cyber security Crossword Puzzles

¡Vamos de viaje! 2022-10-24

¡Vamos de viaje! crossword puzzle
Across
  1. screen
  2. suitcase
  3. to go through security
  4. to pack a suitcase
  5. to get in line
  6. to go on vacation
  7. airport
  8. ticket
Down
  1. itinerary
  2. flight
  3. travel agency
  4. identification
  5. travel
  6. departure
  7. luggage
  8. to board
  9. gate
  10. passport

18 Clues: gateflightscreentravelticketluggageairportsuitcaseto boardpassportitinerarydeparturetravel agencyidentificationto get in lineto go on vacationto pack a suitcaseto go through security

Vocabulary 2022-11-08

Vocabulary crossword puzzle
Across
  1. Financial gain
  2. Means of transport
  3. Service/set-up
  4. Request
  5. Task
  6. Financial plan
  7. Costs
  8. Buy
  9. Bill
  10. Guarantee
  11. Rental agreement
Down
  1. Work table/checkout
  2. Boss
  3. Trader/merchant
  4. Network security device
  5. Close observation
  6. Down payment
  7. Trainee

18 Clues: BuyBossTaskBillCostsRequestTraineeGuaranteeDown paymentFinancial gainService/set-upFinancial planTrader/merchantRental agreementClose observationMeans of transportWork table/checkoutNetwork security device

Unit 4 Crossword puzzle 2023-02-06

Unit 4 Crossword puzzle crossword puzzle
Across
  1. asemalaituri
  2. saapua
  3. tuhota
  4. tähän asti
  5. välittömästi
  6. tarpeellinen
  7. uupunut
Down
  1. satama
  2. portti
  3. läpi
  4. turvatarkastus
  5. teltta
  6. poistaa
  7. lähteä
  8. ilmoittautua

15 Clues: läpisatamaporttisaapuatuhotatelttalähteäpoistaauupunuttähän astiasemalaiturivälittömästitarpeellinenilmoittautuaturvatarkastus

worlsa 2025-01-13

worlsa crossword puzzle
Across
  1. Food
  2. Justice
  3. Education
  4. Dignity
Down
  1. Employment
  2. Rights Civil Rights
  3. Security

7 Clues: FoodJusticeDignitySecurityEducationEmploymentRights Civil Rights

SN43004FP Chapter 4.2 2022-10-19

SN43004FP Chapter 4.2 crossword puzzle
Across
  1. A tested set of hotfixes, security updates and critical updates
  2. Enable software programs to be updated automatically
Down
  1. Microsoft service which automates downloading and installing software updates
  2. Update fix for a problem addressing a critical, non security related bug
  3. Update fix for a product-specific security-related vulnerability
  4. Service which provides management and distribution of updates
  5. Software to fix problems or update the operating system

7 Clues: Enable software programs to be updated automaticallySoftware to fix problems or update the operating systemService which provides management and distribution of updatesA tested set of hotfixes, security updates and critical updatesUpdate fix for a product-specific security-related vulnerability...

Your Local Crossword 2023-10-17

Your Local Crossword crossword puzzle
Across
  1. A place to keep valuables secure.
  2. They shield your eyes from the bright sun.
  3. Provides security for doors and gates.
  4. Ensures safety at the swimming pool.
  5. A cool spot to escape the direct sunlight.
  6. Sounds a warning if there's a threat.
  7. Protects your skin from harmful UV rays.
  8. Waters the lawn on a hot summer day.
Down
  1. Measures the temperature of the air.
  2. Provides shade over windows or patios.
  3. A professional who deals with security.
  4. Used to water plants during hot spells.
  5. Helps circulate air and keep things cool.
  6. Cools down a room on a scorching day.
  7. Used for cooking outdoors in summer.
  8. Staying well ___ is important in hot weather.
  9. Keeps beverages cold during picnics.
  10. A popular way to cool off in summer.

18 Clues: A place to keep valuables secure.Measures the temperature of the air.Used for cooking outdoors in summer.Ensures safety at the swimming pool.Keeps beverages cold during picnics.Waters the lawn on a hot summer day.A popular way to cool off in summer.Cools down a room on a scorching day.Sounds a warning if there's a threat....

Vocabulary #3 2024-09-19

Vocabulary #3 crossword puzzle
Across
  1. a person tending to work with energy.
  2. a system of interconected people.
  3. data held in a computer.
  4. the act of of converting waste into reusable material.
  5. my house has a security ________
  6. something that gets your attention and is apealing to you.
  7. a formal request to an authority.
  8. Our teacher gave us an _________ from the office.
Down
  1. a loud cry or call.
  2. a form you fill with a complain about the service.
  3. slightly irritated or angry.
  4. a firm decision
  5. a piece of equipment for a specific task.
  6. the singer forgot her ________ now no one can hear her voice.
  7. the teacher tried to __________ us to recycle.

15 Clues: a firm decisiona loud cry or call.data held in a computer.slightly irritated or angry.my house has a security ________a system of interconected people.a formal request to an authority.a person tending to work with energy.a piece of equipment for a specific task.the teacher tried to __________ us to recycle....

CONVERSATIONAL SELLING SKILLS 2018-12-13

CONVERSATIONAL SELLING SKILLS crossword puzzle
Across
  1. CONVERSION
  2. MEETING
  3. SEE
  4. MONETARY
  5. ABILITY
  6. HE IS KING
  7. NO
  8. ___ A LEAD
Down
  1. SECURITY
  2. DISCUSSION
  3. EXPERT
  4. REINSURANCE COMPANY
  5. LEAKAGE
  6. FRIENDS DO THIS
  7. ENDORSE
  8. FUEL TO THE SALES ENGINE

16 Clues: NOSEEEXPERTMEETINGLEAKAGEABILITYENDORSESECURITYMONETARYCONVERSIONDISCUSSIONHE IS KING___ A LEADFRIENDS DO THISREINSURANCE COMPANYFUEL TO THE SALES ENGINE

Vida Y Muerte Prólogo y C1 2023-04-26

Vida Y Muerte Prólogo y C1 crossword puzzle
Across
  1. Tattoo
  2. War
  3. Mistreatment
  4. Gang
  5. At the beginning
  6. Rules
  7. business
Down
  1. Punishment/penalty
  2. Lasted
  3. They Joined Together
  4. Gang Member
  5. Threat
  6. To hit
  7. Name of initiation event
  8. Tear
  9. Security

16 Clues: WarTearGangRulesLastedTattooThreatTo hitSecuritybusinessGang MemberMistreatmentAt the beginningPunishment/penaltyThey Joined TogetherName of initiation event

gun control 2024-11-14

gun control crossword puzzle
Across
  1. Legacy
  2. Safety
  3. Gun ownership regulation
  4. Problem
  5. Violence
  6. Touch
  7. Encouraging something
  8. Carry weapons
  9. Body of law
Down
  1. Lawmaking
  2. Achieve a goal
  3. Avoid something
  4. Necessary
  5. Contest against
  6. Supporters
  7. To mourn

16 Clues: TouchLegacySafetyProblemViolenceTo mournLawmakingNecessarySupportersBody of lawCarry weaponsAchieve a goalAvoid somethingContest againstEncouraging somethingGun ownership regulation

Career Cluster Puzzle 2024-12-06

Career Cluster Puzzle crossword puzzle
Across
  1. This cluster includes careers in sales, public relations, merchandising and ____, regardless of industry.
  2. The ____, distribution and logistics cluster includes people who plan and move people and goods.
  3. This career cluster includes jobs in policy making, elected officials, national security and taxation.
  4. Workers in the law, public safety, corrections and _____ cluster protect citizens. Professions include emergency services, security/surveillance, law and law enforcement.
  5. The ______ and training career cluster includes teaching roles as well as professional counselors, school psychologists and speech-language pathologists who offer support and guidance to students.
  6. This cluster includes people involved in the processing and production of goods.
  7. The ____ and tourism cluster jobs within restaurants, bars, tourist attractions, resorts, hotels and travel agencies.
  8. The ____________, food and natural resources cluster includes everything related to the creation of agricultural products. Job fields include farming, ranching, food processing, engineering and veterinary medicine.
  9. The ___ services cluster includes jobs like his cluster encompasses fields as diverse as cosmetology, counseling, social work, real estate and personal banking.
Down
  1. This cluster includes careers in banking, investments and insurance as well as those who manage taxes and finances for businesses
  2. The business,____ and administration cluster is vast, covering most of the functions required to run businesses effectively.
  3. The ___ technology cluster includes computer-related professions, including software development, network administration, information security and systems administration.
  4. The cluster includes highly technical fields in biology, astronomy, chemistry, scientific research and all engineering disciplines.
  5. The architecture and ________ cluster encompasses careers related to designing, building and maintaining homes, industrial facilities, streets or bridges.
  6. This cluster includes journalists, performers and behind-the-scenes workers who make TV, film, media and live performances happen.
  7. This cluster includes jobs like nurses, doctors, pharmacists, technicians, dentists and other providers.

16 Clues: This cluster includes people involved in the processing and production of goods.The ____, distribution and logistics cluster includes people who plan and move people and goods.This career cluster includes jobs in policy making, elected officials, national security and taxation....

2nd Quarter Security Training 2021-06-17

2nd Quarter Security Training crossword puzzle
Across
  1. Any check placed on a hold longer than 7 business days must be deposited into a __________ account.
  2. Per ______________ a check that is placed on a seven business day hold and deposited into a checking account must release $225 the next business day after it was deposited, $5300 the second business day, and the remaining check amount on the seventh business day.
  3. All checks will be placed on a 7 business day hold during the first 30 days for a ________________.
  4. How many numbers are in a Canadian routing number?
  5. These checks will never require a hold.
  6. An account that has been negative for more than 6 business days during the past six months will have a warning that says "___________ Check Hold Warning".
  7. An account with this warning will be subject to seven business day check holds on all checks.
  8. Checks deposited into the ATM will automatically have a ______ day hold.
  9. Checks placed on a hold longer than 2 business days require a __________________.
Down
  1. Ask ________ to understand where the member obtained the check from and for what purpose.
  2. A type of endorsement that involves signing the back of the check the exact way it is written on the front.
  3. When the numerical amount and the written amount on a check do not match, the check can only be negotiated for what is on the _________.
  4. To prevent check fraud, always verify the member’s _______ on the front of the check before negotiating an OnUs check.
  5. If the endorsement states __________ to any financial institution other than MSGCU, do NOT accept the check. If the endorsement lists MSGCU _________, the check should not be accepted until a supervisor can review with Accounting. (Hint: same answer for both blanks)
  6. A check made out to a _______ can only be deposited into that ________ account. (hint: same word)
  7. A type of endorsement that involves signing the back of the check under the words “For Deposit Only”
  8. These checks cannot be deposited at MSGCU because we do not offer the type of account it needs to be deposited into.
  9. These checks must be deposited into an account where the payee(s) has access to the funds.
  10. A type of endorsement that is used when the receiver of the check wants someone to get the money. Includes the words “Pay to the Order of”. We call this a 3rd Party check.

19 Clues: These checks will never require a hold.How many numbers are in a Canadian routing number?Checks deposited into the ATM will automatically have a ______ day hold.Checks placed on a hold longer than 2 business days require a __________________.Ask ________ to understand where the member obtained the check from and for what purpose....

Security Plus Chapter 3 2024-02-29

Security Plus Chapter 3 crossword puzzle
Across
  1. The process of changing encrypted text into the original text
  2. uses two mathematically related keys
  3. two or more different messages that produce the same hash value
  4. evidence or proof of something
  5. A removable external cryptographic device
  6. digital fingerprints
  7. A downgrade attack
  8. to implementing an older and less secure mode “fall back”
  9. An electronic verification of the sender
Down
  1. bruteforce collision attack that exploits the probability theory
  2. denial of the truth or validity of something
  3. The process of changing plaintext into ciphertext
  4. hiding data within an ordinary, nonsecret file
  5. cryptoprocessor
  6. object whose state cannot be modified after it is created
  7. decentralized, distributed and public digital ledger
  8. is a finite sequence of rigorous instructions
  9. The process of sending and receiving secure cryptographic keys
  10. protect the entire hard drive using cryptography

19 Clues: cryptoprocessorA downgrade attackdigital fingerprintsevidence or proof of somethinguses two mathematically related keysAn electronic verification of the senderA removable external cryptographic devicedenial of the truth or validity of somethingis a finite sequence of rigorous instructionshiding data within an ordinary, nonsecret file...

