cyber security Crossword Puzzles

Technology Words 2024-10-09

Technology Words crossword puzzle
Across
  1. Computer Camera
  2. Used to type
  3. You call people on it
  4. Set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
  5. Communicate with others vocally
  6. Coded software
  7. Analyze and solve problems
  8. Prevents viruses
  9. Provides entertainment
  10. Something that you can transfer digital info to
  11. Stores information
  12. Another word for apps
Down
  1. Gain unauthorized access
  2. Random Access Memory
  3. Decode a code
  4. Also an animal
  5. Requires a router
  6. Protects from cyber attacks
  7. The use of computer technology
  8. Remote connection
  9. Communication technology tool
  10. Central Processing Unit
  11. Look through the web
  12. Creates apps/websites
  13. Find locations
  14. Amount of data your internet connection can handle
  15. Accessed from a browser
  16. Protects your computer from virus
  17. Convert data into a code
  18. Social feed

30 Clues: Social feedUsed to typeDecode a codeAlso an animalCoded softwareFind locationsComputer CameraPrevents virusesRequires a routerRemote connectionStores informationRandom Access MemoryLook through the webYou call people on itCreates apps/websitesAnother word for appsProvides entertainmentCentral Processing UnitAccessed from a browser...

Review Weeks 1-6 2022-12-06

Review Weeks 1-6 crossword puzzle
Across
  1. a big meal, often eaten during holidays
  2. (adj) when you don't sleep enough, feeling
  3. this Monday people buy on online
  4. name of San Diego baseball team
  5. this Tuesday people give back
  6. Teacher Neil's home state
  7. US __ their first two World Cup Games
  8. It was Hispanic ___ Month 09/15-10/15
  9. the early bid catches this
  10. another word for ancestors
Down
  1. 11/3 was Nat'l ___ Day
  2. the host of the World Cup this year
  3. to show off artwork or verb to show
  4. Bob Marley is the king of this music
  5. Jet __ when you travel between time zones
  6. Similar to Homemaker
  7. 10/17 was Nat'l ___ Day
  8. Isla means this in English
  9. Online you can many "___ and deals"
  10. Japanese word for big water wave
  11. heavy rain, idiom, "___ and dogs"

21 Clues: Similar to Homemaker11/3 was Nat'l ___ Day10/17 was Nat'l ___ DayTeacher Neil's home stateIsla means this in Englishthe early bid catches thisanother word for ancestorsthis Tuesday people give backname of San Diego baseball teamthis Monday people buy on onlineJapanese word for big water waveheavy rain, idiom, "___ and dogs"...

DCO Review 2024-01-11

DCO Review crossword puzzle
Across
  1. 6
  2. 14
  3. 1
  4. 15
  5. 3
  6. 10
  7. 4
  8. 12
Down
  1. 7
  2. 9
  3. 5
  4. 13
  5. 2
  6. 11
  7. 8

15 Clues: 796521384141311151012

Airports 2019-06-06

Airports crossword puzzle
Across
  1. what you bring with you on holiday?
  2. what does Avsec look for?
  3. Taupo city code
  4. check passengers ....
  5. what you fly on?
  6. nelson city code
  7. only offered to departing and arriving international travellers
  8. what is the amount if alcohol you can bring into nz
  9. what your bag goes through to get checked
Down
  1. is the area before departing passengers through security
  2. who is responsible for directing all ground traffic
  3. what is a hazard to aircrafts
  4. Kapiti Coast city code
  5. what does biosecurity look for?
  6. is the area where you go through security & hand over your passport and departure card

15 Clues: Taupo city codewhat you fly on?nelson city codecheck passengers ....Kapiti Coast city codewhat does Avsec look for?what is a hazard to aircraftswhat does biosecurity look for?what you bring with you on holiday?what your bag goes through to get checkedwho is responsible for directing all ground traffic...

Custody and settlement 2025-10-13

Custody and settlement crossword puzzle
Across
  1. Who securities are lent to
  2. The key role of a custodian for assets
  3. A custody account used by multiple clients
  4. The D in CSD
  5. When a settlement does not occur
  6. common transaction type attracting collateral
  7. what is the process of preparing for settlement
Down
  1. the point when a security formally changes hand
  2. a retail fund investment strategy
  3. The C in OTC
  4. type of agent responsible for fund compliance
  5. the addition of information required to settle a tracaction
  6. Assets taken as protection against default
  7. the date a security starts to trade without a dividend attached
  8. A fund that mirrors the NYSE or the FTSE

15 Clues: The C in OTCThe D in CSDWho securities are lent toWhen a settlement does not occura retail fund investment strategyThe key role of a custodian for assetsA fund that mirrors the NYSE or the FTSEAssets taken as protection against defaultA custody account used by multiple clientstype of agent responsible for fund compliance...

Security Newsletter Puzzle 2021-05-19

Security Newsletter Puzzle crossword puzzle
Across
  1. the unauthorized disclosure could be expected to cause serious damage to national security
  2. a threat an employee will use his or her authorized access, wittingly or unwittingly, to do harm to the security of the United States
Down
  1. _________ Counterintelligence and Security Agency
  2. Communication Security
  3. Formally FOUO
  4. Form that is placed inside the safe
  5. One method to ship Top Secret material

7 Clues: Formally FOUOCommunication SecurityForm that is placed inside the safeOne method to ship Top Secret material_________ Counterintelligence and Security Agencythe unauthorized disclosure could be expected to cause serious damage to national security...

Social Security Puzzle 2024-01-19

Social Security Puzzle crossword puzzle
Across
  1. 1 week
  2. Birthday
  3. In with the new
  4. enforcers
  5. ______ pension
  6. pension ______ (2012)
Down
  1. ______ age
  2. location
  3. meets requirements.
  4. long term benefit
  5. Out with the old
  6. Short term benefit
  7. not a pension.

13 Clues: 1 weeklocationBirthdayenforcers______ agenot a pension.______ pensionIn with the newOut with the oldlong term benefitShort term benefitmeets requirements.pension ______ (2012)

cyber 2021-04-05

cyber crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

유형독해(고급) 4차시 단어시험 2016-07-27

유형독해(고급) 4차시 단어시험 crossword puzzle
Across
  1. 가상의
  2. 접근
  3. 연결을 끊다
  4. 광대역 회선
  5. 정교한
  6. 익명의
  7. 보안
  8. 주변의
  9. 전자의
  10. 재택근무
  11. 전자상거래
  12. 설치하다
  13. 발명하다
Down
  1. 전송하다, 앞으로
  2. 전기의
  3. 전기
  4. 호환가능한
  5. 최대화하다
  6. 세계화하다
  7. 문명화하다
  8. 반도체
  9. 특허권
  10. 회복하다
  11. 해독하다
  12. 고안하다
  13. 계기판

26 Clues: 접근전기보안전기의가상의정교한반도체익명의특허권주변의전자의계기판회복하다해독하다재택근무고안하다설치하다발명하다호환가능한최대화하다세계화하다문명화하다전자상거래연결을 끊다광대역 회선전송하다, 앞으로

Lesson 5 Deck 1 2018-03-01

Lesson 5 Deck 1 crossword puzzle
Across
  1. traveler
  2. passport
  3. welcome
  4. excursion; tour
  5. accident
  6. room service
  7. ruins
  8. expired
  9. adventurer
Down
  1. to return
  2. seatbelt
  3. to take off
  4. to take a trip
  5. campground
  6. to be full
  7. tourist
  8. lodging
  9. safety; security
  10. high quality
  11. dangerous
  12. itinerary
  13. island
  14. to sail

23 Clues: ruinsislandtouristlodgingwelcometo sailexpiredtravelerseatbeltpassportaccidentto returndangerousitinerarycampgroundto be fulladventurerto take offhigh qualityroom serviceto take a tripexcursion; toursafety; security

Las Noticias 2021-10-26

Las Noticias crossword puzzle
Across
  1. desorden disorder
  2. source
  3. magazines
  4. news
  5. to lie
  6. to publish
  7. security
  8. link
  9. war
  10. to broadcast
  11. to prove, to confirm
Down
  1. reliable
  2. to interview
  3. to lack
  4. verifiable
  5. to look for
  6. because
  7. to give
  8. to follow
  9. to say
  10. to navigate

21 Clues: warnewslinksourceto lieto sayto lackbecauseto givereliablesecuritymagazinesto followverifiableto publishto look forto navigateto interviewto broadcastdesorden disorderto prove, to confirm

Spanish Vocabulary 2022-10-31

Spanish Vocabulary crossword puzzle
Across
  1. The service
  2. expect
  3. Landing
  4. The flight
  5. the passport
  6. The seat
  7. airport
  8. the window
  9. late
Down
  1. automatic
  2. name
  3. sometimes
  4. security
  5. The hallway
  6. the electronic ticket
  7. the counter
  8. On time
  9. to show
  10. hugged
  11. The track
  12. the assistant
  13. the plane

22 Clues: namelateexpecthuggedOn timeLandingto showairportsecurityThe seatautomaticsometimesThe trackthe planeThe flightthe windowThe serviceThe hallwaythe counterthe passportthe assistantthe electronic ticket

New Deal 2022-12-01

New Deal crossword puzzle
Across
  1. the first "R"
  2. ________ farming
  3. collective bargaining
  4. the second "R"
  5. court________
  6. Social__________
  7. 1932
  8. the third "R"
  9. NRA STAMP
  10. ______chats
Down
  1. overspending
  2. Banking__________
  3. alphabet______
  4. New Deal President
  5. retirement payment
  6. _______days
  7. virus
  8. ________Valley Authority
  9. government______
  10. __________Conservation Corps
  11. __________Adjustment Act
  12. "_______ itself"

22 Clues: 1932virusNRA STAMP_______days______chatsoverspendingthe first "R"court________the third "R"alphabet______the second "R"________ farmingSocial__________government______"_______ itself"Banking__________New Deal Presidentretirement paymentcollective bargaining________Valley Authority__________Adjustment Act__________Conservation Corps

NAME:........................................................................... 2019-03-26

NAME:........................................................................... crossword puzzle
Across
  1. ekran
  2. szczepionka
  3. bezpieczeństwo
  4. głośnik
  5. zawiesić się
  6. środowisko
  7. układ słoneczny
  8. ustawienia
  9. wyszukiwarka internetowa
  10. ciecz
  11. oprogramowanie
  12. ciało stałe
Down
  1. komórka
  2. pierwiastek chemiczny
  3. załącznik
  4. hasło
  5. para wodna
  6. drukarka
  7. strona internetowa
  8. trójkąt
  9. tlen
  10. skasować
  11. błąd
  12. plik
  13. @

25 Clues: @tlenbłądplikekranhasłocieczkomórkagłośniktrójkątdrukarkaskasowaćzałącznikpara wodnaśrodowiskoustawieniaszczepionkaciało stałezawiesić siębezpieczeństwooprogramowanieukład słonecznystrona internetowapierwiastek chemicznywyszukiwarka internetowa

U7 How could you do that? 2020-03-30

U7 How could you do that? crossword puzzle
Across
  1. edessä
  2. kiireinen
  3. koe
  4. valehtelija
  5. halaus, halata
  6. arvata
  7. selittää
  8. poissa tolaltaan, järkyttynyt
  9. lupa
  10. juliste
  11. nolo
  12. selittää
  13. viesti
  14. keskustella
Down
  1. viimeisin
  2. pyytää anteeksi
  3. salasana
  4. tapahtua
  5. ongelmat
  6. ihastus
  7. pettää
  8. kateellinen
  9. luvata
  10. kiusaaja
  11. salaisuus
  12. turvallisuus
  13. jutut

27 Clues: koelupanolojututedessäpettääarvataluvataviestiihastusjulistesalasanatapahtuaongelmatselittääkiusaajaselittääviimeisinkiireinensalaisuusvalehtelijakateellinenkeskustellaturvallisuushalaus, halatapyytää anteeksipoissa tolaltaan, järkyttynyt

Spanish Vocab 2023-04-26

Spanish Vocab crossword puzzle
Across
  1. weather
  2. turtle
  3. boat
  4. simple
  5. candy
  6. energy
  7. security
  8. trick
  9. to fish
  10. butterfly
  11. to flip
  12. bomb
  13. avocado
  14. gum
  15. door
Down
  1. water bottle
  2. clothing store
  3. to fly
  4. hotel
  5. snorkle
  6. airport
  7. to walk
  8. shade
  9. plane
  10. vez perchance
  11. baggage

26 Clues: gumboatbombdoorhotelcandytrickshadeplaneto flyturtlesimpleenergyweathersnorkleairportto fishto walkto flipavocadobaggagesecuritybutterflywater bottlevez perchanceclothing store

