cyber security Crossword Puzzles

Unit 8 2024-05-08

Unit 8 crossword puzzle
Across
  1. Banks
  2. Japanese attack
  3. Youngest govenor
  4. Major crop
  5. Rural
  6. Transport
  7. Airplane
Down
  1. exports
  2. increase demand
  3. Social Security
  4. Civilian
  5. Agricultural
  6. Georgia representative
  7. Programs
  8. Insect

15 Clues: BanksRuralInsectexportsCivilianProgramsAirplaneTransportMajor cropAgriculturalincrease demandSocial SecurityJapanese attackYoungest govenorGeorgia representative

cybersicuritie eng briac 2024-03-13

cybersicuritie eng briac crossword puzzle
Across
  1. A barrier against network threats
  2. Harmful software
  3. is a network of private computers that have been infected with malicious software and are controlled as a group without the owners' knowledge.
  4. Fixing software vulnerabilities
  5. Protection against online threats
  6. Leaking sensitive information have 1 space (_)
  7. Unauthorized access
Down
  1. Double security confirmation for login have 1 space (_)
  2. Online assault
  3. Weakness in security
  4. Tricking people to reveal private information
  5. Scrambling data to keep it secret

12 Clues: Online assaultHarmful softwareUnauthorized accessWeakness in securityFixing software vulnerabilitiesA barrier against network threatsScrambling data to keep it secretProtection against online threatsTricking people to reveal private informationLeaking sensitive information have 1 space (_)Double security confirmation for login have 1 space (_)...

Cyber Challenge Week 2 2023-09-21

Cyber Challenge Week 2 crossword puzzle
Across
  1. Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates.
  2. Method of converting plain text into a code that can only be read by authorised parties.
  3. Malicious software that can cause damage to systems or data
  4. _ _ _ _ _ _ engineering. The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
  5. A form of malware in which files are locked until a payment is made to the attacker
  6. Malicious emails that request sensitive information or opening of attachments
  7. a string of random words that are a more secure version of passwords.
Down
  1. A type of software designed to protect against malware and other threats
  2. Always _ _ _ _ your computer when you leave your desk.
  3. A method of logon that requires you to present two or more pieces of evidence to prove your identity.
  4. An update to software that fixes a vulnerability or bug.
  5. Online harassment.
  6. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source.
  7. A passwordless option for logging into devices
  8. A form of phishing that targets high profile individuals
  9. _ _ _ _ breach. The unauthorized access, use, or disclosure of sensitive information.
  10. Errors or vulnerabilities in software

17 Clues: Online harassment.Errors or vulnerabilities in softwareA passwordless option for logging into devicesAlways _ _ _ _ your computer when you leave your desk.An update to software that fixes a vulnerability or bug.A form of phishing that targets high profile individualsMalicious software that can cause damage to systems or data...

Financial Vocabulary 2013-10-13

Financial Vocabulary crossword puzzle
Across
  1. zatrzymać
  2. aktywa
  3. wypłacalność
  4. prowizja
  5. zasiłek social ........
  6. kapitał własny
  7. wyciągać (pieniądze z konta)
  8. bankomat
  9. oddział
  10. amortyzacja
  11. waluta
  12. czynsz
  13. tygodniówka
Down
  1. ustalanie ceny
  2. dźwignia finansowa
  3. zobowiązanie
  4. spółka
  5. wycena
  6. kredyt hipoteczny
  7. koszty nieprodukcyjne
  8. płynność finansowa
  9. inwentarz
  10. obrót
  11. podatek

24 Clues: obrótspółkaaktywawycenawalutaczynszoddziałpodatekprowizjabankomatzatrzymaćinwentarzamortyzacjatygodniówkazobowiązaniewypłacalnośćustalanie cenykapitał własnykredyt hipotecznydźwignia finansowapłynność finansowakoszty nieprodukcyjnezasiłek social ........wyciągać (pieniądze z konta)

Woordenschat Periode 6 Deel 3 2020-12-07

Woordenschat Periode 6 Deel 3 crossword puzzle
Across
  1. koningin
  2. mening
  3. maatregelen
  4. maatschappelijk
  5. oorlog
  6. scène, wereldje
  7. bibliotheek
  8. beleid
  9. veiligheid
  10. politiek
  11. privé
  12. moslims
  13. armoede
Down
  1. tiener
  2. macht, kracht
  3. systeem, stelsel
  4. interpretatie
  5. wet
  6. wettelijk
  7. plaatselijk, lokaal
  8. methode, manieren om iets te doen
  9. maatschappij
  10. arm
  11. getrouwd

24 Clues: wetarmprivétienermeningoorlogbeleidmoslimsarmoedekoninginpolitiekgetrouwdwettelijkveiligheidmaatregelenbibliotheekmaatschappijmacht, krachtinterpretatiemaatschappelijkscène, wereldjesysteem, stelselplaatselijk, lokaalmethode, manieren om iets te doen

words 2021-03-16

words crossword puzzle
Across
  1. 3d
  2. lähedal
  3. kohustuslik
  4. karistus
  5. kihlatud
  6. eelis
  7. ülemkohus
  8. au
  9. suudlema
  10. hull
  11. idioom
  12. haarama
  13. hapnik
  14. tähistamine
Down
  1. uusarendusala
  2. memoriaal
  3. padi
  4. suhtlemisoskused
  5. kohtamine(musimusi kalli kalli)
  6. something
  7. turvalisus
  8. somebody
  9. nõrk
  10. katuseala
  11. kandik
  12. asundus

26 Clues: 3daupadinõrkhulleelisidioomkandikhapniklähedalhaaramaasunduskaristuskihlatudsomebodysuudlemamemoriaalsomethingülemkohuskatusealaturvalisuskohustusliktähistamineuusarendusalasuhtlemisoskusedkohtamine(musimusi kalli kalli)

Smart moves 2 kpl 17 2017-05-10

Smart moves 2 kpl 17 crossword puzzle
Across
  1. osoittaa
  2. luokkakaveri
  3. lentää
  4. tuskin
  5. saapua (jonnekin)
  6. (tässä:) toimia
  7. lentokenttä
  8. varusteet, tavarat
  9. poikki, ’rättiväsynyt’
  10. kiivetä
  11. maisemat
  12. kotikaupunki
Down
  1. näky, näkeminen
  2. nuorisohotelli
  3. silti, kuitenkin
  4. kolkko
  5. ylellisyys
  6. lopen uupunut
  7. läpi
  8. innostunut, jännittynyt
  9. matkustaa
  10. turvatarkastus
  11. mennä joltakin ohi
  12. laskeutua

24 Clues: läpikolkkolentäätuskinkiivetäosoittaamaisematmatkustaalaskeutuaylellisyyslentokenttäluokkakaverikotikaupunkilopen uupunutnuorisohotelliturvatarkastusnäky, näkeminen(tässä:) toimiasilti, kuitenkinsaapua (jonnekin)varusteet, tavaratmennä joltakin ohipoikki, ’rättiväsynyt’innostunut, jännittynyt

english-dutch 141 2018-07-26

english-dutch 141 crossword puzzle
Across
  1. job
  2. always
  3. soup
  4. about
  5. sick
  6. security guards
  7. theory
  8. dangerous
  9. trained
  10. sure
  11. work area
  12. to asks, questions
  13. saturday
  14. airport
Down
  1. infected
  2. not
  3. no
  4. succcess
  5. stricter
  6. government
  7. selection days
  8. those
  9. almost, rather well
  10. locations
  11. complete
  12. something

26 Clues: nojobnotsoupsicksureaboutthosealwaystheorytrainedairportinfectedsucccessstrictercompletesaturdaylocationsdangeroussomethingwork areagovernmentselection dayssecurity guardsto asks, questionsalmost, rather well

9/11 2024-09-11

9/11 crossword puzzle
Across
  1. Patriotisme
  2. Avion
  3. Peur
  4. Survivant
  5. Attaque
  6. Sécurité
  7. Mémorial
  8. Enquête
  9. Pompiers
  10. Terrorisme
Down
  1. Victimes
  2. Vol
  3. Tours Jumelles
  4. Surveillance
  5. épicentre(site de l'attentat)
  6. Centre du Commerce Mondial
  7. Traumatisme
  8. Héroïsme
  9. Évacuation
  10. Détournement
  11. Invasion
  12. Pentagone
  13. Effondrement
  14. Crash
  15. Choc
  16. Sauvetage

26 Clues: VolPeurChocAvionCrashAttaqueEnquêteVictimesHéroïsmeInvasionSécuritéMémorialPompiersPentagoneSurvivantSauvetageÉvacuationTerrorismePatriotismeTraumatismeSurveillanceDétournementEffondrementTours JumellesCentre du Commerce Mondialépicentre(site de l'attentat)

Alfa Company 1st 2025-10-28

Alfa Company 1st crossword puzzle
Across
  1. 5 1911
  2. STAR-SPANGLED
  3. EDWIN ALEXANDER
  4. SELFLESS
  5. CODE
  6. DEFINITION OF
  7. PHONETIC
  8. SIR
  9. SIR
  10. CLOSED
  11. GENERAL
  12. LET US TRY
Down
  1. E-1
  2. REPORTING
  3. OPEN
  4. SAFETY S2
  5. E-4
  6. OF ALLEGIENCE
  7. SNAP
  8. TO ENCOURAGE
  9. CODE
  10. UNITED STATES
  11. VALUES
  12. STAFF

24 Clues: E-1E-4SIRSIROPENCODESNAPCODESTAFF5 1911VALUESCLOSEDGENERALSELFLESSPHONETICREPORTINGSAFETY S2LET US TRYTO ENCOURAGESTAR-SPANGLEDOF ALLEGIENCEDEFINITION OFUNITED STATESEDWIN ALEXANDER

The UK - A divided country Level 2 2026-02-20

The UK - A divided country Level 2 crossword puzzle
Across
  1. Anstendig
  2. Å skille
  3. Being sceptic to the European Union
  4. Et skille/avstand
  5. Tidsepoke
  6. Forbli
  7. The UK leaving the European Union
  8. Minke/gå nedover
  9. Lønn
  10. Vesentlig
Down
  1. Forskning
  2. Utvide
  3. Befolkningssammensetning
  4. Misnøye
  5. Forsyning
  6. Sikkerhet
  7. Economic and political union
  8. Folkeavstemning
  9. Muligheter
  10. Tilstrekkelig

20 Clues: LønnUtvideForbliMisnøyeÅ skilleForskningAnstendigForsyningSikkerhetTidsepokeVesentligMuligheterTilstrekkeligFolkeavstemningMinke/gå nedoverEt skille/avstandBefolkningssammensetningEconomic and political unionThe UK leaving the European UnionBeing sceptic to the European Union

model UN 2024-05-20

model UN crossword puzzle
Across
  1. With what should an operative clause end? (punctuation)
  2. This committie of the UN has a variation of the greek parthanon on its flag
  3. The first UN peasekeeping mission was in responce to this nation's war for indipendence
  4. What does a preambulatory clause in a resolution state?
  5. As of 2005, this continent was 'host' to the majority of ongoing UN peacekeeping missions
  6. Nation in africa that was a member of the first security council
  7. after what war was the UN established
Down
  1. members of the secuirty counsil not including the 5 perminate members
  2. The UN consists of this many original principal organs which was established under the UN charter in 1945
  3. Last name of the president who ispired the creation of the UN
  4. Which institution carries out the day-to-day running of the UN?
  5. Number of perminate members of the security council
  6. Normally, the elected members of the Security Council serve two-year terms, this country is the exception to the rule
  7. Headquarters of the UN

14 Clues: Headquarters of the UNafter what war was the UN establishedNumber of perminate members of the security councilWith what should an operative clause end? (punctuation)What does a preambulatory clause in a resolution state?Last name of the president who ispired the creation of the UNWhich institution carries out the day-to-day running of the UN?...

