cyber security Crossword Puzzles
Computer Terminology 2024-08-26
Across
- An organized collection of data that can be easily accessed, managed, and updated, often used for storing and retrieving information.
- The software that manages a computer’s hardware and provides services for other software. Examples include Windows, macOS, and Linux.
- The amount of data that can be transmitted over a network in a given period of time, affecting the speed and performance of internet connections.
- A set of instructions that a computer follows to perform a specific task, also known as software or an application.
- A virtual container used to organize files on a computer.
- A collection of data or information stored on a computer, such as a document, image, or video.
- Computing Using remote servers on the internet to store, manage, and process data, rather than relying on local servers or personal computers.
- A software program designed to perform a specific function or task, like a word processor or a game.
- The address used to access a specific website or resource on the internet.
- A small piece of data stored by a web browser that helps remember user preferences and login information.
- A step-by-step set of instructions designed to perform a task or solve a problem.
- Interface (UI) The means by which a user interacts with a computer or software, including elements like buttons, menus, and icons.
- Software used to access and navigate the internet, such as Google Chrome, Mozilla Firefox, or Safari.
- A type of malicious software designed to harm or exploit computers, often by corrupting or deleting data.
- The standard language used to create and design webpages.
Down
- The process of converting data into a code to prevent unauthorized access, ensuring privacy and security.
- A programming language commonly used to create interactive effects within web browsers.
- A language used to describe the presentation of a document written in HTML, including layout, colors, and fonts.
- The process of finding and fixing errors or bugs in a computer program.
- Any external device connected to a computer, such as a mouse, keyboard, or external hard drive.
- A security system designed to prevent unauthorized access to or from a network, often used to protect computers from cyber threats.
- A key combination or icon that provides quick access to a function or application.
- A program or application used to organize, analyze, and store data in tabular form, such as Microsoft Excel or Google Sheets.
- Device A hardware device used to provide data to a computer, such as a keyboard, mouse, or scanner.
- The physical components of a computer system, such as the monitor, keyboard, and processor.
- Device A hardware device used to receive and display data from a computer, such as a monitor, printer, or speakers.
- Storage A service that allows users to save and access their files over the internet instead of on a local hard drive.
- A group of interconnected computers and devices that share resources and information.
- Programs and applications that run on a computer and perform various tasks, like word processing or web browsing.
- A global network of interconnected computers that communicate using standardized protocols, allowing access to websites and online services.
30 Clues: A virtual container used to organize files on a computer. • The standard language used to create and design webpages. • The process of finding and fixing errors or bugs in a computer program. • The address used to access a specific website or resource on the internet. • A step-by-step set of instructions designed to perform a task or solve a problem. • ...
Unit 4 Ready for boarding Textbook pages 68-69 2026-02-04
18 Clues: tulli • lautta • satama • tullata • kuulutus • matkustaja • lähtöselvitys • junavaunu (BrE) • lähtevät(lennot) • saapuvat(lennot) • car ravintolavaunu • car junavaunu(AmE) • check turvatarkastus • station rautatieasema • control passintarkastus • machine myyntiautomaatti • attendant lentoemäntä/stuertti • drop matkatavaroiden jättöpiste
Airports 2019-06-06
Across
- what you bring with you on holiday?
- what does Avsec look for?
- Taupo city code
- check passengers ....
- what you fly on?
- nelson city code
- only offered to departing and arriving international travellers
- what is the amount if alcohol you can bring into nz
- what your bag goes through to get checked
Down
- is the area before departing passengers through security
- who is responsible for directing all ground traffic
- what is a hazard to aircrafts
- Kapiti Coast city code
- what does biosecurity look for?
- is the area where you go through security & hand over your passport and departure card
15 Clues: Taupo city code • what you fly on? • nelson city code • check passengers .... • Kapiti Coast city code • what does Avsec look for? • what is a hazard to aircrafts • what does biosecurity look for? • what you bring with you on holiday? • what your bag goes through to get checked • who is responsible for directing all ground traffic • ...
Custody and settlement 2025-10-13
Across
- Who securities are lent to
- The key role of a custodian for assets
- A custody account used by multiple clients
- The D in CSD
- When a settlement does not occur
- common transaction type attracting collateral
- what is the process of preparing for settlement
Down
- the point when a security formally changes hand
- a retail fund investment strategy
- The C in OTC
- type of agent responsible for fund compliance
- the addition of information required to settle a tracaction
- Assets taken as protection against default
- the date a security starts to trade without a dividend attached
- A fund that mirrors the NYSE or the FTSE
15 Clues: The C in OTC • The D in CSD • Who securities are lent to • When a settlement does not occur • a retail fund investment strategy • The key role of a custodian for assets • A fund that mirrors the NYSE or the FTSE • Assets taken as protection against default • A custody account used by multiple clients • type of agent responsible for fund compliance • ...
Hotel crossword puzzle 2024-05-01
15 Clues: lobi • Koper • masuk • Taman • Sarapan • Pelayan • Keamanan • fasilitas • Pemandangan • Ruang santai • uang tambahan • Kamar tipe VIP • Biaya Tambahan • kamar mandi uap • Meja resepsionis
Types of Markets 2022-01-25
Across
- ____ exchanges are markets that do not have a location.
- Within bond markets in the US, bonds have a ___ value of $1000.
- Corporations issue debt securities to be traded within ____ markets.
- Future markets help protect against ___ of uncertain markets.
- Raising capital within public and private markets is a goal within the ___ market.]
- A security is sold in a ___ market when it is first issued.
- ___ markets have the ability to purchase, sell, and deliver products at a rapid rate.
- Who must register bonds within the bond market?
- The purpose of trading within security markets is to buy orders at a ____ price.
Down
- Primary and secondary ___ are sold in a primary market.
- The most populated exchange in the U.S who owns trading rights with listed companies
- Zero-coupon bonds do not earn ____ within the bond market.
- ___ exchanges are formal secondary markets where sellers auction off orders and sell them at a high price.
- The ___(issuing stocks for the first time) typically occurs in a primary market.
- In a secondary market shares of stock are ___ to the public
15 Clues: Who must register bonds within the bond market? • ____ exchanges are markets that do not have a location. • Primary and secondary ___ are sold in a primary market. • Zero-coupon bonds do not earn ____ within the bond market. • A security is sold in a ___ market when it is first issued. • Future markets help protect against ___ of uncertain markets. • ...
DCO Review 2024-01-11
airport 2026-01-20
15 Clues: Tulli. • Ilmakuopat. • Lähtöportti. • Matkatavarat. • Nousu ilmaan. • Myöhästyminen. • Turvatarkastus. • Koneen käytävä. • Koneen kuljettaja. • Matkustusasiakirja. • Koneen henkilökunta. • Lentokenttärakennus. • Lentolippu koneeseen. • Laskeutuminen maahan. • Ilmoittautuminen lennolle.
Bullying Crossword! 2014-06-22
Across
- When you have committed bullying you are ______
- When you are excluded from a group
- A type of bullying that happens online
- Something that is unpleasant, angering or irritating is _________
- A type of bullying where the bully is calling someone nasty names or saying nasty comments
- Something that happens over and over again
- Knowingly causing pain or distress to others is being _____
Down
- A person that bullies
- When someone uses their fists to hurt someone it is ________
- Done deliberately
- A person that sees bullying happen
- A nasty comment can be very _______
- When you call someone nasty names you _____ them
- A person that gets bullied
- When you are by yourself you are _____
15 Clues: Done deliberately • A person that bullies • A person that gets bullied • A person that sees bullying happen • When you are excluded from a group • A nasty comment can be very _______ • A type of bullying that happens online • When you are by yourself you are _____ • Something that happens over and over again • When you have committed bullying you are ______ • ...
IT terms 2019-06-24
Across
- Main, starting page of a website
- Web page containing journal entries
- The company who produces IOS technology
- Social network originally created for college students
- Trail if data left when you use the internet
- Used to type on a computer
Down
- Website that is used to share and view videos
- A word that is used to secure private information when creating a profile on any online platform
- Copy, pasting someone’s work and not referencing
- World’s best and most popular search engine
- A machine that can make 3D objects out of materials
- A number system that only uses the numbers 0, 1. Helps computers operate
- Online encyclopedia
- Electronic mail
- bullying Bullying online
15 Clues: Electronic mail • Online encyclopedia • bullying Bullying online • Used to type on a computer • Main, starting page of a website • Web page containing journal entries • The company who produces IOS technology • World’s best and most popular search engine • Trail if data left when you use the internet • Website that is used to share and view videos • ...
CAB 2021-05-04
Across
- Someone watching the bullying happening.
- When no one is having fun.
- Spreading rumors, excluding people from games and groups
- When someone is being hurt on purpose.
- What is the A of the ABC's of bullying?
- What is the D of the ABC's of bullying?
- Someone that doesn't have a nice life, so they ___ to make them feel better.
Down
- Writing mean things on peoples Facebook, Instagram... etc
- What is the B of the ABC's of bullying?
