fixed

9 Clues: two or more devices connected togethermalware which is disguised as legitimate softwaremalicious software. A program designed to cause harm to your computerself replicate without any user help meaning they can spread very quickly.emails that try to trick you into giving away personal information such as bank details...

Food security 2024-12-17

Food security crossword puzzle
Across
  1. Poultry raised for eggs meat and feathers
  2. Small animal raised for meat and fur
  3. Animal raised for wool, meat and milk
  4. Large marsupial
Down
  1. Likes to chase mice
  2. Pollinator that plays a critical role in food production
  3. Has a trunk
  4. Flying mammal
  5. Man's best friend

9 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase miceSmall animal raised for meat and furAnimal raised for wool, meat and milkPoultry raised for eggs meat and feathersPollinator that plays a critical role in food production

Food security 2024-12-18

Food security crossword puzzle
Across
  1. to save food from being wasted.
  2. Niño A weather pattern that can lead to droughts.
  3. a process that turns waste into something that helps plants grow.
  4. You need me to grow plants, but I can be scarce in deserts.
  5. A global issue caused by a lack of food.
Down
  1. am the science of producing food, using land and livestock.
  2. The process of growing plants and raising animals for food. (Agriculture)
  3. The farming method that uses natural fertilizers.
  4. grain that feeds billions of people worldwide, and I grow in flooded fields.

9 Clues: to save food from being wasted.A global issue caused by a lack of food.The farming method that uses natural fertilizers.Niño A weather pattern that can lead to droughts.am the science of producing food, using land and livestock.You need me to grow plants, but I can be scarce in deserts....

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. Food that can be used as a resource or is stored to avoid shortages.
  2. The act of growing enough food for the population in a country.
  3. A key principal in food security: ensuring food is available consistently.
  4. The variety and nutritional quality of food grown or available.
Down
  1. A person or group that grows, produces, or distributes food.
  2. A situation where people do not have enough access to safe and nutritious food.
  3. A system for ensuring everyone has access to adequate and nutritious food.
  4. aid Government program to provide food to those in need.
  5. A key resource used in food production, particularly for crops

9 Clues: aid Government program to provide food to those in need.A person or group that grows, produces, or distributes food.A key resource used in food production, particularly for cropsThe act of growing enough food for the population in a country.The variety and nutritional quality of food grown or available....

Security Password 2025-08-23

Security Password crossword puzzle
Across
  1. What is the name of your favorite musical?
  2. What city was your car stolen in?
  3. What is your maternal grandfather's first name?
Down
  1. What instrument did you inherit from your great grandmother?
  2. What is the name of your best friend from college?
  3. What is your family's favorite NCAA team?
  4. What is the name of your roommate in grad school?
  5. What is your first cats name?
  6. Where did you stay for your first anniversary?

9 Clues: What is your first cats name?What city was your car stolen in?What is your family's favorite NCAA team?What is the name of your favorite musical?Where did you stay for your first anniversary?What is your maternal grandfather's first name?What is the name of your roommate in grad school?What is the name of your best friend from college?...

Software Security 2025-11-01

Software Security crossword puzzle
Across
  1. Isolating system components to contain security breaches.
  2. a power to extend the software on certain implementations considering future growth.
  3. A flaw or weakness that can be exploited to cause harm.
  4. Injection Common attack injecting malicious code into database queries.
Down
  1. Ensuring information is accessible only to authorized users.
  2. arises in software due to uncontrolled expansion in volume and enormous capacity of storage.
  3. The process of verifying the identity of a user or system.
  4. Security model enforcing “no read-up” and “no write-down” rules for confidentiality.
  5. Average time to fix a discovered vulnerability (abbreviation).

9 Clues: A flaw or weakness that can be exploited to cause harm.Isolating system components to contain security breaches.The process of verifying the identity of a user or system.Ensuring information is accessible only to authorized users.Average time to fix a discovered vulnerability (abbreviation)....

MALEWARE 2023-06-19

MALEWARE crossword puzzle
Across
  1. REAPETING SOMETHING TO ANNOY SOMEONE
  2. SPYS ON YOU AND STEALS YOUR PASSWORDS
Down
  1. SPYS ON YOU
  2. HOLDS YOU HOSTAGE ONLINE
  3. ATTAKERS DECIVE POEPLE
  4. SOMEONE HACKS YOU

6 Clues: SPYS ON YOUSOMEONE HACKS YOUATTAKERS DECIVE POEPLEHOLDS YOU HOSTAGE ONLINEREAPETING SOMETHING TO ANNOY SOMEONESPYS ON YOU AND STEALS YOUR PASSWORDS

Cybersecurity Month 2022-10-13

Cybersecurity Month crossword puzzle
Across
  1. ________ Information must be protected from leaks or accidental exposure.
  2. Button in Outlook to report suspicious email or phishing in one click.
  3. _______ Period is the length of time information assets are maintained for an authorized person.
  4. Security _______ is a single or series of unwanted or unexpected information Security Events
Down
  1. What is celebrated in October?
  2. Information is accessible to authorized users.
  3. Information is accurate, complete, and reliable.
  4. Mail that seeks to offer services, products, or advertisements but it could be from either a genuine company or a cybercriminal trying to trick you.
  5. A Security ______ is an identified occurrence within a system, service, or network that may be security relevant.

9 Clues: What is celebrated in October?Information is accessible to authorized users.Information is accurate, complete, and reliable.Button in Outlook to report suspicious email or phishing in one click.________ Information must be protected from leaks or accidental exposure....

Cyber Information 2020-08-10

Cyber Information crossword puzzle
Across
  1. A online app where you post pictures
  2. A belief or opinion generally held about someone
  3. A app that can keep the world open and connected with eachother
  4. A app where you can freely write your opinions
Down
  1. Posting to much information and details online
  2. A app where you talk to people and start streaks with friends
  3. Popular with teenagers, charlie demileo is most popular
  4. A trail of data you create while using the internet

8 Clues: A online app where you post picturesPosting to much information and details onlineA app where you can freely write your opinionsA belief or opinion generally held about someoneA trail of data you create while using the internetPopular with teenagers, charlie demileo is most popularA app where you talk to people and start streaks with friends...

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. the fraudulent paractice of using another persons name
  2. pretending to be someone else and sending or posting material
  3. sharing someone's secrets online
  4. online fights using electronic messages with angry and volgar language
Down
  1. the use of devices to bully someone by sending messages or mean post.
  2. repeatedly sending nasty, mean, and insulting messages
  3. talking someone into revealing secrets and information about themselves online
  4. dissing someone online

8 Clues: dissing someone onlinesharing someone's secrets onlinethe fraudulent paractice of using another persons namerepeatedly sending nasty, mean, and insulting messagespretending to be someone else and sending or posting materialthe use of devices to bully someone by sending messages or mean post....

Cyber bullying 2023-10-31

Cyber bullying crossword puzzle
Across
  1. what you use to browse online
  2. How to stop someone from messaging you
  3. What you use to talk online
  4. Tell the system that this user is bullying you
Down
  1. An effect of being bullied
  2. Talk to a person you trust
  3. Don't pay attention to what they say
  4. Don't share your personal information

8 Clues: An effect of being bulliedTalk to a person you trustWhat you use to talk onlinewhat you use to browse onlineDon't pay attention to what they sayDon't share your personal informationHow to stop someone from messaging youTell the system that this user is bullying you

cyber safety 2025-05-05

cyber safety crossword puzzle
Across
  1. Action taken to block a bully
  2. Device that filters unwanted internet traffic
  3. Software that protects your computer system
  4. Sharing secrets without consent is called
Down
  1. Repeatedly sending cruel online messages
  2. Online act of harming someone's reputation
  3. A fake message to steal data
  4. Keep this private to stay safe online

8 Clues: A fake message to steal dataAction taken to block a bullyKeep this private to stay safe onlineRepeatedly sending cruel online messagesSharing secrets without consent is calledOnline act of harming someone's reputationSoftware that protects your computer systemDevice that filters unwanted internet traffic

Cyber Test 2024-04-10

Cyber Test crossword puzzle
Across
  1. My whole team coming clean
  2. Did I do thaaaaat?
  3. When you see me better cross the street
Down
  1. Get Ready for a whale of a tim
  2. These Dudes is comic relief
  3. And Im the Mother lovin monster
  4. Then go home and write about
  5. Yo Angela whos the boss

8 Clues: Did I do thaaaaat?Yo Angela whos the bossMy whole team coming cleanThese Dudes is comic reliefThen go home and write aboutGet Ready for a whale of a timAnd Im the Mother lovin monsterWhen you see me better cross the street

Cyber Ethics 2025-06-15

Cyber Ethics crossword puzzle
Across
  1. We should avoid clicking on unknown_______.
  2. An illegal intrusion into a computer system or network.
  3. The act of using someone else's original work or thoughts.
  4. A legal right granted by law to the creator for his original work.
Down
  1. The simplest way to prevent plagiarism is through proper_______.
  2. The process of transforming data into an unreadable form.
  3. A digital footprint is also known as a digital________.
  4. The unwanted bulk emails that come from unknown sources.