Sampo 2024-10-16

Sampo crossword puzzle
Across
  1. Työtttömyys
  2. Epätasa-arvo
  3. sosiaaliturva
  4. köyhyys
  5. rikollisuus
  6. presidentti
Down
  1. Rasismi
  2. Demokratia
  3. Terveydenhoito
  4. koulutus
  5. hallitus
  6. koulutus
  7. poliitikkoja
  8. oikeukia

14 Clues: RasismiköyhyyskoulutushallituskoulutusoikeukiaDemokratiaTyötttömyysrikollisuuspresidenttiEpätasa-arvopoliitikkojasosiaaliturvaTerveydenhoito

The IPO Process 2022-01-25

The IPO Process crossword puzzle
Across
  1. Lists the number of shares of stock a company can sell
  2. Shares held by investors are called ________ shares
  3. Market in which a security is sold for the first time
  4. The type of corporations that tend to use private placement
  5. A document showing the legal and financial situation of a company to the public
  6. In a private ________, a company knows who exactly will buy its securities
  7. One of the things an investor must consider before investing in a company during an IPO
  8. Stocks that have previously been sold in the marketplace are called _________ shares
Down
  1. Offering of shares that occurs after the company's initial public offering
  2. Name for stock a company has bought back
  3. The issue price of a share during an IPO is known as the __________ price
  4. This type of investor may purchase a security from a company using private placement
  5. Where stock must be registered prior to being sold
  6. A red ______ is used to show financial information to the public while a security is awaiting SEC approval
  7. Shares of stock that a company can sell are called ________ shares

15 Clues: Name for stock a company has bought backWhere stock must be registered prior to being soldShares held by investors are called ________ sharesMarket in which a security is sold for the first timeLists the number of shares of stock a company can sellThe type of corporations that tend to use private placement...

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. und Junk E-Mail unerwünschte Werbemails
  2. versteckt in einem scheinbar nützlichen Programm
  3. Programme, die Tastatureingaben mitprotokollieren
  4. Mobbing mithilfe von elektronischen Medien
  5. Überbegriff für unerwünschte, schädliche Stoffe
Down
  1. Personen die illegalen Computersysteme eindringen und Sicherheitssysteme überwinden
  2. Betrugsmethode, bei der User auf gefälschte Webseiten umgeleitet wird
  3. Viren, die als Programm in ein Dokument eingebettet sind

8 Clues: und Junk E-Mail unerwünschte WerbemailsMobbing mithilfe von elektronischen MedienÜberbegriff für unerwünschte, schädliche Stoffeversteckt in einem scheinbar nützlichen ProgrammProgramme, die Tastatureingaben mitprotokollierenViren, die als Programm in ein Dokument eingebettet sindBetrugsmethode, bei der User auf gefälschte Webseiten umgeleitet wird...

Cyberbullying 2024-10-08

Cyberbullying crossword puzzle
Across
  1. Where does cyberbullying take place?
  2. Occurs when a cyberbully continues to bully.
  3. Someone that harms someone through a device.
Down
  1. An electronic device that people have at home.
  2. Something that can provided to a cyber victim.
  3. Cyberbullying is generally undertaken ______
  4. Who can be a cyberbully?
  5. What should you do if you see cyberbullying?

8 Clues: Who can be a cyberbully?Where does cyberbullying take place?Cyberbullying is generally undertaken ______Occurs when a cyberbully continues to bully.What should you do if you see cyberbullying?Someone that harms someone through a device.An electronic device that people have at home.Something that can provided to a cyber victim.

Qatar Cross Word 2021-11-24

Qatar Cross Word crossword puzzle
Across
  1. Thing that happened with Saudi Arabia
  2. Historic Visit To Break Blockade
  3. capital of independent Palestinian state
Down
  1. Slogan Raised In Qatar
  2. Thing related to Cyber bullying
  3. Full Form of QNA

6 Clues: Full Form of QNASlogan Raised In QatarThing related to Cyber bullyingHistoric Visit To Break BlockadeThing that happened with Saudi Arabiacapital of independent Palestinian state

Word formation 2024-02-24

Word formation crossword puzzle
Across
  1. used to eat
  2. with out this your phone wont open
  3. Our childhood incomplete with this
Down
  1. which is conducted in colleges
  2. used when you are laughing
  3. related to cyber attacks

6 Clues: used to eatrelated to cyber attacksused when you are laughingwhich is conducted in collegeswith out this your phone wont openOur childhood incomplete with this

BULLYINH 2023-09-22

BULLYINH crossword puzzle
Across
  1. : ----- BULLYING; online bullying
  2. : ------ BULLYING; bullying someone with words
  3. : -------- BULLYING; harming someone's body
Down
  1. : A online service to help with bullying
  2. : --------- BULLYING: controlling someone's use of money
  3. : someone who watches bullying happen

6 Clues: : ----- BULLYING; online bullying: someone who watches bullying happen: A online service to help with bullying: -------- BULLYING; harming someone's body: ------ BULLYING; bullying someone with words: --------- BULLYING: controlling someone's use of money

Solve Me M. 2023-08-11

Solve Me M. crossword puzzle
Across
  1. A's Easter Egg
  2. What did I put inside?
  3. What is missing from cyber?
Down
  1. What is the mistake in the treasure hunt?
  2. Colour of A's drink from clue 5?
  3. M's Easter Egg

6 Clues: A's Easter EggM's Easter EggWhat did I put inside?What is missing from cyber?Colour of A's drink from clue 5?What is the mistake in the treasure hunt?

IT Professions 2024-04-17

IT Professions crossword puzzle
Across
  1. Designs, develops, and maintains software applications or systems.
  2. Analyzes an organization's IT systems and processes to improve efficiency and functionality through technology solutions.
  3. Protects computer systems and networks from security breaches, investigates security incidents, and implements security measures to safeguard data.
  4. Analyzes and interprets complex data sets to extract insights and inform business decisions, using statistical analysis, machine learning, and data visualization techniques.
Down
  1. Designs and manages cloud computing infrastructure and solutions, including deployment, integration, and optimization of cloud services.
  2. Manages and maintains an organization's computer networks, including hardware, software, and security protocols.
  3. Administers, maintains, and secures databases, ensuring data integrity and accessibility.
  4. Oversees and manages IT projects from initiation to completion, ensuring they are delivered on time, within budget, and meet quality standards.
  5. Provides technical assistance, troubleshoots hardware and software issues, and assists users with IT-related problems.
  6. Designs, builds, and maintains websites and web applications using programming languages, frameworks, and technologies.

10 Clues: Designs, develops, and maintains software applications or systems.Administers, maintains, and secures databases, ensuring data integrity and accessibility.Manages and maintains an organization's computer networks, including hardware, software, and security protocols....

Spanish 2022-11-29

Spanish crossword puzzle
Across
  1. departure
  2. luggage
  3. to go on vacation
  4. to get in line
  5. arrival
  6. bathing suit
  7. to go through security
  8. airport
  9. suitcase
  10. travel
Down
  1. itinerary
  2. travel agency
  3. plane
  4. flight
  5. to take a taxi
  6. identification
  7. boarding pass
  8. board
  9. gate

19 Clues: gateplaneboardflighttravelluggagearrivalairportsuitcaseitinerarydeparturebathing suittravel agencyboarding passto take a taxiidentificationto get in lineto go on vacationto go through security

Social Media 2021-01-11

Social Media crossword puzzle
Across
  1. Social media can give you a negative __________
  2. Things that are shared on youtube and tiktok
  3. You can use social media on your _____
  4. Social media can be bad for your _____ health
  5. A social media platform where you share videos and dances
  6. A social media platform where you share photos
Down
  1. Social media platform, owned by Mark Zuckerberg
  2. Stories that are not true
  3. Online harassment is another word for cyber-______
  4. You can do this with friends on social media
  5. Social media can make you _____

11 Clues: Stories that are not trueSocial media can make you _____You can use social media on your _____Things that are shared on youtube and tiktokYou can do this with friends on social mediaSocial media can be bad for your _____ healthA social media platform where you share photosSocial media platform, owned by Mark Zuckerberg...

Skibinska 3a 2023-03-22

Skibinska 3a crossword puzzle
Across
  1. zbiór zasad dotyczących dobrego i bezpiecznego zachowania w internecie
  2. zamieszczanie kontrowersyjnych, napastliwych treści w celu zwrócenia na siebie uwagi
  3. lęk przed wypadnięciem z obiegu
  4. technika obróbki obrazu polegająca na łączeniu ludzkich twarzy
  5. mylne informacje rozpowszechniane bez złej intencji
  6. wysyłanie wielu niechcianych wiadomości do dużej ilości osób w celu reklamy
  7. forma komunikacji elektronicznej w której przekazem jest seksualnie sugestywny obraz
  8. dynamiczne regularnie aktualizowanie strony internetowe na dany temat
Down
  1. nieprawdziwa informacja, fake news
  2. zabezpieczenie programu
  3. przemoc z użyciem urządzeń elektronicznych
  4. rodzaj cyber ataku
  5. rodzaj rozmowy między dwoma lub wieloma użytkowników za pośrednictwem internetu

13 Clues: rodzaj cyber atakuzabezpieczenie programulęk przed wypadnięciem z obiegunieprawdziwa informacja, fake newsprzemoc z użyciem urządzeń elektronicznychmylne informacje rozpowszechniane bez złej intencjitechnika obróbki obrazu polegająca na łączeniu ludzkich twarzydynamiczne regularnie aktualizowanie strony internetowe na dany temat...

June Crossword: How to Secure the Manufacturing Edge 2025-05-27

June Crossword: How to Secure the Manufacturing Edge crossword puzzle
Across
  1. Feature of edge solutions that helps in maintaining data privacy
  2. Method to protect data both in transit and at rest
  3. Company providing edge computing solutions for manufacturing cybersecurity
  4. Type of computing that processes data locally to reduce network transmission
Down
  1. Advanced capability to identify and respond to security incidents
  2. Critical aspect of manufacturing cybersecurity involving GDPR and ISO standards
  3. Process to ensure the integrity of the system and prevent unauthorized access
  4. Unified security practices help in minimizing this
  5. Frequent actions to patch vulnerabilities and protect against new threats
  6. Regular checks to identify and address security vulnerabilities

10 Clues: Unified security practices help in minimizing thisMethod to protect data both in transit and at restRegular checks to identify and address security vulnerabilitiesFeature of edge solutions that helps in maintaining data privacyFrequent actions to patch vulnerabilities and protect against new threats...

Social Media 2014-05-12

Social Media crossword puzzle
Across
  1. search engine
  2. an application
  3. a type of bird vocalization
  4. A type of bullying that is a risk of social networking
  5. Social media requires the use of
  6. old fashioned newsfeed
  7. Famous Social Community Site
  8. site that allows you to share your story
  9. #
  10. if a business is going to use social media they should implement a ------
  11. A benefit of social networking is being able to _ _ _ _ _ things with your friends and family
  12. free video and instant messaging site
Down
  1. a diary like post
  2. an online photo-sharing, video-sharing and social networking service
  3. negative feedback
  4. Famous social content site for videos
  5. a microblogging platform and social networking website owned by Yahoo!
  6. most popular online social networking service
  7. pictures & ideas pin board
  8. self-portrait photograph
  9. an act of online robbery
  10. social media can help increase a businesses -----

22 Clues: #search enginean applicationa diary like postnegative feedbackold fashioned newsfeedself-portrait photographan act of online robberypictures & ideas pin boarda type of bird vocalizationFamous Social Community SiteSocial media requires the use ofFamous social content site for videosfree video and instant messaging site...

ffff 2024-01-05

ffff crossword puzzle
Across
  1. extortionist - electronically extorts u
  2. - a small text file
  3. Strategist - person hwo intergrates mobile stuff
  4. Device Convergence - technologies that overlap
  5. - a series of statements
  6. Line - an always on physcial connection
  7. Device- ardware component that allows you to enter data
  8. - comparing stuff to create criteria
  9. - A MORE EXPENSIVE DVD
  10. deleivers requested webpages Online
  11. - a compromised computer
  12. memory - can be erashed faster
Down
  1. sandwiches a liquid compund
  2. - measure of suitability
  3. - apples operationg system
  4. Device - hardware component that conveys information
  5. - saves data
  6. Network - to share their interests, ideas, stories, photos, music, and videos with other registered users.
  7. - an flying electronic
  8. - time to travel from one place to another
  9. - a sound
  10. - a small program
  11. - wirelless comunications
  12. - application of human intelligence to computers
  13. - makes inernet faster
  14. System - 1s and 0s

26 Clues: - a sound- saves data- a small programSystem - 1s and 0s- a small text file- an flying electronic- A MORE EXPENSIVE DVD- makes inernet faster- measure of suitability- a series of statements- a compromised computer- wirelless comunications- apples operationg systemsandwiches a liquid compundmemory - can be erashed faster...