Chapter 8 Security Plus 2024-03-20

Chapter 8 Security Plus crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

US GOV UNIT #7 2023-10-21

US GOV UNIT #7 crossword puzzle
Across
  1. In charge of US transportation
  2. Domestic Intelligence and Security Agency
  3. US Justice Department
  4. Predicts the weather and natural disasters
  5. Oversees agriculture in America
Down
  1. In charge of defending national security
  2. Oversees food safety
  3. Combination of all the leaders of each US military branch
  4. Oversees national involvement in space
  5. Oversees United States mail

10 Clues: Oversees food safetyUS Justice DepartmentOversees United States mailIn charge of US transportationOversees agriculture in AmericaOversees national involvement in spaceIn charge of defending national securityDomestic Intelligence and Security AgencyPredicts the weather and natural disastersCombination of all the leaders of each US military branch

Cancer Control 2013-04-16

Cancer Control crossword puzzle
Across
  1. Can be affected by cancer, found in females
  2. Obesity, Age and Genetic Predisposition
  3. Health promotion strategy, tobacco
  4. Pain and suffering endured
  5. Can be affected by cancer, found in males
  6. Medical Treatment
  7. Lost productivity, social security payments and carers
Down
  1. SES, work, food security, stress
  2. Health promotion strategy, breast
  3. Tobacco smoking, alcohol consumption and exposure to sunlight and UV
  4. Health promotion strategy, sun

11 Clues: Medical TreatmentPain and suffering enduredHealth promotion strategy, sunSES, work, food security, stressHealth promotion strategy, breastHealth promotion strategy, tobaccoObesity, Age and Genetic PredispositionCan be affected by cancer, found in malesCan be affected by cancer, found in femalesLost productivity, social security payments and carers...

krustvardu mikla GOTI subkultura 2023-10-10

krustvardu mikla GOTI subkultura crossword puzzle
Across
  1. mākslas stilam raksturīgi ______ elementi.
  2. Kurā dekādē attīstījās gotu mūzikas žanrs?
  3. subkultūras pārstāvji bieži izceļas ar ______ apģērbu.
  4. subkultūras mākslinieki bieži izmanto _______ apģērbu.
  5. un elektroniski,Kas ir "cyber goth" gotu subkultūrā?
Down
  1. sauc gotu subkultūras festivālu, kas ir saistīts ar gotu mūzikas žanru?
  2. subkultūras pārstāvji bieži izceļas ar ______ apģērbu.
  3. un atšķirīgums,Kas ir gotu subkultūras pamatfilozofija?
  4. subkultūras saknes saistītas ar ______ gadiem.
  5. ir gotu subkultūras bieži izmantotā krāsa?

10 Clues: mākslas stilam raksturīgi ______ elementi.Kurā dekādē attīstījās gotu mūzikas žanrs?ir gotu subkultūras bieži izmantotā krāsa?subkultūras saknes saistītas ar ______ gadiem.un elektroniski,Kas ir "cyber goth" gotu subkultūrā?subkultūras pārstāvji bieži izceļas ar ______ apģērbu.subkultūras pārstāvji bieži izceļas ar ______ apģērbu....

Bullying 2025-04-06

Bullying crossword puzzle
Across
  1. Using phones or internet to bully
  2. A person who sees bullying happen but doesn't always act
  3. Mean words or teasing is this kind of bullying
  4. A person who sees bullying and helps
  5. The feeling when someone is left out or hurt
Down
  1. Kicking, hitting, or pushing
  2. If someone is being bullied, tell a ______ adult
  3. A person who hurts others on purpose
  4. Treating others with care and kindness

9 Clues: Kicking, hitting, or pushingUsing phones or internet to bullyA person who hurts others on purposeA person who sees bullying and helpsTreating others with care and kindnessThe feeling when someone is left out or hurtMean words or teasing is this kind of bullyingIf someone is being bullied, tell a ______ adult...

Layanan BK materi bullying 2025-09-08

Layanan BK materi bullying crossword puzzle
Across
  1. Tindakan mengejek, menghina, atau merendahkan teman termasuk …
  2. yang dilakukan dengan memukul atau menendang.
  3. Orang yang menjadi korban bullying pasti akan
  4. Salah satu bentuk bullying secara tulisan di media sosial.
  5. Perilaku yang menyakiti orang lain secara sengaja.
Down
  1. Salah satu cara mencegah bullying adalah dengan menumbuhkan rasa …
  2. Rasa yang muncul pada korban bullying, biasanya merasa …
  3. Lawan kata 'pelaku'.
  4. Media yang sering dipakai untuk melakukan cyberbullying.
  5. BK Guru yang bisa membantu menyelesaikan masalah bullying di sekolah.

10 Clues: Lawan kata 'pelaku'.yang dilakukan dengan memukul atau menendang.Orang yang menjadi korban bullying pasti akanPerilaku yang menyakiti orang lain secara sengaja.Rasa yang muncul pada korban bullying, biasanya merasa …Media yang sering dipakai untuk melakukan cyberbullying.Salah satu bentuk bullying secara tulisan di media sosial....

Paula M2u2 2016-04-21

Paula M2u2 crossword puzzle
Across
  1. a person who helps you when you're ill.
  2. a certain person in a play ch...
  3. someone whose job is to keep an eye on something (e.g. in a museum)
  4. something you have to know is ….
  5. two people who have something together e.g. They … go to school at .
  6. when you haven’t eaten enough, you are … hungry
  7. when someone posesses something it … to him/her (3rd person!).
  8. English word for “Boden“.
  9. a precious stone.
  10. a chair where you can sit during a concert.
  11. a small bag where you put your money in.
Down
  1. = when you clean the plates
  2. when someone tells you that you have to do something, s/he gives you a c...
  3. the English word for “security”
  4. tells you the position of a house.
  5. a thing that nobody should know.
  6. a machine you can fly with.
  7. opposite of dirty.
  8. another word for big.
  9. English word for “lösen“.

20 Clues: a precious stone.opposite of dirty.another word for big.English word for “Boden“.English word for “lösen“.= when you clean the platesa machine you can fly with.the English word for “security”a certain person in a play ch...something you have to know is ….a thing that nobody should know.tells you the position of a house....

travel vocab 2020-04-10

travel vocab crossword puzzle
Across
  1. seat belt
  2. luggage
  3. ticket window
  4. flight attendant
  5. second class
  6. departure
  7. passenger
  8. enter a country
  9. to miss a flight/train
  10. bunk
  11. train stop
  12. to see
  13. to turn
  14. arrival
  15. car wagon
  16. gate
  17. to go through security
  18. controller
  19. to take off
  20. to land
  21. visa
  22. in the train station
  23. to get/obtain
  24. flight connection
  25. delayed
  26. coach (plane)
  27. in the airport
  28. boarding pass
  29. event ticket
Down
  1. passport
  2. carry-on
  3. aisle
  4. platform
  5. suitcase
  6. layover
  7. luggage scan
  8. sleeping car
  9. baggage claim
  10. security agent
  11. seat
  12. ticket
  13. on time
  14. international airport
  15. to check luggage
  16. counter check-in
  17. travel
  18. first class
  19. ticket
  20. to hope
  21. flight
  22. to go straight
  23. window
  24. waiting room
  25. to give
  26. to board

55 Clues: seatbunkgatevisaaisleticketto seetravelticketflightwindowluggagelayoveron timeto turnarrivalto hopeto landto givedelayedpassportcarry-onplatformsuitcaseto boardseat beltdeparturepassengercar wagontrain stopcontrollerfirst classto take offluggage scansleeping carsecond classwaiting roomevent ticketticket windowbaggage claimto get/obtaincoach (plane)...

Investing Vocabulary 2023-12-11

Investing Vocabulary crossword puzzle
Across
  1. Where shares are bought & sold
  2. Degree of Uncertainty
  3. A low fee portfolio of Stocks
  4. Annual interest payment on a bond
  5. putting your money into assets
  6. Index of 500 companies
  7. Risk free investment
  8. World's largest stock
  9. Increased stock trading & rising stock prices
Down
  1. Prices are falling, Encouraging selling
  2. The practice of investing in a large variety of stocks
  3. A retirement account
  4. Collections of financial investments
  5. A financial asset that can be bought and sold in a financial market
  6. Reward Paid to the Shareholders
  7. Rate of Increase prices over a period of time
  8. Federal program that provides monthly benefits to millions of Americans
  9. A share of value of a company, which can be bought,sold, or traded as an investment & which gives the investor small partial ownership of the company
  10. A security in which the investor loans money to a company or government
  11. Second largest stock

20 Clues: A retirement accountRisk free investmentSecond largest stockDegree of UncertaintyWorld's largest stockIndex of 500 companiesA low fee portfolio of StocksWhere shares are bought & soldputting your money into assetsReward Paid to the ShareholdersAnnual interest payment on a bondCollections of financial investments...

RU ITEC411 Chapter 5 2023-11-29

RU ITEC411 Chapter 5 crossword puzzle
Across
  1. bug that exploited a weakness in OpenSSL
  2. accessing systems that you are not authorized to access
  3. use of voice print of fingerprint
  4. a route that skips regular security in software
  5. malicious software that can change and wreak havoc on your system
  6. malware that locks users out of the system via encryption
  7. email scams
  8. the James Bond of malware
  9. malicious software that disguises itself
  10. devices that use rfid to capture data
  11. fake website scam
Down
  1. is not a joke Jim
  2. worm that attacked Iran's nuclear centrifuges
  3. hacking for a cause
  4. acronym, attack that slows down a server with requests
  5. beginnings of the internet
  6. country that was targeted by Russia and attacked its power grid
  7. an amalgamation of malicious devices that creates zombies
  8. scrambling code to make it unreadable for security
  9. one of its kind was named Conficker

20 Clues: email scamsis not a joke Jimfake website scamhacking for a causethe James Bond of malwarebeginnings of the internetuse of voice print of fingerprintone of its kind was named Confickerdevices that use rfid to capture databug that exploited a weakness in OpenSSLmalicious software that disguises itselfworm that attacked Iran's nuclear centrifuges...

Indian contact act 1872 2025-11-30

Indian contact act 1872 crossword puzzle
Across
  1. created by contract.
  2. condition to validate agreement.
  3. of rescinding a contract.
  4. contract made without free consent is
  5. who makes an offer.
  6. proposal made by one party to another.
  7. essential to contract purpose.
  8. or security on goods.
  9. for breach of contract.
  10. in exchange for a promise.
  11. who sells goods.
Down
  1. that becomes void later.
  2. false statement that induces a contract.
  3. DAMAGES,Liability for late delivery of goods.
  4. must be to be valid.
  5. who buys goods.
  6. paid in advance as security.
  7. GOODS,Goods not specific at contract time.
  8. of ownership.
  9. enforceable by law.
  10. GOODS,Goods manufactured or acquired after agreement
  11. TO SELL,Contract in which goods are delivered later.
  12. GOODS,Goods identified at the time of making the contract.
  13. by buyer to seller.

24 Clues: of ownership.who buys goods.who sells goods.enforceable by law.who makes an offer.by buyer to seller.created by contract.must be to be valid.or security on goods.for breach of contract.that becomes void later.of rescinding a contract.in exchange for a promise.paid in advance as security.essential to contract purpose.condition to validate agreement....

CTF-CW-3S 2025-11-17

CTF-CW-3S crossword puzzle
Across
  1. Granting users permission to resources
  2. Network security system for filtering traffic
  3. Internal Tekion tool for catching secret leaks in source code repositories.
  4. Separating affected systems during security event
  5. Visual map showing how personal information moves through systems
  6. Step-by-step plan for responding to threat scenarios
  7. Testing how well controls perform
  8. Step to limit damage during an event
  9. Science of investigating digital evidence
Down
  1. Organized written information
  2. Source code and CI/CD home for Tekion software teams.
  3. Weakness that can be exploited in a system
  4. Temporary interaction between user and system
  5. Transparent communication about data collection and processing
  6. Goal a control is designed to achieve
  7. Strengthening defenses of computers or networks
  8. Static code scanner in Tekion development workflows.
  9. Manager for data integrity and compliance
  10. European Union's comprehensive data protection regulation
  11. Rules governing how long personal data can be stored

20 Clues: Organized written informationTesting how well controls performStep to limit damage during an eventGoal a control is designed to achieveGranting users permission to resourcesManager for data integrity and complianceScience of investigating digital evidenceWeakness that can be exploited in a systemTemporary interaction between user and system...

Bullying Crossword 2013-06-17

Bullying Crossword crossword puzzle
Across
  1. This people are usually insecure teens
  2. Involves no physical contact but a lot of yelling
  3. A type of bullying that messes with the head
  4. Age the late middle age of their lives
  5. Someone who is not necessarily being the bully but is seeing it
Down
  1. Examples; Anxiety, Depression effects
  2. Involves harassment and bullying online
  3. Someone everyone can do that will help the victim
  4. Someone that often comes from a home where they don't feel safe
  5. Involves harming someone

10 Clues: Involves harming someoneExamples; Anxiety, Depression effectsThis people are usually insecure teensAge the late middle age of their livesInvolves harassment and bullying onlineA type of bullying that messes with the headSomeone everyone can do that will help the victimInvolves no physical contact but a lot of yelling...

bullying 2014-06-19

bullying crossword puzzle
Across
  1. what do you do if someone is getting bullied
  2. what is the person being mean to you called
  3. what is the website people get bullied most with
  4. what is a good bulling movie called
  5. what type of bullying is used on the internet
Down
  1. where does bullying most happen
  2. what type of bully hurts you
  3. what do you do when your getting bullied
  4. what is the person watching called
  5. what is the person getting bullied called

10 Clues: what type of bully hurts youwhere does bullying most happenwhat is the person watching calledwhat is a good bulling movie calledwhat do you do when your getting bulliedwhat is the person getting bullied calledwhat is the person being mean to you calledwhat do you do if someone is getting bulliedwhat type of bullying is used on the internet...

bullying 2014-06-19

bullying crossword puzzle
Across
  1. what do you do if someone is getting bullied
  2. what is the person being mean to you called
  3. what is the website people get bullied most with
  4. what is a good bulling movie called
  5. what type of bullying is used on the internet
Down
  1. where does bullying most happen
  2. what type of bully hurts you
  3. what do you do when your getting bullied
  4. what is the person watching called
  5. what is the person getting bullied called

10 Clues: what type of bully hurts youwhere does bullying most happenwhat is the person watching calledwhat is a good bulling movie calledwhat do you do when your getting bulliedwhat is the person getting bullied calledwhat is the person being mean to you calledwhat do you do if someone is getting bulliedwhat type of bullying is used on the internet...