8 Clues: We should avoid clicking on unknown_______.A digital footprint is also known as a digital________.An illegal intrusion into a computer system or network.The unwanted bulk emails that come from unknown sources.The process of transforming data into an unreadable form.The act of using someone else's original work or thoughts....

CYBER CRIME 2022-10-11

CYBER CRIME crossword puzzle
Across
  1. an expression of intention to damage or to harm
  2. a person who has committed a crime
  3. a type of social engineering attack often used to steal user data
  4. intrusive software that is designed to damage and destroy computers
  5. a horse malware
Down
  1. a verb meaning to gain unauthorized acess into a computer system
  2. the process of proving that something is real
  3. a technique used by hackers to rediredt users to false websites without their knowledge

8 Clues: a horse malwarea person who has committed a crimethe process of proving that something is realan expression of intention to damage or to harma verb meaning to gain unauthorized acess into a computer systema type of social engineering attack often used to steal user dataintrusive software that is designed to damage and destroy computers...

Cyber-Attacks 2022-01-13

Cyber-Attacks crossword puzzle
Across
  1. a spoof or look-alike website
  2. the most common way hackers gain entry to a company's computer network
  3. personally identifiable information
  4. everyone's responsibility to protect company information and assets
Down
  1. an add on to enhance function of browser
  2. software that locks up a computer system and then demands a payment to unlock it
  3. software designed to harm computer
  4. fraudulent emails designed to obtain PII

8 Clues: a spoof or look-alike websitesoftware designed to harm computerpersonally identifiable informationan add on to enhance function of browserfraudulent emails designed to obtain PIIeveryone's responsibility to protect company information and assetsthe most common way hackers gain entry to a company's computer network...

Cyber Wellness 2023-02-01

Cyber Wellness crossword puzzle
Across
  1. Say P____________ things online.
  2. Respect others _O___________
  3. Do not reveal __U______________
Down
  1. Post _P___________ information
  2. Do not reveal __P____________
  3. Do not post S_____________ information online
  4. Respect others _P__________
  5. Say E____________ remarks online
  6. Practice _N____________

9 Clues: Practice _N____________Respect others _P__________Respect others _O___________Do not reveal __P____________Post _P___________ informationDo not reveal __U______________Say P____________ things online.Say E____________ remarks onlineDo not post S_____________ information online

Cyber Safety 2025-06-25

Cyber Safety crossword puzzle
Across
  1. Acronym for Two Factor Authentication
  2. The "Nigerian Prince"
  3. Cyber attackers are looking for and go after ...
  4. Action that follows an email phishing attempt at work
Down
  1. One of the main sources of system vulnerability
  2. State of mind to prevent falling for scams and phishing attempts
  3. Among the most targeted industries for ransomware
  4. Quality of a password that is difficult to hack

8 Clues: The "Nigerian Prince"Acronym for Two Factor AuthenticationOne of the main sources of system vulnerabilityQuality of a password that is difficult to hackCyber attackers are looking for and go after ...Among the most targeted industries for ransomwareAction that follows an email phishing attempt at work...

RU ITEC411 2021-04-12

RU ITEC411 crossword puzzle
Across
  1. Virus that collects passwords, deletes files, and effects millions of computers world wide, usually attacking government agencies/big corporations.
  2. A form of authenticating who you are, by using ones body part.
  3. A form of stealing that usually involves impersonating someone or something.
  4. A kind of malware that does not need to attach itself to another software, but uses exploits in a system to gain access.
  5. Currently, this person is called a _____ because they are trying to steal information via the internet and break into company or personal computer(s), database(s), etc.
  6. Something that you access on the internet, a page of sorts.
  7. A software that is attached to other software, program, picture, etc., that tends to replicates itself.
  8. This is a software or could be a hardware, like a firewall, that looks at incoming transmissions and files to see if they are harmful.
  9. A way of hiding information that you do not want someone knowing, if intercepted.
  10. Preventing someone information that may be viewed as harmful from being seen from the public.
Down
  1. The conduct of a persons character and obligations to others.
  2. A kind of warfare that is virtual.
  3. A kind of software that you need to use in order to use a computer (is booted up automatically when turning on a computer), i.e. Windows, Unix, Linux.
  4. In order to authenticate oneself on the internet the website might have you use ____ authentication in order to better security and verify who you are.
  5. A group of people and how they work together as a society.
  6. Someone that is using a computer is called a what?
  7. A form of testing a network, database, firewall, etc.
  8. A way into a system without having to go through the standard protocols.
  9. A kind of software that looks like the real software you are trying to download, however is actually malware.
  10. A kind of rule that is usually made up the government to try and keep the peace (for the most part).

20 Clues: A kind of warfare that is virtual.Someone that is using a computer is called a what?A form of testing a network, database, firewall, etc.A group of people and how they work together as a society.Something that you access on the internet, a page of sorts.The conduct of a persons character and obligations to others....

Information Technology 2023-05-24

Information Technology crossword puzzle
Across
  1. a person who exploits computer hardware and software for their own purposes
  2. to modify or arrange something so that it works in a certain way
  3. to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
  4. a personal website maintained by an individual
  5. a computer virus that copies its code over and destroys the files of the original data
  6. a set of rules that must be followed for the sake of security
  7. a filter that prevents harmful software from entering a network
  8. a small application that is embedded in a webpage
  9. to make copies
  10. to make sure that it is legitimate
  11. a piece of code that is used to fix a flaw in a computer program
  12. any type of media used on a webpage, including images and videos
  13. the proces of stealing another person’s information and using it for personal gain
  14. how users communicate with a computer
  15. the use of the internet for software and other resources
  16. a collection of icons or pictures that have been organized in a file or page
Down
  1. changing computer to your needs
  2. a measurement of how quickly a computer works
  3. device that converts mechanical information into electronic signals
  4. the company that produces Macs and other computing products
  5. a software that keeps a computer safe from threats such as computer viruses and cyber crimes
  6. tricking people into giving information through email
  7. to work at a location away from a main office by using technology
  8. a word or phrase that makes a computer perform an operation
  9. a person who uses computers and the internet to commit crimes
  10. a filter that prevents harmful softaware from leaving a network
  11. a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
  12. using a legitimate-looking website to trick people
  13. a program that restricts access on a network
  14. an action that results in the loss of another person’s property

30 Clues: to make copieschanging computer to your needsto make sure that it is legitimatehow users communicate with a computera program that restricts access on a networka measurement of how quickly a computer worksa personal website maintained by an individuala small application that is embedded in a webpageusing a legitimate-looking website to trick people...

