cyber security Crossword Puzzles
Cyber Hunt Crossword 2022-08-30
Across
- Theme of SLC 5th floor
- Centre for studies in community health
- The Student Code of _________ conduct lists, in a non-exhaustive way, actions which the University considers to be _____ misconduct offences and the range of remedies and/or penalties which may be imposed.
- A ____ course is a course which cannot be used to fulfil any certificate, diploma or degree program requirements.
- SASSH’s annual cross-faculty case competition
- Answer from question #6
Down
- Used to get into buildings
- SASSH means: society of Arts, Social Science, and _____
- Acronym for the support centre dedicated to helping international students, those new to Canada, and any students interested in gaining a global experience on campus.
- An acronym for Arts & Contemporary studies
- SASSH is dedicated to EDI: ____, diversity, and inclusion.
11 Clues: Theme of SLC 5th floor • Answer from question #6 • Used to get into buildings • Centre for studies in community health • An acronym for Arts & Contemporary studies • SASSH’s annual cross-faculty case competition • SASSH means: society of Arts, Social Science, and _____ • SASSH is dedicated to EDI: ____, diversity, and inclusion. • ...
Be Cyber Smart! 2018-01-04
Across
- ________ before you post.
- Surf ______ is about thinking twice before clicking on links.
- Never meet someone you know _________.
- Check your privacy ________ so that you know who can see your posts.
- Be careful of ______ emails and phone calls.
- Only _______ friend requests from the people you know.
Down
- Don't give strangers online your _________.
- Keep ______ information to yourself.
- We must ________ others online.
- Be wary of what you _______.
- Always use _______ and unique password for your social media accounts.
11 Clues: ________ before you post. • Be wary of what you _______. • We must ________ others online. • Keep ______ information to yourself. • Never meet someone you know _________. • Don't give strangers online your _________. • Be careful of ______ emails and phone calls. • Only _______ friend requests from the people you know. • ...
The Cyber School 2022-01-13
11 Clues: confuse • identifiable • from a distance • reach/obtain sth • think about sth in detail • the way something is placed • having other people with you • discover/judge the extent of sth • a course of study taught in a school • oversee/control a task/a group of people • elements which affect a situation/decision
Jakapan 2022-06-23
Across
- take care of people
- take care of school cleanliness
- Design and plan to build materials, machines
- Repair and maintain engine
Down
- Teach and educate children
- security of the country
- driver customer service and drove him to the destination
- He is a doctor's assistant and takes care of the sick.
- Security in that place
- treat the patient
10 Clues: treat the patient • take care of people • Security in that place • security of the country • Teach and educate children • Repair and maintain engine • take care of school cleanliness • Design and plan to build materials, machines • He is a doctor's assistant and takes care of the sick. • driver customer service and drove him to the destination
Bank Secrecy Act Training 2024-09-06
Across
- Man's best friend
- Likes to chase mice
- Flying mammal
- Has a trunk
- Large marsupial
Down
- of Foreign Asset Control OFAC stands for what?
- Martineau Who is the credit union's BSA Officer
- Theft Stealing someone's name, social security number, or other piece of personal information
- Secrecy Act What does BSA stand for?
- Crowser Who is our Information Security Officer
10 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • Secrecy Act What does BSA stand for? • of Foreign Asset Control OFAC stands for what? • Crowser Who is our Information Security Officer • Martineau Who is the credit union's BSA Officer • ...
BYOD Gone Wrong 2025-08-01
Across
- All caps, red flag: your OS is how many versions behind?!
- That WiFi network at the café that looks... a little too open.
- What your security posture becomes with no policies, no logs, and no control.
- When your laptop goes rogue — and IT has no clue where it went.
- Zero Trust isn’t just a motto — it’s a security _____.
Down
- The invisible wall between secure data and everything else.
- A device you use at work... that security never approved.
- Unprotected, unfiltered, and uninvited: a hacker’s dream data stream.
- It’s not a cape, but it does prevent data exfiltration.
- No login federation here — just 17 browser tabs and reused passwords.
