cyber security Crossword Puzzles
¡Vamos de viaje! 2022-10-24
18 Clues: gate • flight • screen • travel • ticket • luggage • airport • suitcase • to board • passport • itinerary • departure • travel agency • identification • to get in line • to go on vacation • to pack a suitcase • to go through security
Vocabulary 2022-11-08
18 Clues: Buy • Boss • Task • Bill • Costs • Request • Trainee • Guarantee • Down payment • Financial gain • Service/set-up • Financial plan • Trader/merchant • Rental agreement • Close observation • Means of transport • Work table/checkout • Network security device
Unit 4 Crossword puzzle 2023-02-06
15 Clues: läpi • satama • portti • saapua • tuhota • teltta • lähteä • poistaa • uupunut • tähän asti • asemalaituri • välittömästi • tarpeellinen • ilmoittautua • turvatarkastus
worlsa 2025-01-13
SN43004FP Chapter 4.2 2022-10-19
Across
- A tested set of hotfixes, security updates and critical updates
- Enable software programs to be updated automatically
Down
- Microsoft service which automates downloading and installing software updates
- Update fix for a problem addressing a critical, non security related bug
- Update fix for a product-specific security-related vulnerability
- Service which provides management and distribution of updates
- Software to fix problems or update the operating system
7 Clues: Enable software programs to be updated automatically • Software to fix problems or update the operating system • Service which provides management and distribution of updates • A tested set of hotfixes, security updates and critical updates • Update fix for a product-specific security-related vulnerability • ...
Your Local Crossword 2023-10-17
Across
- A place to keep valuables secure.
- They shield your eyes from the bright sun.
- Provides security for doors and gates.
- Ensures safety at the swimming pool.
- A cool spot to escape the direct sunlight.
- Sounds a warning if there's a threat.
- Protects your skin from harmful UV rays.
- Waters the lawn on a hot summer day.
Down
- Measures the temperature of the air.
- Provides shade over windows or patios.
- A professional who deals with security.
- Used to water plants during hot spells.
- Helps circulate air and keep things cool.
- Cools down a room on a scorching day.
- Used for cooking outdoors in summer.
- Staying well ___ is important in hot weather.
- Keeps beverages cold during picnics.
- A popular way to cool off in summer.
18 Clues: A place to keep valuables secure. • Measures the temperature of the air. • Used for cooking outdoors in summer. • Ensures safety at the swimming pool. • Keeps beverages cold during picnics. • Waters the lawn on a hot summer day. • A popular way to cool off in summer. • Cools down a room on a scorching day. • Sounds a warning if there's a threat. • ...
Vocabulary #3 2024-09-19
Across
- a person tending to work with energy.
- a system of interconected people.
- data held in a computer.
- the act of of converting waste into reusable material.
- my house has a security ________
- something that gets your attention and is apealing to you.
- a formal request to an authority.
- Our teacher gave us an _________ from the office.
Down
- a loud cry or call.
- a form you fill with a complain about the service.
- slightly irritated or angry.
- a firm decision
- a piece of equipment for a specific task.
- the singer forgot her ________ now no one can hear her voice.
- the teacher tried to __________ us to recycle.
15 Clues: a firm decision • a loud cry or call. • data held in a computer. • slightly irritated or angry. • my house has a security ________ • a system of interconected people. • a formal request to an authority. • a person tending to work with energy. • a piece of equipment for a specific task. • the teacher tried to __________ us to recycle. • ...
CONVERSATIONAL SELLING SKILLS 2018-12-13
16 Clues: NO • SEE • EXPERT • MEETING • LEAKAGE • ABILITY • ENDORSE • SECURITY • MONETARY • CONVERSION • DISCUSSION • HE IS KING • ___ A LEAD • FRIENDS DO THIS • REINSURANCE COMPANY • FUEL TO THE SALES ENGINE
Vida Y Muerte Prólogo y C1 2023-04-26
16 Clues: War • Tear • Gang • Rules • Lasted • Tattoo • Threat • To hit • Security • business • Gang Member • Mistreatment • At the beginning • Punishment/penalty • They Joined Together • Name of initiation event
gun control 2024-11-14
16 Clues: Touch • Legacy • Safety • Problem • Violence • To mourn • Lawmaking • Necessary • Supporters • Body of law • Carry weapons • Achieve a goal • Avoid something • Contest against • Encouraging something • Gun ownership regulation
Career Cluster Puzzle 2024-12-06
Across
- This cluster includes careers in sales, public relations, merchandising and ____, regardless of industry.
- The ____, distribution and logistics cluster includes people who plan and move people and goods.
- This career cluster includes jobs in policy making, elected officials, national security and taxation.
- Workers in the law, public safety, corrections and _____ cluster protect citizens. Professions include emergency services, security/surveillance, law and law enforcement.
- The ______ and training career cluster includes teaching roles as well as professional counselors, school psychologists and speech-language pathologists who offer support and guidance to students.
- This cluster includes people involved in the processing and production of goods.
- The ____ and tourism cluster jobs within restaurants, bars, tourist attractions, resorts, hotels and travel agencies.
- The ____________, food and natural resources cluster includes everything related to the creation of agricultural products. Job fields include farming, ranching, food processing, engineering and veterinary medicine.
- The ___ services cluster includes jobs like his cluster encompasses fields as diverse as cosmetology, counseling, social work, real estate and personal banking.
Down
- This cluster includes careers in banking, investments and insurance as well as those who manage taxes and finances for businesses
- The business,____ and administration cluster is vast, covering most of the functions required to run businesses effectively.
- The ___ technology cluster includes computer-related professions, including software development, network administration, information security and systems administration.
- The cluster includes highly technical fields in biology, astronomy, chemistry, scientific research and all engineering disciplines.
- The architecture and ________ cluster encompasses careers related to designing, building and maintaining homes, industrial facilities, streets or bridges.
- This cluster includes journalists, performers and behind-the-scenes workers who make TV, film, media and live performances happen.
- This cluster includes jobs like nurses, doctors, pharmacists, technicians, dentists and other providers.
16 Clues: This cluster includes people involved in the processing and production of goods. • The ____, distribution and logistics cluster includes people who plan and move people and goods. • This career cluster includes jobs in policy making, elected officials, national security and taxation. • ...
2nd Quarter Security Training 2021-06-17
Across
- Any check placed on a hold longer than 7 business days must be deposited into a __________ account.
- Per ______________ a check that is placed on a seven business day hold and deposited into a checking account must release $225 the next business day after it was deposited, $5300 the second business day, and the remaining check amount on the seventh business day.
- All checks will be placed on a 7 business day hold during the first 30 days for a ________________.
- How many numbers are in a Canadian routing number?
- These checks will never require a hold.
- An account that has been negative for more than 6 business days during the past six months will have a warning that says "___________ Check Hold Warning".
- An account with this warning will be subject to seven business day check holds on all checks.
- Checks deposited into the ATM will automatically have a ______ day hold.
- Checks placed on a hold longer than 2 business days require a __________________.
Down
- Ask ________ to understand where the member obtained the check from and for what purpose.
- A type of endorsement that involves signing the back of the check the exact way it is written on the front.
- When the numerical amount and the written amount on a check do not match, the check can only be negotiated for what is on the _________.
- To prevent check fraud, always verify the member’s _______ on the front of the check before negotiating an OnUs check.
- If the endorsement states __________ to any financial institution other than MSGCU, do NOT accept the check. If the endorsement lists MSGCU _________, the check should not be accepted until a supervisor can review with Accounting. (Hint: same answer for both blanks)
- A check made out to a _______ can only be deposited into that ________ account. (hint: same word)
- A type of endorsement that involves signing the back of the check under the words “For Deposit Only”
- These checks cannot be deposited at MSGCU because we do not offer the type of account it needs to be deposited into.
- These checks must be deposited into an account where the payee(s) has access to the funds.
- A type of endorsement that is used when the receiver of the check wants someone to get the money. Includes the words “Pay to the Order of”. We call this a 3rd Party check.
19 Clues: These checks will never require a hold. • How many numbers are in a Canadian routing number? • Checks deposited into the ATM will automatically have a ______ day hold. • Checks placed on a hold longer than 2 business days require a __________________. • Ask ________ to understand where the member obtained the check from and for what purpose. • ...
Security Plus Chapter 3 2024-02-29
Across
- The process of changing encrypted text into the original text
- uses two mathematically related keys
- two or more different messages that produce the same hash value
- evidence or proof of something
- A removable external cryptographic device
- digital fingerprints
- A downgrade attack
- to implementing an older and less secure mode “fall back”
- An electronic verification of the sender
Down
- bruteforce collision attack that exploits the probability theory
- denial of the truth or validity of something
- The process of changing plaintext into ciphertext
- hiding data within an ordinary, nonsecret file
- cryptoprocessor
- object whose state cannot be modified after it is created
- decentralized, distributed and public digital ledger
- is a finite sequence of rigorous instructions
- The process of sending and receiving secure cryptographic keys
- protect the entire hard drive using cryptography
19 Clues: cryptoprocessor • A downgrade attack • digital fingerprints • evidence or proof of something • uses two mathematically related keys • An electronic verification of the sender • A removable external cryptographic device • denial of the truth or validity of something • is a finite sequence of rigorous instructions • hiding data within an ordinary, nonsecret file • ...
Chapter 8 Security Plus 2024-03-20
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
US GOV UNIT #7 2023-10-21
Across
- In charge of US transportation
- Domestic Intelligence and Security Agency
- US Justice Department
- Predicts the weather and natural disasters
- Oversees agriculture in America
Down
- In charge of defending national security
- Oversees food safety
- Combination of all the leaders of each US military branch
- Oversees national involvement in space
- Oversees United States mail
10 Clues: Oversees food safety • US Justice Department • Oversees United States mail • In charge of US transportation • Oversees agriculture in America • Oversees national involvement in space • In charge of defending national security • Domestic Intelligence and Security Agency • Predicts the weather and natural disasters • Combination of all the leaders of each US military branch
Cancer Control 2013-04-16
Across
- Can be affected by cancer, found in females
- Obesity, Age and Genetic Predisposition
- Health promotion strategy, tobacco
- Pain and suffering endured
- Can be affected by cancer, found in males
- Medical Treatment
- Lost productivity, social security payments and carers
Down
- SES, work, food security, stress
- Health promotion strategy, breast
- Tobacco smoking, alcohol consumption and exposure to sunlight and UV
- Health promotion strategy, sun
11 Clues: Medical Treatment • Pain and suffering endured • Health promotion strategy, sun • SES, work, food security, stress • Health promotion strategy, breast • Health promotion strategy, tobacco • Obesity, Age and Genetic Predisposition • Can be affected by cancer, found in males • Can be affected by cancer, found in females • Lost productivity, social security payments and carers • ...
krustvardu mikla GOTI subkultura 2023-10-10
Across
- mākslas stilam raksturīgi ______ elementi.
- Kurā dekādē attīstījās gotu mūzikas žanrs?
- subkultūras pārstāvji bieži izceļas ar ______ apģērbu.
- subkultūras mākslinieki bieži izmanto _______ apģērbu.
- un elektroniski,Kas ir "cyber goth" gotu subkultūrā?