FITAVocab.CLK 2013-05-15

FITAVocab.CLK crossword puzzle
Across
  1. society designed to inform people about internet safety and security
  2. electronic technology
  3. unit to measure speed of signaling or data transfer
  4. Comcast;Xfinity
  5. arrangement of data
  6. port to connect peripherals to a computer
  7. document or file with special format
  8. device that sends data to a computer
  9. type of port to connect mouse or keyboard to a PC
  10. 8 bits
  11. processes hardware instructions
  12. main circuit board
  13. "I'm lovin' it!"
  14. symbol designed for recognition
  15. slot to slide in cds and other discs
  16. data delivered to a computer
  17. data delivered from a computer
  18. quoting on an authoritative source
  19. oath taken by a person before undertaking the duties of an office
  20. quantity of storage in computers
  21. to start up
  22. sequence of instructions to be completed by a computer
  23. flash drive; earbuds
  24. rules and behaviors designed to keep individuals safe when online
Down
  1. relating to computer or computer networks
  2. cords
  3. program that searches for documents
  4. bring in and start anew
  5. amount your computer can hold
  6. delivers information to a computer
  7. internet "hosting" service that allows you to make your own website
  8. wireless networking technology that connects other wireless electronic devices
  9. preview of file or page
  10. collection of software that directs a computer's operations
  11. way in which parts of something are laid out
  12. port to connect to the internet
  13. data transmission in which a single wire can carry several channels at one time
  14. protecting information on computer systems/networks
  15. Dogpile;Ixquick
  16. slot that allows you to add more plugins
  17. program designed to do a certain function
  18. ID with 32 characters used for naming wireless networks
  19. port to connect audio devices to a computer
  20. area network that uses high frequency radio signals to transmit and receive data
  21. a computer's main storage device that stores all your files
  22. collection of related data stored on your computer or other storage device
  23. code of conduct one uses online

47 Clues: cords8 bitsto start upComcast;XfinityDogpile;Ixquick"I'm lovin' it!"main circuit boardarrangement of dataflash drive; earbudselectronic technologybring in and start anewpreview of file or pagedata delivered to a computeramount your computer can holddata delivered from a computerport to connect to the internetprocesses hardware instructions...

Computer criminals - types and what they do/how they operate 2016-09-07

Computer criminals - types and what they do/how they operate crossword puzzle
Across
  1. gaining illegal or unauthorized access to a file, computer or network.
  2. When hackers threaten or harm a website, server, or a computer system using denial of service (DOS)
  3. Spamming It refers to the use of electronic messaging systems to send unsolicited messages to users
  4. attack to commit a Cyber Crime can be called as a Cyber Attack
  5. crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data
  6. The process of making, adapting, or imitating objects, statistics, or documents, with the intent to deceive
Down
  1. E-mail fishing for personal and financial information disguised as legitimate business e-mail
  2. False websites that fish for personal and financial information by planting false URLs in Domain Name Users
  3. Theft It is one of the most serious frauds as it involves stealing money and obtaining other benefits with the use of a false identity
  4. as actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.

10 Clues: attack to commit a Cyber Crime can be called as a Cyber Attackgaining illegal or unauthorized access to a file, computer or network.E-mail fishing for personal and financial information disguised as legitimate business e-mailWhen hackers threaten or harm a website, server, or a computer system using denial of service (DOS)...

Bonds 2014-05-02

Bonds crossword puzzle
Across
  1. The price at which a seller is prepared to sell a security at a particular time.
  2. Unable to pay debts.
  3. Businesses that buy and sell securities.
  4. The price at which a buyer is prepared to buy a security at a particular time.
  5. People or institutions to whom money is owed.
  6. Payments by companies to their shareholders.
Down
  1. Funds operated by investment companies that invest people’s money in various assets.
  2. The length of time for which a bond is issued (until it is repaid).
  3. The amount of capital making up a bond or other loan.
  4. Funds that invest money that will be paid to people after they retire from work.
  5. The amount of interest that a bond pays.
  6. Part ownership of a company in the form of stocks or shares.
  7. The rate of income an investor receives from a security.

13 Clues: Unable to pay debts.Businesses that buy and sell securities.The amount of interest that a bond pays.Payments by companies to their shareholders.People or institutions to whom money is owed.The amount of capital making up a bond or other loan.The rate of income an investor receives from a security....

End-of-Semester Crossword 2023-01-24

End-of-Semester Crossword crossword puzzle
Across
  1. novelas, soap operas can be this
  2. the Monday after Thanksgiving
  3. Every Wednesday is ___ Day
  4. The pilgrims arrived on this ship
  5. Teacher Neil's favorite drink
  6. Argentina won the ___ Cup.
  7. I need to give __ smoking!
  8. His car had a __-n-run in October
  9. (idiom) ___ in the oven (pregnant)
  10. MLK was a ___ Rights Leader.
  11. the British word for 'fall' season
Down
  1. similar to goal, made on NYE
  2. another word for cheesy, silly, dumb
  3. We changed the clocks in Nov. "Fall ___"
  4. "And then a __ comes along, w/ the strength.."
  5. The Tuesday after Thanksgiving
  6. (idiom) turn over a new ___. (new beginning)
  7. Most people have bad ___
  8. The __ New Year started on Sunday.
  9. Being a lazy, you're a couch ___.
  10. the Friday before Thanksgiving

21 Clues: Most people have bad ___Every Wednesday is ___ DayArgentina won the ___ Cup.I need to give __ smoking!similar to goal, made on NYEMLK was a ___ Rights Leader.the Monday after ThanksgivingTeacher Neil's favorite drinkThe Tuesday after Thanksgivingthe Friday before Thanksgivingnovelas, soap operas can be thisThe pilgrims arrived on this ship...

Conspiracy theories 2022-11-02

Conspiracy theories crossword puzzle
Across
  1. to keep a secret, to lie ....
  2. fit in, mix, merge, blend in
  3. a concept, a thought
  4. the killing of 6 million jews across Europe from 1941 to 1945
  5. the I in CIA
  6. first man to walk on the moon, Neil ........
  7. shady, dim, sunless
  8. another name for covid-19
  9. keep an eye on, surveil, tail
  10. princess ........ she was killed in a car crash in Paris in 1997
Down
  1. secret, confidential
  2. some people believe that the earth is .......
  3. a US president who was assassinated
  4. the f in FBI
  5. secret organization, secret club or secret .........
  6. falsify, fabricate, bluff
  7. when someone is very happy, we say he is over the ......
  8. doubt, uncertainty
  9. a digital attack, a ....... attack
  10. ........ 51
  11. extraterrestrial, unearthly

21 Clues: ........ 51the f in FBIthe I in CIAdoubt, uncertaintyshady, dim, sunlesssecret, confidentiala concept, a thoughtfalsify, fabricate, bluffanother name for covid-19extraterrestrial, unearthlyfit in, mix, merge, blend into keep a secret, to lie ....keep an eye on, surveil, taila digital attack, a ....... attacka US president who was assassinated...

Love Story 2024-12-10

Love Story crossword puzzle
Across
  1. Pines Party 2024
  2. Bathroom funny business
  3. Chicks
  4. Serenades in the park
  5. Make believe pig skin
  6. Rabbits' favorite pastry
  7. Food Market or comedienne
  8. If my priest had a spouse
  9. family pet cyber thief
  10. Julia Louis-Meyer
  11. Don't feed the swines
  12. Scalding rubadub
  13. FL, 33301
  14. School Shooting Romance
  15. Margaret Rhymes
  16. Puzzles by the pool
Down
  1. It's not rice in the hourglass, it's ...
  2. Summer kickoff weekend
  3. Beach chouxs
  4. Cooking in the nude
  5. Fly Like R Kelly
  6. White trash beauty pageant
  7. Up the bean stalk to meet them
  8. Flames on barrier sand
  9. Maple Leaves & Gaslighters
  10. 2 with red noses dance to horse meat
  11. Singing feng shui money plant
  12. Indoor galaxies
  13. White claws without a couch

29 Clues: ChicksFL, 33301Beach chouxsIndoor galaxiesMargaret RhymesPines Party 2024Fly Like R KellyScalding rubadubJulia Louis-MeyerCooking in the nudePuzzles by the poolSerenades in the parkMake believe pig skinDon't feed the swinesSummer kickoff weekendFlames on barrier sandfamily pet cyber thiefBathroom funny businessSchool Shooting Romance...