10 Clues: Zero Trust isn’t just a motto — it’s a security _____. • It’s not a cape, but it does prevent data exfiltration. • A device you use at work... that security never approved. • All caps, red flag: your OS is how many versions behind?! • The invisible wall between secure data and everything else. • That WiFi network at the café that looks... a little too open. • ...
asdf 2017-03-02
Across
- Praetorian's secure messaging platform, developed in-house and used for communicating sensitive information to clients.
- An encryption technique named after a well-known Roman politician.
- The platform used for secure file storage.
- Platform used for tracking goals and key results.
- A sequence of words or text used instead of a password.
- In the summer of 2015, interns at Praetorian build an IOT fingerprinting device out of a Raspberry Pi. The next step, naturally, was to attach the Pi to one of these.
- One of Praetorian's core values is to default to ______.
- In 2017, Praetorian hired our first ever Chief ______ Officer.
- In most organizations, the weakest link in security is the ______.
- The name of Praetorian's latest web-based platform, which offers security as a service.
Down
- The machine in the breakroom that none of us could live without.
- AppSec's proxy tool of choice.
- The HipChat emoji that means it's time for lunch.
- A popular framework developed by Rapid7 used for internal network penetration testing.
- A popular password cracking tool.
- With this popular office device, anyone in the office can be a DJ.
- The Roman Senate and People.
- There are two main types of cross-site scripting: Stored XSS and ______ XSS.
- Our application penetration testing is closely aligned with the Application Security Verification Standard, created and maintained by this organization.
- Make decisions. Make mistakes. Just take the initiative and orient to ______.
20 Clues: The Roman Senate and People. • AppSec's proxy tool of choice. • A popular password cracking tool. • The platform used for secure file storage. • The HipChat emoji that means it's time for lunch. • Platform used for tracking goals and key results. • A sequence of words or text used instead of a password. • One of Praetorian's core values is to default to ______. • ...
CPC Study By Macie B, Antonio G, Chase R, Sarah L, and Chloe C. 2023-12-26
Across
- Image and video analysis AI service
- Elastic Block Store for persistent storage.
- Petabyte-scale data transport solution.
- AWS Organizations for managing multiple accounts
- voice to text generator
- AWS monitoring and management service.
- Simple virtual servers for small projects
- DDoS protection service for applications
- Scalable domain name system (DNS) service.
- AWS service for easy application deployment
- Isolated location within an AWS Region
- Virtual Private Cloud for isolated network environments.
- Simple Storage Service for cloud storage.
- AWS content delivery network service
- AWS tool for cost analysis.
- Serverless compute service for event-driven functions
Down
- High-performance managed relational database service.
- Distinct global geographic locations for AWS
- Exabyte-scale data transfer service.
- Relational Database Service for managed databases
- Web-based AWS service management interface
- Fully managed petabyte-scale data warehouse.
- Elastic Container Service for containerized application management
- Identity and Access Management individual account.
- Tools for managing AWS cost limits
- AI-powered security service for data protection
- low cost long term data archival service
- AWS service for querying data using SQL.
- AWS service for tracking API activity.
- Web Application Firewall for enhanced web security.
- Security assessment service for applications
- Threat detection service for AWS resources
- AWS business intelligence data visualization tool.
- Elastic Compute Cloud for scalable computing
- AWS service for best practice recommendations
- access control rules for AWS resources
- AWS content delivery network node
37 Clues: voice to text generator • AWS tool for cost analysis. • AWS content delivery network node • Tools for managing AWS cost limits • Image and video analysis AI service • Exabyte-scale data transfer service. • AWS content delivery network service • AWS service for tracking API activity. • AWS monitoring and management service. • Isolated location within an AWS Region • ...