Down
- sauc gotu subkultūras festivālu, kas ir saistīts ar gotu mūzikas žanru?
- subkultūras pārstāvji bieži izceļas ar ______ apģērbu.
- un atšķirīgums,Kas ir gotu subkultūras pamatfilozofija?
- subkultūras saknes saistītas ar ______ gadiem.
- ir gotu subkultūras bieži izmantotā krāsa?
10 Clues: mākslas stilam raksturīgi ______ elementi. • Kurā dekādē attīstījās gotu mūzikas žanrs? • ir gotu subkultūras bieži izmantotā krāsa? • subkultūras saknes saistītas ar ______ gadiem. • un elektroniski,Kas ir "cyber goth" gotu subkultūrā? • subkultūras pārstāvji bieži izceļas ar ______ apģērbu. • subkultūras pārstāvji bieži izceļas ar ______ apģērbu. • ...
Bullying 2025-04-06
Across
- Using phones or internet to bully
- A person who sees bullying happen but doesn't always act
- Mean words or teasing is this kind of bullying
- A person who sees bullying and helps
- The feeling when someone is left out or hurt
Down
- Kicking, hitting, or pushing
- If someone is being bullied, tell a ______ adult
- A person who hurts others on purpose
- Treating others with care and kindness
9 Clues: Kicking, hitting, or pushing • Using phones or internet to bully • A person who hurts others on purpose • A person who sees bullying and helps • Treating others with care and kindness • The feeling when someone is left out or hurt • Mean words or teasing is this kind of bullying • If someone is being bullied, tell a ______ adult • ...
Layanan BK materi bullying 2025-09-08
Across
- Tindakan mengejek, menghina, atau merendahkan teman termasuk …
- yang dilakukan dengan memukul atau menendang.
- Orang yang menjadi korban bullying pasti akan
- Salah satu bentuk bullying secara tulisan di media sosial.
- Perilaku yang menyakiti orang lain secara sengaja.
Down
- Salah satu cara mencegah bullying adalah dengan menumbuhkan rasa …
- Rasa yang muncul pada korban bullying, biasanya merasa …
- Lawan kata 'pelaku'.
- Media yang sering dipakai untuk melakukan cyberbullying.
- BK Guru yang bisa membantu menyelesaikan masalah bullying di sekolah.
10 Clues: Lawan kata 'pelaku'. • yang dilakukan dengan memukul atau menendang. • Orang yang menjadi korban bullying pasti akan • Perilaku yang menyakiti orang lain secara sengaja. • Rasa yang muncul pada korban bullying, biasanya merasa … • Media yang sering dipakai untuk melakukan cyberbullying. • Salah satu bentuk bullying secara tulisan di media sosial. • ...
Paula M2u2 2016-04-21
Across
- a person who helps you when you're ill.
- a certain person in a play ch...
- someone whose job is to keep an eye on something (e.g. in a museum)
- something you have to know is ….
- two people who have something together e.g. They … go to school at .
- when you haven’t eaten enough, you are … hungry
- when someone posesses something it … to him/her (3rd person!).
- English word for “Boden“.
- a precious stone.
- a chair where you can sit during a concert.
- a small bag where you put your money in.
Down
- = when you clean the plates
- when someone tells you that you have to do something, s/he gives you a c...
- the English word for “security”
- tells you the position of a house.
- a thing that nobody should know.
- a machine you can fly with.
- opposite of dirty.
- another word for big.
- English word for “lösen“.
20 Clues: a precious stone. • opposite of dirty. • another word for big. • English word for “Boden“. • English word for “lösen“. • = when you clean the plates • a machine you can fly with. • the English word for “security” • a certain person in a play ch... • something you have to know is …. • a thing that nobody should know. • tells you the position of a house. • ...
travel vocab 2020-04-10
Across
- seat belt
- luggage
- ticket window
- flight attendant
- second class
- departure
- passenger
- enter a country
- to miss a flight/train
- bunk
- train stop
- to see
- to turn
- arrival
- car wagon
- gate
- to go through security
- controller
- to take off
- to land
- visa
- in the train station
- to get/obtain
- flight connection
- delayed
- coach (plane)
- in the airport
- boarding pass
- event ticket
Down
- passport
- carry-on
- aisle
- platform
- suitcase
- layover
- luggage scan
- sleeping car
- baggage claim
- security agent
- seat
- ticket
- on time
- international airport
- to check luggage
- counter check-in
- travel
- first class
- ticket
- to hope
- flight
- to go straight
- window
- waiting room
- to give
- to board
55 Clues: seat • bunk • gate • visa • aisle • ticket • to see • travel • ticket • flight • window • luggage • layover • on time • to turn • arrival • to hope • to land • to give • delayed • passport • carry-on • platform • suitcase • to board • seat belt • departure • passenger • car wagon • train stop • controller • first class • to take off • luggage scan • sleeping car • second class • waiting room • event ticket • ticket window • baggage claim • to get/obtain • coach (plane) • ...
Investing Vocabulary 2023-12-11
Across
- Where shares are bought & sold
- Degree of Uncertainty
- A low fee portfolio of Stocks
- Annual interest payment on a bond
- putting your money into assets
- Index of 500 companies
- Risk free investment
- World's largest stock
- Increased stock trading & rising stock prices
Down
- Prices are falling, Encouraging selling
- The practice of investing in a large variety of stocks
- A retirement account
- Collections of financial investments
- A financial asset that can be bought and sold in a financial market
- Reward Paid to the Shareholders
- Rate of Increase prices over a period of time
- Federal program that provides monthly benefits to millions of Americans
- A share of value of a company, which can be bought,sold, or traded as an investment & which gives the investor small partial ownership of the company
- A security in which the investor loans money to a company or government
- Second largest stock
20 Clues: A retirement account • Risk free investment • Second largest stock • Degree of Uncertainty • World's largest stock • Index of 500 companies • A low fee portfolio of Stocks • Where shares are bought & sold • putting your money into assets • Reward Paid to the Shareholders • Annual interest payment on a bond • Collections of financial investments • ...
RU ITEC411 Chapter 5 2023-11-29
Across
- bug that exploited a weakness in OpenSSL
- accessing systems that you are not authorized to access
- use of voice print of fingerprint
- a route that skips regular security in software
- malicious software that can change and wreak havoc on your system
- malware that locks users out of the system via encryption
- email scams
- the James Bond of malware
- malicious software that disguises itself
- devices that use rfid to capture data
- fake website scam
Down
- is not a joke Jim
- worm that attacked Iran's nuclear centrifuges
- hacking for a cause
- acronym, attack that slows down a server with requests
- beginnings of the internet
- country that was targeted by Russia and attacked its power grid
- an amalgamation of malicious devices that creates zombies
- scrambling code to make it unreadable for security
- one of its kind was named Conficker
20 Clues: email scams • is not a joke Jim • fake website scam • hacking for a cause • the James Bond of malware • beginnings of the internet • use of voice print of fingerprint • one of its kind was named Conficker • devices that use rfid to capture data • bug that exploited a weakness in OpenSSL • malicious software that disguises itself • worm that attacked Iran's nuclear centrifuges • ...
Indian contact act 1872 2025-11-30
Across
- created by contract.
- condition to validate agreement.
- of rescinding a contract.
- contract made without free consent is
- who makes an offer.
- proposal made by one party to another.
- essential to contract purpose.
- or security on goods.
- for breach of contract.
- in exchange for a promise.
- who sells goods.
Down
- that becomes void later.
- false statement that induces a contract.
- DAMAGES,Liability for late delivery of goods.
- must be to be valid.
- who buys goods.
- paid in advance as security.
- GOODS,Goods not specific at contract time.
- of ownership.
- enforceable by law.
- GOODS,Goods manufactured or acquired after agreement
- TO SELL,Contract in which goods are delivered later.
- GOODS,Goods identified at the time of making the contract.
- by buyer to seller.
24 Clues: of ownership. • who buys goods. • who sells goods. • enforceable by law. • who makes an offer. • by buyer to seller. • created by contract. • must be to be valid. • or security on goods. • for breach of contract. • that becomes void later. • of rescinding a contract. • in exchange for a promise. • paid in advance as security. • essential to contract purpose. • condition to validate agreement. • ...
CTF-CW-3S 2025-11-17
Across
- Granting users permission to resources
- Network security system for filtering traffic
- Internal Tekion tool for catching secret leaks in source code repositories.
- Separating affected systems during security event
- Visual map showing how personal information moves through systems
- Step-by-step plan for responding to threat scenarios
- Testing how well controls perform
- Step to limit damage during an event
- Science of investigating digital evidence
Down
- Organized written information
- Source code and CI/CD home for Tekion software teams.
- Weakness that can be exploited in a system
- Temporary interaction between user and system
- Transparent communication about data collection and processing
- Goal a control is designed to achieve
- Strengthening defenses of computers or networks
- Static code scanner in Tekion development workflows.
- Manager for data integrity and compliance
- European Union's comprehensive data protection regulation
- Rules governing how long personal data can be stored
20 Clues: Organized written information • Testing how well controls perform • Step to limit damage during an event • Goal a control is designed to achieve • Granting users permission to resources • Manager for data integrity and compliance • Science of investigating digital evidence • Weakness that can be exploited in a system • Temporary interaction between user and system • ...
Bullying Crossword 2013-06-17
Across
- This people are usually insecure teens
- Involves no physical contact but a lot of yelling
- A type of bullying that messes with the head
- Age the late middle age of their lives
- Someone who is not necessarily being the bully but is seeing it
Down
- Examples; Anxiety, Depression effects
- Involves harassment and bullying online
- Someone everyone can do that will help the victim
- Someone that often comes from a home where they don't feel safe
- Involves harming someone
10 Clues: Involves harming someone • Examples; Anxiety, Depression effects • This people are usually insecure teens • Age the late middle age of their lives • Involves harassment and bullying online • A type of bullying that messes with the head • Someone everyone can do that will help the victim • Involves no physical contact but a lot of yelling • ...
bullying 2014-06-19
Across
- what do you do if someone is getting bullied
- what is the person being mean to you called
- what is the website people get bullied most with
- what is a good bulling movie called
- what type of bullying is used on the internet
Down
- where does bullying most happen
- what type of bully hurts you
- what do you do when your getting bullied
- what is the person watching called
- what is the person getting bullied called
10 Clues: what type of bully hurts you • where does bullying most happen • what is the person watching called • what is a good bulling movie called • what do you do when your getting bullied • what is the person getting bullied called • what is the person being mean to you called • what do you do if someone is getting bullied • what type of bullying is used on the internet • ...
bullying 2014-06-19
Across
- what do you do if someone is getting bullied
- what is the person being mean to you called
- what is the website people get bullied most with
- what is a good bulling movie called
- what type of bullying is used on the internet
Down
- where does bullying most happen
- what type of bully hurts you
- what do you do when your getting bullied
- what is the person watching called
- what is the person getting bullied called
10 Clues: what type of bully hurts you • where does bullying most happen • what is the person watching called • what is a good bulling movie called • what do you do when your getting bullied • what is the person getting bullied called • what is the person being mean to you called • what do you do if someone is getting bullied • what type of bullying is used on the internet • ...