Bulling 2025-04-23

Bulling crossword puzzle
Across
  1. Έτσι αισθάνεται το άτομο που δεν έχει υποστήριξη.
  2. Μετά την κακοποίηση μένει στο θύμα ......τραύμα.
  3. Το άτομα που κάνει εκφοβισμό ή κακοποιεί άλλους.
  4. Εκτός από τη σωματική υπάρχει και η .....βία.
  5. Το bulling μπορεί να προκαλέσει έως και........
Down
  1. Αλλιώς η περιθωριοποίηση που βιώνει το θύμα.
  2. Ένας τρόπος να προσπαθήσεις να βοηθήσεις το θύμα ή να σταματήσεις τον εκφοβισμό.
  3. Το άτομο που δέχεται κακοποίηση ή εκφοβισμό.
  4. Το bulling στην ελληνική γλώσσα.
  5. Η επιθετική συμπεριφορά στο .......... λέγεται Cyber bulling

10 Clues: Το bulling στην ελληνική γλώσσα.Αλλιώς η περιθωριοποίηση που βιώνει το θύμα.Το άτομο που δέχεται κακοποίηση ή εκφοβισμό.Εκτός από τη σωματική υπάρχει και η .....βία.Το bulling μπορεί να προκαλέσει έως και........Μετά την κακοποίηση μένει στο θύμα ......τραύμα.Το άτομα που κάνει εκφοβισμό ή κακοποιεί άλλους....

SECCON 2025 2025-07-31

SECCON 2025 crossword puzzle
Across
  1. A software update to fix vulnerabilities
  2. A secret word or phrase to access accounts
  3. Acronym for using more than one method to verify identity
  4. Blocks unauthorized access to or from a network
  5. A secure way to connect remotely to a network
Down
  1. A type of malicious software
  2. Fake emails used to trick users into revealing information
  3. Unwanted or junk email
  4. What we are trying to protect from cyber threats
  5. To convert data into a secure format

10 Clues: Unwanted or junk emailA type of malicious softwareTo convert data into a secure formatA software update to fix vulnerabilitiesA secret word or phrase to access accountsA secure way to connect remotely to a networkBlocks unauthorized access to or from a networkWhat we are trying to protect from cyber threats...

Get to know the Tech world better! 2022-12-13

Get to know the Tech world better! crossword puzzle
Across
  1. - A principle of economics that captures the consumer's desire to buy the product or service
  2. Virus - First computer virus
  3. - Expense Claim tool
  4. Friday - The day after Thanksgiving
  5. - Programming language exclusively used for AI
Down
  1. - Company's goods and products that are ready to sell
  2. - Site where an associate can raise Technology request
  3. Monday - Marketing term for e-commerce transactions on the Monday after Thanksgiving Day
  4. - Team workspace where knowledge and collaboration meet
  5. - A measure of the stability or consistency

10 Clues: - Expense Claim toolVirus - First computer virusFriday - The day after Thanksgiving- A measure of the stability or consistency- Programming language exclusively used for AI- Company's goods and products that are ready to sell- Site where an associate can raise Technology request- Team workspace where knowledge and collaboration meet...

Cybersecurity Terminology 2025-06-25

Cybersecurity Terminology crossword puzzle
Across
  1. Prefix meaning harmful or bad
  2. The act of keeping something safe from harm
  3. Software used to stop or remove viruses
  4. Prefix related to computers, networks, or the internet
  5. A hacker who helps protect systems legally
  6. Fraudulent email tricking people into giving personal information
Down
  1. Malicious software that locks access until a ransom is paid.
  2. A weakness that can be exploited in a system.
  3. Software that secretly collects user data
  4. The process of encoding data to protect it

10 Clues: Prefix meaning harmful or badSoftware used to stop or remove virusesSoftware that secretly collects user dataThe process of encoding data to protect itA hacker who helps protect systems legallyThe act of keeping something safe from harmA weakness that can be exploited in a system.Prefix related to computers, networks, or the internet...

Computer Lingo 2015-02-03

Computer Lingo crossword puzzle
Across
  1. a unit equal to one billion
  2. arrangement of words and phrases
  3. mid-level support staff
  4. a set of type
Down
  1. most effective way to achieve data security
  2. isolation
  3. an icon containing related files
  4. a program designed to breach the security
  5. to obtain from a foreign supplier
  6. execution of more than one program

10 Clues: isolationa set of typemid-level support staffa unit equal to one billionarrangement of words and phrasesan icon containing related filesto obtain from a foreign supplierexecution of more than one programa program designed to breach the securitymost effective way to achieve data security

Money Matter 2024-03-20

Money Matter crossword puzzle
Across
  1. taxes are paid at a future date
  2. funds free from financial risk
  3. government-imposed charges
  4. deposit account that provides principal security
  5. deposit account held at a financial institution
Down
  1. non-profit institution that accepts deposits
  2. compensation from all sources
  3. defines type of individual tax treatment
  4. amount of income taxed
  5. Social Security, and Medicare taxes

10 Clues: amount of income taxedgovernment-imposed chargescompensation from all sourcesfunds free from financial risktaxes are paid at a future dateSocial Security, and Medicare taxesdefines type of individual tax treatmentnon-profit institution that accepts depositsdeposit account held at a financial institution...

October 2020 Newsletter Crossword Puzzle 2020-10-05

October 2020 Newsletter Crossword Puzzle crossword puzzle
Across
  1. A tool used to discover passwords.
  2. A password based cyberattack where the attacker uses your credentials that were released as a data breach and uses it for other accounts.
  3. Concept of connecting a device with an on and off switch to the internet and/or to each other.
Down
  1. A cyber attacker uses a powerful computer to test every combination of letters, numbers, and characters to hack a password.
  2. A cyber attacker uses a powerful computer to try every word in what vocabulary reference book to see if the word is a password?
  3. Practice of using social tactics to gain information from people or get people to do things they would not normally do.
  4. Hardware that has wireless sensors which transmit data from one place to another over the internet.
  5. U.S. Department of Agriculture’s Personal Identity Verification (PIV) card for access to federal facilities and computers.
  6. A word, phrase or string of characters that are private for an authorized user and allow access to a computer system or service.
  7. Virtual communities or networks that use interactive computer technology to promote creating and sharing ideas, career interests, photos, information, and other forms of expression.

10 Clues: A tool used to discover passwords.Concept of connecting a device with an on and off switch to the internet and/or to each other.Hardware that has wireless sensors which transmit data from one place to another over the internet.Practice of using social tactics to gain information from people or get people to do things they would not normally do....

Health Q3 2022-03-24

Health Q3 crossword puzzle
Across
  1. moral, spiritual, and educational are types of these shared by a family
  2. your father's brother
  3. you are not
  4. powerful synthetic opioid
  5. best sport at Malden High
  6. feeling of craving or extreme dependence
  7. second leading cause of death amongst teens
  8. type of bullying in the form of insults and teasing language
  9. to seek harm or intimidate someone
Down
  1. online platform that allows users to share content and interact
  2. your close circle of loved ones
  3. place to get help for addiction
  4. ideas and beliefs passed down from one generation to another
  5. somehow y'all voted for his poster to win
  6. knowledge or perception of a situation or fact
  7. michelle carter was convicted of involuntary
  8. hip hop artist with a powerful suicide awareness song
  9. form of bullying online

18 Clues: you are notyour father's brotherform of bullying onlinepowerful synthetic opioidbest sport at Malden Highyour close circle of loved onesplace to get help for addictionto seek harm or intimidate someonefeeling of craving or extreme dependencesomehow y'all voted for his poster to winsecond leading cause of death amongst teens...

Cyberbullying 2019-07-11

Cyberbullying crossword puzzle
Across
  1. nothing can go wrong if it is _______
  2. someone who has been targeted
  3. bullying that you can do online
  4. a way of communicating with a certain type of address
  5. person that is constantly mean to someone
  6. when someone is really sad
  7. when you are on a website you are ______
  8. platforms used to upload context,______ media
  9. a way of communicating with someone through a text ______
  10. platforms used to upload context, social _______
Down
  1. a horror movie is _______
  2. when someone is making you do something
  3. a machine connected to a mouse and a keyboard
  4. computers, phones, tablets
  5. used to see on a computer
  6. when you are all by yourself
  7. when someone kills themselves
  8. harm what someone does to themselves if they are really sad

18 Clues: a horror movie is _______used to see on a computercomputers, phones, tabletswhen someone is really sadwhen you are all by yourselfsomeone who has been targetedwhen someone kills themselvesbullying that you can do onlinenothing can go wrong if it is _______when someone is making you do somethingwhen you are on a website you are ______...

Vamos De Viaje Vocab Quiz 2016-10-01

Vamos De Viaje Vocab Quiz crossword puzzle
Across
  1. gate
  2. screen
  3. bathing suit
  4. to go through security
  5. passenger
  6. to get in line
  7. airport
Down
  1. suitcase
  2. identification
  3. flight
  4. luggage
  5. to arive
  6. passport
  7. ticket
  8. departure

15 Clues: gatescreenflightticketluggageairportsuitcaseto arivepassportpassengerdeparturebathing suitidentificationto get in lineto go through security

Income Taxes 2022-02-08

Income Taxes crossword puzzle
Across
  1. a child or other person who lives in the home
  2. another name for social security tax
  3. used to provide for retired or disabled
  4. income amount after adjustments are taken out
  5. used to provide medical benefits for elderly
  6. short for Social Security Number
  7. amounts deducted from the adjusted gross income to determine the taxable income
  8. federal withholdings tax
  9. short for Employer Identification Number
  10. the organization that taxes are paid to.
Down
  1. document given for other income (e.g. contractors)
  2. the month that income taxes are due.
  3. document showing ones income from an employer
  4. short for Earned income credit
  5. requesting more time to pay taxes.
  6. the amount of money owned to the government
  7. income from work, shown on W2
  8. document used to file for income tax Return

18 Clues: federal withholdings taxincome from work, shown on W2short for Earned income creditshort for Social Security Numberrequesting more time to pay taxes.the month that income taxes are due.another name for social security taxused to provide for retired or disabledshort for Employer Identification Numberthe organization that taxes are paid to....

Bullying 2012-11-13

Bullying crossword puzzle
Across
  1. / the type of bullying that happend over the internet
  2. / the person getting bullied
  3. / where can bullying happen
  4. / the person doing the mean act
  5. / if you get bullied you should tell an
Down
  1. / when the bully hits or kicks the victim
  2. / the first step to making a bully stop is to ___ them
  3. / when the bully tells them mean stuff

8 Clues: / where can bullying happen/ the person getting bullied/ the person doing the mean act/ when the bully tells them mean stuff/ when the bully hits or kicks the victim/ if you get bullied you should tell an/ the first step to making a bully stop is to ___ them/ the type of bullying that happend over the internet

week 10 crossword puzzle 2021-11-05

week 10 crossword puzzle crossword puzzle
Across
  1. bullying - the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  2. - he ability to understand and share the feelings of another.
  3. theft
  4. scam
Down
  1. media
  2. sharing
  3. that is threatening or offensive to other people
  4. drama - Describes everyday tiffs and disputes that occur between friends or acquaintances online or via text.

8 Clues: scammediatheftsharingthat is threatening or offensive to other people- he ability to understand and share the feelings of another.drama - Describes everyday tiffs and disputes that occur between friends or acquaintances online or via text....

KnowCrowe 2025-03-12

KnowCrowe crossword puzzle
Across
  1. The first stage of a cyber attack.
  2. The colour of the pinnacle logo.
  3. The alignment of text in a paragraph.
  4. What our new firm email address starts with.
Down
  1. If the word "Crowe" = Logotype, therefore the "Pinnacle" = ?
  2. The Art of ______.
  3. The title of our upcoming global conference
  4. The typographical term for spacing between two lines of text.

8 Clues: The Art of ______.The colour of the pinnacle logo.The first stage of a cyber attack.The alignment of text in a paragraph.The title of our upcoming global conferenceWhat our new firm email address starts with.If the word "Crowe" = Logotype, therefore the "Pinnacle" = ?The typographical term for spacing between two lines of text.

Federal Weekly 2022-02-09

Federal Weekly crossword puzzle
Across
  1. Largest agency in the civilian government
  2. FSI that lead in acquisitions in 2021
  3. The biggest unknown in Federal software
Down
  1. What devsecops leaders aspire to
  2. Largest non-DoD department, after the VA
  3. Tier 1 FSI that is a known leader in cyber
  4. Best source for compiled RFP and vendor info
  5. Largest office within the Executive Office of the President

8 Clues: What devsecops leaders aspire toFSI that lead in acquisitions in 2021The biggest unknown in Federal softwareLargest non-DoD department, after the VALargest agency in the civilian governmentTier 1 FSI that is a known leader in cyberBest source for compiled RFP and vendor infoLargest office within the Executive Office of the President

Crowd Control 2022-12-09

Crowd Control crossword puzzle
Across
  1. Hostile crowd
  2. Avoid unnecessary conversation and maintain a ____ demeanor
  3. Mass ____ which usually involves hundreds or thousands of people
  4. Security officers must protect life and ____
  5. ____ Disputes can be a complex issue while balancing right
  6. the systematic planning for and supervision of and assembly of people
  7. The restriction or limitation of group behavior and movement
  8. Security Officers must not be ____
Down
  1. Crowd with no organization of unified purpose
  2. Civil ____ is usually nonviolent but use tactics that can get them arrested
  3. The First Amendment does not protect against ____ behavior
  4. Always remain ____
  5. Always provide clear and concise ____
  6. Labor Disputes involve ____ lines
  7. Uncontrolled and violent disturbance of the public

15 Clues: Hostile crowdAlways remain ____Labor Disputes involve ____ linesSecurity Officers must not be ____Always provide clear and concise ____Security officers must protect life and ____Crowd with no organization of unified purposeUncontrolled and violent disturbance of the publicThe First Amendment does not protect against ____ behavior...