- What is the C of the ABC's of bullying?
- When everyone is having fun.
- This is standing up to someone.
- Punching, kicking, or spitting.
- Name calling, threating.
- Attacked physically, socially,or emotionally.
15 Clues: Name calling, threating. • When no one is having fun. • When everyone is having fun. • This is standing up to someone. • Punching, kicking, or spitting. • When someone is being hurt on purpose. • What is the B of the ABC's of bullying? • What is the C of the ABC's of bullying? • What is the A of the ABC's of bullying? • What is the D of the ABC's of bullying? • ...
Browsing Safely 2025-06-19
Across
- who commit crimes using the internet or computers.
- list of websites, programs, or users that are blocked or denied access to a system or network because they are considered harmful or untrustworthy.
- process of converting information into a secret code to prevent unauthorized access. It helps keep data safe when sent over the internet.
- list of approved or trusted websites, programs, or users that are allowed to access a system or network.
- or junk messages, usually advertisements, sent over the internet, often in large amounts.
- Theft-Stealing someone’s personal information (like name, credit card number, or password) to commit fraud or crimes.
- files stored on your computer by websites to remember information about you, like login details or site preferences.
- use of electronic communication to bully or harass someone, typically by sending threatening
- software designed to damage, disrupt, or gain unauthorized access to computers or networks (examples: viruses, worms, spyware).
Down
- activities carried out using computers or the internet, such as hacking, data theft, or spreading viruses.
- method used by cybercriminals to trick people into revealing sensitive information (like passwords or bank details) by pretending to be a trustworthy source (like a bank or company).
- Password-A password that is hard to guess, usually made up of a mix of uppercase and lowercase letters, numbers, and special characters (e.g., P@ssw0rd!123), and is at least 8–12 characters long.
- security system (software or hardware) that blocks unauthorized access to or from a private network or computer, helping to protect against cyber threats.
- that automatically displays or downloads advertisements when you're online, often without your full knowledge or consent.
- type of malware that secretly gathers information from your device (like browsing habits or personal data) without your permission.
15 Clues: who commit crimes using the internet or computers. • or junk messages, usually advertisements, sent over the internet, often in large amounts. • use of electronic communication to bully or harass someone, typically by sending threatening • list of approved or trusted websites, programs, or users that are allowed to access a system or network. • ...
NSA Crossword 2014-05-17
Across
- not being observed or disturbed by other people
- set of information that gives information about other data
- information or documents designated as secret
- collection of valuable information
- keeping tabs on people, a close observation
- feeling that you are safe
- electronic surveillance program Snowden had been working on
- group of people that make decisions for a country or state
- person wanted by authorities of a another nation or state
Down
- country Snowden is currently staying in
- law that Snowden violated
- National Security Agency
- NSA agent that leaked governments top-secret documents
- state of being free within society
- what the NSA is trying to prevent
- crime of betraying one's country
- what every person is entitled to
17 Clues: National Security Agency • law that Snowden violated • feeling that you are safe • crime of betraying one's country • what every person is entitled to • what the NSA is trying to prevent • collection of valuable information • state of being free within society • country Snowden is currently staying in • keeping tabs on people, a close observation • ...
Carson 2021-03-04
Across
- bullying is?
- d of bullying there is an intent to hurt them
- punching kicking spitting.
- spreading rumors, exuding people from games.
- making fun of how someone looks and moves.
- pretending to be someone else on the internet.
Down
- no one is having fun, there is a solution.
- name calling
- b of bullying taller or shorter than someone else and think he or she is an easy target.
- everyone is having fun no one is hurt.
- c of bullying bullying constantly
- writing mean things about people on social media.
- a of bullying physical bully
13 Clues: name calling • bullying is? • punching kicking spitting. • a of bullying physical bully • c of bullying bullying constantly • everyone is having fun no one is hurt. • no one is having fun, there is a solution. • making fun of how someone looks and moves. • spreading rumors, exuding people from games. • d of bullying there is an intent to hurt them • ...
Mystery, Fashion, Business, Japan, Gaming 2025-05-08
Across
- To interact with followers' content
- To kill an enemy player in Valorant
- Your online identity and information
- Feeling that someone can't be trusted; important for online safety
- Bright, glowing colors often used in cyber aesthetics
- Popular topic or style that many people follow online
- Winning against the odds, often alone in gaming
Down
- A certain style or look for your online presence
- A cool, futuristic electronic device
- Your unique identity and style online
- The tech system that decides what content people see
- Being genuine and true to yourself online
- To earn money from online content
13 Clues: To earn money from online content • To interact with followers' content • To kill an enemy player in Valorant • A cool, futuristic electronic device • Your online identity and information • Your unique identity and style online • Being genuine and true to yourself online • Winning against the odds, often alone in gaming • A certain style or look for your online presence • ...
Sara Acman 2025-06-12
16 Clues: gulf • brook • stone • effect • battle • recall • worker • debris • powerful • inhabitant • firefighter • monthly pay • to be caught • to be situated • Security camera • a person who treats people
Thanksgiving Crossword 2021-10-07
Across
- A yellow vegetable grown by the Aboriginals
- ___ a pie in the oven
- A dessert eaten at Thanksgiving
- ___ the table before dinner
- A long journey over the ocean
- An object used to frighten birds
- ___ a turkey in the oven
- The month of Thanksgiving in Canada
- Something cooked inside the turkey
- Macy's has this festival every year
- Online shopping is popular on ___ Monday
- Gather the crops
Down
- The sound a turkey makes
- A popular sport played on Thanksgiving
- The early settlers who came to America in 1620
- The evening meal
- A large dinner celebration
- ___ Frobisher was an English explorer
- The nut of an oak tree
- A sauce that is poured over the turkey
- Americans ___ Thanksgiving in November
- Use a knife to ___ the turkey
- A white vegetable that resembles a pumpkin
23 Clues: The evening meal • Gather the crops • ___ a pie in the oven • The nut of an oak tree • The sound a turkey makes • ___ a turkey in the oven • A large dinner celebration • ___ the table before dinner • A long journey over the ocean • Use a knife to ___ the turkey • A dessert eaten at Thanksgiving • An object used to frighten birds • Something cooked inside the turkey • ...
BFCM 2024 2024-11-25
Across
- Pop artist Keith ......
- Our Bridgerton collection includes a design Fit For A .....
- Our Holiday Steals sale code ....24
- Rainbow rug name
- Black Friday/.... Monday
- Copenhagen is the capital city of this country.
- City that is home to our Australian plant.
- Who is the most inspirational frog?
- Customer Care Cup team led by Paul, ..... Finessers
- Jungalow founder and Ruggable collaborator Justina .....
- Customer Care Cup team led Lessly, Resolution .....
Down
- Nicki and Paris
- Day of the week our sale ends
- Large doormats
- Main color of the South Korean flag.
- Fun channel on Slack.
- Kamran Blue ...... Rug
- Customer Care Cup team led by Aja, Customer Support ...
- Customer Care Cup team led by Nohemi, The .... Crew
- Type of mattress in our pet beds.
- 2.5'x7' & 2.5'x10' rugs for example.
21 Clues: Large doormats • Nicki and Paris • Rainbow rug name • Fun channel on Slack. • Pop artist Keith ...... • Kamran Blue ...... Rug • Black Friday/.... Monday • Day of the week our sale ends • Type of mattress in our pet beds. • Our Holiday Steals sale code ....24 • Who is the most inspirational frog? • Main color of the South Korean flag. • 2.5'x7' & 2.5'x10' rugs for example. • ...