Bulling 2025-04-23
Across
- Έτσι αισθάνεται το άτομο που δεν έχει υποστήριξη.
- Μετά την κακοποίηση μένει στο θύμα ......τραύμα.
- Το άτομα που κάνει εκφοβισμό ή κακοποιεί άλλους.
- Εκτός από τη σωματική υπάρχει και η .....βία.
- Το bulling μπορεί να προκαλέσει έως και........
Down
- Αλλιώς η περιθωριοποίηση που βιώνει το θύμα.
- Ένας τρόπος να προσπαθήσεις να βοηθήσεις το θύμα ή να σταματήσεις τον εκφοβισμό.
- Το άτομο που δέχεται κακοποίηση ή εκφοβισμό.
- Το bulling στην ελληνική γλώσσα.
- Η επιθετική συμπεριφορά στο .......... λέγεται Cyber bulling
10 Clues: Το bulling στην ελληνική γλώσσα. • Αλλιώς η περιθωριοποίηση που βιώνει το θύμα. • Το άτομο που δέχεται κακοποίηση ή εκφοβισμό. • Εκτός από τη σωματική υπάρχει και η .....βία. • Το bulling μπορεί να προκαλέσει έως και........ • Μετά την κακοποίηση μένει στο θύμα ......τραύμα. • Το άτομα που κάνει εκφοβισμό ή κακοποιεί άλλους. • ...
SECCON 2025 2025-07-31
Across
- A software update to fix vulnerabilities
- A secret word or phrase to access accounts
- Acronym for using more than one method to verify identity
- Blocks unauthorized access to or from a network
- A secure way to connect remotely to a network
Down
- A type of malicious software
- Fake emails used to trick users into revealing information
- Unwanted or junk email
- What we are trying to protect from cyber threats
- To convert data into a secure format
10 Clues: Unwanted or junk email • A type of malicious software • To convert data into a secure format • A software update to fix vulnerabilities • A secret word or phrase to access accounts • A secure way to connect remotely to a network • Blocks unauthorized access to or from a network • What we are trying to protect from cyber threats • ...
Get to know the Tech world better! 2022-12-13
Across
- - A principle of economics that captures the consumer's desire to buy the product or service
- Virus - First computer virus
- - Expense Claim tool
- Friday - The day after Thanksgiving
- - Programming language exclusively used for AI
Down
- - Company's goods and products that are ready to sell
- - Site where an associate can raise Technology request
- Monday - Marketing term for e-commerce transactions on the Monday after Thanksgiving Day
- - Team workspace where knowledge and collaboration meet
- - A measure of the stability or consistency
10 Clues: - Expense Claim tool • Virus - First computer virus • Friday - The day after Thanksgiving • - A measure of the stability or consistency • - Programming language exclusively used for AI • - Company's goods and products that are ready to sell • - Site where an associate can raise Technology request • - Team workspace where knowledge and collaboration meet • ...
Cybersecurity Terminology 2025-06-25
Across
- Prefix meaning harmful or bad
- The act of keeping something safe from harm
- Software used to stop or remove viruses
- Prefix related to computers, networks, or the internet
- A hacker who helps protect systems legally
- Fraudulent email tricking people into giving personal information
Down
- Malicious software that locks access until a ransom is paid.
- A weakness that can be exploited in a system.
- Software that secretly collects user data
- The process of encoding data to protect it
10 Clues: Prefix meaning harmful or bad • Software used to stop or remove viruses • Software that secretly collects user data • The process of encoding data to protect it • A hacker who helps protect systems legally • The act of keeping something safe from harm • A weakness that can be exploited in a system. • Prefix related to computers, networks, or the internet • ...
Computer Lingo 2015-02-03
10 Clues: isolation • a set of type • mid-level support staff • a unit equal to one billion • arrangement of words and phrases • an icon containing related files • to obtain from a foreign supplier • execution of more than one program • a program designed to breach the security • most effective way to achieve data security
Money Matter 2024-03-20
Across
- taxes are paid at a future date
- funds free from financial risk
- government-imposed charges
- deposit account that provides principal security
- deposit account held at a financial institution
Down
- non-profit institution that accepts deposits
- compensation from all sources
- defines type of individual tax treatment
- amount of income taxed
- Social Security, and Medicare taxes
10 Clues: amount of income taxed • government-imposed charges • compensation from all sources • funds free from financial risk • taxes are paid at a future date • Social Security, and Medicare taxes • defines type of individual tax treatment • non-profit institution that accepts deposits • deposit account held at a financial institution • ...
October 2020 Newsletter Crossword Puzzle 2020-10-05
Across
- A tool used to discover passwords.
- A password based cyberattack where the attacker uses your credentials that were released as a data breach and uses it for other accounts.
- Concept of connecting a device with an on and off switch to the internet and/or to each other.
Down
- A cyber attacker uses a powerful computer to test every combination of letters, numbers, and characters to hack a password.
- A cyber attacker uses a powerful computer to try every word in what vocabulary reference book to see if the word is a password?
- Practice of using social tactics to gain information from people or get people to do things they would not normally do.
- Hardware that has wireless sensors which transmit data from one place to another over the internet.
- U.S. Department of Agriculture’s Personal Identity Verification (PIV) card for access to federal facilities and computers.
- A word, phrase or string of characters that are private for an authorized user and allow access to a computer system or service.
- Virtual communities or networks that use interactive computer technology to promote creating and sharing ideas, career interests, photos, information, and other forms of expression.
10 Clues: A tool used to discover passwords. • Concept of connecting a device with an on and off switch to the internet and/or to each other. • Hardware that has wireless sensors which transmit data from one place to another over the internet. • Practice of using social tactics to gain information from people or get people to do things they would not normally do. • ...
Health Q3 2022-03-24
Across
- moral, spiritual, and educational are types of these shared by a family
- your father's brother
- you are not
- powerful synthetic opioid
- best sport at Malden High
- feeling of craving or extreme dependence
- second leading cause of death amongst teens
- type of bullying in the form of insults and teasing language
- to seek harm or intimidate someone
Down
- online platform that allows users to share content and interact
- your close circle of loved ones
- place to get help for addiction
- ideas and beliefs passed down from one generation to another
- somehow y'all voted for his poster to win
- knowledge or perception of a situation or fact
- michelle carter was convicted of involuntary
- hip hop artist with a powerful suicide awareness song
- form of bullying online
18 Clues: you are not • your father's brother • form of bullying online • powerful synthetic opioid • best sport at Malden High • your close circle of loved ones • place to get help for addiction • to seek harm or intimidate someone • feeling of craving or extreme dependence • somehow y'all voted for his poster to win • second leading cause of death amongst teens • ...
Cyberbullying 2019-07-11
Across
- nothing can go wrong if it is _______
- someone who has been targeted
- bullying that you can do online
- a way of communicating with a certain type of address
- person that is constantly mean to someone
- when someone is really sad
- when you are on a website you are ______
- platforms used to upload context,______ media
- a way of communicating with someone through a text ______
- platforms used to upload context, social _______
Down
- a horror movie is _______
- when someone is making you do something
- a machine connected to a mouse and a keyboard
- computers, phones, tablets
- used to see on a computer
- when you are all by yourself
- when someone kills themselves
- harm what someone does to themselves if they are really sad
18 Clues: a horror movie is _______ • used to see on a computer • computers, phones, tablets • when someone is really sad • when you are all by yourself • someone who has been targeted • when someone kills themselves • bullying that you can do online • nothing can go wrong if it is _______ • when someone is making you do something • when you are on a website you are ______ • ...
Vamos De Viaje Vocab Quiz 2016-10-01
15 Clues: gate • screen • flight • ticket • luggage • airport • suitcase • to arive • passport • passenger • departure • bathing suit • identification • to get in line • to go through security
Income Taxes 2022-02-08
Across
- a child or other person who lives in the home
- another name for social security tax
- used to provide for retired or disabled
- income amount after adjustments are taken out
- used to provide medical benefits for elderly
- short for Social Security Number
- amounts deducted from the adjusted gross income to determine the taxable income
- federal withholdings tax
- short for Employer Identification Number
- the organization that taxes are paid to.
Down
- document given for other income (e.g. contractors)
- the month that income taxes are due.
- document showing ones income from an employer
- short for Earned income credit
- requesting more time to pay taxes.
- the amount of money owned to the government
- income from work, shown on W2
- document used to file for income tax Return
18 Clues: federal withholdings tax • income from work, shown on W2 • short for Earned income credit • short for Social Security Number • requesting more time to pay taxes. • the month that income taxes are due. • another name for social security tax • used to provide for retired or disabled • short for Employer Identification Number • the organization that taxes are paid to. • ...
Bullying 2012-11-13
Across
- / the type of bullying that happend over the internet
- / the person getting bullied
- / where can bullying happen
- / the person doing the mean act
- / if you get bullied you should tell an
Down
- / when the bully hits or kicks the victim
- / the first step to making a bully stop is to ___ them
- / when the bully tells them mean stuff
8 Clues: / where can bullying happen • / the person getting bullied • / the person doing the mean act • / when the bully tells them mean stuff • / when the bully hits or kicks the victim • / if you get bullied you should tell an • / the first step to making a bully stop is to ___ them • / the type of bullying that happend over the internet
week 10 crossword puzzle 2021-11-05
Across
- bullying - the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- - he ability to understand and share the feelings of another.
- theft
- scam
Down
- media
- sharing
- that is threatening or offensive to other people
- drama - Describes everyday tiffs and disputes that occur between friends or acquaintances online or via text.
8 Clues: scam • media • theft • sharing • that is threatening or offensive to other people • - he ability to understand and share the feelings of another. • drama - Describes everyday tiffs and disputes that occur between friends or acquaintances online or via text. • ...
KnowCrowe 2025-03-12
Across
- The first stage of a cyber attack.
- The colour of the pinnacle logo.
- The alignment of text in a paragraph.
- What our new firm email address starts with.
Down
- If the word "Crowe" = Logotype, therefore the "Pinnacle" = ?
- The Art of ______.
- The title of our upcoming global conference
- The typographical term for spacing between two lines of text.
8 Clues: The Art of ______. • The colour of the pinnacle logo. • The first stage of a cyber attack. • The alignment of text in a paragraph. • The title of our upcoming global conference • What our new firm email address starts with. • If the word "Crowe" = Logotype, therefore the "Pinnacle" = ? • The typographical term for spacing between two lines of text.