Strange Stories Vocabulary 2024-10-24

Strange Stories Vocabulary crossword puzzle
Across
  1. sulec
  2. fratcira
  3. edisin/boj
  4. sestniw
  5. fieht
  6. etagtisevni
  7. cerutear
  8. veha/a/ryoeht
  9. stinprergnif
  10. rdaiseapp
  11. oklo/rof/esclu
Down
  1. lualaveb
  2. reoyht
  3. ralam/mesyst
  4. UOF
  5. olicpe
  6. beboryr
  7. cuseryit/mecara
  8. revoscid
  9. tarser
  10. denecevi
  11. tsniprtoof

22 Clues: UOFsulecfiehtreoyhtolicpetarserbeboryrsestniwlualavebfratcirarevoscidceruteardenecevirdaiseappedisin/bojtsniprtoofetagtisevniralam/mesyststinprergnifveha/a/ryoehtoklo/rof/esclucuseryit/mecara

Economics Vocabulary 2023-04-14

Economics Vocabulary crossword puzzle
Across
  1. allowances/dependents
  2. permanent workers/residents
  3. taken out
  4. collectors
  5. tax season
  6. income based
  7. before
Down
  1. reports withholdings
  2. self employed
  3. national programs
  4. money generated
  5. medicare/social security
  6. illegal fraud
  7. money received
  8. after
  9. hourly
  10. money earned minus deductions
  11. contribution
  12. annual
  13. verifies employment

20 Clues: afterhourlyannualbeforetaken outcollectorstax seasoncontributionincome basedself employedillegal fraudmoney receivedmoney generatednational programsverifies employmentreports withholdingsallowances/dependentsmedicare/social securitypermanent workers/residentsmoney earned minus deductions

ICT Crossword 2019-07-08

ICT Crossword crossword puzzle
Across
  1. a diagram used to visually organize information.
  2. search for information about (someone or something) on the Internet using this search engine
  3. a hacker who violates computer security for personal gain or maliciousness.
  4. an interactive computer application for organization, analysis and storage of data in tabular form.
  5. an electronic device for storing and processing data
  6. a project management tool that provides a graphical representation of a project's timeline.
  7. A bad phone company
Down
  1. a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
  2. an organized collection of data, generally stored and accessed electronically from a computer system
  3. that ensures the security of an organization's information systems.
  4. a type of bar chart that illustrates a project schedule
  5. Where you create a database
  6. computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  7. specific measurable achievable relevent timely
  8. Where you create a spreadsheet

15 Clues: A bad phone companyWhere you create a databaseWhere you create a spreadsheetspecific measurable achievable relevent timelya diagram used to visually organize information.an electronic device for storing and processing dataa type of bar chart that illustrates a project schedulethat ensures the security of an organization's information systems....

Travelling 2019-02-19

Travelling crossword puzzle
Across
  1. lend
  2. kohver
  3. a train rongile jõudma
  4. luggage käsipagas
  5. seat vahekäigupoolne koht
  6. lennule registreerimine
  7. toll
  8. seat aknapoolne koht
  9. eemaldama
  10. pass pardakaart
  11. deklareerima
Down
  1. vedelikud
  2. pillow lisapadi
  3. check turvakontroll
  4. mündid
  5. mugav
  6. ukseava (turvakontrollis)
  7. saabuma

18 Clues: lendtollmugavkohvermündidsaabumavedelikudeemaldamadeklareerimapillow lisapadipass pardakaartluggage käsipagascheck turvakontrollseat aknapoolne kohta train rongile jõudmalennule registreerimineseat vahekäigupoolne kohtukseava (turvakontrollis)

종윤 2023-02-15

종윤 crossword puzzle
Across
  1. 세관 신고서
  2. 무게가 초과된
  3. 항공권
  4. 탑승 수속
  5. 깨지기 쉬운
  6. 카트
  7. 탑승구
  8. 세관
  9. 환승
  10. 항공편
  11. 안내 데스크
Down
  1. 환전
  2. 보안 검색대
  3. 입국 심사
  4. 여권
  5. 출발
  6. 도착

18 Clues: 환전카트여권출발도착세관환승항공권탑승구항공편탑승 수속입국 심사세관 신고서보안 검색대깨지기 쉬운안내 데스크무게가 초과된

Avancemos: 1.1 Vamos de vacaciones 2023-11-06

Avancemos: 1.1 Vamos de vacaciones crossword puzzle
Across
  1. - Travel Agent
  2. - Customs
  3. - Travel agency
  4. - The airport
  5. - To go on a trip
Down
  1. - Flight attendant
  2. - The ticket
  3. - Departure
  4. - Security
  5. - To board
  6. - The itinerary
  7. - Passanger
  8. - Suitcase
  9. - To check baggage
  10. - Arrival
  11. - The passport
  12. - Identification
  13. - To travel

18 Clues: - Arrival- Customs- Security- To board- Suitcase- Departure- Passanger- To travel- The ticket- The airport- Travel Agent- The passport- The itinerary- Travel agency- Identification- To go on a trip- Flight attendant- To check baggage

MSA Crossword 2022-02-15

MSA Crossword crossword puzzle
Across
  1. explosive device
  2. Xray tool
  3. flying robot
  4. finding
  5. see inside
  6. agent
  7. blasting agent
  8. certainty
  9. dog
  10. explosive stick
Down
  1. metal detector
  2. smell
  3. surveillance
  4. freight
  5. .38 revolver
  6. volatile chemical compound
  7. MSA canine program
  8. try to find

18 Clues: dogsmellagentfreightfindingXray toolcertaintysee insidetry to findsurveillance.38 revolverflying robotmetal detectorblasting agentexplosive stickexplosive deviceMSA canine programvolatile chemical compound

Vamos De Viaje Vocab Quiz 2016-10-01

Vamos De Viaje Vocab Quiz crossword puzzle
Across
  1. airport
  2. passport
  3. suitcase
  4. passenger
  5. identification
  6. flight
  7. departure
Down
  1. luggage
  2. ticket
  3. gate
  4. screen
  5. to arive
  6. bathing suit
  7. to go through security
  8. to get in line

15 Clues: gateticketscreenflightluggageairportto arivepassportsuitcasepassengerdeparturebathing suitto get in lineidentificationto go through security

CYBERCRIME 2021-07-11

CYBERCRIME crossword puzzle
Across
  1. A politically- or ideologically-motivated cyber attack or hack.
  2. A way to access electonic system by bypassing some or all security mechanisms.
  3. A satellite navigation system that indentifies the precise lovation of the transmitting device.
  4. The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
  5. Malicious software, such as a virus or worm, that attacks a target computer.
  6. The overaching program that runs all the functions on a computer or other electronic device.
  7. A company that offers access the internet.
  8. A camera connectee to computer l, generally used to then stream videos to the internet.
  9. Resource to be accessed, often expressed as a time period.
  10. Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
  11. The process ofnusing a
  12. Determining the identity or location of an attacker or an attacker's intermediary.
  13. The interdependent network of information technology, infrastructures that includes internet.
  14. Hardware or software designed to prevent unathorized users from accessing a computer system.
  15. A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
  16. A network point that acts an entrance to another network
  17. A unique internet identifier registered
  18. An online journal.
  19. A program used to access the internet.
  20. Assurance that remains private and no one sees it except for those expected to see it.
  21. A program that masks something harmful, such as a worm or virus, that it carries into a device.
Down
  1. Attempting to mimic an official email from a trusted organization to lire individuals.
  2. Refer to someone who gains access to a system, software, or hardware without permission.
  3. A log that chronicles any changes made to a document, presentation, software applications, etc.
  4. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
  5. Are a botnet of comprised hosts, controlled by a single intentity.
  6. A unique internet identifier registered to an entity.
  7. An information packet sent from website to a web browser that records a user's activity on the website.
  8. algorithm against data to produce a numeric value that is representative that data.
  9. Stands for "Wireless Fidelity".
  10. A software robot that performs automated tasks.
  11. The act of one individual harrasing or intimidating another individual via the interner.
  12. Unsolicited advertising or other information sent out via email or other messaging service.
  13. A massed data that is used to describe large amounts of other internet data.
  14. A grou of computers that is linked to share data and othe information.
  15. A website that finds information across the Internet based on a set of search criteria.
  16. an entity.
  17. A network security measure in which information is encoded or scrambled prior to transmission.
  18. Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
  19. The changes in data caused by an intruder or investigator accessing files and running applications or process.
  20. Aim to overwhelm the resources of a targeted system to crash that system.

41 Clues: an entity.An online journal.The process ofnusing aStands for "Wireless Fidelity".A program used to access the internet.A unique internet identifier registeredA company that offers access the internet.A software robot that performs automated tasks.A unique internet identifier registered to an entity....

CYBERCRIME 2021-07-11

CYBERCRIME crossword puzzle
Across
  1. The interdependent network of information technology, infrastructures that includes internet.
  2. A grou of computers that is linked to share data and othe information.
  3. A log that chronicles any changes made to a document, presentation, software applications, etc.
  4. A program that masks something harmful, such as a worm or virus, that it carries into a device.
  5. The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
  6. The act of one individual harrasing or intimidating another individual via the interner.
  7. Resource to be accessed, often expressed as a time period.
  8. Refer to someone who gains access to a system, software, or hardware without permission.
  9. A company that offers access the internet.
  10. A network point that acts an entrance to another network
  11. A website that finds information across the Internet based on a set of search criteria.
  12. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
  13. A massed data that is used to describe large amounts of other internet data.
  14. Stands for "Wireless Fidelity".
  15. Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
  16. An online journal.
  17. Aim to overwhelm the resources of a targeted system to crash that system.
  18. The overaching program that runs all the functions on a computer or other electronic device.
  19. The changes in data caused by an intruder or investigator accessing files and running applications or process.
  20. An information packet sent from website to a web browser that records a user's activity on the website.
Down
  1. Assurance that remains private and no one sees it except for those expected to see it.
  2. algorithm against data to produce a numeric value that is representative that data.
  3. A program used to access the internet.
  4. Are a botnet of comprised hosts, controlled by a single intentity.
  5. A politically- or ideologically-motivated cyber attack or hack.
  6. Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
  7. The process ofnusing a
  8. A unique internet identifier registered
  9. A network security measure in which information is encoded or scrambled prior to transmission.
  10. A satellite navigation system that indentifies the precise lovation of the transmitting device.
  11. Hardware or software designed to prevent unathorized users from accessing a computer system.
  12. A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
  13. an entity.
  14. A software robot that performs automated tasks.
  15. A unique internet identifier registered to an entity.
  16. A way to access electonic system by bypassing some or all security mechanisms.
  17. A camera connectee to computer l, generally used to then stream videos to the internet.
  18. Determining the identity or location of an attacker or an attacker's intermediary.
  19. Unsolicited advertising or other information sent out via email or other messaging service.
  20. Malicious software, such as a virus or worm, that attacks a target computer.
  21. Attempting to mimic an official email from a trusted organization to lire individuals.

41 Clues: an entity.An online journal.The process ofnusing aStands for "Wireless Fidelity".A program used to access the internet.A unique internet identifier registeredA company that offers access the internet.A software robot that performs automated tasks.A unique internet identifier registered to an entity....

Digital Tech 2023 Final 2023-05-11

Digital Tech 2023 Final crossword puzzle
Across
  1. A means by which people use the Internet to communicate and share information among their immediate friends, and meet and connect with others through common interests, experiences, and friends.
  2. Irrelevant or unimportant messages to a large group of people.
  3. The standard of conduct expected by other tech users.
  4. Free web based site in which documents can be created, edited, and shared.
  5. Document that is stored on your computer, usually in a related collection/coordination.
  6. The crime of taking someone's personal information and using it to become them. Usually for financial gain.
  7. The legal rights and restrictions governing tech users.
  8. Local Area Network
  9. Large computer network connected over the internet for server redundancy.
  10. Spoofing, internet fraud in the form of emails and pop-ups designed to steal personal information
  11. Instructions/programs that tell your computer what to do.
  12. Online journals in which create interaction from readers. Consists of interest groups, business, and others.
  13. The act of stealing someone else's work in an attempt to pass it off as your own.
  14. A site that allows users to add content using their own browser. Collaborative Site.
  15. Universal serial bus.
  16. The buying and selling of goods online.
  17. Provides Storage for free
  18. Arranging all folders files, and other documents in an arranged order.
  19. Physical equipment that makes up your computer system.
  20. Wide Area Network
  21. Type of file that has been created or saved by an application.
  22. Used to store a group of files and folders in an organized fashion.
  23. Free online storage service that is intertwined with the company and other sites.
  24. Method of identity theft where people try to obtain personal information via phone calls.
Down
  1. The use of online communication to harass or threaten someone. STOP BLOCK TELL
  2. A link that can be added or clipped onto a document.
  3. The capability of using tech and knowing when and how to use it.
  4. The elements of physical and phycological well being related to digital tech use.
  5. The output of the device that lets you see all of your work as you go.
  6. The electronic exchange of info.
  7. The precautions that all tech users must go through in order to ensure their personal safety and security of their network.
  8. The privileges' and freedom extended to all tech users.
  9. Central processing unit, part of the computer system that carries out instructions given by the software. Microprocessor, single chip.
  10. The act of stealing someone else's work in an attempt to pass it off as your own.
  11. The applied science of design to better improve productivity
  12. Someone who knows what is write and wrong to do in the Tec world.
  13. Malicious software, designed to steel information, inflict damage, commit fraud, and spread spam.
  14. The exclusive legal right given to someone who both created and owns a piece of work.
  15. Document created by a program or system file which make us the operating system
  16. Acceptable Use Policy - Rules or guidelines for the proper use of technology or digital devices within an organization.