Zach's Movie Madness 2023-02-10

Zach's Movie Madness crossword puzzle
Across
  1. Extremely rare mineral
  2. "That's some ___!"
  3. You have heard of him
  4. Cyber-savior
  5. Bat country
  6. Christmas classic, to some
  7. No Merlot!
  8. Airplane terrorists
  9. Sensei of Bruce Lee
  10. Island companion
  11. It's a mad, mad, mad, mad movie
  12. Poetic applause, or mass murder
  13. Wordle, sort of
  14. FBI Student
  15. Test for space cadets
  16. Rodney's house
  17. Art medium
  18. Montana's export
  19. Cool eating competition food
Down
  1. Goblin king
  2. "The hills are alive"
  3. Navy bird
  4. Elegant weapon
  5. High school football team
  6. Scorsese, Coppola, Lucas, etc.
  7. French Flag
  8. Hairy detective
  9. Bellagio, Mirage, MGM Grand enemies
  10. Nostromo Crewmember
  11. Dirty cop
  12. Adventurer, or cheap
  13. Student, conqueror
  14. Aquatic adventurer
  15. The old new evolution of film
  16. Spooky FBI Agent
  17. Tricksy
  18. Officer stabbed by Santa

37 Clues: TricksyNavy birdDirty copNo Merlot!Art mediumGoblin kingFrench FlagBat countryFBI StudentCyber-saviorElegant weaponRodney's houseHairy detectiveWordle, sort ofIsland companionSpooky FBI AgentMontana's export"That's some ___!"Student, conquerorAquatic adventurerNostromo CrewmemberAirplane terroristsSensei of Bruce LeeAdventurer, or cheap...

Teacher Appreciation Week Crossword Puzzle 2023-04-20

Teacher Appreciation Week Crossword Puzzle crossword puzzle
Across
  1. helped plan the D.C trip
  2. advisor of ASB
  3. teaches 8th grade Pre-Ap science
  4. teaches special education in E-22
  5. teaches 7A and AVID
  6. 7th grade P.E teacher
  7. special education teacher in room 12
  8. teaches band and orchestra
  9. newest math teacher
  10. They usually say "Have a day
  11. teaches young living
Down
  1. favorite book is the outsiders
  2. has a beard, loves art
  3. loves surfing and is radical
  4. teaches 7th grade Pre-AP and 8th grade science
  5. teaches cyber patriot
  6. teaches geometry
  7. room is next to the former boy's restroom
  8. room l-46 brown hair
  9. teaches three different english classes
  10. loves singing, plays piano
  11. speaks and teaches Vietnamese
  12. room is behind Mrs. C Nguyen's room.
  13. plays League of Legends
  14. dyed her hair black
  15. journalism teacher

26 Clues: advisor of ASBteaches geometryjournalism teacherteaches 7A and AVIDnewest math teacherdyed her hair blackroom l-46 brown hairteaches young livingteaches cyber patriot7th grade P.E teacherhas a beard, loves artplays League of Legendshelped plan the D.C triploves singing, plays pianoteaches band and orchestraloves surfing and is radical...

Teacher Appreciation Crossword Answers 2023-05-01

Teacher Appreciation Crossword Answers crossword puzzle
Across
  1. helped plan the D.C trip
  2. advisor of ASB
  3. teaches 8th grade Pre-Ap science
  4. teaches special education in E-22
  5. teaches 7A and AVID
  6. 7th grade P.E teacher
  7. special education teacher in room 12
  8. teaches band and orchestra
  9. newest math teacher
  10. They usually say "Have a day
  11. teaches young living
Down
  1. favorite book is the outsiders
  2. has a beard, loves art
  3. loves surfing and is radical
  4. teaches 7th grade Pre-AP and 8th grade science
  5. teaches cyber patriot
  6. teaches geometry
  7. room is next to the former boy's restroom
  8. room l-46 brown hair
  9. teaches three different english classes
  10. loves singing, plays piano
  11. speaks and teaches Vietnamese
  12. room is behind Mrs. C Nguyen's room.
  13. plays League of Legends
  14. dyed her hair black
  15. journalism teacher

26 Clues: advisor of ASBteaches geometryjournalism teacherteaches 7A and AVIDnewest math teacherdyed her hair blackroom l-46 brown hairteaches young livingteaches cyber patriot7th grade P.E teacherhas a beard, loves artplays League of Legendshelped plan the D.C triploves singing, plays pianoteaches band and orchestraloves surfing and is radical...

Crossword Puzzle 2022-12-04

Crossword Puzzle crossword puzzle
Across
  1. An adorable name for Hershey Bars
  2. Metal Gear character who likes to wrestle senators
  3. A holiday treat
  4. Family known for their Vacations
  5. An 80s “Vice”
  6. “I see you enjoy Super Mario…”
  7. Fails QTE
  8. Subject of your greatest cyber crime
  9. Connor’s mission in Detroit Become Human
  10. 1988’s olympic winter
  11. Early 90s Kindergarten teacher
  12. The edgier Battle Star
Down
  1. Lost with Bentsen in ’88
  2. a renowned piece of art
  3. A double entendre TV show
  4. Dating sim meets supernatural teen adventure
  5. A wholesome healthy breakfast
  6. “Resident” Albert
  7. Not the coffee shop
  8. 1,000 watts aren’t enough
  9. No___ GTA RP
  10. Themed Oreos are highly…
  11. A rare candy bar
  12. Your on a first name basis with this Galactica Admiral
  13. MultiVersus competitor and semi-retired Fortnite pro

25 Clues: Fails QTENo___ GTA RPAn 80s “Vice”A holiday treatA rare candy bar“Resident” AlbertNot the coffee shop1988’s olympic winterThe edgier Battle Stara renowned piece of artLost with Bentsen in ’88Themed Oreos are highly…A double entendre TV show1,000 watts aren’t enoughA wholesome healthy breakfast“I see you enjoy Super Mario…”...

Eagle 101 topics 2025-10-06

Eagle 101 topics crossword puzzle
Across
  1. the happiness chemical
  2. a strong feeling of annoyance and hostile behavior
  3. the act of working together for a common purpose to achieve something
  4. she was the vaping lessons speaker
  5. achieve something successfully
  6. Friday videos
  7. being nice and considerate to someone
  8. the feeling that something good can and will happen
  9. an intense and irrational fear of something
  10. a natural response to fear or stress
  11. an unstoppable habit
Down
  1. the action of organizing something
  2. The ability to share feelings of another
  3. Online bullying
  4. believing in your self
  5. Standing up aginst behaviors that are mean and harmful happening over and over agin
  6. looking at someone while their talking
  7. a response to lifes pressures
  8. able to be rellied on as honest and truthful
  9. Drug Abuse resistance education

20 Clues: Friday videosOnline bullyingan unstoppable habitthe happiness chemicalbelieving in your selfa response to lifes pressuresachieve something successfullyDrug Abuse resistance educationthe action of organizing somethingshe was the vaping lessons speakera natural response to fear or stressbeing nice and considerate to someone...

Cyber Security 2024-10-21

Cyber Security crossword puzzle
Across
  1. the identity of a user attempting to access a system Authnetication
Down
  1. process of converting plain text or data into ciphertext using cryptographic Encryption algorithms

2 Clues: the identity of a user attempting to access a system Authneticationprocess of converting plain text or data into ciphertext using cryptographic Encryption algorithms

CYBER SECURITY 2022-10-21

CYBER SECURITY crossword puzzle
Across
  1. PROTECT UR COMPUTER
Down
  1. slimy chewy creatures

2 Clues: PROTECT UR COMPUTERslimy chewy creatures

En el aeropuerto 2022-05-24

En el aeropuerto crossword puzzle
Across
  1. baggage claim
  2. flight
  3. departure
  4. to board
  5. to exchange currency
  6. waiting room
  7. boarding pass
  8. to check luggage
  9. arrival
Down
  1. plane ticket
  2. security check
  3. public bathrooms
  4. passenger
  5. passport
  6. airplane
  7. airport
  8. to pack a suitcase
  9. customs
  10. gate

19 Clues: gateflightairportcustomsarrivalto boardpassportairplanepassengerdepartureplane ticketwaiting roombaggage claimboarding passsecurity checkpublic bathroomsto check luggageto pack a suitcaseto exchange currency

Information Misuse 2024-03-18

Information Misuse crossword puzzle
Across
  1. get low self-esteem from this
  2. Service Attacks
Down
  1. cyber attack
  2. works without permission
  3. No Swiping

5 Clues: No Swipingcyber attackService Attacksworks without permissionget low self-esteem from this

Digital media literacy 2023-09-14

Digital media literacy crossword puzzle
Across
  1. something unwed to accept cokies to use
  2. a app based on a red and white logo that’s starts with a p
  3. a social media app based on a blue logo
  4. a practical subject in our school
  5. bullying a type of bullying in line
  6. something u can take pictures on
  7. a social media app known for its dances
Down
  1. a social media app that you post on
  2. an app that goes tweet tweet
  3. you can listen to music from
  4. games that. U play on ur phone
  5. something that we use daily

12 Clues: something that we use dailyan app that goes tweet tweetyou can listen to music fromgames that. U play on ur phonesomething u can take pictures ona practical subject in our schoola social media app that you post onbullying a type of bullying in linesomething unwed to accept cokies to usea social media app based on a blue logo...

Bullying 2024-05-08

Bullying crossword puzzle
Across
  1. someone who uses strength, power or words to harm or intimidate others
  2. a preconceived opinion or feeling
  3. someone what to do if somebody is bullying you
  4. an organized group of criminal activity
  5. a popular belief about specific types of individuals
  6. a reason somebody would bully
Down
  1. type of bullying where you call somebody names
  2. type of bullying where you hit somebody
  3. up what to do if you are a bystander
  4. bullying over the internet
  5. someone who is present at an event
  6. to put up with something or somebody unpleasant

12 Clues: bullying over the interneta reason somebody would bullya preconceived opinion or feelingsomeone who is present at an eventup what to do if you are a bystandertype of bullying where you hit somebodyan organized group of criminal activitytype of bullying where you call somebody namessomeone what to do if somebody is bullying you...

cyber security 2017-06-30

cyber security crossword puzzle
Across
  1. designed to disrupt
Down
  1. a software that can damage your system

2 Clues: designed to disrupta software that can damage your system

Cyber Security 2022-06-15

Cyber Security crossword puzzle
Across
  1. USED IN THE NAVY TO TRANSMIT CODES
Down
  1. WRITE OR SOLVE CODES

2 Clues: WRITE OR SOLVE CODESUSED IN THE NAVY TO TRANSMIT CODES

CYBER SECURITY 2023-09-01

CYBER SECURITY crossword puzzle
Across
  1. Attack
Down
  1. Your Own Device)

2 Clues: AttackYour Own Device)

CYBER SECURITY 2023-09-01

CYBER SECURITY crossword puzzle
Across
  1. Attack
Down
  1. Your Own Device)

2 Clues: AttackYour Own Device)

Daily Crossword 2023-05-12

Daily Crossword crossword puzzle
Across
  1. Type of software program or code designed to harm, exploit, or damage computer systems, networks, or devices. It can be spread through various means, such as email attachments, malicious websites, infected software downloads, or even through physical devices such as USB drives. Can cause a range of problems, including data loss, system crashes, identity theft, and financial loss.
  2. A secret code or phrase that is used to gain access to a computer system, network, website, or other digital resource. Are typically created by users and are kept confidential to prevent unauthorized access to their accounts or data. Should consist of a combination of letters, numbers, and special characters, and to be sufficiently complex and unique in order make it difficult for others to guess or crack. It's important to do so and to change them regularly to help protect against security threats, such as hacking and identity theft.
  3. Type of online scam in which attackers use fraudulent emails, websites, or other forms of electronic communication to trick individuals into providing sensitive information, such as passwords, credit card numbers, or social security numbers. Will appear to come from a legitimate source, such as a bank or online service provider, and will request that the recipient click on a link or provide personal information.
  4. Refers to wireless internet access that is provided in public places such as cafes, airports, libraries, hotels, and other locations. Are typically free or provided for a fee, and allow users to connect to the internet wirelessly using their mobile devices or laptops. While it can be convenient and accessible, it also carries some security risks, as it is often unsecured and open to anyone within range. This can make it easy for hackers and cybercriminals to intercept and access data transmitted over the network, such as login credentials, credit card numbers, or personal information.
  5. Type of cyber attack in which an attacker impersonates a legitimate entity or source, such as a website, email address, or IP address, to deceive users and gain access to sensitive information or systems.
Down
  1. A security system that is designed to monitor and control incoming and outgoing network traffic between a computer or network and the internet. Are used to prevent unauthorized access to a network or device by blocking potentially malicious traffic, such as viruses, malware, and hackers. Works by examining packets of data as they move through the network and enforcing a set of rules or policies that determine which packets are allowed to pass through and which are blocked.
  2. Type of program designed to detect, prevent, and remove malicious software from computer systems and networks. The software works by scanning files and programs for known patterns of malicious code, and then either quarantining or removing any identified threats.
  3. Technology that creates a secure, encrypted connection between two devices or networks over the internet. Your device connects to a server run by the provider, which then forwards your internet traffic to the destination website or service. The encryption provided helps protect your online privacy and security by preventing unauthorized access to your data and hiding your IP address.