SIGURNOST NA INTERNETU 2021-02-11

SIGURNOST NA INTERNETU crossword puzzle
Across
  1. uznemiravanje djece SMS
  2. nasilje uz cyber tehnologije
Down
  1. prijetnje putem interneta
  2. prijevara putem elektronicke poste
  3. proizvodnja provokativnih postova

5 Clues: uznemiravanje djece SMSprijetnje putem internetaproizvodnja provokativnih postovanasilje uz cyber tehnologijeprijevara putem elektronicke poste

unit 6; 2014-04-13

unit 6; crossword puzzle
Across
  1. to hit somebody
  2. a kitchen device that keeps food fresh and cold
  3. rule which you must obey
  4. a card which resembles a debt to your bank
  5. somebody who investigates crimes
  6. to have done something you shouldn't
  7. to steel object from a shop
  8. a person who does ar has done illigal things
  9. somebody who is incredibly stupid
  10. a commited action which was illigal
Down
  1. a person who owns a shop
  2. a short coat
  3. a group of people who protect humans and things
  4. a card which shows your personal information
  5. a very sharp blade you use to shave body hair
  6. breaking things that aren't yours
  7. to forced somebody to hand over things that aren't yours
  8. somebody who steals things from pockets and purses
  9. to be your own boss
  10. a camera system used to maintain security

20 Clues: a short coatto hit somebodyto be your own bossa person who owns a shoprule which you must obeyto steel object from a shopsomebody who investigates crimesbreaking things that aren't yourssomebody who is incredibly stupida commited action which was illigalto have done something you shouldn'ta camera system used to maintain security...

sdl 2018-06-12

sdl crossword puzzle
Across
  1. you can buy medicines here
  2. if you can’t find a place, you can ask here
  3. you can have the curruncy of the country here
  4. people who use flight services
  5. where aircrafts land and take off
  6. a place you can buy stuffs without tax
  7. moving stairs
  8. if you bought first or business class, you can rest here in airport
  9. you can get your ticket and send your luggage here
  10. you must be checked here to go into airside
Down
  1. the way aircrafts move to runway
  2. where aircrafts parked
  3. if you are sweating so much, you can wash tour body
  4. ticket
  5. instead of stairs
  6. what you get on security areas
  7. travelers come out from here
  8. final enterance to get on aircrafts
  9. you must have this and boarding pass to go into airside
  10. stuffs to remember a place or country

20 Clues: ticketmoving stairsinstead of stairswhere aircrafts parkedyou can buy medicines heretravelers come out from herepeople who use flight serviceswhat you get on security areasthe way aircrafts move to runwaywhere aircrafts land and take offfinal enterance to get on aircraftsstuffs to remember a place or countrya place you can buy stuffs without tax...

Aviation 2023-11-19

Aviation crossword puzzle
Across
  1. One of their duties is to load & unload aircraft
  2. Not allowed on aircraft
  3. Relating each letter of alphabet to a word
  4. Built for passengers to use at the airport
  5. Full term for ASO
  6. This role helps prevent any incidents from international trade & travel
  7. Used to help stop drugs and explosives being smuggled into country
  8. This document is required to be able to travel
  9. Security process to check luggage for any explosive
  10. Area where public has access to
  11. Short term for Aviation Security
Down
  1. Area where passengers pass through to Airside
  2. Full term for UM
  3. Also known as the boarding gate
  4. Staff must be wearing this to have access to airside
  5. Full term for PSA
  6. Skills, knowledge & ...
  7. Area where counters are located
  8. Area where only passengers have access to
  9. Time of your flights ( Departure & Arrival)

20 Clues: Full term for UMFull term for PSAFull term for ASONot allowed on aircraftSkills, knowledge & ...Also known as the boarding gateArea where counters are locatedArea where public has access toShort term for Aviation SecurityArea where only passengers have access toRelating each letter of alphabet to a wordBuilt for passengers to use at the airport...

CyberNewspaper 2024-09-16

CyberNewspaper crossword puzzle
Across
  1. Online harassment or bullying
  2. Impersonating someone or something to deceive
  3. Software update to fix security vulnerabilities
  4. Measures taken to protect data
  5. Function that converts data into a fixed size
  6. Network of compromised computers under attacker control)
  7. Securing data by converting it into code
  8. Distributed Denial of Service attack to overwhelm a network)
  9. Investment scam involving fake accounts
  10. Self-replicating malware that spreads across networks)
  11. Software that shows unwanted ads
  12. A system that protects networks
Down
  1. Fraudulent attempts to steal sensitive information)
  2. Malware that encrypts files demanding ransom
  3. Zero Trust Architecture
  4. Hidden way of bypassing security controls
  5. Malware disguised as legitimate software
  6. Attack using trial and error to guess passwords)
  7. Software that records keystrokes
  8. Virtual Private Network for secure connections
  9. Vulnerabilities exploited before being patched
  10. Software that collects data secretly
  11. Multi-Factor Authentication

23 Clues: Zero Trust ArchitectureMulti-Factor AuthenticationOnline harassment or bullyingMeasures taken to protect dataA system that protects networksSoftware that records keystrokesSoftware that shows unwanted adsSoftware that collects data secretlyInvestment scam involving fake accountsMalware disguised as legitimate software...

Banking Glossary Crossword 2025-04-29

Banking Glossary Crossword crossword puzzle
Across
  1. System of money used by a country
  2. Money borrowed with agreement to repay later
  3. Adding money into your account
  4. Move money from one account to another
  5. Sign the back of a cheque for deposit
  6. Loan used to buy property
  7. Deliberate deception to obtain money
  8. Property used to secure a loan
  9. Personal information used for banking security
  10. Fee paid for borrowing money
  11. Security code for account access
  12. Attempt to trick someone financially
Down
  1. Plan for managing income and expenses
  2. Funds allocated to generate future returns
  3. Taking money out of your account
  4. A written order directing a bank to pay money
  5. Borrowed money requiring repayment with interest
  6. Direct withdrawal from an account
  7. Replacing a loan with a new agreement
  8. Withdrawal exceeding account balance
  9. Monthly record of transactions and balance
  10. Account to securely store and grow funds
  11. Confirm information or authenticity
  12. Amount of money currently in account

24 Clues: Loan used to buy propertyFee paid for borrowing moneyAdding money into your accountProperty used to secure a loanTaking money out of your accountSecurity code for account accessSystem of money used by a countryDirect withdrawal from an accountConfirm information or authenticityWithdrawal exceeding account balanceDeliberate deception to obtain money...

Taxes 2025-04-30

Taxes crossword puzzle
Across
  1. Deduction that lowers your taxable income
  2. money paid to you from a companies profit
  3. Range of income that is taxed at a specific rate
  4. Tax system where higher income earners pay a larger percentage
  5. Money you make from selling something
  6. Percentage at which income is taxed
  7. Government program that provides healthcare
  8. Amount of money taken out of your paycheck for taxes
  9. Number you put on a tax form
  10. Money you get back from the gov
Down
  1. Money you make from working
  2. Amount of your income that is subject to tax
  3. When the IRS checks your tax return to make sure its correct
  4. Amount directly reduces amount of tax you owe
  5. Tax of specific goods
  6. Federal program that provides money to old people
  7. Taxes taken out of paycheck to fund social security
  8. Someone you support financially
  9. Tax you pay on the money you earn
  10. Tax taken for social security

20 Clues: Tax of specific goodsMoney you make from workingNumber you put on a tax formTax taken for social securitySomeone you support financiallyMoney you get back from the govTax you pay on the money you earnPercentage at which income is taxedMoney you make from selling somethingDeduction that lowers your taxable income...

Civics - Australia's International Relations and Obligations 2025-05-29

Civics - Australia's International Relations and Obligations crossword puzzle
Across
  1. A country where citizens vote for their leader
  2. A country where citizens don't choose their leader
  3. the UN aims to promote international peace and _________
  4. A migrant who has fled their country due to fear of persecution
  5. Someone seeking to live in another country
  6. the freedoms and protections belonging to all humans
  7. the General _______ is the main body of the UN
  8. ________ Declaration of Human Rights
  9. Australia mostly trades with countries around the _______.
Down
  1. foreign ___ - a country providing assistance to another
  2. Refugee ________; another word for 'treaty'
  3. involving more than two countries
  4. Australia's main ______ are coal, iron ore, gold and natural gas
  5. the Paris Agreement aims to combat ______ change
  6. Nationally Determined ________ - (NDCs)
  7. non-_________ - the concept of non-return of refugees
  8. an international legal agreement
  9. ______ seeker - someone who seeks protection in another country
  10. the UN Security _______ has five permanent members with veto powers
  11. involving two countries

20 Clues: involving two countriesan international legal agreementinvolving more than two countries________ Declaration of Human RightsNationally Determined ________ - (NDCs)Someone seeking to live in another countryRefugee ________; another word for 'treaty'A country where citizens vote for their leaderthe General _______ is the main body of the UN...

Economics Terms 2023-01-03

Economics Terms crossword puzzle
Across
  1. A security that provides ownership rights
  2. A security that promises repayment to a lender
  3. The act of exchanging goods and services
  4. Karl ______
  5. Revenue in excess of costs (revenue - costs)
  6. Gross ______ Product
  7. The relationship between price and quantity.
  8. Warren _______ the CEO of Berkshire Hathaway
  9. A payment for using money.
  10. When a few large sellers dominate the market
  11. A company's overall income
  12. A tax on trade
  13. Payment of profits to shareholders
Down
  1. ______ cost Next best alternative
  2. When inflation and unemployment increase
  3. There aren't enough resources for everyone
  4. Purchasing Power ________
  5. The condition of not having a job
  6. The tools and equipment used in production.
  7. Everything that is owned by an individual.
  8. The usefulness or satisfaction of doing something
  9. A general increase in the overall price level.
  10. The ability to buy a good or service

23 Clues: Karl ______A tax on tradeGross ______ ProductPurchasing Power ________A payment for using money.A company's overall income______ cost Next best alternativeThe condition of not having a jobPayment of profits to shareholdersThe ability to buy a good or serviceWhen inflation and unemployment increaseThe act of exchanging goods and services...

The negotiable instruments Act 1881 2025-12-01

The negotiable instruments Act 1881 crossword puzzle
Across
  1. created by contract.
  2. condition to validate agreement.
  3. of rescinding a contract.
  4. contract made without free consent is
  5. who makes an offer.
  6. proposal made by one party to another.
  7. essential to contract purpose.
  8. or security on goods.
  9. for breach of contract.
  10. in exchange for a promise.
  11. who sells goods.
Down
  1. that becomes void later.
  2. false statement that induces a contract.
  3. DAMAGES,Liability for late delivery of goods.
  4. must be to be valid.
  5. who buys goods.
  6. paid in advance as security.
  7. GOODS,Goods not specific at contract time.
  8. of ownership.
  9. enforceable by law.
  10. GOODS,Goods manufactured or acquired after agreement
  11. TO SELL,Contract in which goods are delivered later.
  12. GOODS,Goods identified at the time of making the contract.
  13. by buyer to seller.

24 Clues: of ownership.who buys goods.who sells goods.enforceable by law.who makes an offer.by buyer to seller.created by contract.must be to be valid.or security on goods.for breach of contract.that becomes void later.of rescinding a contract.in exchange for a promise.paid in advance as security.essential to contract purpose.condition to validate agreement....

Unit 1/1 2018-09-24

Unit 1/1 crossword puzzle
Across
  1. Krankheit
  2. Sicherheit
  3. Rucksacktourist
  4. Strauß
  5. Ausländer
Down
  1. Konzert
  2. ansehen/betrachten
  3. (be)halten
  4. Reisender
  5. Mode
  6. klingen
  7. montieren
  8. einzig/einziger

13 Clues: ModeStraußKonzertklingenKrankheitReisendermontierenAusländer(be)haltenSicherheitRucksacktouristeinzig/einzigeransehen/betrachten

Hotel crossword puzzle 2024-05-01

Hotel crossword puzzle crossword puzzle
Across
  1. Koper
  2. Pelayan
  3. Taman
  4. Biaya Tambahan
  5. Ruang santai
  6. Ruang pertemuan
  7. Meja resepsionis
Down
  1. Kasur tambahan
  2. lobi
  3. Pemesanan
  4. Keamanan
  5. Masuk
  6. Kamar mandi uap
  7. Keluar
  8. Kamar tipe VIP

15 Clues: lobiKoperTamanMasukKeluarPelayanKeamananPemesananRuang santaiKasur tambahanBiaya TambahanKamar tipe VIPKamar mandi uapRuang pertemuanMeja resepsionis

PBR27 2025-09-22

PBR27 crossword puzzle
Across
  1. shouldn't be the only option
  2. our resident SAP expert
  3. delivering modern and advanced warfighting capabilities
  4. they call him "Mr. Munitions"
  5. see this AO for Ground Combat systems
  6. if Marcus Aurelis met this officer, he would've joined the Acquisition Corps
  7. programming network, IT, and cyber across the Army
Down
  1. keeper of this time-killer
  2. our newest Acquisition or a place to go in the summer
  3. things that go boom
  4. a PDD legend and Sustaining PEG icon
  5. our resident IAMD SME
  6. he's known as "A Colonel's Colonel"
  7. a Maritime savant and living la dolce vita
  8. maintenance, logistics, and industrial base
  9. Our DD and DBS whisperer a true SME
  10. known as the patron saint of Army Watercraft
  11. two-time PAE returning champion
  12. Accepted Lee's surrender and also known as "Mr. Aviation"

19 Clues: things that go boomour resident IAMD SMEour resident SAP expertkeeper of this time-killershouldn't be the only optionthey call him "Mr. Munitions"two-time PAE returning championhe's known as "A Colonel's Colonel"Our DD and DBS whisperer a true SMEa PDD legend and Sustaining PEG iconsee this AO for Ground Combat systems...