Appian Developer 2022-11-07

Appian Developer crossword puzzle
Across
  1. An Appian object that stores an expression to be called from other expressions
  2. Configuration option that indicates a processes relative importance over other processes
  3. An Appian object that is a focused work environment for their user
  4. links to process models the user can start directly from a record
  5. Role assigned to the user who starts a given process
  6. the underlying technology that powers Appian Interfaces
  7. An Appian object that stores connection info for an external system
  8. An interface for feeds, tasks, and actions that is available to all Appian users
  9. links to process models the user can start directly from the record list
  10. An object in the process modeler that represents a step in a process
Down
  1. The type of security role given to a user that includes all possible permissions
  2. A specific type of variable that is only available in the context in which it is defined
  3. An Appian object that allows you to create a collection of users with security permissions
  4. An Appian object that connects Appian to external relational databases
  5. A general term for all components that make up the end user experience
  6. any individual who can access and use any of the Appian interfaces
  7. A category of process model nodes which evaluate criteria to determine paths to follow
  8. A type of security role where the user can view and modify the object, but not edit security
  9. A column in a data table that provides a link between data in two tables
  10. Confirmation that an extracted piece of data is correct
  11. A series of tasks linked together to create a wizard which a user can navigate
  12. A user interface component that allows the user to make a binary choice 'yes' or 'no'
  13. A response that occurs when a task is delayed

23 Clues: A response that occurs when a task is delayedRole assigned to the user who starts a given processConfirmation that an extracted piece of data is correctthe underlying technology that powers Appian Interfaceslinks to process models the user can start directly from a recordany individual who can access and use any of the Appian interfaces...

RU ITEC411 2021-04-12

RU ITEC411 crossword puzzle
Across
  1. Preventing someone information that may be viewed as harmful from being seen from the public.
  2. A kind of warfare that is virtual.
  3. A form of testing a network, database, firewall, etc.
  4. Virus that collects passwords, deletes files, and effects millions of computers world wide, usually attacking government agencies/big corporations.
  5. A way into a system without having to go through the standard protocols.
  6. Currently, this person is called a _____ because they are trying to steal information via the internet and break into company or personal computer(s), database(s), etc.
  7. A form of authenticating who you are, by using ones body part.
  8. A kind of software that looks like the real software you are trying to download, however is actually malware.
  9. A software that is attached to other software, program, picture, etc., that tends to replicates itself.
Down
  1. Something that you access on the internet, a page of sorts.
  2. A group of people and how they work together as a society.
  3. Someone that is using a computer is called a what?
  4. In order to authenticate oneself on the internet the website might have you use ____ authentication in order to better security and verify who you are.
  5. A kind of malware that does not need to attach itself to another software, but uses exploits in a system to gain access.
  6. A kind of software that you need to use in order to use a computer (is booted up automatically when turning on a computer), i.e. Windows, Unix, Linux.
  7. A way of hiding information that you do not want someone knowing, if intercepted.
  8. The conduct of a persons character and obligations to others.
  9. A kind of rule that is usually made up the government to try and keep the peace (for the most part).
  10. A form of stealing that usually involves impersonating someone or something.
  11. This is a software or could be a hardware, like a firewall, that looks at incoming transmissions and files to see if they are harmful.

20 Clues: A kind of warfare that is virtual.Someone that is using a computer is called a what?A form of testing a network, database, firewall, etc.A group of people and how they work together as a society.Something that you access on the internet, a page of sorts.The conduct of a persons character and obligations to others....

INNOVATION & RESPONSABILITY 2024-09-04

INNOVATION & RESPONSABILITY crossword puzzle
Across
  1. / Things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet.
  2. / Technology that proposes to improve capacity and productivity by changing or increasing the normal ranges of human function, through the restoration or extension of human physical, intellectual and social capabilities.
  3. / The process of performing a scientific procedure, especially in a laboratory, to determine something.
  4. / Work directed towards the innovation, introduction, and improvement of products and processes.
  5. / The process of generating a genetically identical copy of a cell or an organism.
  6. / The use of biology to develop new products, methods and organisms intended to improve human health and society.
  7. / A government authority or licence conferring a right or title for a set period, especially the sole right to exclude others from making, using, or selling an invention.
  8. / A rule or directive made and maintained by an authority.
  9. / A sudden advance especially in knowledge or technique.
  10. / Chat GPT is one of them.
Down
  1. / The branch of science and engineering devoted to designing, producing, and using structures, devices, and systems by manipulating atoms and molecules
  2. / A branch of artificial intelligence (AI) and computer science that focuses on the using data and algorithms to enable AI to imitate the way that humans learn, gradually improving its accuracy.
  3. / A machine resembling a human being and able to replicate certain human movements and functions automatically.
  4. / Creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.
  5. / Adaptation of a system, process, etc. to be operated with the use of computers and the internet.
  6. / A genetically modified organism
  7. / The simulation of human intelligence processes by machines, especially computer systems.
  8. / The study of the complete set of DNA (including all of its genes) in a person or other organism.
  9. / The process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and supporting decision-making.
  10. / A person recognising the value of liveable environments for humans and nature.

20 Clues: / Chat GPT is one of them./ A genetically modified organism/ A rule or directive made and maintained by an authority./ A sudden advance especially in knowledge or technique./ A person recognising the value of liveable environments for humans and nature./ The process of generating a genetically identical copy of a cell or an organism....

2 2023-05-24

2 crossword puzzle
Across
  1. the company that produces Macs and other computing products
  2. the use of the internet for software and other resources
  3. a word or phrase that makes a computer perform an operation
  4. a small application that is embedded in a webpage
  5. changing computer to your needs
  6. to make copies
  7. any type of media used on a webpage, including images and videos
  8. a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
  9. an action that results in the loss of another person’s property
  10. a filter that prevents harmful software from leaving a network
  11. a person who exploits computer hardware and software for their own purposes
  12. a software that keeps a computer safe from threats such as computer viruses and cyber crimes
  13. tricking people into giving information through email
Down
  1. to modify or arrange something so that it works in a certain way
  2. a measurement of how quickly a computer works
  3. device that converts mechanical information into electronic signals
  4. how users communicate with a computer
  5. a personal website maintained by an individual
  6. to work at a location away from a main office by using technology
  7. a computer virus that copies its code over and destroys the files of the original data
  8. a piece of code that is used to fix a flaw in a computer program
  9. a filter that prevents harmful software from entering a network
  10. a program that restricts access on a network
  11. to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
  12. the proces of stealing another person’s information and using it for personal gain
  13. a person who uses computers and the internet to commit crimes
  14. using a legitimate-looking website to trick people
  15. a set of rules that must be followed for the sake of security
  16. a collection of icons or pictures that have been organized in a file or page
  17. to make sure that it is legitimate

30 Clues: to make copieschanging computer to your needsto make sure that it is legitimatehow users communicate with a computera program that restricts access on a networka measurement of how quickly a computer worksa personal website maintained by an individuala small application that is embedded in a webpageusing a legitimate-looking website to trick people...

G8 CrossWord 2013-01-14

G8 CrossWord crossword puzzle
Across
  1. Can't_host_G8_meetings
  2. A_major_concern_at_G8
  3. Location_of_first_G8
  4. The_8th_country_added_to_G8
  5. Large_South_American_Economy_not_in_G8
  6. Common_issue_discussed
  7. Hosted_2007_G8
Down
  1. Large_Asian_Economy_not_in_G8
  2. Leader_who_did_not_attend_2012_G8
  3. Average_number_of_days_of_G8_meetings
  4. Next_host_of_G8
  5. First_North_American_Country_in_G8
  6. Only_Asian_Country
  7. The_7th_country_added_to_G8

14 Clues: Hosted_2007_G8Next_host_of_G8Only_Asian_CountryLocation_of_first_G8A_major_concern_at_G8Can't_host_G8_meetingsCommon_issue_discussedThe_7th_country_added_to_G8The_8th_country_added_to_G8Large_Asian_Economy_not_in_G8Leader_who_did_not_attend_2012_G8First_North_American_Country_in_G8Average_number_of_days_of_G8_meetings...