Governance Risk and Compliance 2024-11-09
Across
- A set of procedures or guidelines in operations
- The framework of rules and practices for managing an organization
- Conformance with laws, regulations, or standards
- Rules or directives made by an authority to control actions
- Responsibility for actions and decisions
- The potential for loss, damage or negative impact
- A formal examination of an organisation’s accounts or processes
- Moral principles that govern behaviour
- An event that disrupts normal operations, especially in security
- Intentional deception for personal gain or to damage others
- An evaluation or examination of processes or performance
- Originating outside the organization
- Established norms or requirements to ensure quality
- The right to keep personal or sensitive information undisclosed
- Legal responsibility for one’s actions or omissions
- The evaluation or estimation of nature quality or ability
Down
- Regular observation and checking for compliance or performance
- Supervision to ensure processes are followed correctly
- An act of breaking rules or security measures
- Providing information on activities or outcomes
- Actions taken to reduce the severity of risks
- Openness and clear communication about actions or policies
- Occurring within an organization or system
- Adherence to moral and ethical principles; honesty
- Measures implemented to mitigate risks or enforce standards
- Dishonest conduct by those in power, typically for personal gain
- Information collected for analysis or used in decision-making
- Protection from harm or unauthorized access
- A set of rules or guidelines adopted by an organisation
- A potential cause of harm or adverse effect
30 Clues: Originating outside the organization • Moral principles that govern behaviour • Responsibility for actions and decisions • Occurring within an organization or system • Protection from harm or unauthorized access • A potential cause of harm or adverse effect • An act of breaking rules or security measures • Actions taken to reduce the severity of risks • ...
There's enough on this planet for everyone's need, but not everyone's greed 2024-11-26
Across
- People who are affected by food insecurity often feel this sensation
- any nutritious substance that people or animals eat or drink or that plants absorb in order to maintain life and growth
- Access to culturally acceptable food, which is produced and obtained in ways that do not compromise people's dignity, self-respect or human rights
- social, political, cultural factors that influence consumers ability to access certain foods
- One factor contributing to food insecurity
- Opposite of food security, people lack reliable access to food
- Access to food that is nutritious and safe, and produced in environmentally sustainable ways
- sustainability also includes _____ (health and nutrition)
- Availability, Accessibility, Adequacy, Acceptability, Sustainability are all ________ of food security
- exists when all people at all times have physical, social and economic access to sufficient, safe and nutritious food
Down
- Physical and economic access to food for all at all times.
- meeting the needs of the present generation without compromising the ability of future generations to meet their own needs.
- another word for food security
- Increase of price for goods and services (affects the accessibility of the food)
- access affordability of foods that are available for purchasing and consumption
- Natural, financial, or human assets that help provide food or address food insecurity
- Sufficient (enough) food for all people at all times
- people have access to buy a variety of foods
- The person or group that uses or consumes food, often influencing food production demand
- sustainability also includes _______ (laws, policies)
20 Clues: another word for food security • One factor contributing to food insecurity • people have access to buy a variety of foods • Sufficient (enough) food for all people at all times • sustainability also includes _______ (laws, policies) • sustainability also includes _____ (health and nutrition) • Physical and economic access to food for all at all times. • ...
UNHRC 2025-08-24
Across
- Executive arm of the United Nations led by the Secretary-General
- A formal decision or recommendation adopted by the Council
- Independent experts who monitor and report on human rights issues
- Power held by the five permanent members of the Security Council
- Basic rights and freedoms belonging to every person from birth until death
- Case study where the UNHRC investigated violence and killings in Sudan
- Process where the UNHRC reviews all UN member states’ human rights records
- Encouraging respect for human rights worldwide
- Court that UNHRC investigations sometimes support with evidence
- Non-binding human rights statement, such as the UDHR
- Main deliberative and representative organ of the United Nations
- One of the issues the UNHRC responds to when new violations emerge
- Length of term served by UNHRC member states
Down
- Number of member states in the UNHRC
- UN missions that deploy forces to help resolve and prevent conflicts
- Foundational treaty of the United Nations signed in San Francisco in 1945
- UN body responsible for maintaining international peace and security
- Former UN organ responsible for administering trust territories, now inactive
- Seventeen global goals adopted in 2015 as part of the 2030 Agenda
- International organization founded in 1945 to maintain peace and security
- UN body that coordinates economic, social, and environmental issues
- Holding states responsible for human rights violations
- City where the UN Human Rights Council is based
- Mechanism that addresses serious and consistent human rights violations
24 Clues: Number of member states in the UNHRC • Length of term served by UNHRC member states • Encouraging respect for human rights worldwide • City where the UN Human Rights Council is based • Non-binding human rights statement, such as the UDHR • Holding states responsible for human rights violations • A formal decision or recommendation adopted by the Council • ...