Federal Weekly 2022-02-09
Across
- Largest agency in the civilian government
- FSI that lead in acquisitions in 2021
- The biggest unknown in Federal software
Down
- What devsecops leaders aspire to
- Largest non-DoD department, after the VA
- Tier 1 FSI that is a known leader in cyber
- Best source for compiled RFP and vendor info
- Largest office within the Executive Office of the President
8 Clues: What devsecops leaders aspire to • FSI that lead in acquisitions in 2021 • The biggest unknown in Federal software • Largest non-DoD department, after the VA • Largest agency in the civilian government • Tier 1 FSI that is a known leader in cyber • Best source for compiled RFP and vendor info • Largest office within the Executive Office of the President
Crowd Control 2022-12-09
Across
- Hostile crowd
- Avoid unnecessary conversation and maintain a ____ demeanor
- Mass ____ which usually involves hundreds or thousands of people
- Security officers must protect life and ____
- ____ Disputes can be a complex issue while balancing right
- the systematic planning for and supervision of and assembly of people
- The restriction or limitation of group behavior and movement
- Security Officers must not be ____
Down
- Crowd with no organization of unified purpose
- Civil ____ is usually nonviolent but use tactics that can get them arrested
- The First Amendment does not protect against ____ behavior
- Always remain ____
- Always provide clear and concise ____
- Labor Disputes involve ____ lines
- Uncontrolled and violent disturbance of the public
15 Clues: Hostile crowd • Always remain ____ • Labor Disputes involve ____ lines • Security Officers must not be ____ • Always provide clear and concise ____ • Security officers must protect life and ____ • Crowd with no organization of unified purpose • Uncontrolled and violent disturbance of the public • The First Amendment does not protect against ____ behavior • ...
SIGURNOST NA INTERNETU 2021-02-11
5 Clues: uznemiravanje djece SMS • prijetnje putem interneta • proizvodnja provokativnih postova • nasilje uz cyber tehnologije • prijevara putem elektronicke poste
unit 6; 2014-04-13
Across
- to hit somebody
- a kitchen device that keeps food fresh and cold
- rule which you must obey
- a card which resembles a debt to your bank
- somebody who investigates crimes
- to have done something you shouldn't
- to steel object from a shop
- a person who does ar has done illigal things
- somebody who is incredibly stupid
- a commited action which was illigal
Down
- a person who owns a shop
- a short coat
- a group of people who protect humans and things
- a card which shows your personal information
- a very sharp blade you use to shave body hair
- breaking things that aren't yours
- to forced somebody to hand over things that aren't yours
- somebody who steals things from pockets and purses
- to be your own boss
- a camera system used to maintain security
20 Clues: a short coat • to hit somebody • to be your own boss • a person who owns a shop • rule which you must obey • to steel object from a shop • somebody who investigates crimes • breaking things that aren't yours • somebody who is incredibly stupid • a commited action which was illigal • to have done something you shouldn't • a camera system used to maintain security • ...
sdl 2018-06-12
Across
- you can buy medicines here
- if you can’t find a place, you can ask here
- you can have the curruncy of the country here
- people who use flight services
- where aircrafts land and take off
- a place you can buy stuffs without tax
- moving stairs
- if you bought first or business class, you can rest here in airport
- you can get your ticket and send your luggage here
- you must be checked here to go into airside
Down
- the way aircrafts move to runway
- where aircrafts parked
- if you are sweating so much, you can wash tour body
- ticket
- instead of stairs
- what you get on security areas
- travelers come out from here
- final enterance to get on aircrafts
- you must have this and boarding pass to go into airside
- stuffs to remember a place or country
20 Clues: ticket • moving stairs • instead of stairs • where aircrafts parked • you can buy medicines here • travelers come out from here • people who use flight services • what you get on security areas • the way aircrafts move to runway • where aircrafts land and take off • final enterance to get on aircrafts • stuffs to remember a place or country • a place you can buy stuffs without tax • ...
Aviation 2023-11-19
Across
- One of their duties is to load & unload aircraft
- Not allowed on aircraft
- Relating each letter of alphabet to a word
- Built for passengers to use at the airport
- Full term for ASO
- This role helps prevent any incidents from international trade & travel
- Used to help stop drugs and explosives being smuggled into country
- This document is required to be able to travel
- Security process to check luggage for any explosive
- Area where public has access to
- Short term for Aviation Security
Down
- Area where passengers pass through to Airside
- Full term for UM
- Also known as the boarding gate
- Staff must be wearing this to have access to airside
- Full term for PSA
- Skills, knowledge & ...
- Area where counters are located
- Area where only passengers have access to
- Time of your flights ( Departure & Arrival)
20 Clues: Full term for UM • Full term for PSA • Full term for ASO • Not allowed on aircraft • Skills, knowledge & ... • Also known as the boarding gate • Area where counters are located • Area where public has access to • Short term for Aviation Security • Area where only passengers have access to • Relating each letter of alphabet to a word • Built for passengers to use at the airport • ...
CyberNewspaper 2024-09-16
Across
- Online harassment or bullying
- Impersonating someone or something to deceive
- Software update to fix security vulnerabilities
- Measures taken to protect data
- Function that converts data into a fixed size
- Network of compromised computers under attacker control)
- Securing data by converting it into code
- Distributed Denial of Service attack to overwhelm a network)
- Investment scam involving fake accounts
- Self-replicating malware that spreads across networks)
- Software that shows unwanted ads
- A system that protects networks
Down
- Fraudulent attempts to steal sensitive information)
- Malware that encrypts files demanding ransom
- Zero Trust Architecture
- Hidden way of bypassing security controls
- Malware disguised as legitimate software
- Attack using trial and error to guess passwords)
- Software that records keystrokes
- Virtual Private Network for secure connections
- Vulnerabilities exploited before being patched
- Software that collects data secretly
- Multi-Factor Authentication
23 Clues: Zero Trust Architecture • Multi-Factor Authentication • Online harassment or bullying • Measures taken to protect data • A system that protects networks • Software that records keystrokes • Software that shows unwanted ads • Software that collects data secretly • Investment scam involving fake accounts • Malware disguised as legitimate software • ...
Banking Glossary Crossword 2025-04-29
Across
- System of money used by a country
- Money borrowed with agreement to repay later
- Adding money into your account
- Move money from one account to another
- Sign the back of a cheque for deposit
- Loan used to buy property
- Deliberate deception to obtain money
- Property used to secure a loan
- Personal information used for banking security
- Fee paid for borrowing money
- Security code for account access
- Attempt to trick someone financially
Down
- Plan for managing income and expenses
- Funds allocated to generate future returns
- Taking money out of your account
- A written order directing a bank to pay money
- Borrowed money requiring repayment with interest
- Direct withdrawal from an account
- Replacing a loan with a new agreement
- Withdrawal exceeding account balance
- Monthly record of transactions and balance
- Account to securely store and grow funds
- Confirm information or authenticity
- Amount of money currently in account
24 Clues: Loan used to buy property • Fee paid for borrowing money • Adding money into your account • Property used to secure a loan • Taking money out of your account • Security code for account access • System of money used by a country • Direct withdrawal from an account • Confirm information or authenticity • Withdrawal exceeding account balance • Deliberate deception to obtain money • ...
Taxes 2025-04-30
Across
- Deduction that lowers your taxable income
- money paid to you from a companies profit
- Range of income that is taxed at a specific rate
- Tax system where higher income earners pay a larger percentage
- Money you make from selling something
- Percentage at which income is taxed
- Government program that provides healthcare
- Amount of money taken out of your paycheck for taxes
- Number you put on a tax form
- Money you get back from the gov
Down
- Money you make from working
- Amount of your income that is subject to tax
- When the IRS checks your tax return to make sure its correct
- Amount directly reduces amount of tax you owe
- Tax of specific goods
- Federal program that provides money to old people
- Taxes taken out of paycheck to fund social security
- Someone you support financially
- Tax you pay on the money you earn
- Tax taken for social security
20 Clues: Tax of specific goods • Money you make from working • Number you put on a tax form • Tax taken for social security • Someone you support financially • Money you get back from the gov • Tax you pay on the money you earn • Percentage at which income is taxed • Money you make from selling something • Deduction that lowers your taxable income • ...
Civics - Australia's International Relations and Obligations 2025-05-29
Across
- A country where citizens vote for their leader
- A country where citizens don't choose their leader
- the UN aims to promote international peace and _________
- A migrant who has fled their country due to fear of persecution
- Someone seeking to live in another country
- the freedoms and protections belonging to all humans
- the General _______ is the main body of the UN
- ________ Declaration of Human Rights
- Australia mostly trades with countries around the _______.
Down
- foreign ___ - a country providing assistance to another
- Refugee ________; another word for 'treaty'
- involving more than two countries
- Australia's main ______ are coal, iron ore, gold and natural gas
- the Paris Agreement aims to combat ______ change
- Nationally Determined ________ - (NDCs)
- non-_________ - the concept of non-return of refugees
- an international legal agreement
- ______ seeker - someone who seeks protection in another country
- the UN Security _______ has five permanent members with veto powers
- involving two countries
20 Clues: involving two countries • an international legal agreement • involving more than two countries • ________ Declaration of Human Rights • Nationally Determined ________ - (NDCs) • Someone seeking to live in another country • Refugee ________; another word for 'treaty' • A country where citizens vote for their leader • the General _______ is the main body of the UN • ...
Economics Terms 2023-01-03
Across
- A security that provides ownership rights
- A security that promises repayment to a lender
- The act of exchanging goods and services
- Karl ______
- Revenue in excess of costs (revenue - costs)
- Gross ______ Product
- The relationship between price and quantity.
- Warren _______ the CEO of Berkshire Hathaway
- A payment for using money.
- When a few large sellers dominate the market
- A company's overall income
- A tax on trade
- Payment of profits to shareholders
Down
- ______ cost Next best alternative
- When inflation and unemployment increase
- There aren't enough resources for everyone
- Purchasing Power ________
- The condition of not having a job
- The tools and equipment used in production.
- Everything that is owned by an individual.
- The usefulness or satisfaction of doing something
- A general increase in the overall price level.
- The ability to buy a good or service
23 Clues: Karl ______ • A tax on trade • Gross ______ Product • Purchasing Power ________ • A payment for using money. • A company's overall income • ______ cost Next best alternative • The condition of not having a job • Payment of profits to shareholders • The ability to buy a good or service • When inflation and unemployment increase • The act of exchanging goods and services • ...
The negotiable instruments Act 1881 2025-12-01
Across
- created by contract.
- condition to validate agreement.
- of rescinding a contract.
- contract made without free consent is
- who makes an offer.
- proposal made by one party to another.
- essential to contract purpose.
- or security on goods.
- for breach of contract.
- in exchange for a promise.
- who sells goods.
Down
- that becomes void later.
- false statement that induces a contract.
- DAMAGES,Liability for late delivery of goods.
- must be to be valid.
- who buys goods.
- paid in advance as security.
- GOODS,Goods not specific at contract time.
- of ownership.
- enforceable by law.
- GOODS,Goods manufactured or acquired after agreement
- TO SELL,Contract in which goods are delivered later.
- GOODS,Goods identified at the time of making the contract.
- by buyer to seller.
24 Clues: of ownership. • who buys goods. • who sells goods. • enforceable by law. • who makes an offer. • by buyer to seller. • created by contract. • must be to be valid. • or security on goods. • for breach of contract. • that becomes void later. • of rescinding a contract. • in exchange for a promise. • paid in advance as security. • essential to contract purpose. • condition to validate agreement. • ...