40 Clues: Wide Area NetworkLocal Area NetworkUniversal serial bus.Provides Storage for freeThe electronic exchange of info.The buying and selling of goods online.A link that can be added or clipped onto a document.The standard of conduct expected by other tech users.Physical equipment that makes up your computer system....

The Virtual World 2024-02-28

The Virtual World crossword puzzle
Across
  1. A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user.
  2. Communication in real-time over the internet, typically text-based.
  3. Controls that allow users to determine how much information they want to share with others on digital platforms.
  4. A security process in which users provide two different authentication factors to verify themselves.
  5. A live, visual communication between two or more people via computer or mobile device.
  6. A security system designed to prevent unauthorized access to or from a private network.
  7. The network of physical devices embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
  8. The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  9. A collection of web pages accessible via the internet.
  10. The identification or estimation of the real-world geographic location of an object, such as a mobile device or internet-connected computer.
  11. A secret word or phrase used for authentication and to gain access to a system.
  12. Measures taken to protect computer systems and data from unauthorized access or cyber attacks
  13. A machine that processes data and performs tasks according to a set of instructions.
  14. The unauthorized access, disclosure, or acquisition of sensitive information.
  15. A software agent that assists users with tasks or provides information in a virtual environment.
  16. Connected to or accessible via the internet.
  17. Transfer data from a remote computer to a local device.
  18. A unique name used to identify oneself on a computer system or online platform.
  19. The process of converting information or data into a code to prevent unauthorized access.
Down
  1. A global network connecting millions of computers worldwide.
  2. The fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity.
  3. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
  4. The trail of data left behind by users when they interact with digital platforms.
  5. A digital representation of a user in a virtual environment.
  6. A simulated experience that can be similar to or completely different from the real world.
  7. An enhanced version of reality where computer-generated information is overlaid on the real world.
  8. The online representation of an individual's identity, based on data attributes and activities associated with that individual.
  9. Electronic mail sent and received via the internet.
  10. The virtual environment created by interconnected computer systems.
  11. Transfer data from a local device to a remote computer.
  12. The delivery of computing services—such as servers, storage, databases, networking, software, and analytics—over the internet.
  13. The act of playing electronic games, often on devices such as computers, consoles, or mobile phones.
  14. Transmitting or receiving data, typically audio or video, over a computer network in real-time.
  15. Software used to access and view websites on the internet.
  16. Websites and applications that enable users to create and share content or participate in social networking.

35 Clues: Connected to or accessible via the internet.Electronic mail sent and received via the internet.A collection of web pages accessible via the internet.Transfer data from a local device to a remote computer.Transfer data from a remote computer to a local device.Software used to access and view websites on the internet....

Cyber Stalking Crossword 2016-06-29

Cyber Stalking Crossword crossword puzzle
Across
  1. The stalker
  2. When a stalker claims the victim is hurting them, it is called False ___
  3. Cyberstalking is against the ___
  4. The minimum age for Instagram
Down
  1. Someone who defends the victim
  2. What is done when a stalker accesses the victim's social media or email, and can edit it
  3. Most cyber stalking happens on ____
  4. The person being stalked online
  5. Women make up _____ percent of victims
  6. This social media platform allows users to post pictures mainly

10 Clues: The stalkerThe minimum age for InstagramSomeone who defends the victimThe person being stalked onlineCyberstalking is against the ___Most cyber stalking happens on ____Women make up _____ percent of victimsThis social media platform allows users to post pictures mainlyWhen a stalker claims the victim is hurting them, it is called False ___...

IT-Security - Datenschutz/Datensicherheit 2016-01-29

IT-Security - Datenschutz/Datensicherheit crossword puzzle
Across
  1. Wenn Daten doppelt gespeichert werden(Sicherheitskopie auf Festplatte oder USB-Sticks).
  2. Sie dringen illegal in Computersysteme ein.
  3. Diese Programme protokollieren die Tastatureingaben mit.
  4. Echtzeit chatten.
  5. Datenverarbeitungsregisternummer.
Down
  1. Die Sicherheitsexperten untersuchen deinen Computer auf Sicherheitslücken, wie nennt man Sie noch?
  2. Personen werden mit Hilfe von elektronischen Medien verletzt.
  3. Diese Viren sind als ein Programm in eine Datei eingebetet?
  4. Verbreitet sich direkt über Netze.
  5. Werbemails die unerwünscht sind nennt man auch?

10 Clues: Echtzeit chatten.Datenverarbeitungsregisternummer.Verbreitet sich direkt über Netze.Sie dringen illegal in Computersysteme ein.Werbemails die unerwünscht sind nennt man auch?Diese Programme protokollieren die Tastatureingaben mit.Diese Viren sind als ein Programm in eine Datei eingebetet?Personen werden mit Hilfe von elektronischen Medien verletzt....

digital citizenship 2017-09-08

digital citizenship crossword puzzle
Across
  1. presence the existence of individual business that can be found online
  2. bullying using technology to bully someone
  3. the correct way to communicate on the internet
  4. safety the knowledge of the user’s personal safety
Down
  1. domain being available to the public
  2. Passwords passwords that would throw someone off
  3. media instagram, snapchat, twitter, facebook
  4. Danger the danger to children from strangers
  5. citizenship the responsible behavior regard to technology use
  6. copyright taking someone's image without citing it

10 Clues: domain being available to the publicbullying using technology to bully someonemedia instagram, snapchat, twitter, facebookDanger the danger to children from strangersthe correct way to communicate on the internetPasswords passwords that would throw someone offcopyright taking someone's image without citing it...

Bullying 2022-10-24

Bullying crossword puzzle
Across
  1. a form of bullying on the internet
  2. a form of bullying with weird touches
  3. a form of bullying used with words
  4. Something that can make or break bullying
  5. a form of bullying to hurt the victims social life
  6. the target of the bullying
  7. the person who makes fun of/hurts people
Down
  1. person who intimidates the victim
  2. The process of the bully bullying
  3. a form of bullying that hurts the victim

10 Clues: the target of the bullyingperson who intimidates the victimThe process of the bully bullyinga form of bullying on the interneta form of bullying used with wordsa form of bullying with weird touchesa form of bullying that hurts the victimthe person who makes fun of/hurts peopleSomething that can make or break bullying...

TECHNOLOGY 2025-01-29

TECHNOLOGY crossword puzzle
Across
  1. easy to use or understand
  2. the use of machines to perform tasks without human intervention
  3. knowledgeable about modern technology
  4. the trail of data left by users on the internet
  5. a small electronic device with a specific function
Down
  1. measures taken to protect systems from cyber threats
  2. an important discovery or development
  3. introducing new ideas or methods
  4. extremely modern and advanced
  5. Intelligence (AI) the simulation of human intelligence in machines

10 Clues: easy to use or understandextremely modern and advancedintroducing new ideas or methodsan important discovery or developmentknowledgeable about modern technologythe trail of data left by users on the interneta small electronic device with a specific functionmeasures taken to protect systems from cyber threats...

CRISS-CROSS PUZZLE 2025-01-18

CRISS-CROSS PUZZLE crossword puzzle
Across
  1. Who cut Thanos' head off in the movie Avengers:End Game?
  2. How does the bishop move on the chessboard?
  3. Unwanted messages flooding your inbox
  4. Digital brain that thinks like humans, briefly
  5. Planet in the solar system that has the shortest day
  6. Guard against cyber attacks
Down
  1. Element with a symbol Au
  2. Malicious software that holds your files hostage
  3. How many years is the tenure of a Rajya Sabha member?
  4. Web address in short

10 Clues: Web address in shortElement with a symbol AuGuard against cyber attacksUnwanted messages flooding your inboxHow does the bishop move on the chessboard?Digital brain that thinks like humans, brieflyMalicious software that holds your files hostagePlanet in the solar system that has the shortest dayHow many years is the tenure of a Rajya Sabha member?...

Health crossword (safety words) 2025-04-14

Health crossword (safety words) crossword puzzle
Across
  1. Mild traumatic injury caused to the brain
  2. injury caused by a spine injury
  3. What do you put on when riding a motorcycle
  4. What do you put on when you get in a car
  5. a material used to patch up a cut
Down
  1. Bullying conducted online
  2. another word for "taking it easy"
  3. Occupational Safety and Health Administration
  4. acronym for traumatic spinal cord injury
  5. Hours How much sleep a teenager needs

10 Clues: Bullying conducted onlineinjury caused by a spine injuryanother word for "taking it easy"a material used to patch up a cutHours How much sleep a teenager needsacronym for traumatic spinal cord injuryWhat do you put on when you get in a carMild traumatic injury caused to the brainWhat do you put on when riding a motorcycle...

Learning Units Learning Unit 2: The risk management lifecycle 2023-03-10

Learning Units Learning Unit 2: The risk management lifecycle crossword puzzle
Across
  1. also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment.
  2. is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.
  3. is assessing the risks involved in the daily activities of a business and classifying them (low, medium, high risk) based on the impact on the business. It enables a business to look for control measures that would help in curing or mitigating the impact of the risk and, in some cases negating the risk altogether.
  4. is the practice of reducing the impact of potential risks by developing a plan to manage, eliminate, or limit setbacks as much as possible. After management creates and carries out the plan, they'll monitor progress and assess whether or not they need to modify any actions if necessary.
  5. attempts to define what the estimated risk actually means to people concerned with or affected by the risk. A large part of this evaluation will be the consideration of how people perceive risks.
  6. is the structured process used to identify the sources of currency risk and to define the goals of a hedging program aimed at eliminating or minimising the impact of this risk.
  7. should be carried out by anyone who is trained and competent to do so; someone who understands the circumstances, the potential harm and the deviations.
Down
  1. is the process of determining the criticality of business activities and associated resource requirements to ensure operational resilience and continuity of operations during and after a business disruption.
  2. recognizes the areas where you are not compliant with regard to laws, policies or regulations. The resources are at risk for exposure to malicious activity and/or for penalties issued due to non-compliance.
  3. is the possibility of something bad happening. ________ involves uncertainty about the effects/implications of an activity with respect to something that humans value, often focusing on negative, undesirable consequences.
  4. is the identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
  5. in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization.
  6. in computer security, a _____________ is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.

13 Clues: in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization.also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment....

Learning Units Learning Unit 2: The risk management lifecycle 2023-03-10

Learning Units Learning Unit 2: The risk management lifecycle crossword puzzle
Across
  1. attempts to define what the estimated risk actually means to people concerned with or affected by the risk. A large part of this evaluation will be the consideration of how people perceive risks.
  2. in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization.
  3. is the structured process used to identify the sources of currency risk and to define the goals of a hedging program aimed at eliminating or minimising the impact of this risk.
  4. is assessing the risks involved in the daily activities of a business and classifying them (low, medium, high risk) based on the impact on the business. It enables a business to look for control measures that would help in curing or mitigating the impact of the risk and, in some cases negating the risk altogether.
  5. also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment.
Down
  1. is the practice of reducing the impact of potential risks by developing a plan to manage, eliminate, or limit setbacks as much as possible. After management creates and carries out the plan, they'll monitor progress and assess whether or not they need to modify any actions if necessary.
  2. is the process of determining the criticality of business activities and associated resource requirements to ensure operational resilience and continuity of operations during and after a business disruption.
  3. is the possibility of something bad happening. ________ involves uncertainty about the effects/implications of an activity with respect to something that humans value, often focusing on negative, undesirable consequences.
  4. in computer security, a _____________ is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.
  5. is the identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
  6. should be carried out by anyone who is trained and competent to do so; someone who understands the circumstances, the potential harm and the deviations.
  7. recognizes the areas where you are not compliant with regard to laws, policies or regulations. The resources are at risk for exposure to malicious activity and/or for penalties issued due to non-compliance.
  8. is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.

13 Clues: in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization.also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment....