PitchBook 2Q 2019 PlayBook 2019-05-17

PitchBook 2Q 2019 PlayBook crossword puzzle
Across
  1. use of a good or service instead of cash
  2. a request for a portion of a loan
  3. an unsecured loan certificate backed by general credit
  4. debt repayment at a regular schedule
  5. order of priorities of claims
  6. loan agreements that don’t contain usual protections
  7. the right to purchase equity
  8. stretch riskier than a senior loan, in an accommodative way
  9. condition in a bond or loan
  10. a hybrid loan structure
Down
  1. financing offered by a group
  2. between bank loans and equity
  3. something pledged as security for repayment
  4. a form of security interest granted
  5. a giant credit manager that recently agreed to be acquired
  6. lending by unregulated institutions and/or under unregulated conditions
  7. covering an interval between two transactions
  8. a provider of funds
  9. a variable line of credit allowing for drawdowns and repayments

19 Clues: a provider of fundsa hybrid loan structurecondition in a bond or loanfinancing offered by a groupthe right to purchase equitybetween bank loans and equityorder of priorities of claimsa request for a portion of a loana form of security interest granteddebt repayment at a regular scheduleuse of a good or service instead of cash...

Unit 11 2020-02-18

Unit 11 crossword puzzle
Across
  1. Paket
  2. übertragen
  3. Applikation
  4. Verschlüsselung
  5. Analog
  6. kopieren
Down
  1. Sicherheit
  2. Prüfsumme
  3. Kommunikation
  4. Sitzung
  5. Daten
  6. kodieren

12 Clues: PaketDatenAnalogSitzungkodierenkopierenPrüfsummeSicherheitübertragenApplikationKommunikationVerschlüsselung

PDU 12 - Nominalization 2020-11-24

PDU 12 - Nominalization crossword puzzle
Across
  1. obedience
  2. responsible
  3. fair
  4. independent
  5. mature
  6. reliable
Down
  1. develop
  2. capable
  3. permit
  4. strict
  5. secure
  6. lenient

12 Clues: fairpermitstrictsecurematuredevelopcapablelenientreliableobedienceresponsibleindependent

The image of who I am 2023-10-11

The image of who I am crossword puzzle
Across
  1. safe
  2. behappyaboutdoingit
  3. smile
  4. enlarge
  5. lookfixedly
  6. close
Down
  1. reliance
  2. revive
  3. value
  4. excite
  5. help
  6. fulfill

12 Clues: safehelpsmilevalueclosereviveexciteenlargefulfillreliancelookfixedlybehappyaboutdoingit

Security Meeting Q4 - 2021 2021-12-08

Security Meeting Q4 - 2021 crossword puzzle
Across
  1. Overnight cash limit
  2. The color of our robbery folder
  3. 877-511-9797
  4. A device designed to explode in order to injure or kill people or to destroy property
  5. The two things you should always lock before stepping away from your station
  6. Our SECOND evacuation location
  7. You should call this number in an emergency
  8. a cybercrime that targets individuals by email, luring them into providing personal information such as banking information, credit card details, and passwords
  9. If time allows, search for suspicious items around the store after receiving a bomb threat
  10. Our FIRST evacuation location
Down
  1. These should stay with you at all times
  2. All confidential customer information should be ______ at night
  3. The folder is located behind ____
  4. Top drawer limit
  5. Working cash Limit
  6. The act of illegally printing, changing or reproducing a copy of a genuine currency to purposely deceive someone
  7. Our OSM
  8. Our shelter in place
  9. We test the alarm every ____

19 Clues: Our OSM877-511-9797Top drawer limitWorking cash LimitOvernight cash limitOur shelter in placeWe test the alarm every ____Our FIRST evacuation locationOur SECOND evacuation locationThe color of our robbery folderThe folder is located behind ____These should stay with you at all timesYou should call this number in an emergency...

Social security and relationships 2023-01-30

Social security and relationships crossword puzzle
Across
  1. kummipoika
  2. siskontytär
  3. lainsäädäntö
  4. jäädä eläkkeelle
  5. sukupolvi
  6. vamma
  7. syrjintä
  8. viranomaiset
Down
  1. kansallisuus
  2. päiväkoti
  3. äitipuoli
  4. avioero
  5. tulot
  6. kunta
  7. huoltaja
  8. maahanmuuttaja
  9. kansalainen
  10. alaikäinen
  11. puoliso

19 Clues: tulotkuntavammaavioeropuolisohuoltajasyrjintäpäiväkotiäitipuolisukupolvikummipoikaalaikäinensiskontytärkansalainenkansallisuuslainsäädäntöviranomaisetmaahanmuuttajajäädä eläkkeelle

TTS tentang materi Bullying 2022-01-25

TTS tentang materi Bullying crossword puzzle
Across
  1. salah satu ciri-ciri bully relasional
  2. termasuk dalam bully fisik
  3. salah satu alat komunikasi yang dapat memicu cyber bullying
  4. salah satu faktor penyebab pembullyan
Down
  1. salah satu ciri bully verbal
  2. ciri-ciri bully relasional

6 Clues: termasuk dalam bully fisikciri-ciri bully relasionalsalah satu ciri bully verbalsalah satu ciri-ciri bully relasionalsalah satu faktor penyebab pembullyansalah satu alat komunikasi yang dapat memicu cyber bullying

PAYCHECK TERMINOLOGY 2015-03-11

PAYCHECK TERMINOLOGY crossword puzzle
Across
  1. the total amount of money earned during a pay period before deductions
  2. mandatory charges imposed on citizens by local, state, and federal governments
  3. the total amount of money left after all deductions have been withheld
  4. a type of withholding tax that funds the state government
  5. the amount of money subtracted from the gross pay earned for taxes and medical/retirement benefits
  6. this type of tax includes two separate taxes, Social Security and Medicare
  7. this type of information states the name of the employee, address, and social security number
  8. a type of withholding tax that funds the federal government
  9. an agency that collects federal taxes and enforces tax laws
  10. this type of security is based on a tax percentage of (6.2%)
Down
  1. a plan, such as a 401K or 403B
  2. a health care program for the elderly and disabled
  3. this type of deduction is based on a tax percentage of (1.45%)
  4. this type of security funds the retirement plan of the nation

14 Clues: a plan, such as a 401K or 403Ba health care program for the elderly and disableda type of withholding tax that funds the state governmenta type of withholding tax that funds the federal governmentan agency that collects federal taxes and enforces tax lawsthis type of security is based on a tax percentage of (6.2%)...

Private and public places 2024-05-03

Private and public places crossword puzzle
Across
  1. synonym for "illness"
  2. The English for "promouvoir"
  3. The English for "dossier médical"
  4. the English for "médicament"
  5. the identification of the nature of an illness
  6. when confidential information is exposed
  7. The English for "mettre en place"
  8. The English for un "scientifique"
  9. synonym for "revolutionary"
Down
  1. It is a thread-like structure made up of DNA
  2. cause someone to be vulnerable or at risk; endanger
  3. Stealing of information through unauthorized access to computer systems.
  4. The English for "recherche"
  5. the English for "avancé, sophistiqué"
  6. the abbreviation for Artifical Intelligence
  7. a self-replicating material that is present in nearly all living organisms as the main constituent of chromosomes
  8. a secondary and undesirable effect of medical treatment.
  9. a sudden and important discovery

18 Clues: synonym for "illness"The English for "recherche"synonym for "revolutionary"The English for "promouvoir"the English for "médicament"a sudden and important discoveryThe English for "dossier médical"The English for "mettre en place"The English for un "scientifique"the English for "avancé, sophistiqué"when confidential information is exposed...

Valpak – November 2023 2023-10-20

Valpak – November 2023 crossword puzzle
Across
  1. What sport is played on Thanksgiving?
  2. This online shopping day occurs on ____ Monday
  3. A Thanksgiving side dish made from bread
  4. Sweet potato casserole is topped with this fluffy, sweet treat
  5. The centerpiece of the classic Thanksgiving meal
  6. Festive event held in New York City every Thanksgiving
Down
  1. A sauce often put on mashed potatoes, turkey and stuffing
  2. A common Thanksgiving decoration
  3. Black _____ is the busiest shopping day of the year
  4. Popular Black Friday shopping destination
  5. This Thanksgiving-themed dish is made from green beans
  6. First President credited with proclaiming Thanksgiving a National holiday
  7. Synonym for sweet potatoes
  8. Thanksgiving pie with a flaky crust

14 Clues: Synonym for sweet potatoesA common Thanksgiving decorationThanksgiving pie with a flaky crustWhat sport is played on Thanksgiving?A Thanksgiving side dish made from breadPopular Black Friday shopping destinationThis online shopping day occurs on ____ MondayThe centerpiece of the classic Thanksgiving meal...

Bullying Crossword Puzzle 2025-03-11

Bullying Crossword Puzzle crossword puzzle
Across
  1. type of bullying that happens online
  2. does something to help the target
  3. type of bullying that involves putting hands on each other
  4. sees bullying happen and does not tell anyone
  5. something you can be when someone is being bullied
  6. type of bullying that involves rumors and gossip
  7. changing the conversation
Down
  1. person who is bullied
  2. intentional, unwanted, aggressive behavior that causes severe harm
  3. telling an adult about bullying
  4. something you can do to solve the problem
  5. person who bullies others
  6. type of bullying that involves a characteristic about someone that they cannot change
  7. an argument between two connected people

14 Clues: person who is bulliedperson who bullies otherschanging the conversationtelling an adult about bullyingdoes something to help the targettype of bullying that happens onlinean argument between two connected peoplesomething you can do to solve the problemsees bullying happen and does not tell anyonetype of bullying that involves rumors and gossip...

CSIT - Cybersecurity Vocab 2024-12-02

CSIT - Cybersecurity Vocab crossword puzzle
Across
  1. A person or entity responsible for an event that has been identified as a security incident or as a risk
  2. Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted
  3. Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
  4. The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data
  5. Data that can be used to identify or contact an individual
  6. A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication
Down
  1. A number used in conjunction with authentication devices
  2. Scans that allow access to a physical space or program by verifying unique body features
  3. unauthorized use is detected or attempted
  4. Security control that can enforce a virtual boundary based on real-world geography
  5. A basic principle of security stating that a person should be allocated the minimum necessary rights, privileges, or information to perform its role

11 Clues: unauthorized use is detected or attemptedA number used in conjunction with authentication devicesData that can be used to identify or contact an individualSecurity control that can enforce a virtual boundary based on real-world geographyScans that allow access to a physical space or program by verifying unique body features...

For Clients Portal 2017-12-20

For Clients Portal crossword puzzle
Across
  1. Nine
  2. One
  3. Six
  4. Four
  5. Seven
  6. Five
Down
  1. Two
  2. Twelve
  3. Ten
  4. Three
  5. Eleven
  6. Eight

12 Clues: TwoTenOneSixNineFourFiveThreeEightSevenTwelveEleven

UNit 11 words 2024-02-12

UNit 11 words crossword puzzle
Across
  1. arrange
  2. particular
  3. silly
  4. tangy
  5. creed
Down
  1. pilot
  2. protection
  3. reasonable
  4. landslide
  5. confirm
  6. snuggle
  7. cry

12 Clues: crypilotsillytangycreedarrangeconfirmsnugglelandslideprotectionreasonableparticular

Air Travel Essentials Crossword 2024-10-08

Air Travel Essentials Crossword crossword puzzle
Across
  1. – Another term for luggage.
  2. – Main building where passengers arrive and depart.
  3. – Feeling tired after crossing time zones.
  4. – Where passengers come in after a flight.
  5. – Area where bags are screened and passengers go through checks.
  6. – Where planes take off and land.
  7. – Required travel document for international flights.
Down
  1. – A stop between flights.
  2. – Ticket required to get on the plane.
  3. – Process of registering and dropping off luggage.
  4. – When the plane leaves.
  5. – Where passengers wait to board their flight.
  6. – Inspection area after international flights.
  7. – Abbreviation for the agency in charge of airport security in the U.S.

14 Clues: – When the plane leaves.– A stop between flights.– Another term for luggage.– Where planes take off and land.– Ticket required to get on the plane.– Feeling tired after crossing time zones.– Where passengers come in after a flight.– Where passengers wait to board their flight.– Inspection area after international flights....