Airports 2020-03-07

Airports crossword puzzle
Across
  1. 4
  2. 7
  3. 1
  4. 9
  5. 6
  6. 13
  7. 2
  8. 8
  9. 12
Down
  1. 11
  2. 5
  3. 14
  4. 3
  5. 10

14 Clues: 4571936281114131012

Career English 1과 2021-03-30

Career English 1과 crossword puzzle
Across
  1. 유대감
  2. 난민
  3. 귀중한
  4. 인정
  5. 보장,안정감
  6. 희생자
  7. 영구적인
  8. 간헐적인
  9. 예산
Down
  1. 청소년기
  2. 자격
  3. 존엄성
  4. 변호사
  5. 희생하다

14 Clues: 자격난민인정예산유대감귀중한존엄성변호사희생자청소년기희생하다영구적인간헐적인보장,안정감

Mots croisés Cyber 2024-02-01

Mots croisés Cyber crossword puzzle
Across
  1. Vérification de l'identité.
  2. Outil de sécurité qui crée une connexion sécurisée et cryptée entre vous et Internet (acronyme).
  3. Comportement menaçant facilité par des moyens électroniques tels que les SMS.
  4. Type de logiciel malveillant conçu pour bloquer l'accès à un système informatique jusqu'à ce qu'une somme d'argent soit payée
  5. Une norme de technologie sans fil utilisée sur de courtes distances utilisant des ondes radio UHF de courte longueur d’onde.
  6. Technologie de réseau domestique largement utilisée qui permet une connexion sans fil avec l’interface Internet.
Down
  1. Le processus consistant à prendre du texte brut et à le brouiller dans un format illisible.
  2. Accès non autorisé à un réseau, à des systèmes d'information ou à une application.
  3. L'adresse d'une page Web. Vérifiez sa validité avant de cliquer dessus.
  4. Matériel ou logiciel conçu pour empêcher tout accès non autorisé vers ou depuis un réseau privé
  5. Une faille ou une faiblesse dans un système informatique qui pourrait être exploitée pour violer la sécurité du système.
  6. Un e-mail frauduleux provenant prétendument d'une entreprise réputée tentant d'obtenir des informations personnelles.

12 Clues: Vérification de l'identité.L'adresse d'une page Web. Vérifiez sa validité avant de cliquer dessus.Comportement menaçant facilité par des moyens électroniques tels que les SMS.Accès non autorisé à un réseau, à des systèmes d'information ou à une application.Le processus consistant à prendre du texte brut et à le brouiller dans un format illisible....

Cad Abbreviations 2023-12-27

Cad Abbreviations crossword puzzle
Across
  1. security
  2. traffic
  3. supervisor
  4. last seen wearing
  5. on the phone
  6. number
  7. occupied
  8. on scene
  9. business
Down
  1. accident
  2. Suspect
  3. between
  4. In Front of
  5. voicemail
  6. location
  7. possibly
  8. methed of travel
  9. unknown
  10. no further information

19 Clues: numberSuspectbetweentrafficunknownaccidentsecuritylocationpossiblyoccupiedon scenebusinessvoicemailsupervisorIn Front ofon the phonemethed of travellast seen wearingno further information

crossword 2025-10-27

crossword crossword puzzle
Across
  1. Engineering
  2. Marketing Director
  3. Activities Director
  4. Graphic Design
  5. Spanish
  6. Ivrit
  7. AP English
  8. Associate Principal
  9. Lab
  10. Israel Guidance
Down
  1. Art
  2. Principal
  3. Gym
  4. History
  5. Security
  6. College Guidance
  7. 9th Grade Biology
  8. Rambam
  9. Admissions Coordinator

19 Clues: ArtGymLabIvritRambamHistorySpanishSecurityPrincipalAP EnglishEngineeringGraphic DesignIsrael GuidanceCollege Guidance9th Grade BiologyMarketing DirectorActivities DirectorAssociate PrincipalAdmissions Coordinator

KUIS P5 BANGUNLAH JIWA DAN RAGANYA 2025-01-15

KUIS P5 BANGUNLAH JIWA DAN RAGANYA crossword puzzle
Across
  1. Perundungan melalui media sosial disebut ... bullying
  2. Jenis olahraga yang membutuhkan kecepatan dan keserasian gerakan fisik yang teratur
  3. Contoh makanan yang mengandung protein hewani
  4. Kegiatan untuk menjaga kesehatan dan kebugaran tubuh
  5. Memukul termasuk dalam jenis perundungan ...
  6. Anjuran makan ... kali sehari
  7. Contoh makanan yang mengandung protein nabati
  8. Karbohidrat selain nasi
Down
  1. Untuk menjaga kesehatan tubuh, harus makan makanan bergizi ...
  2. Istilah lain dari makanan cepat saji
  3. Buah dan sayur merupakan jenis makanan yang mengandung ...
  4. Cabang olahraga dengan gerakan mengikuti musik disebut senam ...
  5. Karakter yang kita pelajari dari kegiatan senam
  6. Di dalam tubuh yang sehat, terdapat jiwa yang ...

14 Clues: Karbohidrat selain nasiAnjuran makan ... kali sehariIstilah lain dari makanan cepat sajiMemukul termasuk dalam jenis perundungan ...Contoh makanan yang mengandung protein hewaniContoh makanan yang mengandung protein nabatiKarakter yang kita pelajari dari kegiatan senamDi dalam tubuh yang sehat, terdapat jiwa yang ......

French words 2023-04-14

French words crossword puzzle
Across
  1. cash
  2. cue/line
  3. suitcase
  4. bed
  5. baggage
  6. strike
  7. tip
  8. customs
  9. on foot
  10. ticket
  11. castle
  12. post office
Down
  1. car
  2. people
  3. menu
  4. taxi
  5. palace
  6. cathedral
  7. passport
  8. guide
  9. stamp
  10. boat
  11. security
  12. consultant
  13. subway

25 Clues: carbedtipmenucashtaxiboatguidestamppeoplepalacestriketicketsubwaycastlebaggagecustomson footcue/linesuitcasepassportsecuritycathedralconsultantpost office

GSCP 3rd Activities - Key Management 2025-11-04

GSCP 3rd Activities - Key Management crossword puzzle
Across
  1. What was the topic of the second Global Security Culture Program campaign?
  2. The primary purpose of the red zone is to protect what?
  3. Security measure distributed based on roles and business justification.
  4. An alarm that will be triggered when someone opens a door without receiving "access granted" (green light).
  5. Security Zone that is inside the fence line, outside the building.
Down
  1. What type of connector is used as a safety mechanism for lanyards?
  2. How are Media Bin Keys classified in the Key Risk Matrix?
  3. Security Zone that is inside the building, outside of the red zone.
  4. The process by which all individuals and objects are screened going into and out of the Red Zone.
  5. Which system do Amazon data centers use to securely manage physical keys, control access permissions, and track key usage history?

10 Clues: The primary purpose of the red zone is to protect what?How are Media Bin Keys classified in the Key Risk Matrix?What type of connector is used as a safety mechanism for lanyards?Security Zone that is inside the fence line, outside the building.Security Zone that is inside the building, outside of the red zone....