2003 2013-01-18

2003 crossword puzzle
Across
  1. This position controls entry to restricted areas. They perform duties in one of the most sensitive positions in the Air Force Installation Security Program. They must apply controls that ensure only authorized personnel are admitted to restricted areas
  2. _______supervise and are responsible for ensuring the training of the following personnel. Training includes on-the-job and proficiency training requirements.
  3. HQ Air Force Security Force Center provides Air Force commanders with guidance on implementation of DAF Civilian Police and Security Guard program to include guidance on organizing, training, and _________ DAF Civilian Police and Security Guards.
  4. AF/A7S serves as _____________of DAF CP/SG career field.
Down
  1. ___________ are required at all installations supporting Protection Level 1, 2, or 3 resources. These teams are response elements consisting of two properly armed and equipped Security Forces members.
  2. These individuals establish command unique programs and policies to ensure the effective use of the DAF Civilian Police and Security Guards in the protection of command installations, personnel and resources. Responsible for primarily managing and guiding Security Forces programs within their commands.
  3. This position consists of four Security Forces members on one team, or any combination of internal and external SRTs who respond to situations involving protection level resources and may work in smaller teams.
  4. This position is responsible for base security and protection outside of restricted/controlled areas in addition to the following: responds to emergencies and calls for assistance, secures crime scenes and collects evidence, utilizes specialized equipment, takes reports and statements, conducts building checks, and finally accomplishes any other assigned duties.

8 Clues: AF/A7S serves as _____________of DAF CP/SG career field._______supervise and are responsible for ensuring the training of the following personnel. Training includes on-the-job and proficiency training requirements....

2003 2013-01-18

2003 crossword puzzle
Across
  1. This position controls entry to restricted areas. They perform duties in one of the most sensitive positions in the Air Force Installation Security Program. They must apply controls that ensure only authorized personnel are admitted to restricted areas
  2. AF/A7S serves as _____________of DAF CP/SG career field.
  3. _______supervise and are responsible for ensuring the training of the following personnel. Training includes on-the-job and proficiency training requirements.
  4. HQ Air Force Security Force Center provides Air Force commanders with guidance on implementation of DAF Civilian Police and Security Guard program to include guidance on organizing, training, and _________ DAF Civilian Police and Security Guards.
  5. These individuals establish command unique programs and policies to ensure the effective use of the DAF Civilian Police and Security Guards in the protection of command installations, personnel and resources. Responsible for primarily managing and guiding Security Forces programs within their commands.
Down
  1. This position consists of four Security Forces members on one team, or any combination of internal and external SRTs who respond to situations involving protection level resources and may work in smaller teams.
  2. ___________ are required at all installations supporting Protection Level 1, 2, or 3 resources. These teams are response elements consisting of two properly armed and equipped Security Forces members.
  3. Patrols _______ Patrols are responsible for base security and protection outside of restricted/controlled areas in addition to the following: responds to emergencies and calls for assistance, secures crime scenes and collects evidence, utilizes specialized equipment, takes reports and statements, conducts building checks, and finally accomplishes any other assigned duties.

8 Clues: AF/A7S serves as _____________of DAF CP/SG career field._______supervise and are responsible for ensuring the training of the following personnel. Training includes on-the-job and proficiency training requirements....

Marie Van Brittan Brown 2023-02-28

Marie Van Brittan Brown crossword puzzle
Across
  1. was marie a ever a nurse?
  2. American inventor marie was the first??
  3. system
  4. what were some of the things?
  5. There were also ?
  6. who helped Marie Van Brittan Brown?
Down
  1. who were the future inventors of home
  2. when was it invented?
  3. That helped some people check thier?
  4. Brown who invetned home security systems?

10 Clues: systemThere were also ?when was it invented?was marie a ever a nurse?what were some of the things?who helped Marie Van Brittan Brown?That helped some people check thier?who were the future inventors of homeAmerican inventor marie was the first??Brown who invetned home security systems?

Work and jobs - 1 2021-11-26

Work and jobs - 1 crossword puzzle
Across
  1. soldier
  2. security guard
  3. paramedic
  4. artist
  5. sportsperson
  6. outdoors
Down
  1. goldsmith
  2. undertaker
  3. carpenter
  4. construction worker
  5. police officer
  6. car mechanic
  7. cook
  8. shop assistant

14 Clues: cookartistsoldieroutdoorsgoldsmithcarpenterparamedicundertakercar mechanicsportspersonpolice officersecurity guardshop assistantconstruction worker

abcd 2023-12-22

abcd crossword puzzle
Across
  1. j
  2. e
  3. a
  4. f
  5. k
  6. m
  7. d
Down
  1. l
  2. n
  3. b
  4. c
  5. h
  6. i
  7. g

14 Clues: jlnbechaigfkmd

CYBERCRIME 2021-07-11

CYBERCRIME crossword puzzle
Across
  1. A politically- or ideologically-motivated cyber attack or hack.
  2. A way to access electonic system by bypassing some or all security mechanisms.
  3. A satellite navigation system that indentifies the precise lovation of the transmitting device.
  4. The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
  5. Malicious software, such as a virus or worm, that attacks a target computer.
  6. The overaching program that runs all the functions on a computer or other electronic device.
  7. A company that offers access the internet.
  8. A camera connectee to computer l, generally used to then stream videos to the internet.
  9. Resource to be accessed, often expressed as a time period.
  10. Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
  11. The process ofnusing a
  12. Determining the identity or location of an attacker or an attacker's intermediary.
  13. The interdependent network of information technology, infrastructures that includes internet.
  14. Hardware or software designed to prevent unathorized users from accessing a computer system.
  15. A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
  16. A network point that acts an entrance to another network
  17. A unique internet identifier registered
  18. An online journal.
  19. A program used to access the internet.
  20. Assurance that remains private and no one sees it except for those expected to see it.
  21. A program that masks something harmful, such as a worm or virus, that it carries into a device.
Down
  1. Attempting to mimic an official email from a trusted organization to lire individuals.
  2. Refer to someone who gains access to a system, software, or hardware without permission.
  3. A log that chronicles any changes made to a document, presentation, software applications, etc.
  4. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
  5. Are a botnet of comprised hosts, controlled by a single intentity.
  6. A unique internet identifier registered to an entity.
  7. An information packet sent from website to a web browser that records a user's activity on the website.
  8. algorithm against data to produce a numeric value that is representative that data.
  9. Stands for "Wireless Fidelity".
  10. A software robot that performs automated tasks.
  11. The act of one individual harrasing or intimidating another individual via the interner.
  12. Unsolicited advertising or other information sent out via email or other messaging service.
  13. A massed data that is used to describe large amounts of other internet data.
  14. A grou of computers that is linked to share data and othe information.
  15. A website that finds information across the Internet based on a set of search criteria.
  16. an entity.
  17. A network security measure in which information is encoded or scrambled prior to transmission.
  18. Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
  19. The changes in data caused by an intruder or investigator accessing files and running applications or process.
  20. Aim to overwhelm the resources of a targeted system to crash that system.

41 Clues: an entity.An online journal.The process ofnusing aStands for "Wireless Fidelity".A program used to access the internet.A unique internet identifier registeredA company that offers access the internet.A software robot that performs automated tasks.A unique internet identifier registered to an entity....

CYBERCRIME 2021-07-11

CYBERCRIME crossword puzzle
Across
  1. The interdependent network of information technology, infrastructures that includes internet.
  2. A grou of computers that is linked to share data and othe information.
  3. A log that chronicles any changes made to a document, presentation, software applications, etc.
  4. A program that masks something harmful, such as a worm or virus, that it carries into a device.
  5. The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
  6. The act of one individual harrasing or intimidating another individual via the interner.
  7. Resource to be accessed, often expressed as a time period.
  8. Refer to someone who gains access to a system, software, or hardware without permission.
  9. A company that offers access the internet.
  10. A network point that acts an entrance to another network
  11. A website that finds information across the Internet based on a set of search criteria.
  12. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
  13. A massed data that is used to describe large amounts of other internet data.
  14. Stands for "Wireless Fidelity".
  15. Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
  16. An online journal.
  17. Aim to overwhelm the resources of a targeted system to crash that system.
  18. The overaching program that runs all the functions on a computer or other electronic device.
  19. The changes in data caused by an intruder or investigator accessing files and running applications or process.
  20. An information packet sent from website to a web browser that records a user's activity on the website.
Down
  1. Assurance that remains private and no one sees it except for those expected to see it.
  2. algorithm against data to produce a numeric value that is representative that data.
  3. A program used to access the internet.
  4. Are a botnet of comprised hosts, controlled by a single intentity.
  5. A politically- or ideologically-motivated cyber attack or hack.
  6. Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
  7. The process ofnusing a
  8. A unique internet identifier registered
  9. A network security measure in which information is encoded or scrambled prior to transmission.
  10. A satellite navigation system that indentifies the precise lovation of the transmitting device.
  11. Hardware or software designed to prevent unathorized users from accessing a computer system.
  12. A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
  13. an entity.
  14. A software robot that performs automated tasks.
  15. A unique internet identifier registered to an entity.
  16. A way to access electonic system by bypassing some or all security mechanisms.
  17. A camera connectee to computer l, generally used to then stream videos to the internet.
  18. Determining the identity or location of an attacker or an attacker's intermediary.
  19. Unsolicited advertising or other information sent out via email or other messaging service.
  20. Malicious software, such as a virus or worm, that attacks a target computer.
  21. Attempting to mimic an official email from a trusted organization to lire individuals.

41 Clues: an entity.An online journal.The process ofnusing aStands for "Wireless Fidelity".A program used to access the internet.A unique internet identifier registeredA company that offers access the internet.A software robot that performs automated tasks.A unique internet identifier registered to an entity....

Computer Terminology 2024-08-26

Computer Terminology crossword puzzle
Across
  1. An organized collection of data that can be easily accessed, managed, and updated, often used for storing and retrieving information.
  2. The software that manages a computer’s hardware and provides services for other software. Examples include Windows, macOS, and Linux.
  3. The amount of data that can be transmitted over a network in a given period of time, affecting the speed and performance of internet connections.
  4. A set of instructions that a computer follows to perform a specific task, also known as software or an application.
  5. A virtual container used to organize files on a computer.
  6. A collection of data or information stored on a computer, such as a document, image, or video.
  7. Computing Using remote servers on the internet to store, manage, and process data, rather than relying on local servers or personal computers.
  8. A software program designed to perform a specific function or task, like a word processor or a game.
  9. The address used to access a specific website or resource on the internet.
  10. A small piece of data stored by a web browser that helps remember user preferences and login information.
  11. A step-by-step set of instructions designed to perform a task or solve a problem.
  12. Interface (UI) The means by which a user interacts with a computer or software, including elements like buttons, menus, and icons.
  13. Software used to access and navigate the internet, such as Google Chrome, Mozilla Firefox, or Safari.
  14. A type of malicious software designed to harm or exploit computers, often by corrupting or deleting data.
  15. The standard language used to create and design webpages.
Down
  1. The process of converting data into a code to prevent unauthorized access, ensuring privacy and security.
  2. A programming language commonly used to create interactive effects within web browsers.
  3. A language used to describe the presentation of a document written in HTML, including layout, colors, and fonts.
  4. The process of finding and fixing errors or bugs in a computer program.
  5. Any external device connected to a computer, such as a mouse, keyboard, or external hard drive.
  6. A security system designed to prevent unauthorized access to or from a network, often used to protect computers from cyber threats.
  7. A key combination or icon that provides quick access to a function or application.
  8. A program or application used to organize, analyze, and store data in tabular form, such as Microsoft Excel or Google Sheets.
  9. Device A hardware device used to provide data to a computer, such as a keyboard, mouse, or scanner.
  10. The physical components of a computer system, such as the monitor, keyboard, and processor.
  11. Device A hardware device used to receive and display data from a computer, such as a monitor, printer, or speakers.
  12. Storage A service that allows users to save and access their files over the internet instead of on a local hard drive.
  13. A group of interconnected computers and devices that share resources and information.
  14. Programs and applications that run on a computer and perform various tasks, like word processing or web browsing.
  15. A global network of interconnected computers that communicate using standardized protocols, allowing access to websites and online services.

30 Clues: A virtual container used to organize files on a computer.The standard language used to create and design webpages.The process of finding and fixing errors or bugs in a computer program.The address used to access a specific website or resource on the internet.A step-by-step set of instructions designed to perform a task or solve a problem....

Security Plus Chapter 4 2024-03-07

Security Plus Chapter 4 crossword puzzle
Across
  1. validate a main domain along with all subdomains
  2. An entity that is trusted by others
  3. digitally sign a program
  4. A list of certificate serial numbers that have been revoked
  5. an extension to X.509 that allows various values to be associated with a security certificate
  6. replaces SSL
  7. Tracing a certificate back to the highest level of a CA
  8. publicly accessible centralized directory of digital certificates
  9. Data that is encapsulated within a secure outer shell
  10. A method of controlling public keys
  11. performs a real-time lookup of a certificate’s status
Down
  1. multiple CAs that sign digital certificates
  2. management of keys and digital certificates at scale
  3. web servers send queries to the OCSP Responder
  4. confidence in or reliance on another person/entity
  5. associate a user’s identity to a public key
  6. The entity that is responsible for digital certificates
  7. A process in which keys are managed by a third party
  8. A protocol suite for securing Internet Protocol (IP) communications

19 Clues: replaces SSLdigitally sign a programAn entity that is trusted by othersA method of controlling public keysmultiple CAs that sign digital certificatesassociate a user’s identity to a public keyweb servers send queries to the OCSP Respondervalidate a main domain along with all subdomainsconfidence in or reliance on another person/entity...