유형독해(고급) 4차시 단어시험 2016-07-27
26 Clues: 접근 • 전기 • 보안 • 전기의 • 가상의 • 정교한 • 반도체 • 익명의 • 특허권 • 주변의 • 전자의 • 계기판 • 회복하다 • 해독하다 • 재택근무 • 고안하다 • 설치하다 • 발명하다 • 호환가능한 • 최대화하다 • 세계화하다 • 문명화하다 • 전자상거래 • 연결을 끊다 • 광대역 회선 • 전송하다, 앞으로
Lesson 5 Deck 1 2018-03-01
23 Clues: ruins • island • tourist • lodging • welcome • to sail • expired • traveler • seatbelt • passport • accident • to return • dangerous • itinerary • campground • to be full • adventurer • to take off • high quality • room service • to take a trip • excursion; tour • safety; security
Las Noticias 2021-10-26
21 Clues: war • news • link • source • to lie • to say • to lack • because • to give • reliable • security • magazines • to follow • verifiable • to publish • to look for • to navigate • to interview • to broadcast • desorden disorder • to prove, to confirm
Spanish Vocabulary 2022-10-31
22 Clues: name • late • expect • hugged • On time • Landing • to show • airport • security • The seat • automatic • sometimes • The track • the plane • The flight • the window • The service • The hallway • the counter • the passport • the assistant • the electronic ticket
New Deal 2022-12-01
Across
- the first "R"
- ________ farming
- collective bargaining
- the second "R"
- court________
- Social__________
- 1932
- the third "R"
- NRA STAMP
- ______chats
Down
- overspending
- Banking__________
- alphabet______
- New Deal President
- retirement payment
- _______days
- virus
- ________Valley Authority
- government______
- __________Conservation Corps
- __________Adjustment Act
- "_______ itself"
22 Clues: 1932 • virus • NRA STAMP • _______days • ______chats • overspending • the first "R" • court________ • the third "R" • alphabet______ • the second "R" • ________ farming • Social__________ • government______ • "_______ itself" • Banking__________ • New Deal President • retirement payment • collective bargaining • ________Valley Authority • __________Adjustment Act • __________Conservation Corps
NAME:........................................................................... 2019-03-26
25 Clues: @ • tlen • błąd • plik • ekran • hasło • ciecz • komórka • głośnik • trójkąt • drukarka • skasować • załącznik • para wodna • środowisko • ustawienia • szczepionka • ciało stałe • zawiesić się • bezpieczeństwo • oprogramowanie • układ słoneczny • strona internetowa • pierwiastek chemiczny • wyszukiwarka internetowa
U7 How could you do that? 2020-03-30
27 Clues: koe • lupa • nolo • jutut • edessä • pettää • arvata • luvata • viesti • ihastus • juliste • salasana • tapahtua • ongelmat • selittää • kiusaaja • selittää • viimeisin • kiireinen • salaisuus • valehtelija • kateellinen • keskustella • turvallisuus • halaus, halata • pyytää anteeksi • poissa tolaltaan, järkyttynyt
Spanish Vocab 2023-04-26
26 Clues: gum • boat • bomb • door • hotel • candy • trick • shade • plane • to fly • turtle • simple • energy • weather • snorkle • airport • to fish • to walk • to flip • avocado • baggage • security • butterfly • water bottle • vez perchance • clothing store
Strange Stories Vocabulary 2024-10-24
22 Clues: UOF • sulec • fieht • reoyht • olicpe • tarser • beboryr • sestniw • lualaveb • fratcira • revoscid • cerutear • denecevi • rdaiseapp • edisin/boj • tsniprtoof • etagtisevni • ralam/mesyst • stinprergnif • veha/a/ryoeht • oklo/rof/esclu • cuseryit/mecara
Economics Vocabulary 2023-04-14
20 Clues: after • hourly • annual • before • taken out • collectors • tax season • contribution • income based • self employed • illegal fraud • money received • money generated • national programs • verifies employment • reports withholdings • allowances/dependents • medicare/social security • permanent workers/residents • money earned minus deductions
Business Words 2026-03-24
27 Clues: User • Risk • Loan • Rich • Poor • Rival • Money • Owned • Share • Create • Income • Borrow • Example • Feedback • Proposer • Security • Valuable • Exchange • Resources • Materials • Creativity • Bought/Sold • Legal Entity • Responsibility • Brand Permission • Partial Ownership • Influencing Market
Social Security Puzzle 2024-01-19
13 Clues: 1 week • location • Birthday • enforcers • ______ age • not a pension. • ______ pension • In with the new • Out with the old • long term benefit • Short term benefit • meets requirements. • pension ______ (2012)
Law and Public Safety 2025-11-10
dinny be a bully or a will smash ya head in 2018-11-23
Across
- how many people have experienced bullying under the age of 25
- how many people have suffered on line bullying
- bulling What is the name of internet bulling
- what is the biggest killer of males under 40
- how many people have experienced verbal bullying
Down
- what is louie
- what is the form hittng someone
- what people are most likely to get target
- the well being of your mind
9 Clues: what is louie • the well being of your mind • what is the form hittng someone • what people are most likely to get target • bulling What is the name of internet bulling • what is the biggest killer of males under 40 • how many people have suffered on line bullying • how many people have experienced verbal bullying • ...
ICT Crossword 2019-07-08
Across
- a diagram used to visually organize information.
- search for information about (someone or something) on the Internet using this search engine
- a hacker who violates computer security for personal gain or maliciousness.
- an interactive computer application for organization, analysis and storage of data in tabular form.
- an electronic device for storing and processing data
- a project management tool that provides a graphical representation of a project's timeline.
- A bad phone company
Down
- a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
- an organized collection of data, generally stored and accessed electronically from a computer system
- that ensures the security of an organization's information systems.
- a type of bar chart that illustrates a project schedule
- Where you create a database
- computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
- specific measurable achievable relevent timely
- Where you create a spreadsheet
15 Clues: A bad phone company • Where you create a database • Where you create a spreadsheet • specific measurable achievable relevent timely • a diagram used to visually organize information. • an electronic device for storing and processing data • a type of bar chart that illustrates a project schedule • that ensures the security of an organization's information systems. • ...
Security Newsletter Puzzle 2021-05-19
Across
- the unauthorized disclosure could be expected to cause serious damage to national security
- a threat an employee will use his or her authorized access, wittingly or unwittingly, to do harm to the security of the United States
Down
- _________ Counterintelligence and Security Agency
- Communication Security
- Formally FOUO
- Form that is placed inside the safe
- One method to ship Top Secret material
7 Clues: Formally FOUO • Communication Security • Form that is placed inside the safe • One method to ship Top Secret material • _________ Counterintelligence and Security Agency • the unauthorized disclosure could be expected to cause serious damage to national security • ...
Travelling 2019-02-19
18 Clues: lend • toll • mugav • kohver • mündid • saabuma • vedelikud • eemaldama • deklareerima • pillow lisapadi • pass pardakaart • luggage käsipagas • check turvakontroll • seat aknapoolne koht • a train rongile jõudma • lennule registreerimine • seat vahekäigupoolne koht • ukseava (turvakontrollis)
종윤 2023-02-15
Avancemos: 1.1 Vamos de vacaciones 2023-11-06
18 Clues: - Arrival • - Customs • - Security • - To board • - Suitcase • - Departure • - Passanger • - To travel • - The ticket • - The airport • - Travel Agent • - The passport • - The itinerary • - Travel agency • - Identification • - To go on a trip • - Flight attendant • - To check baggage
MSA Crossword 2022-02-15
18 Clues: dog • smell • agent • freight • finding • Xray tool • certainty • see inside • try to find • surveillance • .38 revolver • flying robot • metal detector • blasting agent • explosive stick • explosive device • MSA canine program • volatile chemical compound
Security Plus Chapter 4 2024-03-07
Across
- validate a main domain along with all subdomains
- An entity that is trusted by others
- digitally sign a program
- A list of certificate serial numbers that have been revoked
- an extension to X.509 that allows various values to be associated with a security certificate
- replaces SSL
- Tracing a certificate back to the highest level of a CA
- publicly accessible centralized directory of digital certificates
- Data that is encapsulated within a secure outer shell
- A method of controlling public keys
- performs a real-time lookup of a certificate’s status
Down
- multiple CAs that sign digital certificates
- management of keys and digital certificates at scale
- web servers send queries to the OCSP Responder
- confidence in or reliance on another person/entity
- associate a user’s identity to a public key
- The entity that is responsible for digital certificates
- A process in which keys are managed by a third party
- A protocol suite for securing Internet Protocol (IP) communications
19 Clues: replaces SSL • digitally sign a program • An entity that is trusted by others • A method of controlling public keys • multiple CAs that sign digital certificates • associate a user’s identity to a public key • web servers send queries to the OCSP Responder • validate a main domain along with all subdomains • confidence in or reliance on another person/entity • ...
Chapter 8 Security Plus 2024-03-20
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
Marie Van Brittan Brown 2023-02-28
10 Clues: system • There were also ? • when was it invented? • was marie a ever a nurse? • what were some of the things? • who helped Marie Van Brittan Brown? • That helped some people check thier? • who were the future inventors of home • American inventor marie was the first?? • Brown who invetned home security systems?
technology vocabulary 2021-08-13
Across
- put into format that can be read or processed by computers
- set up for a particular purpose
- a unit of measurement of information
- crime commited using a computer and the internet
- transfer a file or program to a smaller computer
- space a world wide network of of computer networks
- any small compartment
- an organized body of related information
Down
- a program thatgives a computer instrucctions
- a listing of the computer files stored in memory
- the exclusive right to sell a work
- locate and correct errors in a computer program code
- transfer a file or program to a smaller computer
- restore something reduced in volume to it's full volume
- a data transmmision rate for modems
15 Clues: any small compartment • set up for a particular purpose • the exclusive right to sell a work • a data transmmision rate for modems • a unit of measurement of information • an organized body of related information • a program thatgives a computer instrucctions • a listing of the computer files stored in memory • crime commited using a computer and the internet • ...
Vamos De Viaje Vocab Quiz 2016-10-01
15 Clues: gate • ticket • screen • flight • luggage • airport • to arive • passport • suitcase • passenger • departure • bathing suit • to get in line • identification • to go through security
Cyber Security 2017-06-30
Credit Card 2024-05-23
Across
- The measure of your credit health.
- The cost sometimes charged for card use or for missing payments.
- The security code that shows you are in possession of the card.