Unit 1/1 2018-09-24
13 Clues: Mode • Strauß • Konzert • klingen • Krankheit • Reisender • montieren • Ausländer • (be)halten • Sicherheit • Rucksacktourist • einzig/einziger • ansehen/betrachten
Hotel crossword puzzle 2024-05-01
15 Clues: lobi • Koper • Taman • Masuk • Keluar • Pelayan • Keamanan • Pemesanan • Ruang santai • Kasur tambahan • Biaya Tambahan • Kamar tipe VIP • Kamar mandi uap • Ruang pertemuan • Meja resepsionis
PBR27 2025-09-22
Across
- shouldn't be the only option
- our resident SAP expert
- delivering modern and advanced warfighting capabilities
- they call him "Mr. Munitions"
- see this AO for Ground Combat systems
- if Marcus Aurelis met this officer, he would've joined the Acquisition Corps
- programming network, IT, and cyber across the Army
Down
- keeper of this time-killer
- our newest Acquisition or a place to go in the summer
- things that go boom
- a PDD legend and Sustaining PEG icon
- our resident IAMD SME
- he's known as "A Colonel's Colonel"
- a Maritime savant and living la dolce vita
- maintenance, logistics, and industrial base
- Our DD and DBS whisperer a true SME
- known as the patron saint of Army Watercraft
- two-time PAE returning champion
- Accepted Lee's surrender and also known as "Mr. Aviation"
19 Clues: things that go boom • our resident IAMD SME • our resident SAP expert • keeper of this time-killer • shouldn't be the only option • they call him "Mr. Munitions" • two-time PAE returning champion • he's known as "A Colonel's Colonel" • Our DD and DBS whisperer a true SME • a PDD legend and Sustaining PEG icon • see this AO for Ground Combat systems • ...
PitchBook 2Q 2019 PlayBook 2019-05-17
Across
- use of a good or service instead of cash
- a request for a portion of a loan
- an unsecured loan certificate backed by general credit
- debt repayment at a regular schedule
- order of priorities of claims
- loan agreements that don’t contain usual protections
- the right to purchase equity
- stretch riskier than a senior loan, in an accommodative way
- condition in a bond or loan
- a hybrid loan structure
Down
- financing offered by a group
- between bank loans and equity
- something pledged as security for repayment
- a form of security interest granted
- a giant credit manager that recently agreed to be acquired
- lending by unregulated institutions and/or under unregulated conditions
- covering an interval between two transactions
- a provider of funds
- a variable line of credit allowing for drawdowns and repayments
19 Clues: a provider of funds • a hybrid loan structure • condition in a bond or loan • financing offered by a group • the right to purchase equity • between bank loans and equity • order of priorities of claims • a request for a portion of a loan • a form of security interest granted • debt repayment at a regular schedule • use of a good or service instead of cash • ...
Unit 11 2020-02-18
PDU 12 - Nominalization 2020-11-24
The image of who I am 2023-10-11
Security Meeting Q4 - 2021 2021-12-08
Across
- Overnight cash limit
- The color of our robbery folder
- 877-511-9797
- A device designed to explode in order to injure or kill people or to destroy property
- The two things you should always lock before stepping away from your station
- Our SECOND evacuation location
- You should call this number in an emergency
- a cybercrime that targets individuals by email, luring them into providing personal information such as banking information, credit card details, and passwords
- If time allows, search for suspicious items around the store after receiving a bomb threat
- Our FIRST evacuation location
Down
- These should stay with you at all times
- All confidential customer information should be ______ at night
- The folder is located behind ____
- Top drawer limit
- Working cash Limit
- The act of illegally printing, changing or reproducing a copy of a genuine currency to purposely deceive someone
- Our OSM
- Our shelter in place
- We test the alarm every ____
19 Clues: Our OSM • 877-511-9797 • Top drawer limit • Working cash Limit • Overnight cash limit • Our shelter in place • We test the alarm every ____ • Our FIRST evacuation location • Our SECOND evacuation location • The color of our robbery folder • The folder is located behind ____ • These should stay with you at all times • You should call this number in an emergency • ...
Social security and relationships 2023-01-30
19 Clues: tulot • kunta • vamma • avioero • puoliso • huoltaja • syrjintä • päiväkoti • äitipuoli • sukupolvi • kummipoika • alaikäinen • siskontytär • kansalainen • kansallisuus • lainsäädäntö • viranomaiset • maahanmuuttaja • jäädä eläkkeelle
TTS tentang materi Bullying 2022-01-25
6 Clues: termasuk dalam bully fisik • ciri-ciri bully relasional • salah satu ciri bully verbal • salah satu ciri-ciri bully relasional • salah satu faktor penyebab pembullyan • salah satu alat komunikasi yang dapat memicu cyber bullying
PAYCHECK TERMINOLOGY 2015-03-11
Across
- the total amount of money earned during a pay period before deductions
- mandatory charges imposed on citizens by local, state, and federal governments
- the total amount of money left after all deductions have been withheld
- a type of withholding tax that funds the state government
- the amount of money subtracted from the gross pay earned for taxes and medical/retirement benefits
- this type of tax includes two separate taxes, Social Security and Medicare
- this type of information states the name of the employee, address, and social security number
- a type of withholding tax that funds the federal government
- an agency that collects federal taxes and enforces tax laws
- this type of security is based on a tax percentage of (6.2%)
Down
- a plan, such as a 401K or 403B
- a health care program for the elderly and disabled
- this type of deduction is based on a tax percentage of (1.45%)
- this type of security funds the retirement plan of the nation
14 Clues: a plan, such as a 401K or 403B • a health care program for the elderly and disabled • a type of withholding tax that funds the state government • a type of withholding tax that funds the federal government • an agency that collects federal taxes and enforces tax laws • this type of security is based on a tax percentage of (6.2%) • ...
Private and public places 2024-05-03
Across
- synonym for "illness"
- The English for "promouvoir"
- The English for "dossier médical"
- the English for "médicament"
- the identification of the nature of an illness
- when confidential information is exposed
- The English for "mettre en place"
- The English for un "scientifique"
- synonym for "revolutionary"
Down
- It is a thread-like structure made up of DNA
- cause someone to be vulnerable or at risk; endanger
- Stealing of information through unauthorized access to computer systems.
- The English for "recherche"
- the English for "avancé, sophistiqué"
- the abbreviation for Artifical Intelligence
- a self-replicating material that is present in nearly all living organisms as the main constituent of chromosomes
- a secondary and undesirable effect of medical treatment.
- a sudden and important discovery
18 Clues: synonym for "illness" • The English for "recherche" • synonym for "revolutionary" • The English for "promouvoir" • the English for "médicament" • a sudden and important discovery • The English for "dossier médical" • The English for "mettre en place" • The English for un "scientifique" • the English for "avancé, sophistiqué" • when confidential information is exposed • ...
Valpak – November 2023 2023-10-20
Across
- What sport is played on Thanksgiving?
- This online shopping day occurs on ____ Monday
- A Thanksgiving side dish made from bread
- Sweet potato casserole is topped with this fluffy, sweet treat
- The centerpiece of the classic Thanksgiving meal
- Festive event held in New York City every Thanksgiving
Down
- A sauce often put on mashed potatoes, turkey and stuffing
- A common Thanksgiving decoration
- Black _____ is the busiest shopping day of the year
- Popular Black Friday shopping destination
- This Thanksgiving-themed dish is made from green beans
- First President credited with proclaiming Thanksgiving a National holiday
- Synonym for sweet potatoes
- Thanksgiving pie with a flaky crust
14 Clues: Synonym for sweet potatoes • A common Thanksgiving decoration • Thanksgiving pie with a flaky crust • What sport is played on Thanksgiving? • A Thanksgiving side dish made from bread • Popular Black Friday shopping destination • This online shopping day occurs on ____ Monday • The centerpiece of the classic Thanksgiving meal • ...
Bullying Crossword Puzzle 2025-03-11
Across
- type of bullying that happens online
- does something to help the target
- type of bullying that involves putting hands on each other
- sees bullying happen and does not tell anyone
- something you can be when someone is being bullied
- type of bullying that involves rumors and gossip
- changing the conversation
Down
- person who is bullied
- intentional, unwanted, aggressive behavior that causes severe harm
- telling an adult about bullying
- something you can do to solve the problem
- person who bullies others
- type of bullying that involves a characteristic about someone that they cannot change
- an argument between two connected people
14 Clues: person who is bullied • person who bullies others • changing the conversation • telling an adult about bullying • does something to help the target • type of bullying that happens online • an argument between two connected people • something you can do to solve the problem • sees bullying happen and does not tell anyone • type of bullying that involves rumors and gossip • ...
CSIT - Cybersecurity Vocab 2024-12-02
Across
- A person or entity responsible for an event that has been identified as a security incident or as a risk
- Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted
- Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
- The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data
- Data that can be used to identify or contact an individual
- A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication
Down
- A number used in conjunction with authentication devices
- Scans that allow access to a physical space or program by verifying unique body features
- unauthorized use is detected or attempted
- Security control that can enforce a virtual boundary based on real-world geography
- A basic principle of security stating that a person should be allocated the minimum necessary rights, privileges, or information to perform its role
11 Clues: unauthorized use is detected or attempted • A number used in conjunction with authentication devices • Data that can be used to identify or contact an individual • Security control that can enforce a virtual boundary based on real-world geography • Scans that allow access to a physical space or program by verifying unique body features • ...
For Clients Portal 2017-12-20
UNit 11 words 2024-02-12
Air Travel Essentials Crossword 2024-10-08
Across
- – Another term for luggage.
- – Main building where passengers arrive and depart.
- – Feeling tired after crossing time zones.
- – Where passengers come in after a flight.
- – Area where bags are screened and passengers go through checks.
- – Where planes take off and land.
- – Required travel document for international flights.
Down
- – A stop between flights.
- – Ticket required to get on the plane.
- – Process of registering and dropping off luggage.
- – When the plane leaves.
- – Where passengers wait to board their flight.
- – Inspection area after international flights.
- – Abbreviation for the agency in charge of airport security in the U.S.
14 Clues: – When the plane leaves. • – A stop between flights. • – Another term for luggage. • – Where planes take off and land. • – Ticket required to get on the plane. • – Feeling tired after crossing time zones. • – Where passengers come in after a flight. • – Where passengers wait to board their flight. • – Inspection area after international flights. • ...
Overzicht 2013 2014-01-15
Across
- aan wat werd ACW beschuldigt ?
- Willem ... wordt koning van Nederland
- wie treed er in Nederland van de troon ?
- Rusland wilt met ... een vreedzame oplossing
- In Syrie vallen er 1500 doden door ?
- wat was de voornaam van de president van Venezuela ?
- wat was er in Boston tijdens de de beroemde marathon gebeurt ?
- Welke paus treed aaf ?
- Hoe noemt de typhoon dat in Fillipijnen plaats vond ?
- hoe noemt de jongen dat naar Syrie was vertrokken ?
Down
- Wat was er op de luchthaven gestolen ?
- wie was de slachtoffer van cyber spionage ?
- Koning Albert II maakt plaats voor prins ...
- waar was er een kleding fabriek ingestort ?
- waar was er een meteor gevallen ?
- In welke maand is Nelson Mandela overleden ?
16 Clues: Welke paus treed aaf ? • aan wat werd ACW beschuldigt ? • waar was er een meteor gevallen ? • In Syrie vallen er 1500 doden door ? • Willem ... wordt koning van Nederland • Wat was er op de luchthaven gestolen ? • wie treed er in Nederland van de troon ? • wie was de slachtoffer van cyber spionage ? • waar was er een kleding fabriek ingestort ? • ...