8 Clues: Type of cyber attack in which an attacker impersonates a legitimate entity or source, such as a website, email address, or IP address, to deceive users and gain access to sensitive information or systems....

Navy Federal 2024-02-26

Navy Federal crossword puzzle
Across
  1. Used to quickly identify and respond to suspicious transactions
  2. System that assigns risk levels to transactions and customers based on various factors
  3. Understanding normal customer behavior in order to distinguish from fraudulent activity and common customer pattern
  4. Practice ______ to ensure legal adherence and best practices for security
  5. Used to track location of transactions and flag unusual/unexpected location changes
  6. An extra layer of security used alongside credentials
  7. Performed to identify vulnerabilities in bank's systems and processes
  8. Making sure data and transaction from customer are kept secure and encrypted from unauthorized access
  9. Machine learning models that can help identify patterns and anomalies indicative of fraudulent activity.
Down
  1. Steps to take in the event of a security incident
  2. This collective approach can help in early detection and prevention.
  3. Informing customers of ways to recognize phishing and other fraudulent activity
  4. Needs to stay updated in order to stay ahead of evolving fraud tactics
  5. Training bank staff to recognize and report potential fraudulent activity
  6. Update and review to incorporate latest technologies and best practices

15 Clues: Steps to take in the event of a security incidentAn extra layer of security used alongside credentialsUsed to quickly identify and respond to suspicious transactionsThis collective approach can help in early detection and prevention.Performed to identify vulnerabilities in bank's systems and processes...

Types of Markets 2022-01-25

Types of Markets crossword puzzle
Across
  1. ____ exchanges are markets that do not have a location.
  2. Within bond markets in the US, bonds have a ___ value of $1000.
  3. Corporations issue debt securities to be traded within ____ markets.
  4. Future markets help protect against ___ of uncertain markets.
  5. Raising capital within public and private markets is a goal within the ___ market.
  6. A security is sold in a ___ market when it is first issued.
  7. ___ markets have the ability to purchase, sell, and deliver products at a rapid rate.
  8. Who must register bonds within the bond market?
  9. The purpose of trading within security markets is to buy orders at a ____ price.
Down
  1. Primary and secondary ___ are sold in a primary market.
  2. The most populated exchange in the U.S who owns trading rights with listed companies is known as the ____
  3. Zero-coupon bonds do not earn ____ within the bond market.
  4. ___ exchanges are formal secondary markets where sellers auction off orders and sell them at a high price.
  5. The ___(issuing stocks for the first time) typically occurs in a primary market.
  6. In a secondary market shares of stock are ___ to the public

15 Clues: Who must register bonds within the bond market?____ exchanges are markets that do not have a location.Primary and secondary ___ are sold in a primary market.Zero-coupon bonds do not earn ____ within the bond market.A security is sold in a ___ market when it is first issued.Future markets help protect against ___ of uncertain markets....

codi bullying crossword 2023-03-21

codi bullying crossword crossword puzzle
Across
  1. bullying getting physically picked on everyday
  2. bullying some teases you verbally everyday
  3. someone who stands around and watches someone getting bullied
  4. a sore from being punched or kicked
Down
  1. someone teases you and picks on you everyday
  2. a type of physical bullying
  3. a type of psychological bullying
  4. bullying getting picked on online everyday

8 Clues: a type of physical bullyinga type of psychological bullyinga sore from being punched or kickedbullying some teases you verbally everydaybullying getting picked on online everydaysomeone teases you and picks on you everydaybullying getting physically picked on everydaysomeone who stands around and watches someone getting bullied

Kianasearch 6-18-24 2024-06-18

Kianasearch 6-18-24 crossword puzzle
Across
  1. the name of the Crystal that powers lightsabers
  2. my profile name on my peacock account
  3. the best way to cook an egg
  4. my underdog team for the euros
Down
  1. the type of attack on Ascension
  2. NYC borough where the UGA photographer is moving to
  3. “can somebody match my”
  4. the best person on Love Island Season 11

8 Clues: “can somebody match my”the best way to cook an eggmy underdog team for the eurosthe type of attack on Ascensionmy profile name on my peacock accountthe best person on Love Island Season 11the name of the Crystal that powers lightsabersNYC borough where the UGA photographer is moving to

Vocab Crossword 2022-05-04

Vocab Crossword crossword puzzle
Across
  1. Airline
  2. section
  3. delay
  4. Guard
  5. to take off
  6. row
  7. to land
  8. to cancel
  9. to board
Down
  1. counter
  2. security area
  3. cargo
  4. to weigh
  5. procedure
  6. seat

15 Clues: rowseatdelaycargoGuardcounterAirlinesectionto landto weighto boardprocedureto cancelto take offsecurity area

Unit 8 2024-05-08

Unit 8 crossword puzzle
Across
  1. Banks
  2. Japanese attack
  3. Youngest govenor
  4. Major crop
  5. Rural
  6. Transport
  7. Airplane
Down
  1. exports
  2. increase demand
  3. Social Security
  4. Civilian
  5. Agricultural
  6. Georgia representative
  7. Programs
  8. Insect

15 Clues: BanksRuralInsectexportsCivilianProgramsAirplaneTransportMajor cropAgriculturalincrease demandSocial SecurityJapanese attackYoungest govenorGeorgia representative

Unit 8 2024-05-08

Unit 8 crossword puzzle
Across
  1. Banks
  2. Japanese attack
  3. Youngest govenor
  4. Major crop
  5. Rural
  6. Transport
  7. Airplane
Down
  1. exports
  2. increase demand
  3. Social Security
  4. Civilian
  5. Agricultural
  6. Georgia representative
  7. Programs
  8. Insect

15 Clues: BanksRuralInsectexportsCivilianProgramsAirplaneTransportMajor cropAgriculturalincrease demandSocial SecurityJapanese attackYoungest govenorGeorgia representative

Farm To Table Session 1 2022-03-10

Farm To Table Session 1 crossword puzzle
Across
  1. A pigment in leaves which traps sunlight.
  2. The process in which a shoot grows out of a seed.
  3. Food security is the state of having __________ access to sufficient quantity of affordable, nutritious food.
  4. Process in which plants make glucose and oxygen.
Down
  1. The compound in which energy is stored in plants.
  2. The change in __________ can cause disruptions to food supply change.
  3. In order to ensure food security, Singapore has plans to grow _________.
  4. Leaves trap _______ energy during photosynthesis.
  5. Global food systems may be ________ and this causes challenges to food security.
  6. We need to __________ food import sources to reduce reliance on one single source.

10 Clues: A pigment in leaves which traps sunlight.Process in which plants make glucose and oxygen.The compound in which energy is stored in plants.Leaves trap _______ energy during photosynthesis.The process in which a shoot grows out of a seed.The change in __________ can cause disruptions to food supply change....

Teacher Appreciation Week Crossword Puzzle 2023-04-25

Teacher Appreciation Week Crossword Puzzle crossword puzzle
Across
  1. helped plan the D.C trip
  2. advisor of ASB
  3. teaches 8th grade Pre-Ap science
  4. teaches special education in E-22
  5. teaches 7A and AVID
  6. 7th grade P.E teacher
  7. special education teacher in room 12
  8. teaches band and orchestra
  9. newest math teacher
  10. They usually say "Have a day
  11. teaches young living
Down
  1. favorite book is the outsiders
  2. has a beard, loves art
  3. loves surfing and is radical
  4. teaches 7th grade Pre-AP and 8th grade science
  5. teaches cyber patriot
  6. teaches geometry
  7. room is next to the former boy's restroom
  8. room l-46 brown hair
  9. teaches three different english classes
  10. loves singing, plays piano
  11. speaks and teaches Vietnamese
  12. room is behind Mrs. C Nguyen's room.
  13. plays League of Legends
  14. dyed her hair black
  15. journalism teacher

26 Clues: advisor of ASBteaches geometryjournalism teacherteaches 7A and AVIDnewest math teacherdyed her hair blackroom l-46 brown hairteaches young livingteaches cyber patriot7th grade P.E teacherhas a beard, loves artplays League of Legendshelped plan the D.C triploves singing, plays pianoteaches band and orchestraloves surfing and is radical...

Teacher Appreciation Crossword 2023-04-28

Teacher Appreciation  Crossword crossword puzzle
Across
  1. helped plan the D.C trip
  2. advisor of ASB
  3. teaches 8th grade Pre-Ap science
  4. teaches special education in E-22
  5. teaches 7A and AVID
  6. 7th grade P.E teacher
  7. special education teacher in room 12
  8. teaches band and orchestra
  9. newest math teacher
  10. They usually say "Have a day
  11. teaches young living
Down
  1. favorite book is the outsiders
  2. has a beard, loves art
  3. loves surfing and is radical
  4. teaches 7th grade Pre-AP and 8th grade science
  5. teaches cyber patriot
  6. teaches geometry
  7. room is next to the former boy's restroom
  8. room l-46 brown hair
  9. teaches three different english classes
  10. loves singing, plays piano
  11. speaks and teaches Vietnamese
  12. room is behind Mrs. C Nguyen's room.
  13. plays League of Legends
  14. dyed her hair black
  15. journalism teacher

26 Clues: advisor of ASBteaches geometryjournalism teacherteaches 7A and AVIDnewest math teacherdyed her hair blackroom l-46 brown hairteaches young livingteaches cyber patriot7th grade P.E teacherhas a beard, loves artplays League of Legendshelped plan the D.C triploves singing, plays pianoteaches band and orchestraloves surfing and is radical...

Technology Words 2024-10-09

Technology Words crossword puzzle
Across
  1. Computer Camera
  2. Used to type
  3. You call people on it
  4. Set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
  5. Communicate with others vocally
  6. Coded software
  7. Analyze and solve problems
  8. Prevents viruses
  9. Provides entertainment
  10. Something that you can transfer digital info to
  11. Stores information
  12. Another word for apps
Down
  1. Gain unauthorized access
  2. Random Access Memory
  3. Decode a code
  4. Also an animal
  5. Requires a router
  6. Protects from cyber attacks
  7. The use of computer technology
  8. Remote connection
  9. Communication technology tool
  10. Central Processing Unit
  11. Look through the web
  12. Creates apps/websites
  13. Find locations
  14. Amount of data your internet connection can handle
  15. Accessed from a browser
  16. Protects your computer from virus
  17. Convert data into a code
  18. Social feed

30 Clues: Social feedUsed to typeDecode a codeAlso an animalCoded softwareFind locationsComputer CameraPrevents virusesRequires a routerRemote connectionStores informationRandom Access MemoryLook through the webYou call people on itCreates apps/websitesAnother word for appsProvides entertainmentCentral Processing UnitAccessed from a browser...

Review Weeks 1-6 2022-12-06

Review Weeks 1-6 crossword puzzle
Across
  1. a big meal, often eaten during holidays
  2. (adj) when you don't sleep enough, feeling
  3. this Monday people buy on online
  4. name of San Diego baseball team
  5. this Tuesday people give back
  6. Teacher Neil's home state
  7. US __ their first two World Cup Games
  8. It was Hispanic ___ Month 09/15-10/15
  9. the early bid catches this
  10. another word for ancestors
Down
  1. 11/3 was Nat'l ___ Day
  2. the host of the World Cup this year
  3. to show off artwork or verb to show
  4. Bob Marley is the king of this music
  5. Jet __ when you travel between time zones
  6. Similar to Homemaker
  7. 10/17 was Nat'l ___ Day
  8. Isla means this in English
  9. Online you can many "___ and deals"
  10. Japanese word for big water wave
  11. heavy rain, idiom, "___ and dogs"

21 Clues: Similar to Homemaker11/3 was Nat'l ___ Day10/17 was Nat'l ___ DayTeacher Neil's home stateIsla means this in Englishthe early bid catches thisanother word for ancestorsthis Tuesday people give backname of San Diego baseball teamthis Monday people buy on onlineJapanese word for big water waveheavy rain, idiom, "___ and dogs"...