- The time between a purchase and when the bill must be paid.
- The agreement to use money from a financial institution with an agreement to pay it back.
- Your credit history can be requested by an _______________ for hiring decisions.
- How much you pay for ________________ may be related to your credit history.
- The bonus returned to you for regular use of the credit card.
Down
- A risk of credit card convenience can be ___________________.
- A security device in your credit card.
- Money owed for purchases made with a financial loan.
- The percentage rate of the debt when you don't pay your bill in full.
- Your minimum payment amount can be found on your credit card _______.
- You will not have to pay any ________________ if you pay your bill in-full before the first due date.
- The plastic tool that contains security features and your credit account name and number.
15 Clues: The measure of your credit health. • A security device in your credit card. • Money owed for purchases made with a financial loan. • The time between a purchase and when the bill must be paid. • A risk of credit card convenience can be ___________________. • The bonus returned to you for regular use of the credit card. • ...
SOAL KABINET SUKIMAN 2024-10-17
Across
- tugas utama dari Kabinet Sukiman adalah menjaga stabilitas keamanan...
- Siapa yang menjadi Wakil Perdana Menteri dalam Kabinet Sukiman?
- Apakah nama perjanjian bantuan militer yang ditandatangani oleh Kabinet Sukiman dengan Amerika Serikat?
- Kabinet sukiman suwiryo bertugas selama...bulan
- Tujuan dari penyelenggaraan pemilihan umum yang direncanakan Kabinet Sukiman adalah untuk membentuk dewan?
- Kabinet Sukiman-Suwirjo diumumkan pada 26...1951
- Perjanjian Mutual Security Act membuat Indonesia dianggap sebagai bagian dari?
- Salah satu program Kabinet Sukiman-Suwirjo adalah mempercepat penempatan mantan pejuang dalam...
Down
- Kebijakan politik luar negeri yang dijalankan oleh Kabinet Sukiman-Suwirjo bersifat?
- Akibat dari kritik dan tekanan terhadap ditandatanganinya perjanjian Mutual Security Act adalah Kabinet Soekiman mengembalikan amanat kepada?
- Wilayah apa yang ingin dimasukkan ke dalam Republik Indonesia dalam waktu sesingkat-singkatnya menurut Kabinet Sukiman-Suwirjo?
- Program kemakmuran nasional jangka pendek yang dicanangkan Kabinet Sukiman bertujuan untuk meningkatkan kehidupan?
- Siapa yang menandatangani perjanjian Mutual Security Act di pihak Amerika Serikat?
- Langkah pertama yang diambil Kabinet Sukiman-Suwirjo adalah Menjalankan tindakan tegas sebagai negara hukum untuk menjamin...
- Kabinet Sukiman-Suwirjo adalah kabinet ke berapa setelah pembubaran Republik Indonesia Serikat (RIS)?
15 Clues: Kabinet sukiman suwiryo bertugas selama...bulan • Kabinet Sukiman-Suwirjo diumumkan pada 26...1951 • Siapa yang menjadi Wakil Perdana Menteri dalam Kabinet Sukiman? • tugas utama dari Kabinet Sukiman adalah menjaga stabilitas keamanan... • Perjanjian Mutual Security Act membuat Indonesia dianggap sebagai bagian dari? • ...
jobs 2015-12-10
bullying 2026-03-20
7 Clues: not include* • type of bullyng • type of bullying • type of bullying • to lash down or together. • repetitive, intentional hurting of one person • bullying repetitive intentional hurting of one person in a social media
2003 2013-01-18
Across
- This position controls entry to restricted areas. They perform duties in one of the most sensitive positions in the Air Force Installation Security Program. They must apply controls that ensure only authorized personnel are admitted to restricted areas
- _______supervise and are responsible for ensuring the training of the following personnel. Training includes on-the-job and proficiency training requirements.
- HQ Air Force Security Force Center provides Air Force commanders with guidance on implementation of DAF Civilian Police and Security Guard program to include guidance on organizing, training, and _________ DAF Civilian Police and Security Guards.
- AF/A7S serves as _____________of DAF CP/SG career field.
Down
- ___________ are required at all installations supporting Protection Level 1, 2, or 3 resources. These teams are response elements consisting of two properly armed and equipped Security Forces members.
- These individuals establish command unique programs and policies to ensure the effective use of the DAF Civilian Police and Security Guards in the protection of command installations, personnel and resources. Responsible for primarily managing and guiding Security Forces programs within their commands.
- This position consists of four Security Forces members on one team, or any combination of internal and external SRTs who respond to situations involving protection level resources and may work in smaller teams.
- This position is responsible for base security and protection outside of restricted/controlled areas in addition to the following: responds to emergencies and calls for assistance, secures crime scenes and collects evidence, utilizes specialized equipment, takes reports and statements, conducts building checks, and finally accomplishes any other assigned duties.
8 Clues: AF/A7S serves as _____________of DAF CP/SG career field. • _______supervise and are responsible for ensuring the training of the following personnel. Training includes on-the-job and proficiency training requirements. • ...
2003 2013-01-18
Across
- This position controls entry to restricted areas. They perform duties in one of the most sensitive positions in the Air Force Installation Security Program. They must apply controls that ensure only authorized personnel are admitted to restricted areas
- AF/A7S serves as _____________of DAF CP/SG career field.
- _______supervise and are responsible for ensuring the training of the following personnel. Training includes on-the-job and proficiency training requirements.
- HQ Air Force Security Force Center provides Air Force commanders with guidance on implementation of DAF Civilian Police and Security Guard program to include guidance on organizing, training, and _________ DAF Civilian Police and Security Guards.
- These individuals establish command unique programs and policies to ensure the effective use of the DAF Civilian Police and Security Guards in the protection of command installations, personnel and resources. Responsible for primarily managing and guiding Security Forces programs within their commands.
Down
- This position consists of four Security Forces members on one team, or any combination of internal and external SRTs who respond to situations involving protection level resources and may work in smaller teams.
- ___________ are required at all installations supporting Protection Level 1, 2, or 3 resources. These teams are response elements consisting of two properly armed and equipped Security Forces members.
- Patrols _______ Patrols are responsible for base security and protection outside of restricted/controlled areas in addition to the following: responds to emergencies and calls for assistance, secures crime scenes and collects evidence, utilizes specialized equipment, takes reports and statements, conducts building checks, and finally accomplishes any other assigned duties.
8 Clues: AF/A7S serves as _____________of DAF CP/SG career field. • _______supervise and are responsible for ensuring the training of the following personnel. Training includes on-the-job and proficiency training requirements. • ...
Work and jobs - 1 2021-11-26
14 Clues: cook • artist • soldier • outdoors • goldsmith • carpenter • paramedic • undertaker • car mechanic • sportsperson • police officer • security guard • shop assistant • construction worker
abcd 2023-12-22
Staff Meeting 11/8 2013-11-07
Across
- is being served at the Nov. 14th Town Hall
- make sure you write you ____ on the document going around
- put the tutor evals. in the ____ binder
- you need to be back from winter break on January
- will be giving residents evaluations
Down
- are due November 10th
- is on call next week
- water bottles in the Cyber are not
- request shift off is due November
9 Clues: is on call next week • are due November 10th • request shift off is due November • water bottles in the Cyber are not • will be giving residents evaluations • put the tutor evals. in the ____ binder • is being served at the Nov. 14th Town Hall • you need to be back from winter break on January • make sure you write you ____ on the document going around
Scorpion 2025-08-22
Across
- Human calculator, math genius with OCD
- Homeland Security agent who mentors and protects the team
- Toby’s profession
- Walter’s main skill, besides inventing solutions
- What eventually grows between Walter and Paige
- Former waitress who helps the team connect emotionally
- Team shrink and behaviorist with gambling issues
- What the group calls themselves, despite constant clashes
Down
- Paige’s genius son mentored by Walter
- Word often used to describe the group’s members
- Team leader with a genius IQ of 197
- Security agency Cabe works for
- Name of the genius team in the show
- Happy’s area of expertise
- Mechanical prodigy and only female genius on the team
- What Sylvester is often compared to
- Walter’s sister, battled multiple sclerosis
17 Clues: Toby’s profession • Happy’s area of expertise • Security agency Cabe works for • Team leader with a genius IQ of 197 • Name of the genius team in the show • What Sylvester is often compared to • Paige’s genius son mentored by Walter • Human calculator, math genius with OCD • Walter’s sister, battled multiple sclerosis • What eventually grows between Walter and Paige • ...
Chapter 1 part 1 2023-09-23
16 Clues: man • name • woman • gender • address • language • last name • city, town • first name • nationality • postal code • phone number • date of birth • email address • personal details • social security number
2nd Quarter Security Training 2021-06-17
Across
- Any check placed on a hold longer than 7 business days must be deposited into a __________ account.
- Per ______________ a check that is placed on a seven business day hold and deposited into a checking account must release $225 the next business day after it was deposited, $5300 the second business day, and the remaining check amount on the seventh business day.
- All checks will be placed on a 7 business day hold during the first 30 days for a ________________.