Chapter 8 Security Plus 2024-03-20

Chapter 8 Security Plus crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

Cyber Security 2017-06-30

Cyber Security crossword puzzle
Across
  1. a type of hidden virus that can come out itself at any time
Down
  1. another type of virus that can cause lots of pop ups

2 Clues: another type of virus that can cause lots of pop upsa type of hidden virus that can come out itself at any time

jobs 2015-12-10

jobs crossword puzzle
Across
  1. Koch
  2. Tierpfleger
  3. Maler
  4. Verkäufer/in
  5. arbeiten
  6. Sicherheit
  7. Gärtner
Down
  1. Bäcker
  2. LKW-Fahrer
  3. Geld
  4. Friseur
  5. Supermarkt
  6. Lehrerin

13 Clues: KochGeldMalerBäckerFriseurGärtnerLehrerinarbeitenLKW-FahrerSupermarktSicherheitTierpflegerVerkäufer/in

9-1-1 Officer Ch 4 Police Overview 2023-03-15

9-1-1 Officer Ch 4  Police Overview crossword puzzle
Across
  1. The misappropriation of money
  2. Forcibly taking someone's vehicle
  3. Geographical area of authority
  4. _______ Services Division includes vehicle maintenance
  5. Division that includes Chief or Sheriff
  6. _______Process includes child support warrants
Down
  1. Division that handles safe transfer of inmates
  2. _______ Patrol Division is primarily sworn officers
  3. Security provides security for judges
  4. ________ Warrants handles execution of warrants

10 Clues: The misappropriation of moneyGeographical area of authorityForcibly taking someone's vehicleSecurity provides security for judgesDivision that includes Chief or SheriffDivision that handles safe transfer of inmates_______Process includes child support warrants________ Warrants handles execution of warrants...

Credit Card 2024-05-23

Credit Card crossword puzzle
Across
  1. The measure of your credit health.
  2. The cost sometimes charged for card use or for missing payments.
  3. The security code that shows you are in possession of the card.
  4. The time between a purchase and when the bill must be paid.
  5. The agreement to use money from a financial institution with an agreement to pay it back.
  6. Your credit history can be requested by an _______________ for hiring decisions.
  7. How much you pay for ________________ may be related to your credit history.
  8. The bonus returned to you for regular use of the credit card.
Down
  1. A risk of credit card convenience can be ___________________.
  2. A security device in your credit card.
  3. Money owed for purchases made with a financial loan.
  4. The percentage rate of the debt when you don't pay your bill in full.
  5. Your minimum payment amount can be found on your credit card _______.
  6. You will not have to pay any ________________ if you pay your bill in-full before the first due date.
  7. The plastic tool that contains security features and your credit account name and number.

15 Clues: The measure of your credit health.A security device in your credit card.Money owed for purchases made with a financial loan.The time between a purchase and when the bill must be paid.A risk of credit card convenience can be ___________________.The bonus returned to you for regular use of the credit card....

SOAL KABINET SUKIMAN 2024-10-17

SOAL KABINET SUKIMAN crossword puzzle
Across
  1. tugas utama dari Kabinet Sukiman adalah menjaga stabilitas keamanan...
  2. Siapa yang menjadi Wakil Perdana Menteri dalam Kabinet Sukiman?
  3. Apakah nama perjanjian bantuan militer yang ditandatangani oleh Kabinet Sukiman dengan Amerika Serikat?
  4. Kabinet sukiman suwiryo bertugas selama...bulan
  5. Tujuan dari penyelenggaraan pemilihan umum yang direncanakan Kabinet Sukiman adalah untuk membentuk dewan?
  6. Kabinet Sukiman-Suwirjo diumumkan pada 26...1951
  7. Perjanjian Mutual Security Act membuat Indonesia dianggap sebagai bagian dari?
  8. Salah satu program Kabinet Sukiman-Suwirjo adalah mempercepat penempatan mantan pejuang dalam...
Down
  1. Kebijakan politik luar negeri yang dijalankan oleh Kabinet Sukiman-Suwirjo bersifat?
  2. Akibat dari kritik dan tekanan terhadap ditandatanganinya perjanjian Mutual Security Act adalah Kabinet Soekiman mengembalikan amanat kepada?
  3. Wilayah apa yang ingin dimasukkan ke dalam Republik Indonesia dalam waktu sesingkat-singkatnya menurut Kabinet Sukiman-Suwirjo?
  4. Program kemakmuran nasional jangka pendek yang dicanangkan Kabinet Sukiman bertujuan untuk meningkatkan kehidupan?
  5. Siapa yang menandatangani perjanjian Mutual Security Act di pihak Amerika Serikat?
  6. Langkah pertama yang diambil Kabinet Sukiman-Suwirjo adalah Menjalankan tindakan tegas sebagai negara hukum untuk menjamin...
  7. Kabinet Sukiman-Suwirjo adalah kabinet ke berapa setelah pembubaran Republik Indonesia Serikat (RIS)?

15 Clues: Kabinet sukiman suwiryo bertugas selama...bulanKabinet Sukiman-Suwirjo diumumkan pada 26...1951Siapa yang menjadi Wakil Perdana Menteri dalam Kabinet Sukiman?tugas utama dari Kabinet Sukiman adalah menjaga stabilitas keamanan...Perjanjian Mutual Security Act membuat Indonesia dianggap sebagai bagian dari?...

Carson 2021-03-04

Carson crossword puzzle
Across
  1. bullying is?
  2. d of bullying there is an intent to hurt them
  3. punching kicking spitting.
  4. spreading rumors, exuding people from games.
  5. making fun of how someone looks and moves.
  6. pretending to be someone else on the internet.
Down
  1. no one is having fun, there is a solution.
  2. name calling
  3. b of bullying taller or shorter than someone else and think he or she is an easy target.
  4. everyone is having fun no one is hurt.
  5. c of bullying bullying constantly
  6. writing mean things about people on social media.
  7. a of bullying physical bully

13 Clues: name callingbullying is?punching kicking spitting.a of bullying physical bullyc of bullying bullying constantlyeveryone is having fun no one is hurt.no one is having fun, there is a solution.making fun of how someone looks and moves.spreading rumors, exuding people from games.d of bullying there is an intent to hurt them...

Mystery, Fashion, Business, Japan, Gaming 2025-05-08

Mystery, Fashion, Business, Japan, Gaming crossword puzzle
Across
  1. To interact with followers' content
  2. To kill an enemy player in Valorant
  3. Your online identity and information
  4. Feeling that someone can't be trusted; important for online safety
  5. Bright, glowing colors often used in cyber aesthetics
  6. Popular topic or style that many people follow online
  7. Winning against the odds, often alone in gaming
Down
  1. A certain style or look for your online presence
  2. A cool, futuristic electronic device
  3. Your unique identity and style online
  4. The tech system that decides what content people see
  5. Being genuine and true to yourself online
  6. To earn money from online content

13 Clues: To earn money from online contentTo interact with followers' contentTo kill an enemy player in ValorantA cool, futuristic electronic deviceYour online identity and informationYour unique identity and style onlineBeing genuine and true to yourself onlineWinning against the odds, often alone in gamingA certain style or look for your online presence...

Chapter 1 part 1 2023-09-23

Chapter 1 part 1 crossword puzzle
Across
  1. personal details
  2. nationality
  3. phone number
  4. postal code
  5. last name
  6. city, town
  7. email address
  8. man
  9. first name
Down
  1. social security number
  2. gender
  3. language
  4. date of birth
  5. address
  6. woman
  7. name

16 Clues: mannamewomangenderaddresslanguagelast namecity, townfirst namenationalitypostal codephone numberdate of birthemail addresspersonal detailssocial security number

mc 2025-03-19

mc crossword puzzle
Across
  1. WTLS provides this to verify the identity of the communicating parties
  2. The layer in WAP responsible for managing session states
  3. The layer in WAP responsible for security
  4. WTLS provides this to ensure data is private
  5. The protocol used in the Security Layer of WAP
  6. WTLS is optimized for this type of bandwidth
Down
  1. WTLS is designed to work efficiently in this type of delay network
  2. WTLS is based on this protocol
  3. WTLS provides this to ensure data has not been tampered with
  4. WTLS is based on this protocol

10 Clues: WTLS is based on this protocolWTLS is based on this protocolThe layer in WAP responsible for securityWTLS provides this to ensure data is privateWTLS is optimized for this type of bandwidthThe protocol used in the Security Layer of WAPThe layer in WAP responsible for managing session states...

CASP - Governance 2022-01-26

CASP - Governance crossword puzzle
Across
  1. protects patient's healthcare information
  2. International standard on how to manage information security
  3. Guide to test, training, and exercise programs for IT Plans and capabilities
  4. International framework and process for managing risk
Down
  1. protects the data of financial institution customers
  2. supplementary standard that provides advice on how to implement security controls
  3. covers the steps in the RMF that address security control selection for federal information systems
  4. protects financial information of public companies
  5. 27031 Guidelines for information and communication technology readiness for business continuity

9 Clues: protects patient's healthcare informationprotects financial information of public companiesprotects the data of financial institution customersInternational framework and process for managing riskInternational standard on how to manage information securityGuide to test, training, and exercise programs for IT Plans and capabilities...

CIS Knowledge Hub 2025-02-20

CIS Knowledge Hub crossword puzzle
Across
  1. Which Microsoft-owned SAST platform focuses on secure code analysis?
  2. Which security test simulates a real attack on a system?
  3. Which testing mixes internal knowledge and external behavior?
  4. Which testing checks functionality without seeing the internal code?
  5. Which analysis tests security while the application is running?
  6. Which free DAST tool from OWASP scans running web apps?
Down
  1. Which testing is done with full visibility of code?
  2. Which analysis scans source code for vulnerabilities?
  3. Which DAST tool by PortSwigger is used widely for web security testing?

9 Clues: Which testing is done with full visibility of code?Which analysis scans source code for vulnerabilities?Which free DAST tool from OWASP scans running web apps?Which security test simulates a real attack on a system?Which testing mixes internal knowledge and external behavior?Which analysis tests security while the application is running?...

EXERCISE 4.1 2020-03-30

EXERCISE 4.1 crossword puzzle
Across
  1. who created the Banaue Rice Terraces
  2. this president created the National Grains Authority
  3. mode of transportation during the prehistoric Philippines
  4. Who created the videophone?
  5. dubbed as the gloden age of science and technology
  6. implemented the Universal Access to Quality Tertiary Education Act
  7. implemented the cyber act of 1999
  8. Roberto del rosario invented the ___?
  9. what field of science given priority in the Spanish era
Down
  1. created the prject " doctors to the bario"
  2. fe del mundo invented the ___?
  3. described as dark, brown and short prehistoric people in the philippines
  4. Most advance civilization during the prehistoric philippines
  5. Dr. Abelardo aguilar created the _____?

14 Clues: Who created the videophone?fe del mundo invented the ___?implemented the cyber act of 1999who created the Banaue Rice TerracesRoberto del rosario invented the ___?Dr. Abelardo aguilar created the _____?created the prject " doctors to the bario"dubbed as the gloden age of science and technologythis president created the National Grains Authority...

Bullying Crossword Puzzle 2020-11-30

Bullying Crossword Puzzle crossword puzzle
Across
  1. what is the c in bullying
  2. someone is being hurt in an isolated event
  3. spreading rumors excluding people from games and groups
  4. punching,kicking, and spitting
  5. what is the b in bullying
  6. someone who stands by and lets something happen
Down
  1. No one is having fun there is a possible solution
  2. Name calling, threatning
  3. what is the a in bullying
  4. uneaqual balance of power and is rude over and over again
  5. what is the d in bullying
  6. writing mean things on someones facebook, instagram, or twitter, and texting
  7. stands up to a bully
  8. everyone is having fun and no one is getting hurt

14 Clues: stands up to a bullyName calling, threatningwhat is the c in bullyingwhat is the a in bullyingwhat is the d in bullyingwhat is the b in bullyingpunching,kicking, and spittingsomeone is being hurt in an isolated eventsomeone who stands by and lets something happenNo one is having fun there is a possible solution...

Scorpion 2025-08-22

Scorpion crossword puzzle
Across
  1. Human calculator, math genius with OCD
  2. Homeland Security agent who mentors and protects the team
  3. Toby’s profession
  4. Walter’s main skill, besides inventing solutions
  5. What eventually grows between Walter and Paige
  6. Former waitress who helps the team connect emotionally
  7. Team shrink and behaviorist with gambling issues
  8. What the group calls themselves, despite constant clashes
Down
  1. Paige’s genius son mentored by Walter
  2. Word often used to describe the group’s members
  3. Team leader with a genius IQ of 197
  4. Security agency Cabe works for
  5. Name of the genius team in the show
  6. Happy’s area of expertise
  7. Mechanical prodigy and only female genius on the team
  8. What Sylvester is often compared to
  9. Walter’s sister, battled multiple sclerosis

17 Clues: Toby’s professionHappy’s area of expertiseSecurity agency Cabe works forTeam leader with a genius IQ of 197Name of the genius team in the showWhat Sylvester is often compared toPaige’s genius son mentored by WalterHuman calculator, math genius with OCDWalter’s sister, battled multiple sclerosisWhat eventually grows between Walter and Paige...