Puzzle Thingy 2021-01-12

Puzzle Thingy crossword puzzle
Across
  1. Reserve System a group consisted of 12 independent regional banks that could lend to other banks in times of need
  2. income tax pay as you earn system
  3. Taxes tax on the estate or total property of person who has died
  4. Money increase money supply will lower interest rates thus encouraging investment spending
  5. Spending Social security, medicare, medicaid, government must pay the amount required
  6. policy the use of government spending and revenue collection to influence the economy.
  7. national health insurance program in the United States, begun in 1966 under the Social Security Administration
  8. Policy Drops GDP and used to drop demand
  9. taxes out of work still collecting money to live off of, have to be looking for a new job
  10. tax tax on money or property that one living person gives to another
Down
  1. Policy used to expand the economy, initiate growth, and increase output
  2. taxes General revenue tax on the sale or manufacture of a good
  3. income Person’s gross income-including salaries, and wages
  4. taxes a tax that charges a higher rate for people who earn a higher income
  5. GDP
  6. Policy Actions the Federal Reserve takes to influence inflation
  7. Year October 1st to September 30th
  8. security tax used to fund old age, survivors, and disability insurance
  9. budget written document estimating the federal government’s spending in the coming year
  10. Money reduce the money supply will increase interest rates and cause spending to
  11. taxes imported goods brought into the country

21 Clues: GDPincome tax pay as you earn systemYear October 1st to September 30thPolicy Drops GDP and used to drop demandtaxes imported goods brought into the countryincome Person’s gross income-including salaries, and wagestaxes General revenue tax on the sale or manufacture of a goodPolicy Actions the Federal Reserve takes to influence inflation...

CYBERCRIME 2021-07-11

CYBERCRIME crossword puzzle
Across
  1. A politically- or ideologically-motivated cyber attack or hack.
  2. A way to access electonic system by bypassing some or all security mechanisms.
  3. A satellite navigation system that indentifies the precise lovation of the transmitting device.
  4. The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
  5. Malicious software, such as a virus or worm, that attacks a target computer.
  6. The overaching program that runs all the functions on a computer or other electronic device.
  7. A company that offers access the internet.
  8. A camera connectee to computer l, generally used to then stream videos to the internet.
  9. Resource to be accessed, often expressed as a time period.
  10. Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
  11. The process ofnusing a
  12. Determining the identity or location of an attacker or an attacker's intermediary.
  13. The interdependent network of information technology, infrastructures that includes internet.
  14. Hardware or software designed to prevent unathorized users from accessing a computer system.
  15. A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
  16. A network point that acts an entrance to another network
  17. A unique internet identifier registered
  18. An online journal.
  19. A program used to access the internet.
  20. Assurance that remains private and no one sees it except for those expected to see it.
  21. A program that masks something harmful, such as a worm or virus, that it carries into a device.
Down
  1. Attempting to mimic an official email from a trusted organization to lire individuals.
  2. Refer to someone who gains access to a system, software, or hardware without permission.
  3. A log that chronicles any changes made to a document, presentation, software applications, etc.
  4. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
  5. Are a botnet of comprised hosts, controlled by a single intentity.
  6. A unique internet identifier registered to an entity.
  7. An information packet sent from website to a web browser that records a user's activity on the website.
  8. algorithm against data to produce a numeric value that is representative that data.
  9. Stands for "Wireless Fidelity".
  10. A software robot that performs automated tasks.
  11. The act of one individual harrasing or intimidating another individual via the interner.
  12. Unsolicited advertising or other information sent out via email or other messaging service.
  13. A massed data that is used to describe large amounts of other internet data.
  14. A grou of computers that is linked to share data and othe information.
  15. A website that finds information across the Internet based on a set of search criteria.
  16. an entity.
  17. A network security measure in which information is encoded or scrambled prior to transmission.
  18. Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
  19. The changes in data caused by an intruder or investigator accessing files and running applications or process.
  20. Aim to overwhelm the resources of a targeted system to crash that system.

41 Clues: an entity.An online journal.The process ofnusing aStands for "Wireless Fidelity".A program used to access the internet.A unique internet identifier registeredA company that offers access the internet.A software robot that performs automated tasks.A unique internet identifier registered to an entity....

CYBERCRIME 2021-07-11

CYBERCRIME crossword puzzle
Across
  1. The interdependent network of information technology, infrastructures that includes internet.
  2. A grou of computers that is linked to share data and othe information.
  3. A log that chronicles any changes made to a document, presentation, software applications, etc.
  4. A program that masks something harmful, such as a worm or virus, that it carries into a device.
  5. The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
  6. The act of one individual harrasing or intimidating another individual via the interner.
  7. Resource to be accessed, often expressed as a time period.
  8. Refer to someone who gains access to a system, software, or hardware without permission.
  9. A company that offers access the internet.
  10. A network point that acts an entrance to another network
  11. A website that finds information across the Internet based on a set of search criteria.
  12. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
  13. A massed data that is used to describe large amounts of other internet data.
  14. Stands for "Wireless Fidelity".
  15. Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
  16. An online journal.
  17. Aim to overwhelm the resources of a targeted system to crash that system.
  18. The overaching program that runs all the functions on a computer or other electronic device.
  19. The changes in data caused by an intruder or investigator accessing files and running applications or process.
  20. An information packet sent from website to a web browser that records a user's activity on the website.
Down
  1. Assurance that remains private and no one sees it except for those expected to see it.
  2. algorithm against data to produce a numeric value that is representative that data.
  3. A program used to access the internet.
  4. Are a botnet of comprised hosts, controlled by a single intentity.
  5. A politically- or ideologically-motivated cyber attack or hack.
  6. Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
  7. The process ofnusing a
  8. A unique internet identifier registered
  9. A network security measure in which information is encoded or scrambled prior to transmission.
  10. A satellite navigation system that indentifies the precise lovation of the transmitting device.
  11. Hardware or software designed to prevent unathorized users from accessing a computer system.
  12. A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
  13. an entity.
  14. A software robot that performs automated tasks.
  15. A unique internet identifier registered to an entity.
  16. A way to access electonic system by bypassing some or all security mechanisms.
  17. A camera connectee to computer l, generally used to then stream videos to the internet.
  18. Determining the identity or location of an attacker or an attacker's intermediary.
  19. Unsolicited advertising or other information sent out via email or other messaging service.
  20. Malicious software, such as a virus or worm, that attacks a target computer.
  21. Attempting to mimic an official email from a trusted organization to lire individuals.

41 Clues: an entity.An online journal.The process ofnusing aStands for "Wireless Fidelity".A program used to access the internet.A unique internet identifier registeredA company that offers access the internet.A software robot that performs automated tasks.A unique internet identifier registered to an entity....

Digital Tech 2023 Final 2023-05-11

Digital Tech 2023 Final crossword puzzle
Across
  1. A means by which people use the Internet to communicate and share information among their immediate friends, and meet and connect with others through common interests, experiences, and friends.
  2. Irrelevant or unimportant messages to a large group of people.
  3. The standard of conduct expected by other tech users.
  4. Free web based site in which documents can be created, edited, and shared.
  5. Document that is stored on your computer, usually in a related collection/coordination.
  6. The crime of taking someone's personal information and using it to become them. Usually for financial gain.
  7. The legal rights and restrictions governing tech users.
  8. Local Area Network
  9. Large computer network connected over the internet for server redundancy.
  10. Spoofing, internet fraud in the form of emails and pop-ups designed to steal personal information
  11. Instructions/programs that tell your computer what to do.
  12. Online journals in which create interaction from readers. Consists of interest groups, business, and others.
  13. The act of stealing someone else's work in an attempt to pass it off as your own.
  14. A site that allows users to add content using their own browser. Collaborative Site.
  15. Universal serial bus.
  16. The buying and selling of goods online.
  17. Provides Storage for free
  18. Arranging all folders files, and other documents in an arranged order.
  19. Physical equipment that makes up your computer system.
  20. Wide Area Network
  21. Type of file that has been created or saved by an application.
  22. Used to store a group of files and folders in an organized fashion.
  23. Free online storage service that is intertwined with the company and other sites.
  24. Method of identity theft where people try to obtain personal information via phone calls.
Down
  1. The use of online communication to harass or threaten someone. STOP BLOCK TELL
  2. A link that can be added or clipped onto a document.
  3. The capability of using tech and knowing when and how to use it.
  4. The elements of physical and phycological well being related to digital tech use.
  5. The output of the device that lets you see all of your work as you go.
  6. The electronic exchange of info.
  7. The precautions that all tech users must go through in order to ensure their personal safety and security of their network.
  8. The privileges' and freedom extended to all tech users.
  9. Central processing unit, part of the computer system that carries out instructions given by the software. Microprocessor, single chip.
  10. The act of stealing someone else's work in an attempt to pass it off as your own.
  11. The applied science of design to better improve productivity
  12. Someone who knows what is write and wrong to do in the Tec world.
  13. Malicious software, designed to steel information, inflict damage, commit fraud, and spread spam.
  14. The exclusive legal right given to someone who both created and owns a piece of work.
  15. Document created by a program or system file which make us the operating system
  16. Acceptable Use Policy - Rules or guidelines for the proper use of technology or digital devices within an organization.

40 Clues: Wide Area NetworkLocal Area NetworkUniversal serial bus.Provides Storage for freeThe electronic exchange of info.The buying and selling of goods online.A link that can be added or clipped onto a document.The standard of conduct expected by other tech users.Physical equipment that makes up your computer system....

The Virtual World 2024-02-28

The Virtual World crossword puzzle
Across
  1. A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user.
  2. Communication in real-time over the internet, typically text-based.
  3. Controls that allow users to determine how much information they want to share with others on digital platforms.
  4. A security process in which users provide two different authentication factors to verify themselves.
  5. A live, visual communication between two or more people via computer or mobile device.
  6. A security system designed to prevent unauthorized access to or from a private network.
  7. The network of physical devices embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
  8. The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  9. A collection of web pages accessible via the internet.
  10. The identification or estimation of the real-world geographic location of an object, such as a mobile device or internet-connected computer.
  11. A secret word or phrase used for authentication and to gain access to a system.
  12. Measures taken to protect computer systems and data from unauthorized access or cyber attacks
  13. A machine that processes data and performs tasks according to a set of instructions.
  14. The unauthorized access, disclosure, or acquisition of sensitive information.
  15. A software agent that assists users with tasks or provides information in a virtual environment.
  16. Connected to or accessible via the internet.
  17. Transfer data from a remote computer to a local device.
  18. A unique name used to identify oneself on a computer system or online platform.
  19. The process of converting information or data into a code to prevent unauthorized access.
Down
  1. A global network connecting millions of computers worldwide.
  2. The fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity.
  3. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
  4. The trail of data left behind by users when they interact with digital platforms.
  5. A digital representation of a user in a virtual environment.
  6. A simulated experience that can be similar to or completely different from the real world.
  7. An enhanced version of reality where computer-generated information is overlaid on the real world.
  8. The online representation of an individual's identity, based on data attributes and activities associated with that individual.
  9. Electronic mail sent and received via the internet.
  10. The virtual environment created by interconnected computer systems.
  11. Transfer data from a local device to a remote computer.
  12. The delivery of computing services—such as servers, storage, databases, networking, software, and analytics—over the internet.
  13. The act of playing electronic games, often on devices such as computers, consoles, or mobile phones.
  14. Transmitting or receiving data, typically audio or video, over a computer network in real-time.
  15. Software used to access and view websites on the internet.
  16. Websites and applications that enable users to create and share content or participate in social networking.

35 Clues: Connected to or accessible via the internet.Electronic mail sent and received via the internet.A collection of web pages accessible via the internet.Transfer data from a local device to a remote computer.Transfer data from a remote computer to a local device.Software used to access and view websites on the internet....