- How many numbers are in a Canadian routing number?
- These checks will never require a hold.
- An account that has been negative for more than 6 business days during the past six months will have a warning that says "___________ Check Hold Warning".
- An account with this warning will be subject to seven business day check holds on all checks.
- Checks deposited into the ATM will automatically have a ______ day hold.
- Checks placed on a hold longer than 2 business days require a __________________.
Down
- Ask ________ to understand where the member obtained the check from and for what purpose.
- A type of endorsement that involves signing the back of the check the exact way it is written on the front.
- When the numerical amount and the written amount on a check do not match, the check can only be negotiated for what is on the _________.
- To prevent check fraud, always verify the member’s _______ on the front of the check before negotiating an OnUs check.
- If the endorsement states __________ to any financial institution other than MSGCU, do NOT accept the check. If the endorsement lists MSGCU _________, the check should not be accepted until a supervisor can review with Accounting. (Hint: same answer for both blanks)
- A check made out to a _______ can only be deposited into that ________ account. (hint: same word)
- A type of endorsement that involves signing the back of the check under the words “For Deposit Only”
- These checks cannot be deposited at MSGCU because we do not offer the type of account it needs to be deposited into.
- These checks must be deposited into an account where the payee(s) has access to the funds.
- A type of endorsement that is used when the receiver of the check wants someone to get the money. Includes the words “Pay to the Order of”. We call this a 3rd Party check.
19 Clues: These checks will never require a hold. • How many numbers are in a Canadian routing number? • Checks deposited into the ATM will automatically have a ______ day hold. • Checks placed on a hold longer than 2 business days require a __________________. • Ask ________ to understand where the member obtained the check from and for what purpose. • ...
Security Plus Chapter 3 2024-02-29
Across
- The process of changing encrypted text into the original text
- uses two mathematically related keys
- two or more different messages that produce the same hash value
- evidence or proof of something
- A removable external cryptographic device
- digital fingerprints
- A downgrade attack
- to implementing an older and less secure mode “fall back”
- An electronic verification of the sender
Down
- bruteforce collision attack that exploits the probability theory
- denial of the truth or validity of something
- The process of changing plaintext into ciphertext
- hiding data within an ordinary, nonsecret file
- cryptoprocessor
- object whose state cannot be modified after it is created
- decentralized, distributed and public digital ledger
- is a finite sequence of rigorous instructions
- The process of sending and receiving secure cryptographic keys
- protect the entire hard drive using cryptography
19 Clues: cryptoprocessor • A downgrade attack • digital fingerprints • evidence or proof of something • uses two mathematically related keys • An electronic verification of the sender • A removable external cryptographic device • denial of the truth or validity of something • is a finite sequence of rigorous instructions • hiding data within an ordinary, nonsecret file • ...
Chapter 8 Security Plus 2024-03-20
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
October 2020 Newsletter Crossword Puzzle 2020-10-05
Across
- A tool used to discover passwords.
- A password based cyberattack where the attacker uses your credentials that were released as a data breach and uses it for other accounts.
- Concept of connecting a device with an on and off switch to the internet and/or to each other.
Down
- A cyber attacker uses a powerful computer to test every combination of letters, numbers, and characters to hack a password.
- A cyber attacker uses a powerful computer to try every word in what vocabulary reference book to see if the word is a password?
- Practice of using social tactics to gain information from people or get people to do things they would not normally do.
- Hardware that has wireless sensors which transmit data from one place to another over the internet.
- U.S. Department of Agriculture’s Personal Identity Verification (PIV) card for access to federal facilities and computers.
- A word, phrase or string of characters that are private for an authorized user and allow access to a computer system or service.
- Virtual communities or networks that use interactive computer technology to promote creating and sharing ideas, career interests, photos, information, and other forms of expression.
10 Clues: A tool used to discover passwords. • Concept of connecting a device with an on and off switch to the internet and/or to each other. • Hardware that has wireless sensors which transmit data from one place to another over the internet. • Practice of using social tactics to gain information from people or get people to do things they would not normally do. • ...
Das Internet 2017-03-09
7 Clues: Wann wurde Facebook gegründet? • Welcher Firmer gehört Yoututbe? • Eine aktuelle Gefahr im Internet • Von wem wurde Youtube gegründet? • Was war die erste Sociale plattform? • Wie laute die erste App mit einer Story? • Mit was zahlen große Konzerne ihre Rechnungen
Computing Test 2019-06-17
7 Clues: hacking • bullying online • a law or a set of laws • intelligence that is not human • someone who has data stored about them • the divide between people with internet and not • hackers putting bad things in files to hack you
Types of Bullying 2013-08-12
7 Clues: someone. • a person's feelings. • someone like an outcast. • calling, saying hurtful things. • hurting a person such as spreading rumours. • information and communication technologies to bullying someone. • someone's relationship, excluding, making the person feel left out etc.
9-1-1 Officer Ch 4 Police Overview 2023-03-15
Across
- The misappropriation of money
- Forcibly taking someone's vehicle
- Geographical area of authority
- _______ Services Division includes vehicle maintenance
- Division that includes Chief or Sheriff
- _______Process includes child support warrants
Down
- Division that handles safe transfer of inmates
- _______ Patrol Division is primarily sworn officers
- Security provides security for judges
- ________ Warrants handles execution of warrants
10 Clues: The misappropriation of money • Geographical area of authority • Forcibly taking someone's vehicle • Security provides security for judges • Division that includes Chief or Sheriff • Division that handles safe transfer of inmates • _______Process includes child support warrants • ________ Warrants handles execution of warrants • ...
mc 2025-03-19
Across
- WTLS provides this to verify the identity of the communicating parties
- The layer in WAP responsible for managing session states
- The layer in WAP responsible for security
- WTLS provides this to ensure data is private
- The protocol used in the Security Layer of WAP
- WTLS is optimized for this type of bandwidth
Down
- WTLS is designed to work efficiently in this type of delay network
- WTLS is based on this protocol
- WTLS provides this to ensure data has not been tampered with
- WTLS is based on this protocol
10 Clues: WTLS is based on this protocol • WTLS is based on this protocol • The layer in WAP responsible for security • WTLS provides this to ensure data is private • WTLS is optimized for this type of bandwidth • The protocol used in the Security Layer of WAP • The layer in WAP responsible for managing session states • ...
CASP - Governance 2022-01-26
Across
- protects patient's healthcare information
- International standard on how to manage information security
- Guide to test, training, and exercise programs for IT Plans and capabilities
- International framework and process for managing risk
Down
- protects the data of financial institution customers
- supplementary standard that provides advice on how to implement security controls
- covers the steps in the RMF that address security control selection for federal information systems
- protects financial information of public companies
- 27031 Guidelines for information and communication technology readiness for business continuity
9 Clues: protects patient's healthcare information • protects financial information of public companies • protects the data of financial institution customers • International framework and process for managing risk • International standard on how to manage information security • Guide to test, training, and exercise programs for IT Plans and capabilities • ...
CIS Knowledge Hub 2025-02-20
Across
- Which Microsoft-owned SAST platform focuses on secure code analysis?
- Which security test simulates a real attack on a system?
- Which testing mixes internal knowledge and external behavior?
- Which testing checks functionality without seeing the internal code?
- Which analysis tests security while the application is running?
- Which free DAST tool from OWASP scans running web apps?
Down
- Which testing is done with full visibility of code?
- Which analysis scans source code for vulnerabilities?
- Which DAST tool by PortSwigger is used widely for web security testing?
9 Clues: Which testing is done with full visibility of code? • Which analysis scans source code for vulnerabilities? • Which free DAST tool from OWASP scans running web apps? • Which security test simulates a real attack on a system? • Which testing mixes internal knowledge and external behavior? • Which analysis tests security while the application is running? • ...