Hartford Funds Compliance Crossword 2019-05-01

Hartford Funds Compliance Crossword crossword puzzle
Across
  1. A security device used in cars, trucks and corporate networks.
  2. Investment adviser firm that serves as the adviser to certain Hartford Funds.
  3. Working for, or on the board of a start-up company is considered a(n) _____________ and must be reported via MCO prior to any engagement.
  4. Adhere to a rule (policy, standard, law).
  5. Dedicated to investor protection and market integrity through effective and efficient regulation of broker-dealers.
  6. Separation of illicit proceeds from their source by a variation of financial transactions intended to conceal the origin of the proceeds.
  7. Vendor employees use to attest/complete various Compliance related activities (reportable account disclosure, outside business requests, limited partnership requests, etc).
  8. Any technology application that allows users to create, share and exchange information in an online community or forum.
  9. Situation in which a person is in a position to derive personal benefit from decisions made in their official capacity. HINT – 3 words.
  10. Moral principles that govern a person’s behavior.
  11. Hartford Funds Chief Compliance Officer.
Down
  1. Mutual Funds/ETFs should never be described as providing this type of protection.
  2. Unacceptable or improper behavior by an employee.
  3. Compliance is not an act, it’s a _______.
  4. Protection of internet-connected systems from cyber-attacks, protect against unauthorized access to data centers and other computerized systems.
  5. Investment adviser firm that serves as the adviser to separately managed accounts.
  6. All potential conflicts of interest need to be _________.
  7. Who is responsible for making sure all reportable accounts, trades, and holdings are appropriately and timely disclosed in MyComplianceOffice?
  8. Encouraging a Financial Advisor to invest his clients in Hartford Funds Core Equity Fund because the Fund will outperform its benchmark during the next 2 years is inappropriate. Use of such language is considered?
  9. FINRA Registered Broker-Dealer that is the official distributor for Hartford Fund’s ETFs.
  10. Engages in the underwriting and wholesale distribution and marketing of open end investment companies registered under the Investment Company Act of 1940 to third party firms.
  11. Procedures, laws and regulations designed to stop the practice of generating income through illegal actions.
  12. Travel & Expense items are input into this system.

23 Clues: Hartford Funds Chief Compliance Officer.Compliance is not an act, it’s a _______.Adhere to a rule (policy, standard, law).Unacceptable or improper behavior by an employee.Moral principles that govern a person’s behavior.Travel & Expense items are input into this system.All potential conflicts of interest need to be _________....

Semester 1 Intro to Business and Marketing Review 2023-12-06

Semester 1 Intro to Business and Marketing Review crossword puzzle
Across
  1. An economic system in which individuals own and operate the majority of businesses that provide goods and services.
  2. Cyber ____________ refers to the practices and steps that users of computers and IoT devices take to maintain system health and improve online security.
  3. An economic system in which businesses and individuals decide what to produce and buy, and the market determines prices and quantities sold.
  4. This occurs when people's needs and wants are unlimited and the resources to produce the goods and services to meet those needs and wants are limited.
  5. The performance ______________ process is a formal system for reviewing, evaluating, and improving employee performance.
  6. The people who create goods and services are called ___________ resources.
  7. A person who risks time, effort, and money to start and operate a business.
  8. A set of behaviors that utilize a toolbox of techniques, tools, and strategies that allow a person to achieve set goals within a given time.
  9. Things that you think you must have in order to be satisfied.
  10. Types of workplace communication include memos, business letters, _________, and chat platforms.
Down
  1. The inputs and resources used to produce goods and services.
  2. An economy that exhibits elements of both capitalism and socialism.
  3. Things that you must have in order to survive.
  4. Resources that are used in the production of goods and services.
  5. The skill set and process that utilizes a systematic approach to a task, whether answering a question, making a decision, or solving a problem.
  6. What remains after all business expenses have been deducted from sales revenue.
  7. Nonproductive _____________ in teams can cause a breakdown of trust, resentment, lowered efforts and stalled productivity.
  8. The organized effort of individuals to produce and sell, for a profit, the goods and services that satisfy society's needs.
  9. An economic system in which the government decides what goods and services will be produced,how they will be produced, for whom available goods and services will be produced, and who owns and controls the major factors of production.
  10. The way in which people deal with the creation and distribution of wealth.
  11. Raw materials supplied by nature.

21 Clues: Raw materials supplied by nature.Things that you must have in order to survive.The inputs and resources used to produce goods and services.Things that you think you must have in order to be satisfied.Resources that are used in the production of goods and services.An economy that exhibits elements of both capitalism and socialism....

Cyberbullying 2024-09-17

Cyberbullying crossword puzzle
Across
  1. when some one is cyber bulling
  2. 1-404-978-9282,1-877-355-5787, and 650-253-0000.
  3. do this to your parent or guardian
Down
  1. something to do after telling and blocking
  2. something cyberbullies do
  3. actions that are _______ can cause bad things.
  4. the cause
  5. The person who is being cyberbullied

8 Clues: the causesomething cyberbullies dowhen some one is cyber bullingdo this to your parent or guardianThe person who is being cyberbulliedsomething to do after telling and blockingactions that are _______ can cause bad things.1-404-978-9282,1-877-355-5787, and 650-253-0000.

Global challenge 2024-11-12

Global challenge crossword puzzle
Across
  1. spreading in a liquid
  2. devices to transmit informations
  3. cable with glass
Down
  1. the reason you have www
  2. a fight in I.e. economics around the world
  3. platform where you can communicate
  4. bullying in the internet
  5. people who can control your devices from around the world

8 Clues: cable with glassspreading in a liquidthe reason you have wwwbullying in the internetdevices to transmit informationsplatform where you can communicatea fight in I.e. economics around the worldpeople who can control your devices from around the world

Air Travel Words 2022-04-18

Air Travel Words crossword puzzle
Across
  1. time The time a plane will leave from an airport.
  2. attendant The airline employee responsible for providing service to passengers and ensuring their in-flight safety.
  3. pass The ticket passengers need to enter the plane and locate their seat.
  4. The area where the pilot sits to operate the plane; remains closed and locked during flight for security reasons.
  5. flight The airplane a passenger catches after a layover.
  6. time The time a plane will land at an airport.
  7. class The section of the plane that offers standard seat size, amenities, and service; typically, the least expensive section. Also called economy class.
  8. A flight that departs late at night and arrives during early morning hours.
  9. class A section of the plane reserved for travelers who want to upgrade from the standard seat size, amenities, and service.
Down
  1. luggage Bags that are put in the cargo area of the plane, which is inaccessible by passengers.
  2. class The section of the plane that offers the largest seat size and highest-quality amenities and service.
  3. ticket A ticket that passengers buy to fly to a destination but not to return.
  4. number The number that identifies a particular flight and that passengers use to find their gate number and plane.
  5. agent An airline employee who checks in passengers, checks luggage, and prints boarding passes.
  6. ticket A ticket that passengers buy to travel to a destination and back again.
  7. The process passengers must go through when first arriving at the airport before going through security.
  8. (Federal Aviation Administration) The federal agency that develops and enforces safety regulations and advancements.
  9. A stop in an airport before reaching the final destination.
  10. The bags passengers bring with them on the plane.
  11. class See coach class.
  12. (Transportation Security Administration) A federal agency that protects transportation systems in the United States and ensures safe air travel; employees serve as security officers in airports.
  13. claim The area in the airport where passengers go to collect their luggage.

22 Clues: class See coach class.time The time a plane will land at an airport.time The time a plane will leave from an airport.The bags passengers bring with them on the plane.flight The airplane a passenger catches after a layover.A stop in an airport before reaching the final destination....

CHAPTER 6 NATIONAL SECURITY AND PEACE EDUCATION 2019-09-30

CHAPTER 6 NATIONAL SECURITY AND PEACE EDUCATION crossword puzzle
Across
  1. the particular condition that someone or something is in at a specific time.
  2. a group of people living in the same place or having a particular characteristic in common.
  3. discussion aimed at reaching an agreement.
  4. WOLFERS- who has a member of the council of the ISS and did much to help the institute was one of the handful of men created the establishment of academic fields of international now politics.
  5. he state of being free from danger or threat.he state of being free from danger or threat.
  6. profession, activity, or skill of managing international relations, typically by a country's representatives abroad.
  7. intense feeling of deep affection.
  8. relating to the government or the public affairs of a country.
  9. PEACE- refers to a state of affairs where peace is permanently established over a certain area. ... The term perpetual peace became acknowledged when German philosopher Immanuel Kant published his 1795 essay Perpetual Peace: A Philosophical Sketch.
Down
  1. the power or right to give orders, make decisions, and enforce obedience.
  2. the power or right to act, speak, or think as one wants without hindrance or restraint.
  3. surroundings or conditions in which a person, animal, or plant lives or operates.
  4. the arts and other manifestations of human intellectual achievement regarded collectively.
  5. a large body of people united by common descent, history, culture, or language, inhabiting a particular country or territory.
  6. the action of protecting, or the state of being protected.
  7. from disturbance; tranquility.
  8. SECURITY-National security is the security of a nation state, including its citizens, economy, and institutions, which is regarded as a duty of government.
  9. The branch of knowledge concerned with the production, consumption, and transfer of wealth.
  10. relating to or characteristic of soldiers or armed forces.
  11. MAIER-served as the director of the Center for European Studies at Harvard, 1994-2001, and currently co-directs (with Sven Beckert, Sugata Bose, and Jean Comaroff) the Weatherhead Initiative in Global History.