Chapter 9: Computer Security Technology Master Crossword 2026-03-05

Chapter 9: Computer Security Technology Master Crossword crossword puzzle
Across
  1. A suite of protocols used to secure and encrypt Virtual Private Network (VPN) traffic.
  2. Malicious software specifically designed to cause harm, disrupt operations, or steal data.
  3. A system that only monitors and alerts administrators about malicious network traffic, but does not actively block it (Abbreviation).
  4. A potential danger, such as a hacker or a virus, that could exploit a weakness in a computer system.
  5. A system that collects, correlates, and analyzes security logs from various devices like firewalls and endpoints (Abbreviation).
  6. A decoy system or network set up to look attractive to cyber attackers in order to study their tactics.
  7. The zone where external-facing servers (like web and email) are placed to keep them separate from the secure internal network (Abbreviation).
  8. The secure, encrypted path that a Virtual Private Network (VPN) creates through an untrusted network like the internet.
  9. A logical connection point that firewalls can block to prevent certain types of traffic, such as 80 for web traffic.
  10. A defense mechanism designed to intentionally slow down network connections to frustrate automated scanning tools.
  11. A vulnerability or attack that is unknown to the software vendor and has no patch available yet (No spaces).
  12. A mode that allows a network interface card (NIC) to read all traffic passing on the network segment, not just traffic addressed to it.
  13. A security system that actively blocks or drops malicious traffic, rather than just alerting administrators (Abbreviation).
  14. A stealthy type of malware designed to hide its presence deep within the operating system to avoid detection by standard antivirus.
  15. A technology that hides multiple internal private IP addresses behind a single public IP address (Abbreviation).
  16. The type of inspection firewall that remembers the context of active network connections.
Down
  1. Creates a secure, encrypted tunnel through an untrusted network like the internet (Abbreviation).
  2. The physical or logical device that collects network traffic data for an Intrusion Detection System to analyze.
  3. A device that combines a firewall, intrusion prevention, and antivirus capabilities into one single physical appliance (Abbreviation).
  4. The type of detection that relies on a constantly updated database of known threat patterns to identify malicious activity.
  5. An intermediary server that makes web requests on behalf of internal users and hides internal IP addresses.
  6. The process of verifying a user's identity before granting them access to a system.
  7. A secure, isolated virtual environment used to safely run and test untrusted code without risking the main computer.
  8. The physical hardware address assigned to a network interface card (Abbreviation).
  9. The secure holding area where antivirus software places an infected file so it cannot execute and spread.
  10. The modern, advanced replacement for traditional antivirus that monitors behavior and responds to threats (Abbreviation).
  11. The type of detection that learns what "normal" network traffic looks like and triggers an alert when something deviates from that baseline.
  12. A basic filtering firewall inspects these individual units of data passing through the network.

28 Clues: The physical hardware address assigned to a network interface card (Abbreviation).The process of verifying a user's identity before granting them access to a system.A suite of protocols used to secure and encrypt Virtual Private Network (VPN) traffic.The type of inspection firewall that remembers the context of active network connections....

Pengantar Teknologi Informasi 2023-09-06

Pengantar Teknologi Informasi crossword puzzle
Across
  1. Informasi
  2. Topologi yang menyerupai bintang
  3. Alamat pada jaringan Internet.
Down
  1. Pemalsuan data pada aktivitas Cyber Crime adalah Data...
  2. Menjaga data agar tidak terjadi adanya perubahan
  3. Salahsatu bagian dari AI adalah ... Humanly

6 Clues: InformasiTopologi yang menyerupai bintangAlamat pada jaringan Internet.Salahsatu bagian dari AI adalah ... HumanlyMenjaga data agar tidak terjadi adanya perubahanPemalsuan data pada aktivitas Cyber Crime adalah Data...

Government Acronyms 2023-01-21

Government Acronyms crossword puzzle
Across
  1. inner-city home development
  2. parcel
  3. retaliation force
  4. security alliance
  5. investigation
  6. intelligence
  7. Aeronautics
  8. global peace-makers
  9. pills
Down
  1. mail
  2. plant police
  3. covid monsters
  4. banks
  5. attorneys
  6. disaster relief
  7. financing paintings
  8. farm loans
  9. taxes
  10. labor relations
  11. water and air
  12. snow plows

21 Clues: mailbankstaxespillsparcelattorneysfarm loanssnow plowsAeronauticsplant policeintelligenceinvestigationwater and aircovid monstersdisaster relieflabor relationsretaliation forcesecurity alliancefinancing paintingsglobal peace-makersinner-city home development

Aeropuerto Game || No spaces No caps 2023-04-19

Aeropuerto Game || No spaces No caps crossword puzzle
Across
  1. sign
  2. window
  3. check in
  4. boarding pass
  5. seat belt
  6. documents
  7. ticket
  8. terminal
  9. passenger
  10. flight attendant
  11. economy class seat
  12. security
  13. arrival
  14. gate
Down
  1. aisle
  2. metal detector
  3. seat
  4. round trip
  5. luggage
  6. first class seat
  7. passport
  8. screen
  9. departure/exit

23 Clues: signseatgateaislewindowticketscreenluggagearrivalcheck interminalpassportsecurityseat beltdocumentspassengerround tripboarding passmetal detectordeparture/exitfirst class seatflight attendanteconomy class seat

Citizens Bank & Trust 2012-12-09

Citizens Bank & Trust crossword puzzle
Across
  1. Legal Document
  2. Security
  3. Childs Bank
  4. Latt Maxey
  5. First Contact
  6. Necessity
  7. First Office
  8. Trust Services
  9. Home Loan
  10. Biggest Asset
  11. Scrutinize
Down
  1. Pencil Pusher
  2. Plastic
  3. A Branch
  4. President
  5. Rate
  6. Family
  7. Manager of Assets
  8. Paper money
  9. Loan Decision
  10. Office

21 Clues: RateFamilyOfficePlasticA BranchSecurityPresidentNecessityHome LoanLatt MaxeyScrutinizeChilds BankPaper moneyFirst OfficePencil PusherFirst ContactLoan DecisionBiggest AssetLegal DocumentTrust ServicesManager of Assets

Unit 5 - Architechture 2014-04-21

Unit 5 - Architechture crossword puzzle
Across
  1. Decke
  2. Beleuchtung
  3. ungewöhnlich
  4. Termin
  5. Herausforderung
  6. anstatt
  7. Geschäftsmann
  8. Werkzeug
  9. Klimaanlage
  10. Kühlschrank
  11. Kilometer
  12. Sicherheit
  13. Lift
Down
  1. Wärme
  2. Stockwerk
  3. Verbindung
  4. Eisen
  5. Wolkenkratzer
  6. Bauland
  7. entwerfen,entworf
  8. Lohn
  9. pünktlich
  10. Angst
  11. Architekt/in
  12. Stahl
  13. Ziegelstein
  14. Stadtsilhouette
  15. Baustelle

28 Clues: LohnLiftWärmeDeckeEisenAngstStahlTerminBaulandanstattWerkzeugStockwerkpünktlichKilometerBaustelleVerbindungSicherheitBeleuchtungKlimaanlageZiegelsteinKühlschrankungewöhnlichArchitekt/inWolkenkratzerGeschäftsmannHerausforderungStadtsilhouetteentwerfen,entworf

1.1. Signs and Warnings 2017-04-17

1.1. Signs and Warnings crossword puzzle
Across
  1. pakjes
  2. kust
  3. brandblusser
  4. ongewone
  5. motor
  6. vuurwapens
  7. voertuig
  8. begaat
  9. stroming
  10. doeuit
  11. terrein
  12. ontsnappen
Down
  1. gifslangen
  2. bewijs
  3. gemak
  4. proberen
  5. veiligheid
  6. strandwacht
  7. rijbewijs
  8. drijf
  9. betekent
  10. druk
  11. overtreding
  12. buik
  13. gebogen
  14. spieren
  15. afval
  16. zwaai

28 Clues: kustdrukbuikgemakdrijfmotorafvalzwaaipakjesbewijsbegaatdoeuitgebogenspierenterreinproberenbetekentongewonevoertuigstromingrijbewijsgifslangenveiligheidvuurwapensontsnappenstrandwachtovertredingbrandblusser

VOCAB LESSON#4-CROSSWORD PUZZLE 2023-11-05

VOCAB LESSON#4-CROSSWORD PUZZLE crossword puzzle
Across
  1. Rounded
  2. Stale
  3. Holder
  4. Covering
  5. In the flesh
  6. Manner or position in moving around
  7. Infamy
  8. Throwback
  9. Display
  10. Short Fuse
  11. Shabby
  12. Innocence
Down
  1. Earthly
  2. Easily cured
  3. Compassion
  4. Appreciate
  5. Undercover
  6. Security
  7. Godly or higher than a peasant
  8. Greedy to share

20 Clues: StaleHolderInfamyShabbyEarthlyRoundedDisplayCoveringSecurityThrowbackInnocenceCompassionAppreciateUndercoverShort FuseEasily curedIn the fleshGreedy to shareGodly or higher than a peasantManner or position in moving around

révision vocabulaire S1 anglais 2024-11-21

révision vocabulaire S1 anglais crossword puzzle
Across
  1. Inspection
  2. Trip
  3. Scholarship
  4. Resources
  5. Grant
  6. Aviation company
  7. Attempt
  8. Succeed
  9. Mark
  10. Class
  11. Teacher
  12. Certification
Down
  1. Newcomer
  2. Register
  3. Due date
  4. Elective
  5. Internship
  6. Requirement
  7. Transport
  8. Safety
  9. Commuter
  10. Task
  11. Tasks
  12. Association
  13. Fee
  14. Reading room
  15. Unit
  16. Study

28 Clues: FeeTripTaskMarkUnitGrantTasksClassStudySafetyAttemptSucceedTeacherNewcomerRegisterDue dateElectiveCommuterTransportResourcesInspectionInternshipRequirementScholarshipAssociationReading roomCertificationAviation company

Discover the Future 2024-06-16

Discover the Future crossword puzzle
Across
  1. 감지기
  2. 위험요소
  3. 결과,영향
  4. 관련된
  5. 상호작용하다
  6. 걱정
  7. 운송수단
  8. 점점 더
  9. 이용가능한
  10. 선호, 좋아함
  11. 정확히, 꼭
  12. 단점
  13. 자주
  14. 전자공학기술
Down
  1. 보안
  2. 셀 수 없이 많은
  3. 짜증 나게 하는
  4. 잠재적
  5. 갈라진 틈
  6. 자동적으로
  7. 도착
  8. 결정하다
  9. 심화시키다
  10. 도시의

24 Clues: 보안도착걱정단점자주감지기잠재적관련된도시의위험요소결정하다운송수단점점 더결과,영향갈라진 틈자동적으로심화시키다이용가능한상호작용하다정확히, 꼭전자공학기술선호, 좋아함짜증 나게 하는셀 수 없이 많은

junior 1 2026-03-30

junior 1 crossword puzzle
Across
  1. - 6
  2. - 9
  3. - 26
  4. -27
  5. - 28
  6. - 29
  7. - 19
  8. - 4
  9. - 5
  10. - 24
  11. - 17
  12. - 16
  13. - 1
  14. - 18
Down
  1. - 25
  2. - 2
  3. - 21
  4. - 11
  5. - 12
  6. - 8
  7. - 22
  8. - 7
  9. - 15
  10. - 20
  11. - 10
  12. - 3
  13. - 23
  14. - 13
  15. - 14

29 Clues: - 2- 6- 9-27- 8- 7- 4- 5- 3- 1- 25- 21- 26- 11- 12- 22- 28- 15- 20- 29- 19- 10- 23- 24- 17- 13- 16- 14- 18

cyber 2021-04-05

cyber crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Roles & Jobs 2024-06-19

Roles & Jobs crossword puzzle
Across
  1. Dogs that provide comfort and support to people.
  2. Following a scent trail to locate a person or object.
  3. Dogs trained to assist individuals with disabilities.
  4. Used to monitor areas for safety.
  5. General term for dogs trained to locate persons or objects.
  6. Employed in private security roles.
  7. Trained to locate deceased individuals.
  8. Trained to detect explosives, drugs, or other substances.
  9. Role of guarding property and people.
Down
  1. Traditional job of managing livestock.
  2. Assists visually impaired individuals.
  3. Role involving locating missing persons.
  4. German Shepherds used in armed forces.
  5. General term for dogs aiding individuals in various ta
  6. German Shepherds trained for law enforcement duties.
  7. Dogs used to detect contraband at borders.

16 Clues: Used to monitor areas for safety.Employed in private security roles.Role of guarding property and people.Traditional job of managing livestock.Assists visually impaired individuals.German Shepherds used in armed forces.Trained to locate deceased individuals.Role involving locating missing persons.Dogs used to detect contraband at borders....