Retirement Terms 2025-10-16
Across
- Benefit Plan: A pension plan in which the amount of benefits paid to an
- age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
- make tax-deductible contributions.
- (Individual Retirement Account): A special type of account that allows investors
- IRA, the contributions are not tax deductible
- Contribution Plan: A pension plan wherein a certain amount or percentage
- conditions to a person following retirement or to surviving dependents.
- IRA: Roth IRAs allow investors who do not exceed a specific income level to
- plan.
- after retirement is fixed in advance in accordance with a formula given in
- money is set aside each year (by either the company and/or the employee) for the
- A type of defined contribution retirement account funded through pre-tax
Down
- of the employee. There are restrictions as to when and how you can
- include payment of hospital and medical expenses.
- Benefits: Benefits (compensation in addition to salary) that may be provided
- A federal program that provides some level of health benefits for people
- Security: A federal benefits program developed in 1935, Social Security is
- a limited amount of money toward retirement annually. Unlike the
- these funds without penalties.
- employees for sickness, accidental injury, or accidental death. These benefits
- through a tax levied on employers and employees.
- bonds, mutual funds or other assets, and are not taxed until they are
- deductions. The funds in the account can be invested in a number of different
- A sum of money paid regularly as a retirement benefit; money paid under
24 Clues: plan. • these funds without penalties. • make tax-deductible contributions. • IRA, the contributions are not tax deductible • through a tax levied on employers and employees. • include payment of hospital and medical expenses. • a limited amount of money toward retirement annually. Unlike the • of the employee. There are restrictions as to when and how you can • ...
Jobs 2023 2023-10-21
15 Clues: Nurse • Manager • Analyst • Advisor • Manager. • developer • Assistant. • Developer. • Therapist. • Practitioner. • System analyst • Research Analyst • Security Analyst. • Therapist Assistant • and Health Services Manager.
social media 2023-05-05
Across
- something you can get by dodgy websites
- the thing that you can control and make to your preferences
- things you can download onto the computer
- the way other computers communicate
Down
- controls incoming and outgoing traffic into your device
- something you need to log in
- the thing that holds all your information
- something that stops virus' from getting in your computer
- something you do to get into someone's account
- a way of bullying online
10 Clues: a way of bullying online • something you need to log in • the way other computers communicate • something you can get by dodgy websites • the thing that holds all your information • things you can download onto the computer • something you do to get into someone's account • controls incoming and outgoing traffic into your device • ...
SAFER INTERNET KONSTI 2023-06-07
Across
- ist die Verbreitung von Hass im Internet
- ist eine Tätigkeit bei der man sehr achtsam sein muss
- ist schlaggebend dafür was für Inhalte einem vorgeschlagen werden.
- von denen gibt es viele im Internet
- ist zum Beispiel das beleidigen von anderen im Internet
Down
- können die Volgen von Cybber-mobbing sein
- gibt es wie Sand am Meer.
- Ist BEINAHE das beste Fach
- ist der Herr Braun
- sind Inhalte die unter Achtzenjährigen nicht gestattet sind.
10 Clues: ist der Herr Braun • gibt es wie Sand am Meer. • Ist BEINAHE das beste Fach • von denen gibt es viele im Internet • ist die Verbreitung von Hass im Internet • können die Volgen von Cybber-mobbing sein • ist eine Tätigkeit bei der man sehr achtsam sein muss • ist zum Beispiel das beleidigen von anderen im Internet • ...
Crossword Set 04 2025-07-18
Across
- When data is incomplete, it lacks this data quality
- System of regular data duplication
- A central place where all important data is stored
- Data made unreadable without a key
- Online storage system for data
Down
- Sending data outside the organization without permission
- Number of principles in BCBS239
- Type of cyber attach using fake emails
- Unauthorized data access or theft
- The data lifecycle phase where data is analyzed, accessed or consumed for business insights, decisions or operations
10 Clues: Online storage system for data • Number of principles in BCBS239 • Unauthorized data access or theft • System of regular data duplication • Data made unreadable without a key • Type of cyber attach using fake emails • A central place where all important data is stored • When data is incomplete, it lacks this data quality • ...