Five Nights at Freddy's 2023-09-07
Across
- How do you defend against animatronic attacks in FNaF Special Delivery
- What is the name of the protagonist in Five Nights at Freddy's 3
- The main thing you have to do to animatronics in the game in FNaF 6
- The security guard's shift lasts for this many hours
- What is the objective of the player in "Security Breach"
- The animatronic that hides in the dark corners of the restaurant in FNaF 1
- The animatronics' objective during the night in FNaF 1
- What is the highest difficulty level in Ultimate Custom Night
- The animatronic who performs on the Ballora Gallery stage in SL
- What animatronic does The Puppet reside in FNaF 6
- The animatronic that moves frequently in FNaF 1
- The main character you play as in FNaF 2
- What is the setting of "Tales From the Pizzaplex"
- How many different mini-games are there in "Five Nights at Freddy's: Help Wanted"
- The newspaper headlines often seen in the game in FNaF 1
- What is the DLC for FNaF Security Breach
- The protagonist's primary defense mechanism in FNaF 1
- The 2nd most popular Withered animatronic in FNaF 2
- What is the ultimate goal of the organization responsible for creating and experimenting on the animatronics
- The animatronic that frequently appears in the East Hall in FNaF 1
- What is the title of the second novel in the Five Nights at Freddy's book series by Scott Cawthon and Kira Breed-Wrisley, known for its eerie and unsettling characters
- The main character and protagonist of FNAF 6, known as the "Cassette Man" in FNaF 6
- The room where you wind up the music box to keep the Puppet at bay in FNaF 2
- The animatronic that hides in the closet in FNaF 4
- Who is the main protagonist in FNaF Silver Eyes
- What is the name of Charlie's childhood friend and love interest in "The Silver Eyes"
- The creepy marionette that haunts the establishment in FNaF 2
- What was the "Curse of Dreadbear" DLC in FNaF: Help Wanted made for
- What happens to you when the ventilation system fails in FNaF 3
- The task of burning down the establishment is carried out on this night in FNaF 6
- In the story, what tragic event from the past continues to haunt the characters and plays a pivotal role in the plot
- The name of the horror attraction where the game is set in FNaF 3
- What is the purpose of collecting tapes in the game in HW
- What is the primary gameplay mechanic in FNaF Special Delivery
- The main protagonist of Five Nights at Freddy's 4
- Phone Guy is replaced by who in FNaF 3
- What is the name of the animatronic who copy's Gregory's voice in SBR
- A life-size animatronic bear who entertains during the day in FNaF 2
- Who saves you from the Mimic in SBR
- Who do you play as in FNaF Security Breach Ruin
- What animatronic does William Afton reside in in FNaF Security Breach
- What type of animatronics replace the normal ones in FNaF 3
- In what year did Five Nights at Freddy's 4 take place
- What Twisted animatronic did Foxy dismantle in "The Twisted Ones" Novel
Down
- The name of the restaurant where the game takes place in FNaF 1
- The name of the underground facility in Sister Location
- Who does the player play as in FNaF Security Breach
- The animatronic that resembles a Funtime Freddy, with several animatronic parts merged in FNaF 6
- The day shift security guard, who leaves recorded messages in FNaF 1
- The main character and security guard in FNaF 1
- The name of the pizzeria where FNAF 2 takes place
- The phone guy's profession
- What character do the Minireenas crawl into in "Room for one more"
- What is the name of the minigame where you play as Balloon Boy in FNaF 3
- What is the Acronym for Five Night at Freddy's
- What Twisted animatronic killed Charlie in the "The Twisted Ones" Novel
- The room where you access the Ennard control module in SL
- What type of game is Freddy in Space 1
- Who makes the Fnaf games?
- What type of animatronics are in FNaF world
- The name of the terrifying yellow animatronic bear in Five Nights at Freddy's 4
- The animatronic who is responsible for "scooping" Mike in Sister Location
- What is the specific event from Charlie's past that drives her to return to her hometown and investigate the dark history of Freddy Fazbear's Pizza in "The Silver Eyes"
- The technician who assists you throughout the game in SL
- What role does the player take on in the game's story mode in HW
- What is the title of the first book in the Fazbear Frights series
- What is the main platform people play Ultimate Custom Night on
- What model is Glamrock Freddy in FNaF Security Breach Ruin
- The security office's primary source of information in FNaF 1
- The animatronic who has a rabbit on his hand in SL
- The room where you encounter Funtime Freddy in SL
- The animatronic that resembles a broken clown and is a central character in the game in FNaF 6
- Who is the main antagonist in "FNaF: Help Wanted"
- The man behind the mask
- What is the name of the animatronic that replaces Foxy in FNaF Security Breach
- In the novel, what is the primary objective of the clandestine organization that experiments on animatronics
- Where does the creepy laughter of the animatronics come from
- In "Fetch," what is the name of the animatronic dog
- The important event that many believe to happen in FNaF 2
- How many animatronic characters can you choose from in Ultimate Custom Night
80 Clues: The man behind the mask • Who makes the Fnaf games? • The phone guy's profession • Who saves you from the Mimic in SBR • What type of game is Freddy in Space 1 • Phone Guy is replaced by who in FNaF 3 • The main character you play as in FNaF 2 • What is the DLC for FNaF Security Breach • What type of animatronics are in FNaF world • ...
Time for the Updates! 2023-09-13
Across
- Companies will often release an update to ______ a specific security vulnerability.
- Attackers use security vulnerabilities to _______ weaknesses and gain access to your system or network.
- All software eventually reaches _______ __ ______ where it is no longer supported with updates and patches. You should avoid using this software at this point.
- It’s important to install updates as soon as possible. They are usually released to fix ________ vulnerabilities.
- Not updating your software can make your system _______ to hackers or malware.
Down
- Whenever possible, you should always enable ______-updates on your computer or cellphone.
- Only download and install software updates from _______ sources.
- Some software updates may require a device or system ______ to fully install.
- It’s very important to install _____ as soon as they are available. This reduces possible security vulnerabilities.
9 Clues: Only download and install software updates from _______ sources. • Some software updates may require a device or system ______ to fully install. • Not updating your software can make your system _______ to hackers or malware. • Companies will often release an update to ______ a specific security vulnerability. • ...
JOBS OR OCCUPATIONS 2023-11-10
Across
- A person who spends his/her mental or physical power
- A person who reports events
- A person who deals with people's lives
- A person who can use transportation vehicles
- A person who maintains security of country
- A person who designs and maintains machines
Down
- A person who produces fruits, vegetables
- Woman serving in restaurants
- Men serving in restaurants
- A person who designs home, cities
- A person who vaccinates people
- A person who maintains security of city
12 Clues: Men serving in restaurants • A person who reports events • Woman serving in restaurants • A person who vaccinates people • A person who designs home, cities • A person who deals with people's lives • A person who maintains security of city • A person who produces fruits, vegetables • A person who maintains security of country • A person who designs and maintains machines • ...
Compliance Program 2021-05-04
Across
- The Federal Aviation Administration (FAA) sets regulations to adopt specific rules for the operation of small Unmanned Aircraft Systems for this compliance category
- if required by a contract requirements may apply to purchases of iron, steel and other manufactured products permanently incorporated into infrastructure projects. Further, these projects must be undertaken by U.S. states and municipalities with funds issued by certain U.S. federal departments and agencies
- The use of cranes and similar types of lifting equipment can pose special hazards for the Company and its employees. To avoid the risk of serious accidents, employees are required to follow policies within the Corporate Crane Procedures
- Kiewit is required by the USCG to periodically provide a Certificate of Financial Responsibility(COFR), Certificate of Inspection (COI) and Certificate of Documentation(COD) for this category.
- Kiewit utilizes a USDOT number and requires an operator to be licensed to be able to operate commercial motor vehicles
- deals with cyber security and often is related to phishing attacks
Down
- This category defines the process to transport equipment and material internationally
- Engage a team (Legal and operation stakeholders) in developing, reviewing, and/or updating processes, procedures, and controls that best meet the Company’s needs, and can be consistently applied by operations groups and other stakeholders
- Relates to Price fixing, comparing bids, agreements to be noncompetitive or allocating bids
- deals with the payment requirements to employees who work for contractors that work on federal and public buildings, typically related to the Davis-Bacon Act
- deals with the training of operators and the plans for how to operate manlifts (abbreviation)
- The document will assist each location to assemble a functional set of procedures, monitoring measures, and training requirements that, when implemented, will minimize their compliance risk
12 Clues: deals with cyber security and often is related to phishing attacks • This category defines the process to transport equipment and material internationally • Relates to Price fixing, comparing bids, agreements to be noncompetitive or allocating bids • deals with the training of operators and the plans for how to operate manlifts (abbreviation) • ...
Vocabulario 1 2021-09-27
Airport Cristina 2019-11-28
New Deal Legacy 2024-03-24
Lady Diana 2026-04-07
Chashless society 2024-09-02
Across
- How non-cash make it easier to travel?
- Reason for declining cash?
- What is the dark side of a cashless society?
- The impact of cashless on business?
- Why is printing money considered a loss?
- Why are non-cash payment instruments easier to use than money?
- Why are illegal transactions easier with cash?
- What are the disadvantages of the non-cash payment system?
- Risk of system failure?
- Why is cashless more efficient?
- Impact of system failure on traders?
Down
- What is the main disadvantage of non-cash payments?
- What are the main advantages of a cashless system?
- What is easy money laundered?
- Why do banks need high security in the cash system?
- What are the risks of electronic money?
- How does cash affect bank security
- Cashless concerns?
- What are the benefits of going cashless while traveling?
- The impact of negative interest rates?
20 Clues: Cashless concerns? • Risk of system failure? • Reason for declining cash? • What is easy money laundered? • Why is cashless more efficient? • How does cash affect bank security • The impact of cashless on business? • Impact of system failure on traders? • How non-cash make it easier to travel? • The impact of negative interest rates? • What are the risks of electronic money? • ...