20 Clues: from disturbance; tranquility.intense feeling of deep affection.discussion aimed at reaching an agreement.the action of protecting, or the state of being protected.relating to or characteristic of soldiers or armed forces.relating to the government or the public affairs of a country....

Bernardo C. Los Viajes assignment 2024-03-05

Bernardo C. Los Viajes assignment crossword puzzle
Across
  1. ecotourism
  2. security measures
  3. to sail
  4. customs agent
  5. Border
  6. compass
  7. itinerary
  8. insurance
  9. to return
Down
  1. high season
  2. valid
  3. to pack your bags
  4. tour guide
  5. expired
  6. room service
  7. hostel
  8. lodging
  9. ruins
  10. traffic jam

19 Clues: validruinshostelBorderexpiredto saillodgingcompassitineraryinsuranceto returnecotourismtour guidehigh seasontraffic jamroom servicecustoms agentto pack your bagssecurity measures

Pre-intermediate 3 2022-11-14

Pre-intermediate 3 crossword puzzle
Across
  1. késik
  2. talán
  3. vám
  4. átvesz, befogad
  5. érkezési kapuk
  6. agresszív közúti magatartás
  7. tábla, jelzések
  8. biztonsági ellenörzés
  9. határozott
Down
  1. fiuka
  2. indulási kapuk
  3. egy napot
  4. jóslat
  5. konferencia
  6. hely, helyszin
  7. mostanában
  8. beszáll (repülőbe)
  9. kütyü
  10. utas

19 Clues: vámutasfiukakésiktalánkütyüjóslategy napotmostanábanhatározottkonferenciaindulási kapukhely, helyszinérkezési kapukátvesz, befogadtábla, jelzésekbeszáll (repülőbe)biztonsági ellenörzésagresszív közúti magatartás

Airport vocabulary 2022-11-16

Airport vocabulary crossword puzzle
Across
  1. asiento de pasillo
  2. viaje
  3. asiento de la ventana
  4. turista
  5. equipaje
  6. viajar
  7. seguridad
  8. cancelado
  9. puerta
Down
  1. salidas
  2. demorado
  3. llegadas
  4. esperar
  5. terminal
  6. tarjeta de embarque
  7. peso(kg)
  8. pasaporte
  9. aduana
  10. fecha de nacimiento (contracion)

19 Clues: viajeviajaraduanapuertasalidasesperarturistademoradollegadasterminalpeso(kg)equipajepasaporteseguridadcanceladoasiento de pasillotarjeta de embarqueasiento de la ventanafecha de nacimiento (contracion)

Cyberpuzzle 2023-08-08

Cyberpuzzle crossword puzzle
Across
  1. Substitute_ with numbers, punctuation marks or symbols when creating your password
  2. Phishing attempt directed at specific individuals or companies
  3. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  4. Kind of software used to prevent, scan, detect and delete viruses from a computer
  5. Physical security breach in which an unauthorised person follows an authorised individual to enter a secured premise
  6. Cybersecurity Awareness Month
  7. Mandatory to wear inside the organisation and to remove outside
Down
  1. Action to do when I receive a suspicious email
  2. When available, use stronger_for an added layer of security
  3. Type of malware that disrupts computers, servers, and other devices
  4. Phishing attack deployed via SMS message
  5. Defensive technology designed to keep the bad guys out

12 Clues: Cybersecurity Awareness MonthPhishing attack deployed via SMS messageAction to do when I receive a suspicious emailDefensive technology designed to keep the bad guys outWhen available, use stronger_for an added layer of securityPhishing attempt directed at specific individuals or companies...

Cyber Ethics & Networking Concepts 2025-05-24

Cyber Ethics & Networking Concepts crossword puzzle
Across
  1. Computer network created for an individual person
  2. Bulk emails from unknown sources
  3. Use single user software in multiple system
  4. Stands for Wi-Fi
  5. Delivers message only to the destination
  6. Topology where data travels in a cicular path
  7. Imitating or copying the sources of one's original work to another persons
  8. All nodes connected via a central device
  9. Criminal Activities that involve the use of computers
Down
  1. An impression of information about a person using internet
  2. Responsible behaviour in social media
  3. A type of cyberattack that uses fraudulent email
  4. Simplest form of network topology
  5. Each computer in a network
  6. Illegally copied or distributed software
  7. Internet accessing in an illegal manner
  8. Network within a small area
  9. Harmful program disrupts computer system

18 Clues: Stands for Wi-FiEach computer in a networkNetwork within a small areaBulk emails from unknown sourcesSimplest form of network topologyResponsible behaviour in social mediaInternet accessing in an illegal mannerIllegally copied or distributed softwareDelivers message only to the destinationHarmful program disrupts computer system...

FIT E: Technology Vocab 2013-05-16

FIT E: Technology Vocab crossword puzzle
Across
  1. is made up of 1000 gigabytes
  2. the wiring in your computer
  3. is made up of 1000 zetabytes
  4. a type of booklet that advertises a company's products
  5. a company's symbol or graphic design
  6. the location where you can put in a disc
  7. the location on your computer where you can plug in your peripherals
  8. any type of attachment you can plug in your computer
  9. a type of program that allows you to receive internet
  10. anything that is sent out of a computer
  11. a informational paper about you and your history, usually made for a job
  12. the privacy and security of yourself on the internet
  13. is made up of 1000 bits
  14. is made up of 1000 petabytes
  15. is made up of 1000 bytes
  16. a type of search engine that searches all types of other search engine
  17. the main center of your computer where all the data goes
Down
  1. a program that allows you to search the web
  2. anything that has to do with the internet
  3. the device you use to operate your desktop
  4. is made up of 1000 yottabytes
  5. the act of spreading public notice for your product
  6. the brain of your computer, where all the data is stored
  7. the term used for a picture or graphic image that is made up by numbers
  8. a zoomable presentation program
  9. is made up of 1000 exabytes
  10. the screen of your computer
  11. anything that you plug in your computer
  12. a company's words or phrase that is advertised
  13. is made up of 1000 terabytes
  14. a program where you can access any type of media or internet wirelessly
  15. is made up of 1000 kilobytes
  16. is made up of 1000 brontobytes
  17. a portable electronic device that is wireless
  18. the location on your cmputer where you can plug in your headphones or earbuds
  19. the place where you can save files off of any type of device
  20. is made up of 1000 megabytes
  21. the smallest amount of storage you can have

38 Clues: is made up of 1000 bitsis made up of 1000 bytesthe wiring in your computeris made up of 1000 exabytesthe screen of your computeris made up of 1000 gigabytesis made up of 1000 zetabytesis made up of 1000 terabytesis made up of 1000 kilobytesis made up of 1000 petabytesis made up of 1000 megabytesis made up of 1000 yottabytes...