Overzicht 2013 2014-01-15

Overzicht 2013 crossword puzzle
Across
  1. aan wat werd ACW beschuldigt ?
  2. Willem ... wordt koning van Nederland
  3. wie treed er in Nederland van de troon ?
  4. Rusland wilt met ... een vreedzame oplossing
  5. In Syrie vallen er 1500 doden door ?
  6. wat was de voornaam van de president van Venezuela ?
  7. wat was er in Boston tijdens de de beroemde marathon gebeurt ?
  8. Welke paus treed aaf ?
  9. Hoe noemt de typhoon dat in Fillipijnen plaats vond ?
  10. hoe noemt de jongen dat naar Syrie was vertrokken ?
Down
  1. Wat was er op de luchthaven gestolen ?
  2. wie was de slachtoffer van cyber spionage ?
  3. Koning Albert II maakt plaats voor prins ...
  4. waar was er een kleding fabriek ingestort ?
  5. waar was er een meteor gevallen ?
  6. In welke maand is Nelson Mandela overleden ?

16 Clues: Welke paus treed aaf ?aan wat werd ACW beschuldigt ?waar was er een meteor gevallen ?In Syrie vallen er 1500 doden door ?Willem ... wordt koning van NederlandWat was er op de luchthaven gestolen ?wie treed er in Nederland van de troon ?wie was de slachtoffer van cyber spionage ?waar was er een kleding fabriek ingestort ?...

Black Friday & Cyber Monday 2017-11-29

Black Friday & Cyber Monday crossword puzzle
Across
  1. three times as great
  2. increasing in size, number
  3. sellers of merchandise directly to customers
  4. building blocks made from clay, then baked in a kiln or in the sun
  5. lifting, taking
  6. things devised to publicize a product or event
  7. a combining form meaning computer, computer network or online
  8. people who shop
  9. having a likeness in a general way to other things
Down
  1. showing how something performs or operates
  2. competitor for the same goal
  3. bargains, financial discounts
  4. computer that isn't portable; not a laptop or tablet
  5. before all others; before the second; the initial one
  6. mixture of cement, sand & water used to bond bricks & other building materials together
  7. systematic inquiry or investigation of a subject

16 Clues: lifting, takingpeople who shopthree times as greatincreasing in size, numbercompetitor for the same goalbargains, financial discountsshowing how something performs or operatessellers of merchandise directly to customersthings devised to publicize a product or eventsystematic inquiry or investigation of a subject...

Comp Sci Study Guide 2025-04-09

Comp Sci Study Guide crossword puzzle
Across
  1. Malicious Software
  2. Arithmetic Logic Unit
  3. Component that holds all other components
  4. Cyber crime that steals information through sketchy links through email or text
  5. Basic Input/Output System, firmware in the motherboard
  6. Components that manage the flow of data between the CPU, GPU, RAM, storage, and peripherals
  7. Renders graphics and visuals
Down
  1. Used to amplify or switch electronic signals and electrical power
  2. The delay before data follows an instruction for transfer
  3. Uses a laser light to read data from or write data to an optical disc
  4. International character encoding standard
  5. American Standard Code for Information Interchange
  6. Stores data on flash memory
  7. Pathways that allow components to exchange data
  8. Uses magnetic disks to store digital information
  9. One billion hertz

16 Clues: One billion hertzMalicious SoftwareArithmetic Logic UnitStores data on flash memoryRenders graphics and visualsInternational character encoding standardComponent that holds all other componentsPathways that allow components to exchange dataUses magnetic disks to store digital informationAmerican Standard Code for Information Interchange...

Bullying Is Wrong. 2021-10-27

Bullying Is Wrong. crossword puzzle
Across
  1. a bystander doesn’t help when they see someone getting bullied is _____ bullying
  2. can be done by an individual or Group?
  3. A form of looking down on yourself?
  4. I must be_____to everyone
  5. Being a bully makes you a smaller person, helping makes u a...
  6. What should you say to someone who stood up for you?
  7. I shouldn't_____ someone.
Down
  1. The act of gossiping or telling on someone, when they do non-hurtful things to get attention.
  2. ____ someone from a group is a form of bullying.
  3. Bullying online is called ___ bullying?
  4. Appreciate your inner
  5. Bullying is---
  6. you should___when bullied.
  7. bullying can be physical or ___.
  8. you ___ ask for help when bullied
  9. you can bully someone without ___

16 Clues: Bullying is---Appreciate your innerI must be_____to everyoneI shouldn't_____ someone.you should___when bullied.bullying can be physical or ___.you ___ ask for help when bulliedyou can bully someone without ___A form of looking down on yourself?can be done by an individual or Group?Bullying online is called ___ bullying?...

Christmas knowledge quiz 2021-12-12

Christmas knowledge quiz crossword puzzle
Across
  1. Whose Christmas advert features Kevin the Carrot?
  2. Whose slogan is "just do it"
  3. Whose slogan is "taste the rainbow"
  4. Which supermarket uses orange as its main colour
  5. Which city did the first Primark open in?
Down
  1. Whose slogan is "I'm lovin it"
  2. In retail which Monday falls after Black Friday?
  3. Which supermarket says "every little helps"?
  4. Whose Christmas advert talks about carving turkeys with lasers?
  5. Which supermarket was voted the cheapest in 2020?

10 Clues: Whose slogan is "just do it"Whose slogan is "I'm lovin it"Whose slogan is "taste the rainbow"Which city did the first Primark open in?Which supermarket says "every little helps"?In retail which Monday falls after Black Friday?Which supermarket uses orange as its main colourWhose Christmas advert features Kevin the Carrot?...

ITF-Chapter4-KeyTerms 2019-12-10

ITF-Chapter4-KeyTerms crossword puzzle
Across
  1. A security concern regarding network devices, and other devices such a smartphones that give the option of using the device without a password.
  2. An early example of encryption used by Julius Caesar to send confidential military messages.
  3. Attempting to secretively discover private information about a person, company, or other entity.
  4. A development model that breaks down project activities into a series of sequential or linear phases, each phase depending on the deliverables from the previous phase.
  5. Regularly scheduled backups.
  6. TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
  7. Backups that are stored in the same building or even the same room as the computer systems they are taken from.
  8. Software that help remove unwanted, unsolicited email.
  9. The passive gathering of information about a potential victim.
  10. An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
  11. Works whose copyrights have expired and are free for anyone to reproduce, display, and make derivatives.
  12. The use of deception to gain personal and/or private information for unlawful purposes.
  13. The SDLC phase that involves studying existing information systems that are already in place and the requirements for new information systems.
  14. A device that contains one or more hard drives that users can access over the network.
  15. A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
  16. Unscheduled backups performed periodically.
  17. Data that are being transported from one device to another, whether by radio, electrical, or light signals.
  18. Any word, picture, or symbol that's used to distinguish a good from other similar goods.
  19. The study and design of a system by examining its components and their interactions.
  20. The ability to ensure that someone can't deny that they performed a certain act.
  21. The various forms of information systems including transaction processing, management, and expert systems.
  22. A development model that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design.
  23. An attribute used to classify information based on the risk of public disclosure.
  24. A scheme for classifying information based on different levels of public/private distinctions.
  25. The identification, evaluation, and prioritization of risks followed by activities that minimizes, monitors, and controls the impact of the risk.
  26. A device that controls the flow of network traffic to protect systems from unauthorized network connections.
  27. An activity that involves integrating various computing systems and software applications to function together as a whole.
  28. Exploiting a victim using email messages
  29. A project management process that divides a large or complex project into smaller, more manageable projects that can be completed as part of an incremental or iterative process.
  30. A reasonable belief that personal information collected by an information system is controlled and protected and not shared or used beyond its original intent.
  31. The practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time.
  32. A method of increasing fault tolerance by providing multiple network paths between hosts.
Down
  1. The SDLC phase that involves purchasing and installing new hardware and software, integrating the various system components, and testing the operation of the new system.
  2. The SDLC phase that involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project.
  3. A type of access control that restricts access based on the users role in an organization.
  4. An attempt to connect to a server by capturing and resending of authentication information.
  5. A method of increasing fault tolerance by providing power backups and power failover.
  6. Tricking a victim into revealing sensitive information under false pretenses.
  7. Convincing a victim that they are performing a legitimate task within their web browser window, when in fact they are being tricked into revealing sensitive information or installing malware on their computer
  8. A type of access control where a user has complete control over a resource, and also determines the permissions other users have those those resources.
  9. Anything that is owned by a copyright holder.
  10. A scheme for classifying information based on government and military requirements.
  11. combination of technology, people, and procedures used to organize, analyze, and store data.
  12. The SDLC phase that involves monitoring and evaluating the new information system.
  13. A methodology or framework that defines steps and tasks for developing and maintaining information systems.
  14. A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.
  15. Data in a persistent storage medium, such as a hard drive or optical disc.
  16. An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
  17. A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face or voice.
  18. Directions for disposing and even destroying data when it's no longer needed or when a storage device needs to be replaced.
  19. A type of authentication that requires the user to provide something that they know, such as a password or PIN.
  20. Authentication that requires two or more evidences of authentication, usually of different types.
  21. A type of authentication that requires the user to provide something that they have, such as a key, fob, electronic chip, or smart card.
  22. A method of authenticating with one system to gain access to other related systems.
  23. A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
  24. An attack where the an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
  25. A backup of the system software, including operating system files.
  26. Concerning security, a person responsible for securing networks and responding to intrusions.
  27. A backup of data stored in a database.
  28. The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
  29. Software that helps protect against malicious software infections.
  30. Protections granted by the federal government to creators, writers, and inventors regarding rights to reproduce, display, make derivatives, sell, rent, or lend a work.
  31. Software where anyone can inspect, enhance, and modify the source code.
  32. The SDLC phase that involves reviewing the system requirements document from the analysis phase and producing detailed specifications that cover all aspects of the system.
  33. A person who is in charge of designing and implementing security methods to protect an organization's computer systems and networks.
  34. Any software where the publisher retains intellectual property rights to the source code.
  35. A systematic process for determining and addressing needs, or "gaps" between current conditions, and desired conditions or "wants".
  36. The capturing and storing of computer and user events.
  37. Backups that are stored at a location far enough from a possible natural disaster, while being close enough to recover the data and systems within a reasonable amount of time.
  38. The process of turning data points into useful information.
  39. The crime of using someone else's intellectual property in a way that should be reserved for the copyright holder.
  40. An exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public.
  41. The process of keeping track of user activity while attached to a system.
  42. The buying and selling of products or services electronically, typically through the Internet.
  43. A license given by a government that provides inventors a temporary monopoly on their invention.
  44. A type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources. The security manager controls the security policy and users aren't able to override the policy.

76 Clues: Regularly scheduled backups.A backup of data stored in a database.Exploiting a victim using email messagesUnscheduled backups performed periodically.Anything that is owned by a copyright holder.Software that help remove unwanted, unsolicited email.The capturing and storing of computer and user events....