Thanksgiving Crossword 2021-10-07

Thanksgiving Crossword crossword puzzle
Across
  1. A yellow vegetable grown by the Aboriginals
  2. ___ a pie in the oven
  3. A dessert eaten at Thanksgiving
  4. ___ the table before dinner
  5. A long journey over the ocean
  6. An object used to frighten birds
  7. ___ a turkey in the oven
  8. The month of Thanksgiving in Canada
  9. Something cooked inside the turkey
  10. Macy's has this festival every year
  11. Online shopping is popular on ___ Monday
  12. Gather the crops
Down
  1. The sound a turkey makes
  2. A popular sport played on Thanksgiving
  3. The early settlers who came to America in 1620
  4. The evening meal
  5. A large dinner celebration
  6. ___ Frobisher was an English explorer
  7. The nut of an oak tree
  8. A sauce that is poured over the turkey
  9. Americans ___ Thanksgiving in November
  10. Use a knife to ___ the turkey
  11. A white vegetable that resembles a pumpkin

23 Clues: The evening mealGather the crops___ a pie in the ovenThe nut of an oak treeThe sound a turkey makes___ a turkey in the ovenA large dinner celebration___ the table before dinnerA long journey over the oceanUse a knife to ___ the turkeyA dessert eaten at ThanksgivingAn object used to frighten birdsSomething cooked inside the turkey...

BFCM 2024 2024-11-25

BFCM 2024 crossword puzzle
Across
  1. Pop artist Keith ......
  2. Our Bridgerton collection includes a design Fit For A .....
  3. Our Holiday Steals sale code ....24
  4. Rainbow rug name
  5. Black Friday/.... Monday
  6. Copenhagen is the capital city of this country.
  7. City that is home to our Australian plant.
  8. Who is the most inspirational frog?
  9. Customer Care Cup team led by Paul, ..... Finessers
  10. Jungalow founder and Ruggable collaborator Justina .....
  11. Customer Care Cup team led Lessly, Resolution .....
Down
  1. Nicki and Paris
  2. Day of the week our sale ends
  3. Large doormats
  4. Main color of the South Korean flag.
  5. Fun channel on Slack.
  6. Kamran Blue ...... Rug
  7. Customer Care Cup team led by Aja, Customer Support ...
  8. Customer Care Cup team led by Nohemi, The .... Crew
  9. Type of mattress in our pet beds.
  10. 2.5'x7' & 2.5'x10' rugs for example.

21 Clues: Large doormatsNicki and ParisRainbow rug nameFun channel on Slack.Pop artist Keith ......Kamran Blue ...... RugBlack Friday/.... MondayDay of the week our sale endsType of mattress in our pet beds.Our Holiday Steals sale code ....24Who is the most inspirational frog?Main color of the South Korean flag.2.5'x7' & 2.5'x10' rugs for example....

Browsing Safely 2025-06-19

Browsing Safely crossword puzzle
Across
  1. who commit crimes using the internet or computers.
  2. list of websites, programs, or users that are blocked or denied access to a system or network because they are considered harmful or untrustworthy.
  3. process of converting information into a secret code to prevent unauthorized access. It helps keep data safe when sent over the internet.
  4. list of approved or trusted websites, programs, or users that are allowed to access a system or network.
  5. or junk messages, usually advertisements, sent over the internet, often in large amounts.
  6. Theft-Stealing someone’s personal information (like name, credit card number, or password) to commit fraud or crimes.
  7. files stored on your computer by websites to remember information about you, like login details or site preferences.
  8. use of electronic communication to bully or harass someone, typically by sending threatening
  9. software designed to damage, disrupt, or gain unauthorized access to computers or networks (examples: viruses, worms, spyware).
Down
  1. activities carried out using computers or the internet, such as hacking, data theft, or spreading viruses.
  2. method used by cybercriminals to trick people into revealing sensitive information (like passwords or bank details) by pretending to be a trustworthy source (like a bank or company).
  3. Password-A password that is hard to guess, usually made up of a mix of uppercase and lowercase letters, numbers, and special characters (e.g., P@ssw0rd!123), and is at least 8–12 characters long.
  4. security system (software or hardware) that blocks unauthorized access to or from a private network or computer, helping to protect against cyber threats.
  5. that automatically displays or downloads advertisements when you're online, often without your full knowledge or consent.
  6. type of malware that secretly gathers information from your device (like browsing habits or personal data) without your permission.

15 Clues: who commit crimes using the internet or computers.or junk messages, usually advertisements, sent over the internet, often in large amounts.use of electronic communication to bully or harass someone, typically by sending threateninglist of approved or trusted websites, programs, or users that are allowed to access a system or network....

Museum 2023-05-23

Museum crossword puzzle
Across
  1. Магазин сувениров
  2. Посетитель
  3. Лондон
  4. звезда
  5. скульптура
  6. Ложные новости
Down
  1. выставка
  2. Карта
  3. экскурсовод
  4. произведение искусства
  5. Охрана
  6. Билет
  7. кафетерий

13 Clues: КартаБилетЛондонОхраназвездавыставкакафетерийПосетительскульптураэкскурсоводЛожные новостиМагазин сувенировпроизведение искусства

No privacy 2024-04-19

No privacy crossword puzzle
Across
  1. записывать (на аудио)
  2. наблюдение
  3. безопасность
  4. цель
  5. чтобы
  6. повысить
  7. покупательские привычки
Down
  1. почти
  2. исследование
  3. улучшить
  4. приватность
  5. проводить
  6. хранить

13 Clues: цельпочтичтобыхранитьулучшитьповыситьпроводитьнаблюдениеприватностьисследованиебезопасностьзаписывать (на аудио)покупательские привычки

Time for the Updates! 2023-09-13

Time for the Updates! crossword puzzle
Across
  1. Companies will often release an update to ______ a specific security vulnerability.
  2. Attackers use security vulnerabilities to _______ weaknesses and gain access to your system or network.
  3. All software eventually reaches _______ __ ______ where it is no longer supported with updates and patches. You should avoid using this software at this point.
  4. It’s important to install updates as soon as possible. They are usually released to fix ________ vulnerabilities.
  5. Not updating your software can make your system _______ to hackers or malware.
Down
  1. Whenever possible, you should always enable ______-updates on your computer or cellphone.
  2. Only download and install software updates from _______ sources.
  3. Some software updates may require a device or system ______ to fully install.
  4. It’s very important to install _____ as soon as they are available. This reduces possible security vulnerabilities.

9 Clues: Only download and install software updates from _______ sources.Some software updates may require a device or system ______ to fully install.Not updating your software can make your system _______ to hackers or malware.Companies will often release an update to ______ a specific security vulnerability....

dinny be a bully or a will smash ya head in 2018-11-23

dinny be a bully or a will smash ya head in crossword puzzle
Across
  1. how many people have experienced bullying under the age of 25
  2. how many people have suffered on line bullying
  3. bulling What is the name of internet bulling
  4. what is the biggest killer of males under 40
  5. how many people have experienced verbal bullying
Down
  1. what is louie
  2. what is the form hittng someone
  3. what people are most likely to get target
  4. the well being of your mind

9 Clues: what is louiethe well being of your mindwhat is the form hittng someonewhat people are most likely to get targetbulling What is the name of internet bullingwhat is the biggest killer of males under 40how many people have suffered on line bullyinghow many people have experienced verbal bullying...

the Kennedys 2022-02-13

the Kennedys crossword puzzle
Across
  1. girl friend
  2. future badge
  3. almost bald
  4. gf girl
  5. oldest twin
  6. detective
  7. St Lukes
  8. security
  9. wife
Down
  1. shedder
  2. two dads
  3. youngest twin
  4. first born
  5. has a wife
  6. the best
  7. the baby
  8. southwest

17 Clues: wifesheddergf girltwo dadsthe bestthe babySt Lukessecuritydetectivesouthwestfirst bornhas a wifegirl friendalmost baldoldest twinfuture badgeyoungest twin

Vocabulario 1 2021-09-27

Vocabulario 1 crossword puzzle
Across
  1. airport
  2. departure
  3. gate
  4. seat
  5. ticket
Down
  1. security
  2. suitcase
  3. airline
  4. identification
  5. luggage
  6. board
  7. passport

12 Clues: gateseatboardticketairlineairportluggagesecuritysuitcasepassportdepartureidentification

Airport Cristina 2019-11-28

Airport Cristina crossword puzzle
Across
  1. d
  2. j
  3. i
  4. f
  5. l
  6. a
Down
  1. k
  2. h
  3. e
  4. c
  5. g
  6. b

12 Clues: khdecjgiflba

New Deal Legacy 2024-03-24

New Deal Legacy crossword puzzle
Across
  1. Security
  2. Roosevelt
  3. Impact
  4. Deal
  5. Banking
  6. Movements
Down
  1. Workers
  2. Depression
  3. Government
  4. Involvement
  5. Popularity
  6. Economy

12 Clues: DealImpactWorkersEconomyBankingSecurityRooseveltMovementsDepressionGovernmentPopularityInvolvement

Chashless society 2024-09-02

Chashless society crossword puzzle
Across
  1. How non-cash make it easier to travel?
  2. Reason for declining cash?
  3. What is the dark side of a cashless society?
  4. The impact of cashless on business?
  5. Why is printing money considered a loss?
  6. Why are non-cash payment instruments easier to use than money?
  7. Why are illegal transactions easier with cash?
  8. What are the disadvantages of the non-cash payment system?
  9. Risk of system failure?
  10. Why is cashless more efficient?
  11. Impact of system failure on traders?
Down
  1. What is the main disadvantage of non-cash payments?
  2. What are the main advantages of a cashless system?
  3. What is easy money laundered?
  4. Why do banks need high security in the cash system?
  5. What are the risks of electronic money?
  6. How does cash affect bank security
  7. Cashless concerns?
  8. What are the benefits of going cashless while traveling?
  9. The impact of negative interest rates?

20 Clues: Cashless concerns?Risk of system failure?Reason for declining cash?What is easy money laundered?Why is cashless more efficient?How does cash affect bank securityThe impact of cashless on business?Impact of system failure on traders?How non-cash make it easier to travel?The impact of negative interest rates?What are the risks of electronic money?...