Black Friday & Cyber Monday 2017-11-29
Across
- three times as great
- increasing in size, number
- sellers of merchandise directly to customers
- building blocks made from clay, then baked in a kiln or in the sun
- lifting, taking
- things devised to publicize a product or event
- a combining form meaning computer, computer network or online
- people who shop
- having a likeness in a general way to other things
Down
- showing how something performs or operates
- competitor for the same goal
- bargains, financial discounts
- computer that isn't portable; not a laptop or tablet
- before all others; before the second; the initial one
- mixture of cement, sand & water used to bond bricks & other building materials together
- systematic inquiry or investigation of a subject
16 Clues: lifting, taking • people who shop • three times as great • increasing in size, number • competitor for the same goal • bargains, financial discounts • showing how something performs or operates • sellers of merchandise directly to customers • things devised to publicize a product or event • systematic inquiry or investigation of a subject • ...
Comp Sci Study Guide 2025-04-09
Across
- Malicious Software
- Arithmetic Logic Unit
- Component that holds all other components
- Cyber crime that steals information through sketchy links through email or text
- Basic Input/Output System, firmware in the motherboard
- Components that manage the flow of data between the CPU, GPU, RAM, storage, and peripherals
- Renders graphics and visuals
Down
- Used to amplify or switch electronic signals and electrical power
- The delay before data follows an instruction for transfer
- Uses a laser light to read data from or write data to an optical disc
- International character encoding standard
- American Standard Code for Information Interchange
- Stores data on flash memory
- Pathways that allow components to exchange data
- Uses magnetic disks to store digital information
- One billion hertz
16 Clues: One billion hertz • Malicious Software • Arithmetic Logic Unit • Stores data on flash memory • Renders graphics and visuals • International character encoding standard • Component that holds all other components • Pathways that allow components to exchange data • Uses magnetic disks to store digital information • American Standard Code for Information Interchange • ...
Bullying Is Wrong. 2021-10-27
Across
- a bystander doesn’t help when they see someone getting bullied is _____ bullying
- can be done by an individual or Group?
- A form of looking down on yourself?
- I must be_____to everyone
- Being a bully makes you a smaller person, helping makes u a...
- What should you say to someone who stood up for you?
- I shouldn't_____ someone.
Down
- The act of gossiping or telling on someone, when they do non-hurtful things to get attention.
- ____ someone from a group is a form of bullying.
- Bullying online is called ___ bullying?
- Appreciate your inner
- Bullying is---
- you should___when bullied.
- bullying can be physical or ___.
- you ___ ask for help when bullied
- you can bully someone without ___
16 Clues: Bullying is--- • Appreciate your inner • I must be_____to everyone • I shouldn't_____ someone. • you should___when bullied. • bullying can be physical or ___. • you ___ ask for help when bullied • you can bully someone without ___ • A form of looking down on yourself? • can be done by an individual or Group? • Bullying online is called ___ bullying? • ...
Christmas knowledge quiz 2021-12-12
Across
- Whose Christmas advert features Kevin the Carrot?
- Whose slogan is "just do it"
- Whose slogan is "taste the rainbow"
- Which supermarket uses orange as its main colour
- Which city did the first Primark open in?
Down
- Whose slogan is "I'm lovin it"
- In retail which Monday falls after Black Friday?
- Which supermarket says "every little helps"?
- Whose Christmas advert talks about carving turkeys with lasers?
- Which supermarket was voted the cheapest in 2020?
10 Clues: Whose slogan is "just do it" • Whose slogan is "I'm lovin it" • Whose slogan is "taste the rainbow" • Which city did the first Primark open in? • Which supermarket says "every little helps"? • In retail which Monday falls after Black Friday? • Which supermarket uses orange as its main colour • Whose Christmas advert features Kevin the Carrot? • ...
ITF-Chapter4-KeyTerms 2019-12-10
Across
- A security concern regarding network devices, and other devices such a smartphones that give the option of using the device without a password.
- An early example of encryption used by Julius Caesar to send confidential military messages.
- Attempting to secretively discover private information about a person, company, or other entity.
- A development model that breaks down project activities into a series of sequential or linear phases, each phase depending on the deliverables from the previous phase.
- Regularly scheduled backups.
- TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
- Backups that are stored in the same building or even the same room as the computer systems they are taken from.
- Software that help remove unwanted, unsolicited email.
- The passive gathering of information about a potential victim.
- An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
- Works whose copyrights have expired and are free for anyone to reproduce, display, and make derivatives.
- The use of deception to gain personal and/or private information for unlawful purposes.
- The SDLC phase that involves studying existing information systems that are already in place and the requirements for new information systems.
- A device that contains one or more hard drives that users can access over the network.
- A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
- Unscheduled backups performed periodically.
- Data that are being transported from one device to another, whether by radio, electrical, or light signals.
- Any word, picture, or symbol that's used to distinguish a good from other similar goods.
- The study and design of a system by examining its components and their interactions.
- The ability to ensure that someone can't deny that they performed a certain act.
- The various forms of information systems including transaction processing, management, and expert systems.
- A development model that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design.
- An attribute used to classify information based on the risk of public disclosure.
- A scheme for classifying information based on different levels of public/private distinctions.
- The identification, evaluation, and prioritization of risks followed by activities that minimizes, monitors, and controls the impact of the risk.
- A device that controls the flow of network traffic to protect systems from unauthorized network connections.
- An activity that involves integrating various computing systems and software applications to function together as a whole.
- Exploiting a victim using email messages
- A project management process that divides a large or complex project into smaller, more manageable projects that can be completed as part of an incremental or iterative process.
- A reasonable belief that personal information collected by an information system is controlled and protected and not shared or used beyond its original intent.
- The practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time.
- A method of increasing fault tolerance by providing multiple network paths between hosts.
Down
- The SDLC phase that involves purchasing and installing new hardware and software, integrating the various system components, and testing the operation of the new system.
- The SDLC phase that involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project.
- A type of access control that restricts access based on the users role in an organization.
- An attempt to connect to a server by capturing and resending of authentication information.
- A method of increasing fault tolerance by providing power backups and power failover.
- Tricking a victim into revealing sensitive information under false pretenses.
- Convincing a victim that they are performing a legitimate task within their web browser window, when in fact they are being tricked into revealing sensitive information or installing malware on their computer
- A type of access control where a user has complete control over a resource, and also determines the permissions other users have those those resources.
- Anything that is owned by a copyright holder.
- A scheme for classifying information based on government and military requirements.
- combination of technology, people, and procedures used to organize, analyze, and store data.
- The SDLC phase that involves monitoring and evaluating the new information system.
- A methodology or framework that defines steps and tasks for developing and maintaining information systems.
- A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.
- Data in a persistent storage medium, such as a hard drive or optical disc.
- An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
- A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face or voice.
- Directions for disposing and even destroying data when it's no longer needed or when a storage device needs to be replaced.
- A type of authentication that requires the user to provide something that they know, such as a password or PIN.
- Authentication that requires two or more evidences of authentication, usually of different types.
- A type of authentication that requires the user to provide something that they have, such as a key, fob, electronic chip, or smart card.
- A method of authenticating with one system to gain access to other related systems.
- A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
- An attack where the an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
- A backup of the system software, including operating system files.
- Concerning security, a person responsible for securing networks and responding to intrusions.
- A backup of data stored in a database.
- The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
- Software that helps protect against malicious software infections.
- Protections granted by the federal government to creators, writers, and inventors regarding rights to reproduce, display, make derivatives, sell, rent, or lend a work.
- Software where anyone can inspect, enhance, and modify the source code.
- The SDLC phase that involves reviewing the system requirements document from the analysis phase and producing detailed specifications that cover all aspects of the system.
- A person who is in charge of designing and implementing security methods to protect an organization's computer systems and networks.
- Any software where the publisher retains intellectual property rights to the source code.
- A systematic process for determining and addressing needs, or "gaps" between current conditions, and desired conditions or "wants".
- The capturing and storing of computer and user events.
- Backups that are stored at a location far enough from a possible natural disaster, while being close enough to recover the data and systems within a reasonable amount of time.
- The process of turning data points into useful information.
- The crime of using someone else's intellectual property in a way that should be reserved for the copyright holder.
- An exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public.
- The process of keeping track of user activity while attached to a system.
- The buying and selling of products or services electronically, typically through the Internet.
- A license given by a government that provides inventors a temporary monopoly on their invention.
- A type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources. The security manager controls the security policy and users aren't able to override the policy.
76 Clues: Regularly scheduled backups. • A backup of data stored in a database. • Exploiting a victim using email messages • Unscheduled backups performed periodically. • Anything that is owned by a copyright holder. • Software that help remove unwanted, unsolicited email. • The capturing and storing of computer and user events. • ...
ITF-Capt4-1-keyterms 2019-12-05
Across
- A security concern regarding network devices, and other devices such a smartphones that give the option of using the device without a password.
- An early example of encryption used by Julius Caesar to send confidential military messages.
- Attempting to secretively discover private information about a person, company, or other entity.
- A development model that breaks down project activities into a series of sequential or linear phases, each phase depending on the deliverables from the previous phase.
- Regularly scheduled backups.
- TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
- Backups that are stored in the same building or even the same room as the computer systems they are taken from.
- Software that help remove unwanted, unsolicited email.
- The passive gathering of information about a potential victim.
- An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
- Works whose copyrights have expired and are free for anyone to reproduce, display, and make derivatives.
- The use of deception to gain personal and/or private information for unlawful purposes.
- The SDLC phase that involves studying existing information systems that are already in place and the requirements for new information systems.
- A device that contains one or more hard drives that users can access over the network.
- A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
- Unscheduled backups performed periodically.
- Data that are being transported from one device to another, whether by radio, electrical, or light signals.
- Any word, picture, or symbol that's used to distinguish a good from other similar goods.
- The study and design of a system by examining its components and their interactions.
- The ability to ensure that someone can't deny that they performed a certain act.
- The various forms of information systems including transaction processing, management, and expert systems.
- A development model that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design.
- An attribute used to classify information based on the risk of public disclosure.
- A scheme for classifying information based on different levels of public/private distinctions.
- The identification, evaluation, and prioritization of risks followed by activities that minimizes, monitors, and controls the impact of the risk.
- A device that controls the flow of network traffic to protect systems from unauthorized network connections.
- An activity that involves integrating various computing systems and software applications to function together as a whole.
- Exploiting a victim using email messages
- A project management process that divides a large or complex project into smaller, more manageable projects that can be completed as part of an incremental or iterative process.
- A reasonable belief that personal information collected by an information system is controlled and protected and not shared or used beyond its original intent.
- The practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time.
- A method of increasing fault tolerance by providing multiple network paths between hosts.
Down
- The SDLC phase that involves purchasing and installing new hardware and software, integrating the various system components, and testing the operation of the new system.
- The SDLC phase that involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project.
- A type of access control that restricts access based on the users role in an organization.
- An attempt to connect to a server by capturing and resending of authentication information.
- A method of increasing fault tolerance by providing power backups and power failover.
- Tricking a victim into revealing sensitive information under false pretenses.