ITF-Capt4-1-keyterms 2019-12-05

ITF-Capt4-1-keyterms crossword puzzle
Across
  1. A security concern regarding network devices, and other devices such a smartphones that give the option of using the device without a password.
  2. An early example of encryption used by Julius Caesar to send confidential military messages.
  3. Attempting to secretively discover private information about a person, company, or other entity.
  4. A development model that breaks down project activities into a series of sequential or linear phases, each phase depending on the deliverables from the previous phase.
  5. Regularly scheduled backups.
  6. TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
  7. Backups that are stored in the same building or even the same room as the computer systems they are taken from.
  8. Software that help remove unwanted, unsolicited email.
  9. The passive gathering of information about a potential victim.
  10. An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
  11. Works whose copyrights have expired and are free for anyone to reproduce, display, and make derivatives.
  12. The use of deception to gain personal and/or private information for unlawful purposes.
  13. The SDLC phase that involves studying existing information systems that are already in place and the requirements for new information systems.
  14. A device that contains one or more hard drives that users can access over the network.
  15. A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
  16. Unscheduled backups performed periodically.
  17. Data that are being transported from one device to another, whether by radio, electrical, or light signals.
  18. Any word, picture, or symbol that's used to distinguish a good from other similar goods.
  19. The study and design of a system by examining its components and their interactions.
  20. The ability to ensure that someone can't deny that they performed a certain act.
  21. The various forms of information systems including transaction processing, management, and expert systems.
  22. A development model that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design.
  23. An attribute used to classify information based on the risk of public disclosure.
  24. A scheme for classifying information based on different levels of public/private distinctions.
  25. The identification, evaluation, and prioritization of risks followed by activities that minimizes, monitors, and controls the impact of the risk.
  26. A device that controls the flow of network traffic to protect systems from unauthorized network connections.
  27. An activity that involves integrating various computing systems and software applications to function together as a whole.
  28. Exploiting a victim using email messages
  29. A project management process that divides a large or complex project into smaller, more manageable projects that can be completed as part of an incremental or iterative process.
  30. A reasonable belief that personal information collected by an information system is controlled and protected and not shared or used beyond its original intent.
  31. The practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time.
  32. A method of increasing fault tolerance by providing multiple network paths between hosts.
Down
  1. The SDLC phase that involves purchasing and installing new hardware and software, integrating the various system components, and testing the operation of the new system.
  2. The SDLC phase that involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project.
  3. A type of access control that restricts access based on the users role in an organization.
  4. An attempt to connect to a server by capturing and resending of authentication information.
  5. A method of increasing fault tolerance by providing power backups and power failover.
  6. Tricking a victim into revealing sensitive information under false pretenses.
  7. Convincing a victim that they are performing a legitimate task within their web browser window, when in fact they are being tricked into revealing sensitive information or installing malware on their computer
  8. A type of access control where a user has complete control over a resource, and also determines the permissions other users have those those resources.
  9. Anything that is owned by a copyright holder.
  10. A scheme for classifying information based on government and military requirements.
  11. combination of technology, people, and procedures used to organize, analyze, and store data.
  12. The SDLC phase that involves monitoring and evaluating the new information system.
  13. A methodology or framework that defines steps and tasks for developing and maintaining information systems.
  14. A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.
  15. Data in a persistent storage medium, such as a hard drive or optical disc.
  16. An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
  17. A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face or voice.
  18. Directions for disposing and even destroying data when it's no longer needed or when a storage device needs to be replaced.
  19. A type of authentication that requires the user to provide something that they know, such as a password or PIN.
  20. Authentication that requires two or more evidences of authentication, usually of different types.
  21. A type of authentication that requires the user to provide something that they have, such as a key, fob, electronic chip, or smart card.
  22. A method of authenticating with one system to gain access to other related systems.
  23. A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
  24. An attack where the an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
  25. A backup of the system software, including operating system files.
  26. Concerning security, a person responsible for securing networks and responding to intrusions.
  27. A backup of data stored in a database.
  28. The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
  29. Software that helps protect against malicious software infections.
  30. Protections granted by the federal government to creators, writers, and inventors regarding rights to reproduce, display, make derivatives, sell, rent, or lend a work.
  31. Software where anyone can inspect, enhance, and modify the source code.
  32. The SDLC phase that involves reviewing the system requirements document from the analysis phase and producing detailed specifications that cover all aspects of the system.
  33. A person who is in charge of designing and implementing security methods to protect an organization's computer systems and networks.
  34. Any software where the publisher retains intellectual property rights to the source code.
  35. A systematic process for determining and addressing needs, or "gaps" between current conditions, and desired conditions or "wants".
  36. The capturing and storing of computer and user events.
  37. Backups that are stored at a location far enough from a possible natural disaster, while being close enough to recover the data and systems within a reasonable amount of time.
  38. The process of turning data points into useful information.
  39. The crime of using someone else's intellectual property in a way that should be reserved for the copyright holder.
  40. An exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public.
  41. The process of keeping track of user activity while attached to a system.
  42. The buying and selling of products or services electronically, typically through the Internet.
  43. A license given by a government that provides inventors a temporary monopoly on their invention.
  44. A type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources. The security manager controls the security policy and users aren't able to override the policy.

76 Clues: Regularly scheduled backups.A backup of data stored in a database.Exploiting a victim using email messagesUnscheduled backups performed periodically.Anything that is owned by a copyright holder.Software that help remove unwanted, unsolicited email.The capturing and storing of computer and user events....

Types of Bullying 2013-08-12

Types of Bullying crossword puzzle
Across
  1. Using information and communication technologies to bullying someone.
  2. Treating someone like an outcast.
  3. Secretly hurting a person such as spreading rumours.
  4. Affecting someone's relationship, excluding, making the person feel left out etc.
Down
  1. Name calling, saying hurtful things.
  2. Hurting someone.
  3. Hurting a person's feelings.

7 Clues: Hurting someone.Hurting a person's feelings.Treating someone like an outcast.Name calling, saying hurtful things.Secretly hurting a person such as spreading rumours.Using information and communication technologies to bullying someone.Affecting someone's relationship, excluding, making the person feel left out etc.

jobs 2021-01-07

jobs crossword puzzle
Across
  1. Frisör/in
  2. Tierpfleger
  3. arbeiten
  4. Landwirtschaftsgehilfe
  5. Sicherheitsbediensteter
  6. Lehrer/in
Down
  1. Maler
  2. Gärtner
  3. Koch
  4. Verkäufer/in
  5. LKW-Fahrer
  6. Sicherheit
  7. Bäcker

13 Clues: KochMalerBäckerGärtnerarbeitenFrisör/inLehrer/inLKW-FahrerSicherheitTierpflegerVerkäufer/inLandwirtschaftsgehilfeSicherheitsbediensteter

James HW 1/25 2024-01-25

James HW 1/25 crossword puzzle
Across
  1. he development of computer systems capable of performing tasks that normally require human intelligence.
  2. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  3. The simulated cyberattack on a computer system to evaluate its security.
  4. a method or algorithm for transforming plaintext (readable data) into ciphertext (encoded or encrypted data) to secure communication or protect information.
  5. The process of verifying the identity of a user, system, or application before granting access.
Down
  1. Large and complex datasets that are difficult to manage and analyze using traditional data processing applications.
  2. The practice of protecting computer systems, networks, and data from security breaches and unauthorized access.
  3. The study and practice of techniques for securing communication and data through the use of codes and ciphers.
  4. Malicious software that attaches itself to a host program and can replicate itself to spread to other programs.
  5. A form of social engineering where attackers trick individuals into divulging sensitive information by pretending to be a trustworthy entity.
  6. A collection of computers and other devices connected for the purpose of sharing resources and information

11 Clues: The simulated cyberattack on a computer system to evaluate its security.The process of verifying the identity of a user, system, or application before granting access.he development of computer systems capable of performing tasks that normally require human intelligence....

Unit 24 2019-11-13

Unit 24 crossword puzzle
Across
  1. työskennellä
  2. työhakemus
  3. todistus
  4. sisältää
  5. vastuu
Down
  1. tietotekniikka
  2. työkaveri
  3. työaika
  4. hoitaa
  5. lahjakas
  6. hyväksyä
  7. turvallisuus
  8. palkka

13 Clues: hoitaavastuupalkkatyöaikalahjakashyväksyätodistussisältäätyökaverityöhakemustyöskennelläturvallisuustietotekniikka

Ivan's Crossword 2018-11-09

Ivan's Crossword crossword puzzle
Across
  1. охрана
  2. крыша
  3. притворяться
  4. игральные кубики
  5. расстроенный
  6. бросить (кубики)/ катиться
Down
  1. чеснок
  2. угадывать
  3. взбитые (сливки)
  4. наводнение
  5. Греция
  6. пропустить
  7. ловушка

13 Clues: крышачеснокохранаГрецияловушкаугадыватьнаводнениепропуститьпритворятьсярасстроенныйвзбитые (сливки)игральные кубикибросить (кубики)/ катиться

Crybersecrity 2023-02-09

Crybersecrity crossword puzzle
Across
  1. Something online
  2. media A place people post pictures of themselves
  3. Something personal
Down
  1. Bullies online
  2. On the screen

5 Clues: On the screenBullies onlineSomething onlineSomething personalmedia A place people post pictures of themselves

Bullying Types 2025-05-02

Bullying Types crossword puzzle
Across
  1. Punching someone in the face
  2. Name calling
  3. Rumours being spread
Down
  1. Threatening to harm you
  2. Harmful words online

5 Clues: Name callingHarmful words onlineRumours being spreadThreatening to harm youPunching someone in the face

WatchGuard Dictionary Day 2022-10-11

WatchGuard Dictionary Day crossword puzzle
Across
  1. Malicious software
  2. WatchGuard for SOCs
  3. Fraudulent emails
Down
  1. WatchGuard's XDR Solution
  2. An easy-to-use MFA product
  3. security simplified
  4. WatchGuard's signature red box
  5. Unified Security Platform

8 Clues: Fraudulent emailsMalicious softwaresecurity simplifiedWatchGuard for SOCsWatchGuard's XDR SolutionUnified Security PlatformAn easy-to-use MFA productWatchGuard's signature red box

Family 2019-11-22

Family crossword puzzle
Across
  1. Waymo
  2. Blue Lake
  3. Gale’s husband
  4. Security Guard
  5. Georgia
  6. Fireman
  7. Dec 5 hospital
  8. THISISIT
  9. Confederate Loot
  10. Annie’s mom
  11. Rachel’s mom
  12. OK
  13. Robin’s dad
  14. State Farm Agent
  15. Daddy’s Grandfather’s daughter
  16. Where in the world is.......
  17. Court’s first roommate
  18. Vincents Staten Island Hospital
  19. Teachers College Nana Verne’s College
  20. Youngest cousin
  21. College Counselor
  22. 3224
  23. Andrew Taylor Profession
  24. Go You
  25. Steve and
  26. Spain
Down
  1. Youngest Uncle
  2. Translation Company
  3. Emery Paper
  4. Galaxy
  5. Go Green, Go.....
  6. Saturn
  7. Field
  8. Mommy's plate
  9. Kat’s namesake
  10. Seville mom
  11. Steppingstone
  12. College gig
  13. Middle school friend
  14. Nellie’s birthplace
  15. Oldest Uncle
  16. Middle Uncle
  17. 1967 Detroit
  18. Coconut water
  19. Slave
  20. 654______
  21. William UVA Football
  22. Gymnastics teacher
  23. 27th
  24. Plantation
  25. The _____

51 Clues: OK27th3224WaymoFieldSlaveSpainGalaxySaturnGo YouGeorgiaFiremanTHISISITBlue Lake654______The _____Steve andPlantationEmery PaperSeville momCollege gigAnnie’s momRobin’s dadRachel’s momOldest UncleMiddle Uncle1967 DetroitMommy's plateSteppingstoneCoconut waterYoungest UncleGale’s husbandSecurity GuardDec 5 hospitalKat’s namesakeYoungest cousin...

WGSM 2021-10-02

WGSM crossword puzzle
Across
  1. Cris collects these
  2. Director of inhouse Sales
  3. IF German food is what you crave
  4. grab a drink here
  5. the system used to input tickets
  6. Kimberly has over 100 of these
  7. sales refers to the 1000 building as this
  8. Richie Roth is this
  9. Director of Housekeeping
  10. guests can text using this service
  11. this team delivers Ice and assists with luggage
  12. aka the ghost
Down
  1. this restaurant is currently closed
  2. a studio in the classic section is what Rate Code
  3. Owners can slide on waterslides here
  4. sister property in Gatlinburg
  5. recently opened pool
  6. Director of Engineering
  7. code 44 in sales terms
  8. Director of security
  9. 22 1 22 in sales terms
  10. noise complaint put in a ticket for this department
  11. Resort Ops Director
  12. If you have a call out please call this
  13. Jason, Angel, Cathy and Gage

25 Clues: aka the ghostgrab a drink hereCris collects theseResort Ops DirectorRichie Roth is thisrecently opened poolDirector of securitycode 44 in sales terms22 1 22 in sales termsDirector of EngineeringDirector of HousekeepingDirector of inhouse SalesJason, Angel, Cathy and Gagesister property in GatlinburgKimberly has over 100 of these...

One platform to support communication and learning wherever it happens 2023-10-04

One platform to support communication and learning wherever it happens crossword puzzle
Across
  1. Certified by one of the most recognized information security standards worldwide
  2. Conformity
  3. study and use of the English language in academic settings
  4. prep To study for an examination
  5. Schooling
  6. Adding and subtracting
  7. Connect teacher tools to Remind to share content, resources, and more
  8. Monitor and measure teacher, student, and family communicationC
  9. Raise kids
  10. Protecting the personal information of students under 13
  11. Turnout or presence
  12. Detailed examination
  13. Exchanging messages and information
  14. Area where a group of schools exist
  15. Alert your entire community in emergency situations
Down
  1. Alert your entire community in emergency situations
  2. Places of learning
  3. Comply with The Family Educational Rights and Privacy Act
  4. Gaining knowledge
  5. Meeting federal and state laws for student privacy
  6. Safety, Manage settings to safeguard and support communication
  7. Comply with General Data Protection Regulation (EU)
  8. Teaching
  9. Create accounts and classes, send role based messages
  10. Class tutor
  11. Send notifications to your entire community or specific roles

26 Clues: TeachingSchoolingConformityRaise kidsClass tutorGaining knowledgePlaces of learningTurnout or presenceDetailed examinationAdding and subtractingprep To study for an examinationExchanging messages and informationArea where a group of schools existMeeting federal and state laws for student privacyAlert your entire community in emergency situations...

BLUE ECONOMY 2023-10-29

BLUE ECONOMY crossword puzzle
Across
  1. relating to or found in the sea.
  2. introduction of harmful materials into the environment
  3. place where ships load or unload
  4. Surname Cabinet Secretary Ministry of Blue Economy
  5. catching fish
  6. Think Maritime,Think Women
  7. Ship or boat
  8. Exchange of Goods and services
  9. boundary of a coast, where land meets water
  10. the business of transporting freight,by ship
  11. oldest Swahili settlement in East Africa
  12. a body of salt water
  13. state of a country or region
Down
  1. being free from danger or threat
  2. of, relating to, or bordering on the sea.
  3. recreation, relaxation, and pleasure activities
  4. someone employed on a sea vessel
  5. Swahili for 'In the Sea'
  6. large area of water surrounded by land.
  7. Maritime security of a country
  8. middlemen who make shipping happen
  9. Coastal city in Kenya
  10. UN Agency for safety of shipping

23 Clues: Ship or boatcatching fisha body of salt waterCoastal city in KenyaSwahili for 'In the Sea'Think Maritime,Think Womenstate of a country or regionExchange of Goods and servicesMaritime security of a countrybeing free from danger or threatrelating to or found in the sea.someone employed on a sea vesselplace where ships load or unload...