Five Nights at Freddy's 2023-09-07

Five Nights at Freddy's crossword puzzle
Across
  1. How do you defend against animatronic attacks in FNaF Special Delivery
  2. What is the name of the protagonist in Five Nights at Freddy's 3
  3. The main thing you have to do to animatronics in the game in FNaF 6
  4. The security guard's shift lasts for this many hours
  5. What is the objective of the player in "Security Breach"
  6. The animatronic that hides in the dark corners of the restaurant in FNaF 1
  7. The animatronics' objective during the night in FNaF 1
  8. What is the highest difficulty level in Ultimate Custom Night
  9. The animatronic who performs on the Ballora Gallery stage in SL
  10. What animatronic does The Puppet reside in FNaF 6
  11. The animatronic that moves frequently in FNaF 1
  12. The main character you play as in FNaF 2
  13. What is the setting of "Tales From the Pizzaplex"
  14. How many different mini-games are there in "Five Nights at Freddy's: Help Wanted"
  15. The newspaper headlines often seen in the game in FNaF 1
  16. What is the DLC for FNaF Security Breach
  17. The protagonist's primary defense mechanism in FNaF 1
  18. The 2nd most popular Withered animatronic in FNaF 2
  19. What is the ultimate goal of the organization responsible for creating and experimenting on the animatronics
  20. The animatronic that frequently appears in the East Hall in FNaF 1
  21. What is the title of the second novel in the Five Nights at Freddy's book series by Scott Cawthon and Kira Breed-Wrisley, known for its eerie and unsettling characters
  22. The main character and protagonist of FNAF 6, known as the "Cassette Man" in FNaF 6
  23. The room where you wind up the music box to keep the Puppet at bay in FNaF 2
  24. The animatronic that hides in the closet in FNaF 4
  25. Who is the main protagonist in FNaF Silver Eyes
  26. What is the name of Charlie's childhood friend and love interest in "The Silver Eyes"
  27. The creepy marionette that haunts the establishment in FNaF 2
  28. What was the "Curse of Dreadbear" DLC in FNaF: Help Wanted made for
  29. What happens to you when the ventilation system fails in FNaF 3
  30. The task of burning down the establishment is carried out on this night in FNaF 6
  31. In the story, what tragic event from the past continues to haunt the characters and plays a pivotal role in the plot
  32. The name of the horror attraction where the game is set in FNaF 3
  33. What is the purpose of collecting tapes in the game in HW
  34. What is the primary gameplay mechanic in FNaF Special Delivery
  35. The main protagonist of Five Nights at Freddy's 4
  36. Phone Guy is replaced by who in FNaF 3
  37. What is the name of the animatronic who copy's Gregory's voice in SBR
  38. A life-size animatronic bear who entertains during the day in FNaF 2
  39. Who saves you from the Mimic in SBR
  40. Who do you play as in FNaF Security Breach Ruin
  41. What animatronic does William Afton reside in in FNaF Security Breach
  42. What type of animatronics replace the normal ones in FNaF 3
  43. In what year did Five Nights at Freddy's 4 take place
  44. What Twisted animatronic did Foxy dismantle in "The Twisted Ones" Novel
Down
  1. The name of the restaurant where the game takes place in FNaF 1
  2. The name of the underground facility in Sister Location
  3. Who does the player play as in FNaF Security Breach
  4. The animatronic that resembles a Funtime Freddy, with several animatronic parts merged in FNaF 6
  5. The day shift security guard, who leaves recorded messages in FNaF 1
  6. The main character and security guard in FNaF 1
  7. The name of the pizzeria where FNAF 2 takes place
  8. The phone guy's profession
  9. What character do the Minireenas crawl into in "Room for one more"
  10. What is the name of the minigame where you play as Balloon Boy in FNaF 3
  11. What is the Acronym for Five Night at Freddy's
  12. What Twisted animatronic killed Charlie in the "The Twisted Ones" Novel
  13. The room where you access the Ennard control module in SL
  14. What type of game is Freddy in Space 1
  15. Who makes the Fnaf games?
  16. What type of animatronics are in FNaF world
  17. The name of the terrifying yellow animatronic bear in Five Nights at Freddy's 4
  18. The animatronic who is responsible for "scooping" Mike in Sister Location
  19. What is the specific event from Charlie's past that drives her to return to her hometown and investigate the dark history of Freddy Fazbear's Pizza in "The Silver Eyes"
  20. The technician who assists you throughout the game in SL
  21. What role does the player take on in the game's story mode in HW
  22. What is the title of the first book in the Fazbear Frights series
  23. What is the main platform people play Ultimate Custom Night on
  24. What model is Glamrock Freddy in FNaF Security Breach Ruin
  25. The security office's primary source of information in FNaF 1
  26. The animatronic who has a rabbit on his hand in SL
  27. The room where you encounter Funtime Freddy in SL
  28. The animatronic that resembles a broken clown and is a central character in the game in FNaF 6
  29. Who is the main antagonist in "FNaF: Help Wanted"
  30. The man behind the mask
  31. What is the name of the animatronic that replaces Foxy in FNaF Security Breach
  32. In the novel, what is the primary objective of the clandestine organization that experiments on animatronics
  33. Where does the creepy laughter of the animatronics come from
  34. In "Fetch," what is the name of the animatronic dog
  35. The important event that many believe to happen in FNaF 2
  36. How many animatronic characters can you choose from in Ultimate Custom Night

80 Clues: The man behind the maskWho makes the Fnaf games?The phone guy's professionWho saves you from the Mimic in SBRWhat type of game is Freddy in Space 1Phone Guy is replaced by who in FNaF 3The main character you play as in FNaF 2What is the DLC for FNaF Security BreachWhat type of animatronics are in FNaF world...

NSA Crossword 2014-05-17

NSA Crossword crossword puzzle
Across
  1. information or documents designated as secret
  2. country Snowden is currently staying in
  3. keeping tabs on people, a close observation
  4. collection of valuable information
  5. what every person is entitled to
  6. what the NSA is trying to prevent
Down
  1. electronic surveillance program Snowden had been working on
  2. person wanted by authorities of a another nation or state
  3. National Security Agency
  4. NSA agent that leaked governments top-secret documents
  5. not being observed or disturbed by other people
  6. law that Snowden violated
  7. feeling that you are safe
  8. state of being free within society
  9. group of people that make decisions for a country or state
  10. crime of betraying one's country
  11. set of information that gives information about other data

17 Clues: National Security Agencylaw that Snowden violatedfeeling that you are safewhat every person is entitled tocrime of betraying one's countrywhat the NSA is trying to preventstate of being free within societycollection of valuable informationcountry Snowden is currently staying inkeeping tabs on people, a close observation...

Schramm ITSCM 280 rev 2023-02-14

Schramm ITSCM 280 rev crossword puzzle
Across
  1. Redundant Array of Independent Drives
  2. Different kind of data being generated
  3. A disadvantage of big data is high ____ rate.
  4. The ____ layer is the top layer of the OSI model
  5. Network topology with common backbone
  6. Cable with inner conductor wire and insulation
  7. RAID 0 name
  8. The ____ layer is the bottom layer of the OSI model
  9. Emotion security breacher pray on
Down
  1. Cloud where apps and data are business critical
  2. One disadvantage of cloud computing is loss of ___
  3. Mechanism to bring the meaning out of big data
  4. Fastest growing cloud service
  5. A security breach activity using email
  6. OSI layer where IP address is used
  7. MAC address stands for Media Access _____
  8. Increase ____ is a disadvantage of big data
  9. Abbreviation for Distributed Denial of Service

18 Clues: RAID 0 nameFastest growing cloud serviceEmotion security breacher pray onOSI layer where IP address is usedRedundant Array of Independent DrivesNetwork topology with common backboneDifferent kind of data being generatedA security breach activity using emailMAC address stands for Media Access _____Increase ____ is a disadvantage of big data...

JOBS OR OCCUPATIONS 2023-11-10

JOBS OR OCCUPATIONS crossword puzzle
Across
  1. A person who spends his/her mental or physical power
  2. A person who reports events
  3. A person who deals with people's lives
  4. A person who can use transportation vehicles
  5. A person who maintains security of country
  6. A person who designs and maintains machines
Down
  1. A person who produces fruits, vegetables
  2. Woman serving in restaurants
  3. Men serving in restaurants
  4. A person who designs home, cities
  5. A person who vaccinates people
  6. A person who maintains security of city

12 Clues: Men serving in restaurantsA person who reports eventsWoman serving in restaurantsA person who vaccinates peopleA person who designs home, citiesA person who deals with people's livesA person who maintains security of cityA person who produces fruits, vegetablesA person who maintains security of countryA person who designs and maintains machines...

worlsa 2025-01-13

worlsa crossword puzzle
Across
  1. Food
  2. Justice
  3. Education
  4. Dignity
Down
  1. Employment
  2. Rights Civil Rights
  3. Security

7 Clues: FoodJusticeDignitySecurityEducationEmploymentRights Civil Rights

technology vocabulary 2021-08-13

technology vocabulary crossword puzzle
Across
  1. put into format that can be read or processed by computers
  2. set up for a particular purpose
  3. a unit of measurement of information
  4. crime commited using a computer and the internet
  5. transfer a file or program to a smaller computer
  6. space a world wide network of of computer networks
  7. any small compartment
  8. an organized body of related information
Down
  1. a program thatgives a computer instrucctions
  2. a listing of the computer files stored in memory
  3. the exclusive right to sell a work
  4. locate and correct errors in a computer program code
  5. transfer a file or program to a smaller computer
  6. restore something reduced in volume to it's full volume
  7. a data transmmision rate for modems

15 Clues: any small compartmentset up for a particular purposethe exclusive right to sell a worka data transmmision rate for modemsa unit of measurement of informationan organized body of related informationa program thatgives a computer instrucctionsa listing of the computer files stored in memorycrime commited using a computer and the internet...

Reisen 2021-04-28

Reisen crossword puzzle
Across
  1. to wait
  2. customs
  3. plane passenger
  4. airport
  5. visit
  6. security
  7. passport
  8. to take a trip
  9. boarding pass
  10. aisle
Down
  1. seat
  2. to go on vacation
  3. to pack a suitcase
  4. sights
  5. arrive
  6. Have a good trip
  7. travel
  8. destination

18 Clues: seatvisitaislesightsarrivetravelto waitcustomsairportsecuritypassportdestinationboarding passto take a tripplane passengerHave a good tripto go on vacationto pack a suitcase

passcode to win the Spanish war 2021-11-01

passcode to win the Spanish war crossword puzzle
Across
  1. policy
  2. of the Maine
  3. Riders
  4. Lome Letter
  5. Aguinaldo
  6. Randolph Hearst
  7. William McKinley
  8. Doctrine
Down
  1. Amendment
  2. Policy
  3. Roosevelt
  4. Maine
  5. security
  6. of San Juan Hill
  7. Soldiers
  8. journalism

16 Clues: MainepolicyPolicyRiderssecuritySoldiersDoctrineAmendmentRooseveltAguinaldojournalismLome Letterof the MaineRandolph Hearstof San Juan HillWilliam McKinley

Tech definitions 2016-08-31

Tech definitions crossword puzzle
Across
  1. Computer-aid design for techs and artists
  2. The code to let us run the software.
  3. It is a common measurement for data speed
  4. A network security system
  5. The first page you get to when you open the internet
  6. Local area network
  7. It is the most effective way to get data security
  8. To prepare a chosen partition on the drive.
Down
  1. printing A printer that prints a 3 dimensional figure
  2. the indicator that is on the screen
  3. It is used to create complete applications
  4. management systems
  5. the most widely used internet in that local area
  6. The measurement of data that is transferred in a second
  7. A person who gets into someone else's account.
  8. the internet
  9. Joint Photographic Experts Group
  10. Domain name system

18 Clues: the internetmanagement systemsLocal area networkDomain name systemA network security systemJoint Photographic Experts Groupthe indicator that is on the screenThe code to let us run the software.Computer-aid design for techs and artistsIt is a common measurement for data speedIt is used to create complete applications...

2025 Cybersecurity Awareness Month 2025-09-08

2025 Cybersecurity Awareness Month crossword puzzle
Across
  1. Fake system set up to lure hackers.
  2. Unauthorized access to data or systems
  3. Fake emails or messages to steal information
  4. Malware that locks files and demands payment.
  5. Code used to take advantage of a vulnerability.
  6. Hacker intercepts communication between two parties.
  7. Securing data by converting it into unreadable code.
  8. Encrypts internet traffic for secure browsing
Down
  1. Authentication Verifying identity using two methods.
  2. EU law protecting personal data privacy.
  3. Security barrier between trusted and untrusted networks.
  4. Process of verifying a user’s identity.
  5. Username and password for authentication.
  6. Malicious code that spreads through files or programs
  7. Software that protects against malicious programs.
  8. Malware disguised as legitimate software.
  9. Isolated environment for testing suspicious files
  10. Security rules for handling credit card data.

18 Clues: Fake system set up to lure hackers.Unauthorized access to data or systemsProcess of verifying a user’s identity.EU law protecting personal data privacy.Username and password for authentication.Malware disguised as legitimate software.Fake emails or messages to steal informationMalware that locks files and demands payment....

Alliances 2019-01-23

Alliances crossword puzzle
Across
  1. many countries are apart of it
  2. a necessity to bored a plane
  3. has a death penalty
  4. a list of true statements
  5. a storage unit for keeping items whilst traveling
  6. another word for company
  7. shortened for European Union
  8. A form of defense for citizens
  9. another word for an army or a troop of modern soldiers
Down
  1. an area that contains helpful information
  2. what was the end of the title of the first slide on the board
  3. Shortened for International Security Assistance Force
  4. an agreement between two or more states or countries
  5. can leak out of airport body scanners
  6. headquarters are located in the Netherlands

15 Clues: has a death penaltyanother word for companya list of true statementsa necessity to bored a planeshortened for European Unionmany countries are apart of itA form of defense for citizenscan leak out of airport body scannersan area that contains helpful informationheadquarters are located in the Netherlands...

Alliances 2019-01-23

Alliances crossword puzzle
Across
  1. many countries are apart of it
  2. a necessity to bored a plane
  3. has a death penalty
  4. a list of true statements
  5. a storage unit for keeping items whilst traveling
  6. another word for company
  7. shortened for European Union
  8. A form of defense for citizens
  9. another word for an army or a troop of modern soldiers
Down
  1. an area that contains helpful information
  2. what was the end of the title of the first slide on the board
  3. Shortened for International Security Assistance Force
  4. an agreement between two or more states or countries
  5. can leak out of airport body scanners
  6. headquarters are located in the Netherlands

15 Clues: has a death penaltyanother word for companya list of true statementsa necessity to bored a planeshortened for European Unionmany countries are apart of itA form of defense for citizenscan leak out of airport body scannersan area that contains helpful informationheadquarters are located in the Netherlands...