Secured Credit Card 2022-03-22

Secured Credit Card crossword puzzle
Across
  1. Annual Fee
  2. Under this age you have to submit a paper application
  3. this card cannot be used as this type of protection for a checking account
  4. Minimum security deposit
Down
  1. $2500 is the _________ security deposit
  2. balance transfer fee
  3. Increments a security deposit can be made in after the minimum deposit
  4. amount of annual fee broke down into a monthly charge

8 Clues: Annual Feebalance transfer feeMinimum security deposit$2500 is the _________ security depositUnder this age you have to submit a paper applicationamount of annual fee broke down into a monthly chargeIncrements a security deposit can be made in after the minimum depositthis card cannot be used as this type of protection for a checking account

Executive Branch 2022-12-07

Executive Branch crossword puzzle
Across
  1. Service System
  2. decision - pardon
  3. College
  4. Agreement
  5. System
  6. Appointees
  7. Policy
Down
  1. System
  2. - Executive Order
  3. Service Workers
  4. Agencies
  5. Bureaucracy
  6. to elect - Electors
  7. Sanctioning
  8. Corporations
  9. Security

16 Clues: SystemSystemPolicyCollegeAgenciesSecurityAgreementAppointeesBureaucracySanctioningCorporationsService SystemService Workers- Executive Orderdecision - pardonto elect - Electors

Security Summer Fun 2021-07-30

Security Summer Fun crossword puzzle
Across
  1. Allows TAD PGS, Inc. to operate with a clearance while having a foreign parent
  2. Threat that an employee or a contractor will use his or her authorized access, wittingly or unwittingly, to do harm to the security of the United States.
  3. One of the Affiliates of a foreign interest (Adecco)
  4. How many days the Intra-Company Visit request should be submitted to Security before a meeting can take place between TAD PGS employees and Adecco affiliates
Down
  1. A type of social engineering where an attacker sends a fraudulent message designed to trick a human victim
  2. The briefing that must be submitted before you leave on international travel
  3. Foreign Ownership Control and Influence
  4. Information or material of which unauthorized disclosure could be expected to cause serious damage to the national security
  5. The database the DOD uses to store clearance information
  6. The form that is submitted to Security with the associate information, worksite, recruiter, sales manager, and visit requirements

10 Clues: Foreign Ownership Control and InfluenceOne of the Affiliates of a foreign interest (Adecco)The database the DOD uses to store clearance informationThe briefing that must be submitted before you leave on international travelAllows TAD PGS, Inc. to operate with a clearance while having a foreign parent...

Learning Units Learning Unit 2: The risk management lifecycle 2023-03-10

Learning Units Learning Unit 2: The risk management lifecycle crossword puzzle
Across
  1. also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment.
  2. is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.
  3. is assessing the risks involved in the daily activities of a business and classifying them (low, medium, high risk) based on the impact on the business. It enables a business to look for control measures that would help in curing or mitigating the impact of the risk and, in some cases negating the risk altogether.
  4. is the practice of reducing the impact of potential risks by developing a plan to manage, eliminate, or limit setbacks as much as possible. After management creates and carries out the plan, they'll monitor progress and assess whether or not they need to modify any actions if necessary.
  5. attempts to define what the estimated risk actually means to people concerned with or affected by the risk. A large part of this evaluation will be the consideration of how people perceive risks.
  6. is the structured process used to identify the sources of currency risk and to define the goals of a hedging program aimed at eliminating or minimising the impact of this risk.
  7. should be carried out by anyone who is trained and competent to do so; someone who understands the circumstances, the potential harm and the deviations.
Down
  1. is the process of determining the criticality of business activities and associated resource requirements to ensure operational resilience and continuity of operations during and after a business disruption.
  2. recognizes the areas where you are not compliant with regard to laws, policies or regulations. The resources are at risk for exposure to malicious activity and/or for penalties issued due to non-compliance.
  3. is the possibility of something bad happening. ________ involves uncertainty about the effects/implications of an activity with respect to something that humans value, often focusing on negative, undesirable consequences.
  4. is the identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
  5. in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization.
  6. in computer security, a _____________ is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.

13 Clues: in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization.also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment....

Cyber Stalking Crossword 2016-06-29

Cyber Stalking Crossword crossword puzzle
Across
  1. The stalker
  2. When a stalker claims the victim is hurting them, it is called False ___
  3. Cyberstalking is against the ___
  4. The minimum age for Instagram
Down
  1. Someone who defends the victim
  2. What is done when a stalker accesses the victim's social media or email, and can edit it
  3. Most cyber stalking happens on ____
  4. The person being stalked online
  5. Women make up _____ percent of victims
  6. This social media platform allows users to post pictures mainly

10 Clues: The stalkerThe minimum age for InstagramSomeone who defends the victimThe person being stalked onlineCyberstalking is against the ___Most cyber stalking happens on ____Women make up _____ percent of victimsThis social media platform allows users to post pictures mainlyWhen a stalker claims the victim is hurting them, it is called False ___...

IT-Security - Datenschutz/Datensicherheit 2016-01-29

IT-Security - Datenschutz/Datensicherheit crossword puzzle
Across
  1. Wenn Daten doppelt gespeichert werden(Sicherheitskopie auf Festplatte oder USB-Sticks).
  2. Sie dringen illegal in Computersysteme ein.
  3. Diese Programme protokollieren die Tastatureingaben mit.
  4. Echtzeit chatten.
  5. Datenverarbeitungsregisternummer.
Down
  1. Die Sicherheitsexperten untersuchen deinen Computer auf Sicherheitslücken, wie nennt man Sie noch?
  2. Personen werden mit Hilfe von elektronischen Medien verletzt.
  3. Diese Viren sind als ein Programm in eine Datei eingebetet?
  4. Verbreitet sich direkt über Netze.
  5. Werbemails die unerwünscht sind nennt man auch?

10 Clues: Echtzeit chatten.Datenverarbeitungsregisternummer.Verbreitet sich direkt über Netze.Sie dringen illegal in Computersysteme ein.Werbemails die unerwünscht sind nennt man auch?Diese Programme protokollieren die Tastatureingaben mit.Diese Viren sind als ein Programm in eine Datei eingebetet?Personen werden mit Hilfe von elektronischen Medien verletzt....

digital citizenship 2017-09-08

digital citizenship crossword puzzle
Across
  1. presence the existence of individual business that can be found online
  2. bullying using technology to bully someone
  3. the correct way to communicate on the internet
  4. safety the knowledge of the user’s personal safety
Down
  1. domain being available to the public
  2. Passwords passwords that would throw someone off
  3. media instagram, snapchat, twitter, facebook
  4. Danger the danger to children from strangers
  5. citizenship the responsible behavior regard to technology use
  6. copyright taking someone's image without citing it

10 Clues: domain being available to the publicbullying using technology to bully someonemedia instagram, snapchat, twitter, facebookDanger the danger to children from strangersthe correct way to communicate on the internetPasswords passwords that would throw someone offcopyright taking someone's image without citing it...

Bullying 2022-10-24

Bullying crossword puzzle
Across
  1. a form of bullying on the internet
  2. a form of bullying with weird touches
  3. a form of bullying used with words
  4. Something that can make or break bullying
  5. a form of bullying to hurt the victims social life
  6. the target of the bullying
  7. the person who makes fun of/hurts people
Down
  1. person who intimidates the victim
  2. The process of the bully bullying
  3. a form of bullying that hurts the victim

10 Clues: the target of the bullyingperson who intimidates the victimThe process of the bully bullyinga form of bullying on the interneta form of bullying used with wordsa form of bullying with weird touchesa form of bullying that hurts the victimthe person who makes fun of/hurts peopleSomething that can make or break bullying...

TECHNOLOGY 2025-01-29

TECHNOLOGY crossword puzzle
Across
  1. easy to use or understand
  2. the use of machines to perform tasks without human intervention
  3. knowledgeable about modern technology
  4. the trail of data left by users on the internet
  5. a small electronic device with a specific function
Down
  1. measures taken to protect systems from cyber threats
  2. an important discovery or development
  3. introducing new ideas or methods
  4. extremely modern and advanced
  5. Intelligence (AI) the simulation of human intelligence in machines

10 Clues: easy to use or understandextremely modern and advancedintroducing new ideas or methodsan important discovery or developmentknowledgeable about modern technologythe trail of data left by users on the interneta small electronic device with a specific functionmeasures taken to protect systems from cyber threats...

CRISS-CROSS PUZZLE 2025-01-18

CRISS-CROSS PUZZLE crossword puzzle
Across
  1. Who cut Thanos' head off in the movie Avengers:End Game?
  2. How does the bishop move on the chessboard?
  3. Unwanted messages flooding your inbox
  4. Digital brain that thinks like humans, briefly
  5. Planet in the solar system that has the shortest day
  6. Guard against cyber attacks
Down
  1. Element with a symbol Au
  2. Malicious software that holds your files hostage
  3. How many years is the tenure of a Rajya Sabha member?
  4. Web address in short

10 Clues: Web address in shortElement with a symbol AuGuard against cyber attacksUnwanted messages flooding your inboxHow does the bishop move on the chessboard?Digital brain that thinks like humans, brieflyMalicious software that holds your files hostagePlanet in the solar system that has the shortest dayHow many years is the tenure of a Rajya Sabha member?...

Health crossword (safety words) 2025-04-14

Health crossword (safety words) crossword puzzle
Across
  1. Mild traumatic injury caused to the brain
  2. injury caused by a spine injury
  3. What do you put on when riding a motorcycle
  4. What do you put on when you get in a car
  5. a material used to patch up a cut
Down
  1. Bullying conducted online
  2. another word for "taking it easy"
  3. Occupational Safety and Health Administration
  4. acronym for traumatic spinal cord injury
  5. Hours How much sleep a teenager needs

10 Clues: Bullying conducted onlineinjury caused by a spine injuryanother word for "taking it easy"a material used to patch up a cutHours How much sleep a teenager needsacronym for traumatic spinal cord injuryWhat do you put on when you get in a carMild traumatic injury caused to the brainWhat do you put on when riding a motorcycle...

Profiles 2 text 1 Alisa 2014-12-03

Profiles 2 text 1 Alisa crossword puzzle
Across
  1. rokotus
  2. pahoillaan oleva,katuva
  3. turvallisuus
  4. näköala,maisema
  5. toimittaa,luovuttaa
  6. kokemus,kokea
  7. olla mukana,esiintyä
  8. mainita
Down
  1. esine
  2. varaus
  3. matkustaja
  4. tavara
  5. suunta
  6. rukous
  7. paikka

15 Clues: esinevaraustavarasuuntarukouspaikkarokotusmainitamatkustajaturvallisuuskokemus,kokeanäköala,maisematoimittaa,luovuttaaolla mukana,esiintyäpahoillaan oleva,katuva

At the airport 2024-11-30

At the airport crossword puzzle
Across
  1. рейс, полёт
  2. небо
  3. двигатель
  4. пассажир
  5. чрезвычайная ситуация
  6. приземляться
Down
  1. захватывающий
  2. безопасность
  3. крыло
  4. занятой,людный
  5. аккуратный, внимательный
  6. обслуживать, разносить (напитки)
  7. утомительный
  8. безопасный
  9. полагаться на

15 Clues: небокрылопассажирдвигательбезопасныйрейс, полётбезопасностьутомительныйприземлятьсязахватывающийполагаться назанятой,людныйчрезвычайная ситуацияаккуратный, внимательныйобслуживать, разносить (напитки)

MY MOTHER AT 66 & ELEMENTARY......SLUM 2020-08-04

MY MOTHER AT 66 & ELEMENTARY......SLUM crossword puzzle
Across
  1. fast moving, forceful
  2. sleep
  3. running
  4. safety
  5. bad, mean
  6. well known
  7. well bred
  8. pale
  9. clear, unclouded sky
  10. twisted
Down
  1. pale like an ash
  2. dead body
  3. opposite of wide
  4. scattering
  5. burial places
  6. luring, attracting
  7. closed in
  8. stopped abnormally
  9. unwanted plants
  10. giving rewards

20 Clues: palesleepsafetyrunningtwisteddead bodyclosed inbad, meanwell bredscatteringwell knownburial placesgiving rewardsunwanted plantspale like an ashopposite of wideluring, attractingstopped abnormallyclear, unclouded skyfast moving, forceful

Las Noticias 2021-10-26

Las Noticias crossword puzzle
Across
  1. link
  2. to interview
  3. to lack
  4. to follow
  5. reliable
  6. security
  7. to give
  8. war
  9. to lie
  10. to publish
Down
  1. to say
  2. to navigate
  3. source
  4. to broadcast
  5. magazines
  6. because
  7. to look for
  8. verifiable
  9. disorder
  10. to prove, to confirm
  11. news
  12. tweet

22 Clues: warlinknewstweetto saysourceto liebecauseto lackto givereliabledisordersecuritymagazinesto followverifiableto publishto navigateto look forto interviewto broadcastto prove, to confirm