CTF-CW-6 2025-11-17

CTF-CW-6 crossword puzzle
Across
  1. Place in process where risk leaks in
  2. Lightweight, portable way to package software
  3. Temporary period of activity restarted
  4. Replace identifying information with artificial identifiers
  5. Issue, project, and bug tracker at Tekion.
  6. The one managing day-to-day data operations
  7. Someone outside your company doing work
  8. Privacy principle limiting collection to necessary information only
  9. Guarantee that a message was sent and received
  10. Approved items or users that are allowed
  11. Security Orchestration Automation & Response acronym
  12. Isolated test environment
  13. Security review step used by Tekion before release.
Down
  1. Building data protection into systems from the ground up
  2. Secret management and credential vault at Tekion.
  3. Specific logic for finding attacks
  4. List defining who can do what in a system
  5. The one responsible for compliance
  6. Completely removing threats or malware
  7. Evaluation of privacy risks before implementing new data processing

20 Clues: Isolated test environmentSpecific logic for finding attacksThe one responsible for compliancePlace in process where risk leaks inTemporary period of activity restartedCompletely removing threats or malwareSomeone outside your company doing workApproved items or users that are allowedList defining who can do what in a system...

CTF-CW-6 2025-11-17

CTF-CW-6 crossword puzzle
Across
  1. Place in process where risk leaks in
  2. Lightweight, portable way to package software
  3. Temporary period of activity restarted
  4. Replace identifying information with artificial identifiers
  5. Issue, project, and bug tracker at Tekion.
  6. The one managing day-to-day data operations
  7. Someone outside your company doing work
  8. Privacy principle limiting collection to necessary information only
  9. Guarantee that a message was sent and received
  10. Approved items or users that are allowed
  11. Security Orchestration Automation & Response acronym
  12. Isolated test environment
  13. Security review step used by Tekion before release.
Down
  1. Building data protection into systems from the ground up
  2. Secret management and credential vault at Tekion.
  3. Specific logic for finding attacks
  4. List defining who can do what in a system
  5. The one responsible for compliance
  6. Completely removing threats or malware
  7. Evaluation of privacy risks before implementing new data processing

20 Clues: Isolated test environmentSpecific logic for finding attacksThe one responsible for compliancePlace in process where risk leaks inTemporary period of activity restartedCompletely removing threats or malwareSomeone outside your company doing workApproved items or users that are allowedList defining who can do what in a system...

Indian contact act 1872 2025-11-30

Indian contact act 1872 crossword puzzle
Across
  1. created by contract.
  2. condition to validate agreement.
  3. of rescinding a contract.
  4. contract made without free consent is
  5. who makes an offer.
  6. proposal made by one party to another.
  7. essential to contract purpose.
  8. or security on goods.
  9. for breach of contract.
  10. in exchange for a promise.
  11. who sells goods.
Down
  1. that becomes void later.
  2. false statement that induces a contract.
  3. DAMAGES,Liability for late delivery of goods.
  4. must be to be valid.
  5. who buys goods.
  6. paid in advance as security.
  7. GOODS,Goods not specific at contract time.
  8. of ownership.
  9. enforceable by law.
  10. GOODS,Goods manufactured or acquired after agreement
  11. TO SELL,Contract in which goods are delivered later.
  12. GOODS,Goods identified at the time of making the contract.
  13. by buyer to seller.

24 Clues: of ownership.who buys goods.who sells goods.enforceable by law.who makes an offer.by buyer to seller.created by contract.must be to be valid.or security on goods.for breach of contract.that becomes void later.of rescinding a contract.in exchange for a promise.paid in advance as security.essential to contract purpose.condition to validate agreement....

Chapter 22 Vocabulary 2014-03-12

Chapter 22 Vocabulary crossword puzzle
Across
  1. security/A system by which the participating nations agree to take joint action against a nation
  2. formal agreement between the governments of two or more countries
  3. avoidance of involvement in world affairs
  4. of members of both major political parties
  5. document entitling a traveler to certain protections established by international treaty
  6. attacks any one of them
  7. treaty/Agreement between two nations
  8. official of the government who represents the nation in diplomatic matters
  9. defense alliance/An agreement between nations to support each other in case of an attack
  10. military service; also called the draft
  11. special document, required by certain countries, that is issued by the government of the country
  12. agreement/An agreement made between the president and another head of state
Down
  1. security/Protection of a nation’s borders and territories against invasion or control by foreign
  2. security pact/A mutual defense treaty among nations of a region
  3. in world affairs
  4. policy designed to keep the Soviet Union from expanding its power
  5. ambassador’s official residence and offices in a foreign country
  6. measure such as withholding economic aid to influence a foreign government’s activities
  7. policy/The strategies and goals that guide a nation’s relations with other countries
  8. treaty/International agreement signed by several nations
  9. /Office that promotes American business and safeguards its travelers in a foreign country
  10. government official who heads a consulate in a foreign nation

22 Clues: in world affairsattacks any one of themtreaty/Agreement between two nationsmilitary service; also called the draftavoidance of involvement in world affairsof members of both major political partiestreaty/International agreement signed by several nationsgovernment official who heads a consulate in a foreign nation...

Investing-Briana Cutaran 2025-03-25

Investing-Briana Cutaran crossword puzzle
Across
  1. investing all the money you have available
  2. the availability of cash
  3. Virtual currency
  4. how much Tom Brady lost on FTX
  5. when the stock market is high
  6. ability to move your 401k funds
  7. how old you need to be to invest in crypto
  8. initial public offering
  9. when your this old you must take the minimum out of your account annually
  10. a loan from you to the person you bought it from
  11. biggest financial fraud in US history
  12. Dollar cost averaging
  13. after working a certain amount of time with a company you get 100% of your 401k
Down
  1. what percentage you need to pay for social security tax if you work for an employer
  2. the person who takes care of your investments in a mutual fund
  3. system to record info so you can't cheat the system
  4. pool of money from multiple different investors
  5. currencies backed by the government that don't have a physical commodity
  6. the money you contribute here is after taxes
  7. Both you, your employer, and sometimes the state pays into this
  8. how much you can put into your IRA per year
  9. President of the Stanwood AAAA Booster club
  10. when the stock market is low
  11. a security that represents the ownership of a fraction of a corporation
  12. the investment game we've been playing
  13. how old do you need to be to receive full social security benefits

26 Clues: Virtual currencyDollar cost averaginginitial public offeringthe availability of cashwhen the stock market is lowwhen the stock market is highhow much Tom Brady lost on FTXability to move your 401k fundsbiggest financial fraud in US historythe investment game we've been playinginvesting all the money you have available...

Retirement terms 2025-10-16

Retirement terms crossword puzzle
Across
  1. Benefit Plan: A pension plan in which the amount of benefits paid to an
  2. age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
  3. make tax-deductible contributions.
  4. (Individual Retirement Account): A special type of account that allows investors
  5. IRA, the contributions are not tax deductible
  6. Contribution Plan: A pension plan wherein a certain amount or percentage
  7. conditions to a person following retirement or to surviving dependents.
  8. IRA: Roth IRAs allow investors who do not exceed a specific income level to
  9. plan.
  10. after retirement is fixed in advance in accordance with a formula given in
  11. money is set aside each year (by either the company and/or the employee) for the
  12. A type of defined contribution retirement account funded through pre-tax
Down
  1. of the employee. There are restrictions as to when and how you can
  2. include payment of hospital and medical expenses.
  3. Benefits: Benefits (compensation in addition to salary) that may be provided
  4. A federal program that provides some level of health benefits for people
  5. Security: A federal benefits program developed in 1935, Social Security is
  6. a limited amount of money toward retirement annually. Unlike the
  7. these funds without penalties.
  8. employees for sickness, accidental injury, or accidental death. These benefits
  9. through a tax levied on employers and employees.
  10. bonds, mutual funds or other assets, and are not taxed until they are
  11. deductions. The funds in the account can be invested in a number of different
  12. A sum of money paid regularly as a retirement benefit; money paid under

24 Clues: plan.these funds without penalties.make tax-deductible contributions.IRA, the contributions are not tax deductiblethrough a tax levied on employers and employees.include payment of hospital and medical expenses.a limited amount of money toward retirement annually. Unlike theof the employee. There are restrictions as to when and how you can...

retirement terms 2025-10-17

retirement terms crossword puzzle
Across
  1. Benefits: Benefits (compensation in addition to salary) that may be provided
  2. A federal program that provides some level of health benefits for people
  3. age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
  4. Benefit Plan: A pension plan in which the amount of benefits paid to an
  5. these funds without penalties.
  6. IRA, the contributions are not tax deductible
  7. money is set aside each year (by either the company and/or the employee) for the
  8. A sum of money paid regularly as a retirement benefit; money paid under
  9. include payment of hospital and medical expenses.
  10. employees for sickness, accidental injury, or accidental death. These benefits
  11. Security: A federal benefits program developed in 1935, Social Security is
  12. A type of defined contribution retirement account funded through pre-tax
Down
  1. after retirement is fixed in advance in accordance with a formula given in
  2. plan.
  3. of the employee. There are restrictions as to when and how you can
  4. a limited amount of money toward retirement annually. Unlike the
  5. (Individual Retirement Account): A special type of account that allows investors
  6. Contribution Plan: A pension plan wherein a certain amount or percentage
  7. IRA: Roth IRAs allow investors who do not exceed a specific income level to
  8. make tax-deductible contributions.
  9. through a tax levied on employers and employees.
  10. conditions to a person following retirement or to surviving dependents.
  11. deductions. The funds in the account can be invested in a number of different
  12. bonds, mutual funds or other assets, and are not taxed until they are

24 Clues: plan.these funds without penalties.make tax-deductible contributions.IRA, the contributions are not tax deductiblethrough a tax levied on employers and employees.include payment of hospital and medical expenses.a limited amount of money toward retirement annually. Unlike theof the employee. There are restrictions as to when and how you can...

dollar and sense 2025-10-17

dollar and sense crossword puzzle
Across
  1. Security: A federal benefits program developed in 1935, Social Security is
  2. these funds without penalties.
  3. make tax-deductible contributions.
  4. include payment of hospital and medical expenses.
  5. Contribution Plan: A pension plan wherein a certain amount or percentage
  6. of the employee. There are restrictions as to when and how you can
  7. money is set aside each year (by either the company and/or the employee) for the
  8. after retirement is fixed in advance in accordance with a formula given in
  9. Benefit Plan: A pension plan in which the amount of benefits paid to an
  10. Terms
  11. IRA: Roth IRAs allow investors who do not exceed a specific income level to
  12. bonds, mutual funds or other assets, and are not taxed until they are
Down
  1. deductions. The funds in the account can be invested in a number of different
  2. employees for sickness, accidental injury, or accidental death. These benefits
  3. IRA, the contributions are not tax deductible
  4. A federal program that provides some level of health benefits for people
  5. (Individual Retirement Account): A special type of account that allows investors
  6. plan.
  7. through a tax levied on employers and employees.
  8. age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
  9. a limited amount of money toward retirement annually. Unlike the
  10. conditions to a person following retirement or to surviving dependents.
  11. A sum of money paid regularly as a retirement benefit; money paid under
  12. Benefits: Benefits (compensation in addition to salary) that may be provided
  13. A type of defined contribution retirement account funded through pre-tax

25 Clues: plan.Termsthese funds without penalties.make tax-deductible contributions.IRA, the contributions are not tax deductiblethrough a tax levied on employers and employees.include payment of hospital and medical expenses.a limited amount of money toward retirement annually. Unlike theof the employee. There are restrictions as to when and how you can...

DFE Module 08 – Network Forensics 2025-11-05

DFE Module 08 – Network Forensics crossword puzzle
Across
  1. Intercepting unsecured connections to steal personal information
  2. Command line packet sniffer used to capture and analyze network packets
  3. Flooding a target with traffic to deny service to legitimate users
  4. Logs containing details about network connectivity and routing
  5. Decoy system designed to lure and study attacker behavior
  6. Capturing network traffic to obtain sensitive information
  7. Records of allowed or denied network traffic for security monitoring
  8. Contain assigned IP addresses and timestamps for network devices
  9. Capturing recording and analyzing network events to discover the source of security incidents
  10. Taking over an active user session to gain unauthorized access
Down
  1. GUI tool used to capture and analyze live or recorded network traffic
  2. Faking an IP address to appear as a trusted host
  3. Suspicious network communication caused by infected systems
  4. Records generated by intrusion detection systems to identify anomalies
  5. Analysis performed during an ongoing attack to respond quickly
  6. Intercepting and relaying messages between two parties
  7. Mapping attacker’s MAC address to victim’s IP address to intercept traffic
  8. Relating multiple events to identify patterns or root causes
  9. Digital forensic artifact indicating a potential security breach
  10. Unauthorized wireless access point set up to steal data
  11. Attempt to gain FTP credentials by repeated login failures
  12. Analysis of logs after an incident has already occurred
  13. Attack that overwhelms a server with half open TCP connections
  14. Converting data from different log formats into a common format
  15. Wireshark feature that allows filtering of captured packets for analysis

25 Clues: Faking an IP address to appear as a trusted hostIntercepting and relaying messages between two partiesUnauthorized wireless access point set up to steal dataAnalysis of logs after an incident has already occurredDecoy system designed to lure and study attacker behaviorCapturing network traffic to obtain sensitive information...