Crossword 3 2023-05-24

Crossword 3 crossword puzzle
Across
  1. to make copies
  2. a piece of code that is used to fix a flaw in a computer program
  3. a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
  4. the proces of stealing another person’s information and using it for personal gain
  5. to make sure that it is legitimate
  6. any type of media used on a webpage, including images and videos
  7. a person who exploits computer hardware and software for their own purposes
  8. a small application that is embedded in a webpage
  9. a measurement of how quickly a computer works
  10. a collection of icons or pictures that have been organized in a file or page
  11. a person who uses computers and the internet to commit crimes
Down
  1. a computer virus that copies its code over and destroys the files of the original data
  2. to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
  3. a word or phrase that makes a computer perform an operation
  4. a filter that prevents harmful software from entering a network
  5. device that converts mechanical information into electronic signals
  6. a software that keeps a computer safe from threats such as computer viruses and cyber crimes
  7. a filter that prevents harmful software from leaving a network
  8. an action that results in the loss of another person’s property
  9. tricking people into giving information through email
  10. how users communicate with a computer
  11. the use of the internet for software and other resources
  12. the company that produces Macs and other computing products
  13. changing computer to your needs
  14. a program that restricts access on a network
  15. to modify or arrange something so that it works in a certain way
  16. a set of rules that must be followed for the sake of security
  17. using a legitimate-looking website to trick people
  18. a personal website maintained by an individual
  19. to work at a location away from a main office by using technology

30 Clues: to make copieschanging computer to your needsto make sure that it is legitimatehow users communicate with a computera program that restricts access on a networka measurement of how quickly a computer worksa personal website maintained by an individuala small application that is embedded in a webpageusing a legitimate-looking website to trick people...

NATO Crossword 2023-08-03

NATO Crossword crossword puzzle
Across
  1. NATO's largest partnership group is known as the Partnership for ___
  2. NATO's founding treaty is known as the North Atlantic Treaty or the ___ Treaty
  3. Countries that wish to join NATO usually, but not always, use a MAP, or Membership ___ Plan
  4. NATO is the North ___ Treaty Organization
  5. NATO has been leading a peace-support operation in this country since June 1999
  6. The principle that if one Ally is attacked, all Allies are attacked, is also known as ___ defense
  7. This was the first SACEUR, and was later the 34th President of the United States
  8. The lengthy statement released at Summits is often called this.
  9. US General Christopher Cavoli currently holds this position, the second-highest military position within NATO.
  10. This kind of threat typically does not involve weapons, but can include disinformation, interference in politics, and cyber operations
  11. NATO Air Base Geilenkirchen, Germany, is home to 14 of these aircraft, known as NATO's eyes in the sky
  12. This ability enables Allied forces from different countries to operate together.
  13. Last month's NATO Summit took place in this city.
Down
  1. This Italian city is home to NATO military command.
  2. NATO's maritime security operation in the Mediterranean is called Operation Sea ___
  3. This is the part of the founding treaty that explains how new members can join
  4. PermReps sit on the NAC, or North Atlantic ___
  5. Allies pledged to devote this much of their GDP to defense spending
  6. NATO's military headquarters in Mons, Belgium
  7. All 31 Allies must agree for NATO to do anything. This is known as ___ decision making.
  8. This country is an official Invitee, but not yet a member
  9. This is one of NATO's closest partners, and its headquarters are right downtown
  10. Allies contribute money to fund NATO programs. This is known as ___ funding.
  11. NATO's current Secretary General is from this country
  12. The overall guiding document for NATO, revised about once a decade, is known as the Strategic ___
  13. This Virginia city is home to Allied Command Transformation (ACT)

26 Clues: NATO is the North ___ Treaty OrganizationNATO's military headquarters in Mons, BelgiumPermReps sit on the NAC, or North Atlantic ___Last month's NATO Summit took place in this city.This Italian city is home to NATO military command.NATO's current Secretary General is from this countryThis country is an official Invitee, but not yet a member...

Team Building 2025-06-11

Team Building crossword puzzle
Across
  1. What should we do to every member who walks in?
  2. What form has to be filled out to add a joint owner to an account?
  3. Who do we send wires to?
  4. Monthly Cyber Security training
  5. What are we doing when entering C in the proc code?
  6. What tool do we have to check after placing a hold on a check?
  7. Where our goals are entered
  8. What department is notified of the death of a member?
  9. What has to be pressed on the cash advance machine at the end of the night?
  10. What is the name of the credit cards reward program?
  11. What is the drive thru being replaced with?
  12. Who has to be called to release a vehicle from rep?
Down
  1. What can be up to 50% on auto loans depending on credit score?
  2. Where are checks scanned in at the end of the night?
  3. What would you recommend to a member who needs to do some home remodeling?
  4. What program gives CD's a .05% rate increase?
  5. What kind of ID does someone have to have to do a cash advance?
  6. What has to be filled out on verafin when opening a new account?
  7. What has to be accompany a POA being submitted to the back office?
  8. Who do we contact for questions regarding current loans?
  9. Who can withdraw from a custodial account?
  10. How many cross sells per month do you need to reach the first tier goal?
  11. What is checked each time a cashier's check is made
  12. Who needs to be emailed when giving out or receiving $5,000 in cash?
  13. What does an MSR have to pull to qualify someone for a loan?
  14. What do MSR's add to an auto loan that covers vehicle repairs?
  15. What is added to an auto loan to cover the amount owed on the loan vs the amount paid by insurance coverage after a total loss?
  16. What does the E in HELOC represent?

28 Clues: Who do we send wires to?Where our goals are enteredMonthly Cyber Security trainingWhat does the E in HELOC represent?Who can withdraw from a custodial account?What is the drive thru being replaced with?What program gives CD's a .05% rate increase?What should we do to every member who walks in?What is checked each time a cashier's check is made...

At the Airport 2017-01-12

At the Airport crossword puzzle
Across
  1. жидкость
  2. терять
  3. стойка регистрации - ... desk
  4. присоединяться
  5. пассажир
  6. быстрый
  7. пропускать
  8. багаж
  9. сотрудник службы безопасности
  10. очередь
  11. острый
Down
  1. тележка
  2. досматривать
  3. предмет
  4. показывать
  5. опасный
  6. посадочный талон - ... card
  7. прямой
  8. тяжелый
  9. оставлять
  10. внимательный
  11. проходить через - go ...

22 Clues: багажтерятьпрямойострыйтележкапредметопасныйтяжелыйбыстрыйочередьжидкостьпассажироставлятьпоказыватьпропускатьдосматриватьвнимательныйприсоединятьсяпроходить через - go ...посадочный талон - ... cardстойка регистрации - ... deskсотрудник службы безопасности

o Aeroporto e Uma Viagem de Aviao 2023-03-20

o Aeroporto e Uma Viagem de Aviao crossword puzzle
Across
  1. stewardness
  2. luggage
  3. arrivals
  4. flight
  5. escalator
  6. trip
  7. vacation
  8. pilot
  9. flightcrew
  10. destination
  11. security
  12. runway
  13. fristclass
  14. through
  15. tocheckin
Down
  1. tripticket
  2. domesticflight
  3. carryon
  4. agent
  5. monitor
  6. suitcase
  7. automatic runway
  8. customs
  9. seatnumber
  10. passenger
  11. cart

26 Clues: tripcartagentpilotflightrunwayluggagecarryonmonitorcustomsthrougharrivalssuitcasevacationsecurityescalatorpassengertocheckintripticketflightcrewseatnumberfristclassstewardnessdestinationdomesticflightautomatic runway

Family 2024-01-10

Family crossword puzzle
Across
  1. Support
  2. Respect
  3. Preserves
  4. Understanding
  5. Social
  6. Love
  7. Environment
  8. Security
  9. Traditions
  10. Bases/foundations
  11. Face
  12. Core
Down
  1. Culture
  2. Build
  3. Identity
  4. Empathy
  5. Crucial
  6. Family
  7. Challenges
  8. Learn
  9. Provides
  10. Values
  11. Care
  12. Teaches
  13. Foster
  14. Grow

26 Clues: CareLoveGrowFaceCoreBuildLearnFamilyValuesSocialFosterCultureSupportEmpathyCrucialRespectTeachesIdentityProvidesSecurityPreservesChallengesTraditionsEnvironmentUnderstandingBases/foundations