NSA Crossword 2014-05-17
Across
- information or documents designated as secret
- country Snowden is currently staying in
- keeping tabs on people, a close observation
- collection of valuable information
- what every person is entitled to
- what the NSA is trying to prevent
Down
- electronic surveillance program Snowden had been working on
- person wanted by authorities of a another nation or state
- National Security Agency
- NSA agent that leaked governments top-secret documents
- not being observed or disturbed by other people
- law that Snowden violated
- feeling that you are safe
- state of being free within society
- group of people that make decisions for a country or state
- crime of betraying one's country
- set of information that gives information about other data
17 Clues: National Security Agency • law that Snowden violated • feeling that you are safe • what every person is entitled to • crime of betraying one's country • what the NSA is trying to prevent • state of being free within society • collection of valuable information • country Snowden is currently staying in • keeping tabs on people, a close observation • ...
Schramm ITSCM 280 rev 2023-02-14
Across
- Redundant Array of Independent Drives
- Different kind of data being generated
- A disadvantage of big data is high ____ rate.
- The ____ layer is the top layer of the OSI model
- Network topology with common backbone
- Cable with inner conductor wire and insulation
- RAID 0 name
- The ____ layer is the bottom layer of the OSI model
- Emotion security breacher pray on
Down
- Cloud where apps and data are business critical
- One disadvantage of cloud computing is loss of ___
- Mechanism to bring the meaning out of big data
- Fastest growing cloud service
- A security breach activity using email
- OSI layer where IP address is used
- MAC address stands for Media Access _____
- Increase ____ is a disadvantage of big data
- Abbreviation for Distributed Denial of Service
18 Clues: RAID 0 name • Fastest growing cloud service • Emotion security breacher pray on • OSI layer where IP address is used • Redundant Array of Independent Drives • Network topology with common backbone • Different kind of data being generated • A security breach activity using email • MAC address stands for Media Access _____ • Increase ____ is a disadvantage of big data • ...
the Kennedys 2022-02-13
17 Clues: wife • shedder • gf girl • two dads • the best • the baby • St Lukes • security • detective • southwest • first born • has a wife • girl friend • almost bald • oldest twin • future badge • youngest twin
Museum 2023-05-23
13 Clues: Карта • Билет • Лондон • Охрана • звезда • выставка • кафетерий • Посетитель • скульптура • экскурсовод • Ложные новости • Магазин сувениров • произведение искусства
No privacy 2024-04-19
13 Clues: цель • почти • чтобы • хранить • улучшить • повысить • проводить • наблюдение • приватность • исследование • безопасность • записывать (на аудио) • покупательские привычки
Tech definitions 2016-08-31
Across
- Computer-aid design for techs and artists
- The code to let us run the software.
- It is a common measurement for data speed
- A network security system
- The first page you get to when you open the internet
- Local area network
- It is the most effective way to get data security
- To prepare a chosen partition on the drive.
Down
- printing A printer that prints a 3 dimensional figure
- the indicator that is on the screen
- It is used to create complete applications
- management systems
- the most widely used internet in that local area
- The measurement of data that is transferred in a second
- A person who gets into someone else's account.
- the internet
- Joint Photographic Experts Group
- Domain name system
18 Clues: the internet • management systems • Local area network • Domain name system • A network security system • Joint Photographic Experts Group • the indicator that is on the screen • The code to let us run the software. • Computer-aid design for techs and artists • It is a common measurement for data speed • It is used to create complete applications • ...
2025 Cybersecurity Awareness Month 2025-09-08
Across
- Fake system set up to lure hackers.
- Unauthorized access to data or systems
- Fake emails or messages to steal information
- Malware that locks files and demands payment.
- Code used to take advantage of a vulnerability.
- Hacker intercepts communication between two parties.
- Securing data by converting it into unreadable code.
- Encrypts internet traffic for secure browsing
Down
- Authentication Verifying identity using two methods.
- EU law protecting personal data privacy.
- Security barrier between trusted and untrusted networks.
- Process of verifying a user’s identity.
- Username and password for authentication.
- Malicious code that spreads through files or programs
- Software that protects against malicious programs.
- Malware disguised as legitimate software.
- Isolated environment for testing suspicious files
- Security rules for handling credit card data.
18 Clues: Fake system set up to lure hackers. • Unauthorized access to data or systems • Process of verifying a user’s identity. • EU law protecting personal data privacy. • Username and password for authentication. • Malware disguised as legitimate software. • Fake emails or messages to steal information • Malware that locks files and demands payment. • ...
Health Q3 2022-03-24
Across
- moral, spiritual, and educational are types of these shared by a family
- your father's brother
- you are not
- powerful synthetic opioid
- best sport at Malden High
- feeling of craving or extreme dependence
- second leading cause of death amongst teens
- type of bullying in the form of insults and teasing language
- to seek harm or intimidate someone
Down
- online platform that allows users to share content and interact
- your close circle of loved ones
- place to get help for addiction
- ideas and beliefs passed down from one generation to another
- somehow y'all voted for his poster to win
- knowledge or perception of a situation or fact
- michelle carter was convicted of involuntary
- hip hop artist with a powerful suicide awareness song
- form of bullying online
18 Clues: you are not • your father's brother • form of bullying online • powerful synthetic opioid • best sport at Malden High • your close circle of loved ones • place to get help for addiction • to seek harm or intimidate someone • feeling of craving or extreme dependence • somehow y'all voted for his poster to win • second leading cause of death amongst teens • ...
Cyberbullying 2019-07-11
Across
- nothing can go wrong if it is _______
- someone who has been targeted
- bullying that you can do online
- a way of communicating with a certain type of address
- person that is constantly mean to someone
- when someone is really sad
- when you are on a website you are ______
- platforms used to upload context,______ media
- a way of communicating with someone through a text ______
- platforms used to upload context, social _______
Down
- a horror movie is _______
- when someone is making you do something
- a machine connected to a mouse and a keyboard
- computers, phones, tablets
- used to see on a computer
- when you are all by yourself
- when someone kills themselves
- harm what someone does to themselves if they are really sad
18 Clues: a horror movie is _______ • used to see on a computer • computers, phones, tablets • when someone is really sad • when you are all by yourself • someone who has been targeted • when someone kills themselves • bullying that you can do online • nothing can go wrong if it is _______ • when someone is making you do something • when you are on a website you are ______ • ...
Unit 2 Odd Pages 2013-04-25
Across
- A collection of multimedia resources accessible via the internet
- Service that enhance security of the data processing systems and the data transfers of an organisation. The services are intended to counter security attacks and they make use of one or more security mechanisms to provide the services
- Small simple network device that allows multiple computers to communicate. They are an inexpensive piece of network equipment often found in home wired networks and small businesses
- Most commonly used type of interface which uses icons and pictures that are easily understood by the user and can be clicked using an input device. They vary between manufactures but are generally seen as the most intuitive way of using a computer giving access to users with different levels of knowledge
- A piece of malicious code that is written by programmers and used to corrupt data and systems it comes in different forms such as Trojans, Logic Bombs and Worms
- The link between the user and the technology that they are using both hardware and software
- Technology that enables instant automatic payment directly from the customers bank account when a debit card is used
Down
- When an organisations computer system is interrupted by some form of disaster including power cuts, Fire, Floods, Terrorist Attacks
- When an employee goes against the company ICT code of practice e.g. Leaving a workstation logging on creating the opportunity for an unauthorised individual to access their account
- When individuals or organisations break the law through using computers to illegally access a computer system e.g. to break in and change the payroll figures on the internal database
- Mechanism that is designed to detect and prevent or recover from a security attack
- Hardware devices that join multiple computers together at the data link network protocol layer
- One of the main defences against online problems from internal and external threats it continually scans for viruses including Trojans and worms and can be set to run at particular times of the day. To be effective it must be kept up to date. there are many free and affordable virus checkers.
- Any action that compromises the security of data held by an organisation
- Acts as a barrier between the public internet and your private computer or network and block threats including some viruses. A firewall is a preventive measure against external threats and is a first line of defence but must be used with care and in conjunction with other security measures to be effective
15 Clues: A collection of multimedia resources accessible via the internet • Any action that compromises the security of data held by an organisation • Mechanism that is designed to detect and prevent or recover from a security attack • The link between the user and the technology that they are using both hardware and software • ...
Reisen 2021-04-28
18 Clues: seat • visit • aisle • sights • arrive • travel • to wait • customs • airport • security • passport • destination • boarding pass • to take a trip • plane passenger • Have a good trip • to go on vacation • to pack a suitcase
Alliances 2019-01-23
Across
- many countries are apart of it
- a necessity to bored a plane
- has a death penalty
- a list of true statements
- a storage unit for keeping items whilst traveling
- another word for company
- shortened for European Union
- A form of defense for citizens
- another word for an army or a troop of modern soldiers
Down
- an area that contains helpful information
- what was the end of the title of the first slide on the board
- Shortened for International Security Assistance Force
- an agreement between two or more states or countries
- can leak out of airport body scanners
- headquarters are located in the Netherlands
15 Clues: has a death penalty • another word for company • a list of true statements • a necessity to bored a plane • shortened for European Union • many countries are apart of it • A form of defense for citizens • can leak out of airport body scanners • an area that contains helpful information • headquarters are located in the Netherlands • ...