- Convincing a victim that they are performing a legitimate task within their web browser window, when in fact they are being tricked into revealing sensitive information or installing malware on their computer
- A type of access control where a user has complete control over a resource, and also determines the permissions other users have those those resources.
- Anything that is owned by a copyright holder.
- A scheme for classifying information based on government and military requirements.
- combination of technology, people, and procedures used to organize, analyze, and store data.
- The SDLC phase that involves monitoring and evaluating the new information system.
- A methodology or framework that defines steps and tasks for developing and maintaining information systems.
- A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.
- Data in a persistent storage medium, such as a hard drive or optical disc.
- An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
- A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face or voice.
- Directions for disposing and even destroying data when it's no longer needed or when a storage device needs to be replaced.
- A type of authentication that requires the user to provide something that they know, such as a password or PIN.
- Authentication that requires two or more evidences of authentication, usually of different types.
- A type of authentication that requires the user to provide something that they have, such as a key, fob, electronic chip, or smart card.
- A method of authenticating with one system to gain access to other related systems.
- A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
- An attack where the an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
- A backup of the system software, including operating system files.
- Concerning security, a person responsible for securing networks and responding to intrusions.
- A backup of data stored in a database.
- The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
- Software that helps protect against malicious software infections.
- Protections granted by the federal government to creators, writers, and inventors regarding rights to reproduce, display, make derivatives, sell, rent, or lend a work.
- Software where anyone can inspect, enhance, and modify the source code.
- The SDLC phase that involves reviewing the system requirements document from the analysis phase and producing detailed specifications that cover all aspects of the system.
- A person who is in charge of designing and implementing security methods to protect an organization's computer systems and networks.
- Any software where the publisher retains intellectual property rights to the source code.
- A systematic process for determining and addressing needs, or "gaps" between current conditions, and desired conditions or "wants".
- The capturing and storing of computer and user events.
- Backups that are stored at a location far enough from a possible natural disaster, while being close enough to recover the data and systems within a reasonable amount of time.
- The process of turning data points into useful information.
- The crime of using someone else's intellectual property in a way that should be reserved for the copyright holder.
- An exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public.
- The process of keeping track of user activity while attached to a system.
- The buying and selling of products or services electronically, typically through the Internet.
- A license given by a government that provides inventors a temporary monopoly on their invention.
- A type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources. The security manager controls the security policy and users aren't able to override the policy.
76 Clues: Regularly scheduled backups. • A backup of data stored in a database. • Exploiting a victim using email messages • Unscheduled backups performed periodically. • Anything that is owned by a copyright holder. • Software that help remove unwanted, unsolicited email. • The capturing and storing of computer and user events. • ...
Types of Bullying 2013-08-12
Across
- Using information and communication technologies to bullying someone.
- Treating someone like an outcast.
- Secretly hurting a person such as spreading rumours.
- Affecting someone's relationship, excluding, making the person feel left out etc.
Down
- Name calling, saying hurtful things.
- Hurting someone.
- Hurting a person's feelings.
7 Clues: Hurting someone. • Hurting a person's feelings. • Treating someone like an outcast. • Name calling, saying hurtful things. • Secretly hurting a person such as spreading rumours. • Using information and communication technologies to bullying someone. • Affecting someone's relationship, excluding, making the person feel left out etc.
jobs 2021-01-07
13 Clues: Koch • Maler • Bäcker • Gärtner • arbeiten • Frisör/in • Lehrer/in • LKW-Fahrer • Sicherheit • Tierpfleger • Verkäufer/in • Landwirtschaftsgehilfe • Sicherheitsbediensteter
James HW 1/25 2024-01-25
Across
- he development of computer systems capable of performing tasks that normally require human intelligence.
- A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The simulated cyberattack on a computer system to evaluate its security.
- a method or algorithm for transforming plaintext (readable data) into ciphertext (encoded or encrypted data) to secure communication or protect information.
- The process of verifying the identity of a user, system, or application before granting access.
Down
- Large and complex datasets that are difficult to manage and analyze using traditional data processing applications.
- The practice of protecting computer systems, networks, and data from security breaches and unauthorized access.
- The study and practice of techniques for securing communication and data through the use of codes and ciphers.
- Malicious software that attaches itself to a host program and can replicate itself to spread to other programs.
- A form of social engineering where attackers trick individuals into divulging sensitive information by pretending to be a trustworthy entity.
- A collection of computers and other devices connected for the purpose of sharing resources and information
11 Clues: The simulated cyberattack on a computer system to evaluate its security. • The process of verifying the identity of a user, system, or application before granting access. • he development of computer systems capable of performing tasks that normally require human intelligence. • ...
Unit 24 2019-11-13
Ivan's Crossword 2018-11-09
13 Clues: крыша • чеснок • охрана • Греция • ловушка • угадывать • наводнение • пропустить • притворяться • расстроенный • взбитые (сливки) • игральные кубики • бросить (кубики)/ катиться
Crybersecrity 2023-02-09
Bullying Types 2025-05-02
WatchGuard Dictionary Day 2022-10-11
8 Clues: Fraudulent emails • Malicious software • security simplified • WatchGuard for SOCs • WatchGuard's XDR Solution • Unified Security Platform • An easy-to-use MFA product • WatchGuard's signature red box
Family 2019-11-22
Across
- Waymo
- Blue Lake
- Gale’s husband
- Security Guard
- Georgia
- Fireman
- Dec 5 hospital
- THISISIT
- Confederate Loot
- Annie’s mom
- Rachel’s mom
- OK
- Robin’s dad
- State Farm Agent
- Daddy’s Grandfather’s daughter
- Where in the world is.......
- Court’s first roommate
- Vincents Staten Island Hospital
- Teachers College Nana Verne’s College
- Youngest cousin
- College Counselor
- 3224
- Andrew Taylor Profession
- Go You
- Steve and
- Spain
Down
- Youngest Uncle
- Translation Company
- Emery Paper
- Galaxy
- Go Green, Go.....
- Saturn
- Field
- Mommy's plate
- Kat’s namesake
- Seville mom
- Steppingstone
- College gig
- Middle school friend
- Nellie’s birthplace
- Oldest Uncle
- Middle Uncle
- 1967 Detroit
- Coconut water
- Slave
- 654______
- William UVA Football
- Gymnastics teacher
- 27th
- Plantation
- The _____
51 Clues: OK • 27th • 3224 • Waymo • Field • Slave • Spain • Galaxy • Saturn • Go You • Georgia • Fireman • THISISIT • Blue Lake • 654______ • The _____ • Steve and • Plantation • Emery Paper • Seville mom • College gig • Annie’s mom • Robin’s dad • Rachel’s mom • Oldest Uncle • Middle Uncle • 1967 Detroit • Mommy's plate • Steppingstone • Coconut water • Youngest Uncle • Gale’s husband • Security Guard • Dec 5 hospital • Kat’s namesake • Youngest cousin • ...
WGSM 2021-10-02
Across
- Cris collects these
- Director of inhouse Sales
- IF German food is what you crave
- grab a drink here
- the system used to input tickets
- Kimberly has over 100 of these
- sales refers to the 1000 building as this
- Richie Roth is this
- Director of Housekeeping
- guests can text using this service
- this team delivers Ice and assists with luggage
- aka the ghost
Down
- this restaurant is currently closed
- a studio in the classic section is what Rate Code
- Owners can slide on waterslides here
- sister property in Gatlinburg
- recently opened pool
- Director of Engineering
- code 44 in sales terms
- Director of security
- 22 1 22 in sales terms
- noise complaint put in a ticket for this department
- Resort Ops Director
- If you have a call out please call this
- Jason, Angel, Cathy and Gage
25 Clues: aka the ghost • grab a drink here • Cris collects these • Resort Ops Director • Richie Roth is this • recently opened pool • Director of security • code 44 in sales terms • 22 1 22 in sales terms • Director of Engineering • Director of Housekeeping • Director of inhouse Sales • Jason, Angel, Cathy and Gage • sister property in Gatlinburg • Kimberly has over 100 of these • ...
One platform to support communication and learning wherever it happens 2023-10-04
Across
- Certified by one of the most recognized information security standards worldwide
- Conformity
- study and use of the English language in academic settings
- prep To study for an examination
- Schooling
- Adding and subtracting
- Connect teacher tools to Remind to share content, resources, and more
- Monitor and measure teacher, student, and family communicationC
- Raise kids
- Protecting the personal information of students under 13
- Turnout or presence
- Detailed examination
- Exchanging messages and information
- Area where a group of schools exist
- Alert your entire community in emergency situations
Down
- Alert your entire community in emergency situations
- Places of learning
- Comply with The Family Educational Rights and Privacy Act
- Gaining knowledge
- Meeting federal and state laws for student privacy
- Safety, Manage settings to safeguard and support communication
- Comply with General Data Protection Regulation (EU)
- Teaching
- Create accounts and classes, send role based messages
- Class tutor
- Send notifications to your entire community or specific roles
26 Clues: Teaching • Schooling • Conformity • Raise kids • Class tutor • Gaining knowledge • Places of learning • Turnout or presence • Detailed examination • Adding and subtracting • prep To study for an examination • Exchanging messages and information • Area where a group of schools exist • Meeting federal and state laws for student privacy • Alert your entire community in emergency situations • ...
BLUE ECONOMY 2023-10-29
Across
- relating to or found in the sea.
- introduction of harmful materials into the environment
- place where ships load or unload
- Surname Cabinet Secretary Ministry of Blue Economy
- catching fish
- Think Maritime,Think Women
- Ship or boat
- Exchange of Goods and services
- boundary of a coast, where land meets water
- the business of transporting freight,by ship
- oldest Swahili settlement in East Africa
- a body of salt water
- state of a country or region
Down
- being free from danger or threat
- of, relating to, or bordering on the sea.
- recreation, relaxation, and pleasure activities
- someone employed on a sea vessel
- Swahili for 'In the Sea'
- large area of water surrounded by land.
- Maritime security of a country
- middlemen who make shipping happen
- Coastal city in Kenya
- UN Agency for safety of shipping
23 Clues: Ship or boat • catching fish • a body of salt water • Coastal city in Kenya • Swahili for 'In the Sea' • Think Maritime,Think Women • state of a country or region • Exchange of Goods and services • Maritime security of a country • being free from danger or threat • relating to or found in the sea. • someone employed on a sea vessel • place where ships load or unload • ...
CTF-CW-6 2025-11-17
Across
- Place in process where risk leaks in
- Lightweight, portable way to package software
- Temporary period of activity restarted
- Replace identifying information with artificial identifiers
- Issue, project, and bug tracker at Tekion.
- The one managing day-to-day data operations
- Someone outside your company doing work
- Privacy principle limiting collection to necessary information only
- Guarantee that a message was sent and received
- Approved items or users that are allowed
- Security Orchestration Automation & Response acronym
- Isolated test environment
- Security review step used by Tekion before release.
Down
- Building data protection into systems from the ground up
- Secret management and credential vault at Tekion.
- Specific logic for finding attacks
- List defining who can do what in a system
- The one responsible for compliance
- Completely removing threats or malware
- Evaluation of privacy risks before implementing new data processing
20 Clues: Isolated test environment • Specific logic for finding attacks • The one responsible for compliance • Place in process where risk leaks in • Temporary period of activity restarted • Completely removing threats or malware • Someone outside your company doing work • Approved items or users that are allowed • List defining who can do what in a system • ...