November 2 2021-11-02

November 2 crossword puzzle
Across
  1. guard - охранник
  2. - отвлекать
  3. - хропеть
  4. - салфетка
  5. - заворачивать
  6. - чудо
  7. - выкрикивать
  8. - заставлять
  9. - агрессивный
  10. pig - морская свинка
  11. - разрушать
  12. - мопс
  13. - палатка
  14. up - подводить итоги/заканчивать
Down
  1. - общее слово для братьев и сестер
  2. - доказательство
  3. - копать
  4. - внешность
  5. - бухгалтер
  6. attendant - стюард/-есса
  7. - бесполезный
  8. - совершать побег/ убегать
  9. - кричать
  10. - общежитие

24 Clues: - чудо- мопс- копать- хропеть- кричать- палатка- салфетка- отвлекать- бухгалтер- общежитие- разрушать- внешность- заставлять- выкрикивать- бесполезный- агрессивный- заворачиватьguard - охранник- доказательствоpig - морская свинкаattendant - стюард/-есса- совершать побег/ убегатьup - подводить итоги/заканчивать- общее слово для братьев и сестер

NI 2 Unit 2 Lessons 3&4 2021-11-28

NI 2 Unit 2 Lessons 3&4 crossword puzzle
Across
  1. bringen
  2. traditionel
  3. Portmonnaie
  4. reizend
  5. Schlamm
  6. Kontakt
  7. anstehen
  8. Feuerwerke
  9. werfen
  10. klingeln
  11. brennen
  12. Reis
  13. zelten
  14. Tradition
  15. schliessen
  16. Zelt
Down
  1. anzünden
  2. Welt
  3. schlafen
  4. Sicherheit
  5. Unterwäsche
  6. Kerze
  7. verdienen
  8. gefährlich
  9. Abfall
  10. Koffer
  11. Ankunft
  12. Umschlage

28 Clues: WeltReisZeltKerzeAbfallKofferwerfenzeltenbringenreizendSchlammKontaktAnkunftbrennenanzündenschlafenanstehenklingelnverdienenUmschlageTraditionSicherheitgefährlichFeuerwerkeschliessentraditionelPortmonnaieUnterwäsche

Prueba de vocabulario útil p. 61-63 2018-02-11

Prueba de vocabulario útil p. 61-63 crossword puzzle
Across
  1. seat
  2. cautious (female)
  3. to take off
  4. to threaten
  5. aisle
  6. window
  7. flight attendant
  8. suspicious (male)
  9. weapon
Down
  1. to solve
  2. to explain
  3. passanger (male)
  4. To line up
  5. flight crew
  6. to claim your luggage
  7. tax, duty
  8. security guard
  9. That’s enough!
  10. sign/signal
  11. fault

20 Clues: seataislefaultwindowweaponto solvetax, dutyto explainTo line upflight crewto take offto threatensign/signalsecurity guardThat’s enough!passanger (male)flight attendantcautious (female)suspicious (male)to claim your luggage

Vocabulary 9 2012-11-04

Vocabulary 9 crossword puzzle
Across
  1. first time
  2. representation of a person
  3. being seen
  4. decision maker
  5. character
  6. firm conviction
  7. educational institution
  8. special skill
  9. indifference
  10. real life
Down
  1. attention
  2. contract to receive something
  3. continued use
  4. plan
  5. electric current
  6. protected
  7. community
  8. make smaller
  9. free from danger
  10. allegiance

20 Clues: planattentioncharacterprotectedcommunityreal lifefirst timebeing seenallegiancemake smallerindifferencecontinued usespecial skilldecision makerfirm convictionelectric currentfree from dangereducational institutionrepresentation of a personcontract to receive something

Unit 5 - Architechture 2014-04-21

Unit 5 - Architechture crossword puzzle
Across
  1. Geschäftsmann
  2. pünktlich
  3. Angst
  4. Bauland
  5. Beleuchtung
  6. Klimaanlage
  7. Stadtsilhouette
  8. Wolkenkratzer
  9. Lift
  10. Wärme
  11. Stahl
Down
  1. entwerfen,entworf
  2. Lohn
  3. Ziegelstein
  4. Sicherheit
  5. Eisen
  6. Kühlschrank
  7. Baustelle
  8. Decke
  9. Herausforderung
  10. Stockwerk
  11. anstatt
  12. ungewöhnlich
  13. Termin
  14. Kilometer
  15. Verbindung
  16. Architekt/in
  17. Werkzeug

28 Clues: LohnLiftEisenDeckeAngstWärmeStahlTerminanstattBaulandWerkzeugBaustellepünktlichStockwerkKilometerSicherheitVerbindungZiegelsteinKühlschrankBeleuchtungKlimaanlageungewöhnlichArchitekt/inGeschäftsmannWolkenkratzerHerausforderungStadtsilhouetteentwerfen,entworf

Unit 5 - Architechture 2014-04-21

Unit 5 - Architechture crossword puzzle
Across
  1. Ziegelstein
  2. Termin
  3. pünktlich
  4. Angst
  5. Geschäftsmann
  6. Kühlschrank
  7. Lift
  8. Decke
  9. entwerfen,entworf
  10. Werkzeug
  11. anstatt
  12. ungewöhnlich
Down
  1. Stadtsilhouette
  2. Herausforderung
  3. Wärme
  4. Architekt/in
  5. Verbindung
  6. Kilometer
  7. Stockwerk
  8. Sicherheit
  9. Lohn
  10. Klimaanlage
  11. Beleuchtung
  12. Eisen
  13. Wolkenkratzer
  14. Stahl
  15. Bauland
  16. Baustelle

28 Clues: LohnLiftWärmeAngstDeckeEisenStahlTerminBaulandanstattWerkzeugKilometerpünktlichStockwerkBaustelleVerbindungSicherheitZiegelsteinKlimaanlageKühlschrankBeleuchtungArchitekt/inungewöhnlichGeschäftsmannWolkenkratzerStadtsilhouetteHerausforderungentwerfen,entworf

banking 11 2023-11-14

banking 11 crossword puzzle
Across
  1. adókulcs
  2. alapkamat
  3. kőltságvetési politika
  4. részvény
  5. kötelező tartalékráta
  6. élénkítő politika
  7. kamatláb
  8. valuta
  9. pénzkínálat
  10. kormányzati kiadás
  11. általánosan elfogadott
Down
  1. hitelt nyújt
  2. monetáris eszközök
  3. biztosító társaság
  4. intézményi befektető
  5. kamatmarzs
  6. committee monetáris tanács
  7. kétszintű
  8. osztalék
  9. folyószámla
  10. kibocsát
  11. értékpapír
  12. jegybank

23 Clues: valutaadókulcsrészvényosztalékkamatlábkibocsátjegybankalapkamatkétszintűkamatmarzsértékpapírfolyószámlapénzkínálathitelt nyújtélénkítő politikamonetáris eszközökbiztosító társaságkormányzati kiadásintézményi befektetőkötelező tartalékrátakőltságvetési politikaáltalánosan elfogadottcommittee monetáris tanács

LA TECNOLOGIA y LA RED 2025-05-15

LA TECNOLOGIA y LA RED crossword puzzle
Across
  1. comment
  2. password
  3. camera
  4. profile
  5. users
  6. cell-phone
  7. link
  8. followers
  9. internet
  10. group
  11. email
  12. security
  13. file
  14. photos
  15. tweet
  16. event
  17. key
Down
  1. call
  2. message
  3. username
  4. speaker-phone
  5. screen
  6. keyboard
  7. mute/silent mode
  8. headphones
  9. mouse
  10. website

27 Clues: keycalllinkfileusersgroupemailmousetweeteventscreencameraphotosmessagecommentprofilewebsiteusernamepasswordkeyboardinternetsecurityfollowersheadphonescell-phonespeaker-phonemute/silent mode

Learning Units Learning Unit 2: The risk management lifecycle 2023-03-10

Learning Units Learning Unit 2: The risk management lifecycle crossword puzzle
Across
  1. attempts to define what the estimated risk actually means to people concerned with or affected by the risk. A large part of this evaluation will be the consideration of how people perceive risks.
  2. in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization.
  3. is the structured process used to identify the sources of currency risk and to define the goals of a hedging program aimed at eliminating or minimising the impact of this risk.
  4. is assessing the risks involved in the daily activities of a business and classifying them (low, medium, high risk) based on the impact on the business. It enables a business to look for control measures that would help in curing or mitigating the impact of the risk and, in some cases negating the risk altogether.
  5. also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment.
Down
  1. is the practice of reducing the impact of potential risks by developing a plan to manage, eliminate, or limit setbacks as much as possible. After management creates and carries out the plan, they'll monitor progress and assess whether or not they need to modify any actions if necessary.
  2. is the process of determining the criticality of business activities and associated resource requirements to ensure operational resilience and continuity of operations during and after a business disruption.
  3. is the possibility of something bad happening. ________ involves uncertainty about the effects/implications of an activity with respect to something that humans value, often focusing on negative, undesirable consequences.
  4. in computer security, a _____________ is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.
  5. is the identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
  6. should be carried out by anyone who is trained and competent to do so; someone who understands the circumstances, the potential harm and the deviations.
  7. recognizes the areas where you are not compliant with regard to laws, policies or regulations. The resources are at risk for exposure to malicious activity and/or for penalties issued due to non-compliance.
  8. is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.

13 Clues: in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization.also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment....

EXERCISE 4.1 2020-03-30

EXERCISE 4.1 crossword puzzle
Across
  1. who created the Banaue Rice Terraces
  2. this president created the National Grains Authority
  3. mode of transportation during the prehistoric Philippines
  4. Who created the videophone?
  5. dubbed as the gloden age of science and technology
  6. implemented the Universal Access to Quality Tertiary Education Act
  7. implemented the cyber act of 1999
  8. Roberto del rosario invented the ___?
  9. what field of science given priority in the Spanish era
Down
  1. created the prject " doctors to the bario"
  2. fe del mundo invented the ___?
  3. described as dark, brown and short prehistoric people in the philippines
  4. Most advance civilization during the prehistoric philippines
  5. Dr. Abelardo aguilar created the _____?

14 Clues: Who created the videophone?fe del mundo invented the ___?implemented the cyber act of 1999who created the Banaue Rice TerracesRoberto del rosario invented the ___?Dr. Abelardo aguilar created the _____?created the prject " doctors to the bario"dubbed as the gloden age of science and technologythis president created the National Grains Authority...

Bullying Crossword Puzzle 2020-11-30

Bullying Crossword Puzzle crossword puzzle
Across
  1. what is the c in bullying
  2. someone is being hurt in an isolated event
  3. spreading rumors excluding people from games and groups
  4. punching,kicking, and spitting
  5. what is the b in bullying
  6. someone who stands by and lets something happen
Down
  1. No one is having fun there is a possible solution
  2. Name calling, threatning
  3. what is the a in bullying
  4. uneaqual balance of power and is rude over and over again
  5. what is the d in bullying
  6. writing mean things on someones facebook, instagram, or twitter, and texting
  7. stands up to a bully
  8. everyone is having fun and no one is getting hurt

14 Clues: stands up to a bullyName calling, threatningwhat is the c in bullyingwhat is the a in bullyingwhat is the d in bullyingwhat is the b in bullyingpunching,kicking, and spittingsomeone is being hurt in an isolated eventsomeone who stands by and lets something happenNo one is having fun there is a possible solution...

Pre-Test Awareness 2014 2014-10-13

Pre-Test Awareness 2014 crossword puzzle
Across
  1. An ISO standard is a ____________ agreement containing technical specifications or other precise criteria to be used consistently
  2. Customer Satisfaction is customer’s ________ of the degree to which the customer’s requirements have been fulfilled
  3. One of the benefit of ISO Certification is it Strengthens business ________
  4. Register Document where all non-conformance are identified in the process and opportunities to improve process
  5. _______ Action to eliminate the cause of a potential nonconformity
Down
  1. defines have the overall process flows for the service /Product
  2. Extent to which planned activities are realized and planned results achieved can be termed as _____
  3. 27001 Information Security Management System
  4. Information Security ___ is -An identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of safeguards, or a previously unknown situation that may be security relevant
  5. Is a systematic approach to managing sensitive company information so that it remains secure
  6. International Organization For Standardization is
  7. 9001 Quality Management System

12 Clues: 9001 Quality Management System27001 Information Security Management SystemInternational Organization For Standardization isdefines have the overall process flows for the service /Product_______ Action to eliminate the cause of a potential nonconformityOne of the benefit of ISO Certification is it Strengthens business ________...