Alliances 2019-01-23
Across
- many countries are apart of it
- a necessity to bored a plane
- has a death penalty
- a list of true statements
- a storage unit for keeping items whilst traveling
- another word for company
- shortened for European Union
- A form of defense for citizens
- another word for an army or a troop of modern soldiers
Down
- an area that contains helpful information
- what was the end of the title of the first slide on the board
- Shortened for International Security Assistance Force
- an agreement between two or more states or countries
- can leak out of airport body scanners
- headquarters are located in the Netherlands
15 Clues: has a death penalty • another word for company • a list of true statements • a necessity to bored a plane • shortened for European Union • many countries are apart of it • A form of defense for citizens • can leak out of airport body scanners • an area that contains helpful information • headquarters are located in the Netherlands • ...
Acorn Crossword 2026-04-07
Across
- Maximum number of Change of Vehicles per policy term
- Abbreviation for Mid Term Adjustment
- Highest level of cover we offer
- Abbreviation for Change of Address
- Abbreviation for Social,Domestic & Pleasure
- Number of V questions we need to ask when completing security
- Name of our Finance Provider
- Name of our CEO
Down
- Name of our insurer
- Number of years we need claims and motoring convictions history
- Lowest level of cover we offer
- Abbreviation for Change of Vehicle
- What we would specify when asking non-motoring convictions
- Number of ID questions we need to ask when completing security
- Abbreviation for Terms of Business Agreement
15 Clues: Name of our CEO • Name of our insurer • Name of our Finance Provider • Lowest level of cover we offer • Highest level of cover we offer • Abbreviation for Change of Vehicle • Abbreviation for Change of Address • Abbreviation for Mid Term Adjustment • Abbreviation for Social,Domestic & Pleasure • Abbreviation for Terms of Business Agreement • ...
worlsa 2025-01-13
passcode to win the Spanish war 2021-11-01
16 Clues: Maine • policy • Policy • Riders • security • Soldiers • Doctrine • Amendment • Roosevelt • Aguinaldo • journalism • Lome Letter • of the Maine • Randolph Hearst • of San Juan Hill • William McKinley
Career Cluster Puzzle 2024-12-06
Across
- This cluster includes careers in sales, public relations, merchandising and ____, regardless of industry.
- The ____, distribution and logistics cluster includes people who plan and move people and goods.
- This career cluster includes jobs in policy making, elected officials, national security and taxation.
- Workers in the law, public safety, corrections and _____ cluster protect citizens. Professions include emergency services, security/surveillance, law and law enforcement.
- The ______ and training career cluster includes teaching roles as well as professional counselors, school psychologists and speech-language pathologists who offer support and guidance to students.
- This cluster includes people involved in the processing and production of goods.
- The ____ and tourism cluster jobs within restaurants, bars, tourist attractions, resorts, hotels and travel agencies.
- The ____________, food and natural resources cluster includes everything related to the creation of agricultural products. Job fields include farming, ranching, food processing, engineering and veterinary medicine.
- The ___ services cluster includes jobs like his cluster encompasses fields as diverse as cosmetology, counseling, social work, real estate and personal banking.
Down
- This cluster includes careers in banking, investments and insurance as well as those who manage taxes and finances for businesses
- The business,____ and administration cluster is vast, covering most of the functions required to run businesses effectively.
- The ___ technology cluster includes computer-related professions, including software development, network administration, information security and systems administration.
- The cluster includes highly technical fields in biology, astronomy, chemistry, scientific research and all engineering disciplines.
- The architecture and ________ cluster encompasses careers related to designing, building and maintaining homes, industrial facilities, streets or bridges.
- This cluster includes journalists, performers and behind-the-scenes workers who make TV, film, media and live performances happen.
- This cluster includes jobs like nurses, doctors, pharmacists, technicians, dentists and other providers.
16 Clues: This cluster includes people involved in the processing and production of goods. • The ____, distribution and logistics cluster includes people who plan and move people and goods. • This career cluster includes jobs in policy making, elected officials, national security and taxation. • ...
krustvardu mikla GOTI subkultura 2023-10-10
Across
- mākslas stilam raksturīgi ______ elementi.
- Kurā dekādē attīstījās gotu mūzikas žanrs?
- subkultūras pārstāvji bieži izceļas ar ______ apģērbu.
- subkultūras mākslinieki bieži izmanto _______ apģērbu.
- un elektroniski,Kas ir "cyber goth" gotu subkultūrā?
Down
- sauc gotu subkultūras festivālu, kas ir saistīts ar gotu mūzikas žanru?
- subkultūras pārstāvji bieži izceļas ar ______ apģērbu.
- un atšķirīgums,Kas ir gotu subkultūras pamatfilozofija?
- subkultūras saknes saistītas ar ______ gadiem.
- ir gotu subkultūras bieži izmantotā krāsa?
10 Clues: mākslas stilam raksturīgi ______ elementi. • Kurā dekādē attīstījās gotu mūzikas žanrs? • ir gotu subkultūras bieži izmantotā krāsa? • subkultūras saknes saistītas ar ______ gadiem. • un elektroniski,Kas ir "cyber goth" gotu subkultūrā? • subkultūras pārstāvji bieži izceļas ar ______ apģērbu. • subkultūras pārstāvji bieži izceļas ar ______ apģērbu. • ...
Bullying 2025-04-06
Across
- Using phones or internet to bully
- A person who sees bullying happen but doesn't always act
- Mean words or teasing is this kind of bullying
- A person who sees bullying and helps
- The feeling when someone is left out or hurt
Down
- Kicking, hitting, or pushing
- If someone is being bullied, tell a ______ adult
- A person who hurts others on purpose
- Treating others with care and kindness
9 Clues: Kicking, hitting, or pushing • Using phones or internet to bully • A person who hurts others on purpose • A person who sees bullying and helps • Treating others with care and kindness • The feeling when someone is left out or hurt • Mean words or teasing is this kind of bullying • If someone is being bullied, tell a ______ adult • ...
Layanan BK materi bullying 2025-09-08
Across
- Tindakan mengejek, menghina, atau merendahkan teman termasuk …
- yang dilakukan dengan memukul atau menendang.
- Orang yang menjadi korban bullying pasti akan
- Salah satu bentuk bullying secara tulisan di media sosial.
- Perilaku yang menyakiti orang lain secara sengaja.
Down
- Salah satu cara mencegah bullying adalah dengan menumbuhkan rasa …
- Rasa yang muncul pada korban bullying, biasanya merasa …
- Lawan kata 'pelaku'.
- Media yang sering dipakai untuk melakukan cyberbullying.
- BK Guru yang bisa membantu menyelesaikan masalah bullying di sekolah.
10 Clues: Lawan kata 'pelaku'. • yang dilakukan dengan memukul atau menendang. • Orang yang menjadi korban bullying pasti akan • Perilaku yang menyakiti orang lain secara sengaja. • Rasa yang muncul pada korban bullying, biasanya merasa … • Media yang sering dipakai untuk melakukan cyberbullying. • Salah satu bentuk bullying secara tulisan di media sosial. • ...
SIGURNOST NA INTERNETU 2021-02-11
5 Clues: uznemiravanje djece SMS • prijetnje putem interneta • proizvodnja provokativnih postova • nasilje uz cyber tehnologije • prijevara putem elektronicke poste
CONVERSATIONAL SELLING SKILLS 2018-12-13
16 Clues: NO • SEE • EXPERT • MEETING • LEAKAGE • ABILITY • ENDORSE • SECURITY • MONETARY • CONVERSION • DISCUSSION • HE IS KING • ___ A LEAD • FRIENDS DO THIS • REINSURANCE COMPANY • FUEL TO THE SALES ENGINE
Vida Y Muerte Prólogo y C1 2023-04-26
16 Clues: War • Tear • Gang • Rules • Lasted • Tattoo • Threat • To hit • Security • business • Gang Member • Mistreatment • At the beginning • Punishment/penalty • They Joined Together • Name of initiation event
gun control 2024-11-14
16 Clues: Touch • Legacy • Safety • Problem • Violence • To mourn • Lawmaking • Necessary • Supporters • Body of law • Carry weapons • Achieve a goal • Avoid something • Contest against • Encouraging something • Gun ownership regulation
What would you find on a military base? 2023-07-28
Across
- medical services are provided here
- a small convenience store or shop within the base
- large structure for housing military aircraft
- area where military vehicles are found
- religious facility
- Barriers used for access control and security purposes
- area on base for military families
Down
- area designated for weapons training and qualification
- on-base retail stores for military members
- a place to purchase groceries
- facilities & activities provided for leisure and relaxation
- storage facility for weapons & ammunition
- buildings or housing facilities where soldiers reside
- entry and exit points of the base, oft manned by security
14 Clues: religious facility • a place to purchase groceries • medical services are provided here • area on base for military families • area where military vehicles are found • storage facility for weapons & ammunition • on-base retail stores for military members • large structure for housing military aircraft • a small convenience store or shop within the base • ...