CTF-CW-6 2025-11-17
Across
- Place in process where risk leaks in
- Lightweight, portable way to package software
- Temporary period of activity restarted
- Replace identifying information with artificial identifiers
- Issue, project, and bug tracker at Tekion.
- The one managing day-to-day data operations
- Someone outside your company doing work
- Privacy principle limiting collection to necessary information only
- Guarantee that a message was sent and received
- Approved items or users that are allowed
- Security Orchestration Automation & Response acronym
- Isolated test environment
- Security review step used by Tekion before release.
Down
- Building data protection into systems from the ground up
- Secret management and credential vault at Tekion.
- Specific logic for finding attacks
- List defining who can do what in a system
- The one responsible for compliance
- Completely removing threats or malware
- Evaluation of privacy risks before implementing new data processing
20 Clues: Isolated test environment • Specific logic for finding attacks • The one responsible for compliance • Place in process where risk leaks in • Temporary period of activity restarted • Completely removing threats or malware • Someone outside your company doing work • Approved items or users that are allowed • List defining who can do what in a system • ...
Indian contact act 1872 2025-11-30
Across
- created by contract.
- condition to validate agreement.
- of rescinding a contract.
- contract made without free consent is
- who makes an offer.
- proposal made by one party to another.
- essential to contract purpose.
- or security on goods.
- for breach of contract.
- in exchange for a promise.
- who sells goods.
Down
- that becomes void later.
- false statement that induces a contract.
- DAMAGES,Liability for late delivery of goods.
- must be to be valid.
- who buys goods.
- paid in advance as security.
- GOODS,Goods not specific at contract time.
- of ownership.
- enforceable by law.
- GOODS,Goods manufactured or acquired after agreement
- TO SELL,Contract in which goods are delivered later.
- GOODS,Goods identified at the time of making the contract.
- by buyer to seller.
24 Clues: of ownership. • who buys goods. • who sells goods. • enforceable by law. • who makes an offer. • by buyer to seller. • created by contract. • must be to be valid. • or security on goods. • for breach of contract. • that becomes void later. • of rescinding a contract. • in exchange for a promise. • paid in advance as security. • essential to contract purpose. • condition to validate agreement. • ...
Chapter 22 Vocabulary 2014-03-12
Across
- security/A system by which the participating nations agree to take joint action against a nation
- formal agreement between the governments of two or more countries
- avoidance of involvement in world affairs
- of members of both major political parties
- document entitling a traveler to certain protections established by international treaty
- attacks any one of them
- treaty/Agreement between two nations
- official of the government who represents the nation in diplomatic matters
- defense alliance/An agreement between nations to support each other in case of an attack
- military service; also called the draft
- special document, required by certain countries, that is issued by the government of the country
- agreement/An agreement made between the president and another head of state
Down
- security/Protection of a nation’s borders and territories against invasion or control by foreign
- security pact/A mutual defense treaty among nations of a region
- in world affairs
- policy designed to keep the Soviet Union from expanding its power
- ambassador’s official residence and offices in a foreign country
- measure such as withholding economic aid to influence a foreign government’s activities
- policy/The strategies and goals that guide a nation’s relations with other countries
- treaty/International agreement signed by several nations
- /Office that promotes American business and safeguards its travelers in a foreign country
- government official who heads a consulate in a foreign nation
22 Clues: in world affairs • attacks any one of them • treaty/Agreement between two nations • military service; also called the draft • avoidance of involvement in world affairs • of members of both major political parties • treaty/International agreement signed by several nations • government official who heads a consulate in a foreign nation • ...
Investing-Briana Cutaran 2025-03-25
Across
- investing all the money you have available
- the availability of cash
- Virtual currency
- how much Tom Brady lost on FTX
- when the stock market is high
- ability to move your 401k funds
- how old you need to be to invest in crypto
- initial public offering
- when your this old you must take the minimum out of your account annually
- a loan from you to the person you bought it from
- biggest financial fraud in US history
- Dollar cost averaging
- after working a certain amount of time with a company you get 100% of your 401k
Down
- what percentage you need to pay for social security tax if you work for an employer
- the person who takes care of your investments in a mutual fund
- system to record info so you can't cheat the system
- pool of money from multiple different investors
- currencies backed by the government that don't have a physical commodity
- the money you contribute here is after taxes
- Both you, your employer, and sometimes the state pays into this
- how much you can put into your IRA per year
- President of the Stanwood AAAA Booster club
- when the stock market is low
- a security that represents the ownership of a fraction of a corporation
- the investment game we've been playing
- how old do you need to be to receive full social security benefits
26 Clues: Virtual currency • Dollar cost averaging • initial public offering • the availability of cash • when the stock market is low • when the stock market is high • how much Tom Brady lost on FTX • ability to move your 401k funds • biggest financial fraud in US history • the investment game we've been playing • investing all the money you have available • ...
Retirement terms 2025-10-16
Across
- Benefit Plan: A pension plan in which the amount of benefits paid to an
- age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
- make tax-deductible contributions.
- (Individual Retirement Account): A special type of account that allows investors
- IRA, the contributions are not tax deductible
- Contribution Plan: A pension plan wherein a certain amount or percentage
- conditions to a person following retirement or to surviving dependents.
- IRA: Roth IRAs allow investors who do not exceed a specific income level to
- plan.
- after retirement is fixed in advance in accordance with a formula given in
- money is set aside each year (by either the company and/or the employee) for the
- A type of defined contribution retirement account funded through pre-tax
Down
- of the employee. There are restrictions as to when and how you can
- include payment of hospital and medical expenses.
- Benefits: Benefits (compensation in addition to salary) that may be provided
- A federal program that provides some level of health benefits for people
- Security: A federal benefits program developed in 1935, Social Security is
- a limited amount of money toward retirement annually. Unlike the
- these funds without penalties.
- employees for sickness, accidental injury, or accidental death. These benefits
- through a tax levied on employers and employees.
- bonds, mutual funds or other assets, and are not taxed until they are
- deductions. The funds in the account can be invested in a number of different
- A sum of money paid regularly as a retirement benefit; money paid under
24 Clues: plan. • these funds without penalties. • make tax-deductible contributions. • IRA, the contributions are not tax deductible • through a tax levied on employers and employees. • include payment of hospital and medical expenses. • a limited amount of money toward retirement annually. Unlike the • of the employee. There are restrictions as to when and how you can • ...
retirement terms 2025-10-17
Across
- Benefits: Benefits (compensation in addition to salary) that may be provided
- A federal program that provides some level of health benefits for people
- age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
- Benefit Plan: A pension plan in which the amount of benefits paid to an
- these funds without penalties.
- IRA, the contributions are not tax deductible
- money is set aside each year (by either the company and/or the employee) for the
- A sum of money paid regularly as a retirement benefit; money paid under
- include payment of hospital and medical expenses.
- employees for sickness, accidental injury, or accidental death. These benefits
- Security: A federal benefits program developed in 1935, Social Security is
- A type of defined contribution retirement account funded through pre-tax
Down
- after retirement is fixed in advance in accordance with a formula given in
- plan.
- of the employee. There are restrictions as to when and how you can
- a limited amount of money toward retirement annually. Unlike the
- (Individual Retirement Account): A special type of account that allows investors
- Contribution Plan: A pension plan wherein a certain amount or percentage
- IRA: Roth IRAs allow investors who do not exceed a specific income level to
- make tax-deductible contributions.
- through a tax levied on employers and employees.
- conditions to a person following retirement or to surviving dependents.
- deductions. The funds in the account can be invested in a number of different
- bonds, mutual funds or other assets, and are not taxed until they are
24 Clues: plan. • these funds without penalties. • make tax-deductible contributions. • IRA, the contributions are not tax deductible • through a tax levied on employers and employees. • include payment of hospital and medical expenses. • a limited amount of money toward retirement annually. Unlike the • of the employee. There are restrictions as to when and how you can • ...
dollar and sense 2025-10-17
Across
- Security: A federal benefits program developed in 1935, Social Security is
- these funds without penalties.
- make tax-deductible contributions.
- include payment of hospital and medical expenses.
- Contribution Plan: A pension plan wherein a certain amount or percentage
- of the employee. There are restrictions as to when and how you can
- money is set aside each year (by either the company and/or the employee) for the
- after retirement is fixed in advance in accordance with a formula given in
- Benefit Plan: A pension plan in which the amount of benefits paid to an
- Terms
- IRA: Roth IRAs allow investors who do not exceed a specific income level to
- bonds, mutual funds or other assets, and are not taxed until they are
Down
- deductions. The funds in the account can be invested in a number of different
- employees for sickness, accidental injury, or accidental death. These benefits
- IRA, the contributions are not tax deductible
- A federal program that provides some level of health benefits for people
- (Individual Retirement Account): A special type of account that allows investors
- plan.
- through a tax levied on employers and employees.
- age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
- a limited amount of money toward retirement annually. Unlike the
- conditions to a person following retirement or to surviving dependents.
- A sum of money paid regularly as a retirement benefit; money paid under
- Benefits: Benefits (compensation in addition to salary) that may be provided
- A type of defined contribution retirement account funded through pre-tax
25 Clues: plan. • Terms • these funds without penalties. • make tax-deductible contributions. • IRA, the contributions are not tax deductible • through a tax levied on employers and employees. • include payment of hospital and medical expenses. • a limited amount of money toward retirement annually. Unlike the • of the employee. There are restrictions as to when and how you can • ...
DFE Module 08 – Network Forensics 2025-11-05
Across
- Intercepting unsecured connections to steal personal information
- Command line packet sniffer used to capture and analyze network packets
- Flooding a target with traffic to deny service to legitimate users
- Logs containing details about network connectivity and routing
- Decoy system designed to lure and study attacker behavior
- Capturing network traffic to obtain sensitive information
- Records of allowed or denied network traffic for security monitoring
- Contain assigned IP addresses and timestamps for network devices
- Capturing recording and analyzing network events to discover the source of security incidents
- Taking over an active user session to gain unauthorized access
Down
- GUI tool used to capture and analyze live or recorded network traffic
- Faking an IP address to appear as a trusted host
- Suspicious network communication caused by infected systems
- Records generated by intrusion detection systems to identify anomalies
- Analysis performed during an ongoing attack to respond quickly
- Intercepting and relaying messages between two parties
- Mapping attacker’s MAC address to victim’s IP address to intercept traffic
- Relating multiple events to identify patterns or root causes
- Digital forensic artifact indicating a potential security breach
- Unauthorized wireless access point set up to steal data
- Attempt to gain FTP credentials by repeated login failures
- Analysis of logs after an incident has already occurred
- Attack that overwhelms a server with half open TCP connections
- Converting data from different log formats into a common format
- Wireshark feature that allows filtering of captured packets for analysis
25 Clues: Faking an IP address to appear as a trusted host • Intercepting and relaying messages between two parties • Unauthorized wireless access point set up to steal data • Analysis of logs after an incident has already occurred • Decoy system designed to lure and study attacker behavior • Capturing network traffic to obtain sensitive information • ...