Jobs Are Here 2015-04-27

Jobs Are Here crossword puzzle
Across
  1. Healty
  2. Cook
  3. Farm
  4. Game
  5. Justice
  6. Electricity
  7. Mrs Doctor
Down
  1. Security
  2. Fire
  3. Good Sound
  4. School
  5. Mystery - Murder
  6. Draw - Paint
  7. Find Precious Stones

14 Clues: CookFireFarmGameHealtySchoolJusticeSecurityGood SoundMrs DoctorElectricityDraw - PaintMystery - MurderFind Precious Stones

chapter 5 2022-10-24

chapter 5 crossword puzzle
Across
  1. principles of policing
  2. bureau
  3. security
  4. marshals
  5. watch system
  6. peels
  7. patrol model
Down
  1. services
  2. system
  3. Vollmer
  4. Police Model
  5. Policing
  6. reeve
  7. enforcement administration

14 Clues: reevepeelsbureausystemVollmerservicessecuritymarshalsPolicingPolice Modelwatch systempatrol modelprinciples of policingenforcement administration

Staff Meeting 11/8 2013-11-07

Staff Meeting 11/8 crossword puzzle
Across
  1. is being served at the Nov. 14th Town Hall
  2. make sure you write you ____ on the document going around
  3. put the tutor evals. in the ____ binder
  4. you need to be back from winter break on January
  5. will be giving residents evaluations
Down
  1. are due November 10th
  2. is on call next week
  3. water bottles in the Cyber are not
  4. request shift off is due November

9 Clues: is on call next weekare due November 10threquest shift off is due Novemberwater bottles in the Cyber are notwill be giving residents evaluationsput the tutor evals. in the ____ binderis being served at the Nov. 14th Town Hallyou need to be back from winter break on Januarymake sure you write you ____ on the document going around

Compliance Program 2021-05-04

Compliance Program crossword puzzle
Across
  1. The Federal Aviation Administration (FAA) sets regulations to adopt specific rules for the operation of small Unmanned Aircraft Systems for this compliance category
  2. if required by a contract requirements may apply to purchases of iron, steel and other manufactured products permanently incorporated into infrastructure projects. Further, these projects must be undertaken by U.S. states and municipalities with funds issued by certain U.S. federal departments and agencies
  3. The use of cranes and similar types of lifting equipment can pose special hazards for the Company and its employees. To avoid the risk of serious accidents, employees are required to follow policies within the Corporate Crane Procedures
  4. Kiewit is required by the USCG to periodically provide a Certificate of Financial Responsibility(COFR), Certificate of Inspection (COI) and Certificate of Documentation(COD) for this category.
  5. Kiewit utilizes a USDOT number and requires an operator to be licensed to be able to operate commercial motor vehicles
  6. deals with cyber security and often is related to phishing attacks
Down
  1. This category defines the process to transport equipment and material internationally
  2. Engage a team (Legal and operation stakeholders) in developing, reviewing, and/or updating processes, procedures, and controls that best meet the Company’s needs, and can be consistently applied by operations groups and other stakeholders
  3. Relates to Price fixing, comparing bids, agreements to be noncompetitive or allocating bids
  4. deals with the payment requirements to employees who work for contractors that work on federal and public buildings, typically related to the Davis-Bacon Act
  5. deals with the training of operators and the plans for how to operate manlifts (abbreviation)
  6. The document will assist each location to assemble a functional set of procedures, monitoring measures, and training requirements that, when implemented, will minimize their compliance risk

12 Clues: deals with cyber security and often is related to phishing attacksThis category defines the process to transport equipment and material internationallyRelates to Price fixing, comparing bids, agreements to be noncompetitive or allocating bidsdeals with the training of operators and the plans for how to operate manlifts (abbreviation)...

Unit 2 Odd Pages 2013-04-25

Unit 2 Odd Pages crossword puzzle
Across
  1. A collection of multimedia resources accessible via the internet
  2. Service that enhance security of the data processing systems and the data transfers of an organisation. The services are intended to counter security attacks and they make use of one or more security mechanisms to provide the services
  3. Small simple network device that allows multiple computers to communicate. They are an inexpensive piece of network equipment often found in home wired networks and small businesses
  4. Most commonly used type of interface which uses icons and pictures that are easily understood by the user and can be clicked using an input device. They vary between manufactures but are generally seen as the most intuitive way of using a computer giving access to users with different levels of knowledge
  5. A piece of malicious code that is written by programmers and used to corrupt data and systems it comes in different forms such as Trojans, Logic Bombs and Worms
  6. The link between the user and the technology that they are using both hardware and software
  7. Technology that enables instant automatic payment directly from the customers bank account when a debit card is used
Down
  1. When an organisations computer system is interrupted by some form of disaster including power cuts, Fire, Floods, Terrorist Attacks
  2. When an employee goes against the company ICT code of practice e.g. Leaving a workstation logging on creating the opportunity for an unauthorised individual to access their account
  3. When individuals or organisations break the law through using computers to illegally access a computer system e.g. to break in and change the payroll figures on the internal database
  4. Mechanism that is designed to detect and prevent or recover from a security attack
  5. Hardware devices that join multiple computers together at the data link network protocol layer
  6. One of the main defences against online problems from internal and external threats it continually scans for viruses including Trojans and worms and can be set to run at particular times of the day. To be effective it must be kept up to date. there are many free and affordable virus checkers.
  7. Any action that compromises the security of data held by an organisation
  8. Acts as a barrier between the public internet and your private computer or network and block threats including some viruses. A firewall is a preventive measure against external threats and is a first line of defence but must be used with care and in conjunction with other security measures to be effective

15 Clues: A collection of multimedia resources accessible via the internetAny action that compromises the security of data held by an organisationMechanism that is designed to detect and prevent or recover from a security attackThe link between the user and the technology that they are using both hardware and software...

JOBS 2023-09-18

JOBS crossword puzzle
Across
  1. 6
  2. 8
  3. 12
  4. 3
  5. 5
Down
  1. 1
  2. 10
  3. 2
  4. 9
  5. 11
  6. 7
  7. 4

12 Clues: 129678435101112

What would you find on a military base? 2023-07-28

What would you find on a military base? crossword puzzle
Across
  1. medical services are provided here
  2. a small convenience store or shop within the base
  3. large structure for housing military aircraft
  4. area where military vehicles are found
  5. religious facility
  6. Barriers used for access control and security purposes
  7. area on base for military families
Down
  1. area designated for weapons training and qualification
  2. on-base retail stores for military members
  3. a place to purchase groceries
  4. facilities & activities provided for leisure and relaxation
  5. storage facility for weapons & ammunition
  6. buildings or housing facilities where soldiers reside
  7. entry and exit points of the base, oft manned by security

14 Clues: religious facilitya place to purchase groceriesmedical services are provided herearea on base for military familiesarea where military vehicles are foundstorage facility for weapons & ammunitionon-base retail stores for military memberslarge structure for housing military aircrafta small convenience store or shop within the base...

worlsa 2025-01-13

worlsa crossword puzzle
Across
  1. Security
  2. Food
  3. Justice
  4. Dignity
Down
  1. Civil Rights
  2. Employment
  3. Education

7 Clues: FoodJusticeDignitySecurityEducationEmploymentCivil Rights

Katrina Webber 2020-01-28

Katrina Webber crossword puzzle
Across
  1. Talking/interacting with people online
  2. Your usage of the internet
  3. Buying and selling online
  4. Enables users to share content online
  5. Computer network that provides information communication to users
Down
  1. Beginning connected to another computer or network
  2. Full electronic participation in society.
  3. The usage of technology
  4. The security level of personal things posted to the internet
  5. The safety of users against security risks
  6. Portable electronic device
  7. Rumors spread on the internet by unreliable sources

12 Clues: The usage of technologyBuying and selling onlineYour usage of the internetPortable electronic deviceEnables users to share content onlineTalking/interacting with people onlineFull electronic participation in society.The safety of users against security risksBeginning connected to another computer or network...

Lesson 1: Introduction to Java 2016-04-24

Lesson 1: Introduction to Java crossword puzzle
Across
  1. For small and memory-constrained devices is ___ Edition
  2. For large-scale is ___ Edition
  3. Responsible for security is called ___ Manager
  4. A simple, general purpose, object-oriented language.
  5. Portable applications for desktop is ___ Edition
  6. A software for developing, editing, compiling, building, and debugging
Down
  1. Java was developed by
  2. The first line of defense is ___ verifier
  3. Once Run Anywhere
  4. Responsible for loading the classes into the interpreter is called ___ Loader
  5. Java was developed at ___ Microsystems
  6. It contains JVM

12 Clues: It contains JVMOnce Run AnywhereJava was developed byFor large-scale is ___ EditionJava was developed at ___ MicrosystemsThe first line of defense is ___ verifierResponsible for security is called ___ ManagerPortable applications for desktop is ___ EditionA simple, general purpose, object-oriented language....

Medical-Legal Partnership 2025-10-31

Medical-Legal Partnership crossword puzzle
Across
  1. Abbreviation for Supplemental Security Income
  2. Legal end of a marriage
  3. Money or help from a program or job
  4. Legal document that distributes property after death
  5. A person over the age of 18
  6. Legal right to care for a child
  7. A person who inherits
Down
  1. A choice you make about your life
  2. Money you receive
  3. Disability insurance program by Social Security
  4. Person who helps with legal problems
  5. Person chosen to make decisions for someone who can’t

12 Clues: Money you receiveA person who inheritsLegal end of a marriageA person over the age of 18Legal right to care for a childA choice you make about your lifeMoney or help from a program or jobPerson who helps with legal problemsAbbreviation for Supplemental Security IncomeDisability insurance program by Social Security...

Das Internet 2017-03-09

Das Internet crossword puzzle
Across
  1. Von wem wurde Youtube gegründet?
  2. Wann wurde Facebook gegründet?
Down
  1. Mit was zahlen große Konzerne ihre Rechnungen
  2. Wie laute die erste App mit einer Story?
  3. Eine aktuelle Gefahr im Internet
  4. Welcher Firmer gehört Yoututbe?
  5. Was war die erste Sociale plattform?

7 Clues: Wann wurde Facebook gegründet?Welcher Firmer gehört Yoututbe?Eine aktuelle Gefahr im InternetVon wem wurde Youtube gegründet?Was war die erste Sociale plattform?Wie laute die erste App mit einer Story?Mit was zahlen große Konzerne ihre Rechnungen

Computing Test 2019-06-17

Computing Test crossword puzzle
Across
  1. the divide between people with internet and not
  2. bullying online
  3. hacking
  4. hackers putting bad things in files to hack you
Down
  1. intelligence that is not human
  2. a law or a set of laws
  3. someone who has data stored about them

7 Clues: hackingbullying onlinea law or a set of lawsintelligence that is not humansomeone who has data stored about themthe divide between people with internet and nothackers putting bad things in files to hack you

Types of Bullying 2013-08-12

Types of Bullying crossword puzzle
Across
  1. calling, saying hurtful things.
  2. someone like an outcast.
  3. someone.
  4. information and communication technologies to bullying someone.
Down
  1. someone's relationship, excluding, making the person feel left out etc.
  2. a person's feelings.
  3. hurting a person such as spreading rumours.

7 Clues: someone.a person's feelings.someone like an outcast.calling, saying hurtful things.hurting a person such as spreading rumours.information and communication technologies to bullying someone.someone's relationship, excluding, making the person feel left out etc.

ELSABET CROSS WORD QUESTI 2025-03-06

ELSABET CROSS WORD QUESTI crossword puzzle
Across
  1. computing is a networking model in which data, applications, and processing power are managed by servers on the Internet
  2. - Refers to cloud functions that process data in some way. This typically refers primarily to running VMs or applications in the cloud, and can also refer to developer tools used to create, test, and deploy applications.
  3. – Cloud services can be designed to auto-scale in order to avoid capacity-related problems. If this auto-scaling is not adjusting to current demands, you might need to adjust the related configurations or check for security issues that might be causing unexpected problems.
  4. vNICs(virtual NICs Virtual switch(vSwitch),Common networking modes
  5. – The ISP might be down. Other problems can originate from your local network hardware, or from endpoint configurations. Or you might have dedicated connections to a public exchange, and your connectivity is suffering from a routing misconfiguration
  6. also called “hosted infrastructure”, it allows a company to use storage or entire virtual servers
Down
  1. Compute,Storage,Network,Security
  2. reduced physical plant costs, reduced upfront costs, reduced personnel costs (employment)
  3. AWS (aws.amazon.com),Oracle Cloud (cloud.oracle.com),Microsoft Azure (azure.microsoft.com)
  4. – Slow or delayed connectivity. Latency is often caused by poor routing, insufficient bandwidth, or a bottleneck. Latency might be the ISP’s responsibility, or you might need to upgrade your service with either your ISP or your CSP.
  5. Usually offered as a subscription based on the number of users
  6. – Cloud computing brings its own set of security vulnerabilities. When troubleshooting cloud services, you’ll need to become familiar with the unique indicators of cloud-based security issues.

12 Clues: Compute,Storage,Network,SecurityUsually offered as a subscription based on the number of usersvNICs(virtual NICs Virtual switch(vSwitch),Common networking modesreduced physical plant costs, reduced upfront costs, reduced personnel costs (employment)AWS (aws.amazon.com),Oracle Cloud (cloud.oracle.com),Microsoft Azure (azure.microsoft.com)...