investing unit crossword 2023-03-24
Across
- A strategy that involves borrowing and selling a security in the hopes of buying it back at a lower price
- The rate at which prices for goods and services increase over time
- A portion of a company's profits paid out to shareholders
- (A market in which stock prices are rising
- Money used to invest in a business or other venture
- A stock of a small, relatively unknown company that trades at a low price
- An option to buy a stock at a predetermined price
- An option to sell a stock at a predetermined price
- A market in which stock prices are falling
- The degree to which the price of a security fluctuates
- A stock of a company that is considered undervalued by the market
- An order to buy or sell a security at a specific price or better
- A firm that facilitates buying
- A measurement of the performance of a group of stocks
- A type of investment vehicle that pools money from many investors
- A retirement savings plan offered by an employer
- A stock of a company that is expected to grow at a faster rate than the overall market)
- selling of securities
Down
- The process of dividing an investment portfolio among different asset classes
- A rating assigned by credit agencies to indicate the creditworthiness of a bond issuer
- The process of adjusting the composition of a portfolio to maintain a desired level of risk and return
- A measure of the profitability of an investment
- The practice of spreading investments across different asset classes
- A collection of investments owned by an individual or institution
- The percentage return on an investment
- The chance of losing money on an investment
- An investment fund that uses advanced investment strategies to generate high returns
- Ownership in a company
- An order to buy or sell a security at the prevailing market price
- Anything of value that can be owned or controlled
- A debt instrument issued by a corporation or government
31 Clues: selling of securities • Ownership in a company • A firm that facilitates buying • The percentage return on an investment • (A market in which stock prices are rising • A market in which stock prices are falling • The chance of losing money on an investment • A measure of the profitability of an investment • A retirement savings plan offered by an employer • ...
Five Nights at Freddy's 2023-09-07
Across
- The phone guy's profession
- The main protagonist of Five Nights at Freddy's 4
- What is the name of the protagonist in Five Nights at Freddy's 3
- The animatronic that hides in the dark corners of the restaurant
- The security guard's shift lasts for this many hours
- The creepy marionette that haunts the establishment
- The day shift security guard, who leaves recorded messages
- The animatronic who is responsible for "scooping" Mike in Sister Location
- The animatronic that hides in the closet
- The name of the underground facility in Sister Location
- The animatronic who performs on the Ballora Gallery stage
- The main character you play as in FNAF 2
- The newspaper headlines often seen in the game
- The 2nd most popular Withered animatronic
- Where does the creepy laughter of the animatronics come from
- In what year did Five Nights at Freddy's 4 take place
- What happens to you when the ventilation system fails
- The name of the pizzeria where FNAF 2 takes place
Down
- The name of the horror attraction where the game is set
- What is the name of the minigame where you play as Balloon Boy (FNaF 3)
- The animatronic that moves frequently
- The name of the restaurant where the game takes place
- The name of the terrifying yellow animatronic bear in Five Nights at Freddy's 4
- The security office's primary source of information
- The room where you access the Ennard control module
- The room where you wind up the music box to keep the Puppet at bay
- What type of animatronics replace the normal ones
- The main character and security guard in FNAF 1
- The important event that many believe to happen in FNaF
- Phone Guy is replaced by who
- The protagonist's primary defense mechanism
- The animatronic that frequently appears in the East Hall
- A life-size animatronic bear who entertains during the day (FNaF 2)
- The animatronics' objective during the night
34 Clues: The phone guy's profession • Phone Guy is replaced by who • The animatronic that moves frequently • The animatronic that hides in the closet • The main character you play as in FNAF 2 • The 2nd most popular Withered animatronic • The protagonist's primary defense mechanism • The animatronics' objective during the night • The newspaper headlines often seen in the game • ...
Investment Crossword 2022-11-21
Across
- interest that is earned both on the initial deposit and on the interest earned by the initial deposit
- is a security that matures in a year or loss
- is money placed into an account
- putting money aside so it will be available when you need it
- made of a strong and lasting material(cotton)
- The official currency
- Company is a finical institution that makes money bu issuing loans; loan company
- financial investment issued by a corporation, government, or other organization
- bank is a finical institution that provides services for businesses
- central bank of United States
- People must be able to carry money
- money can be saved and used at a later date
- is a financial institution that accepts money from customers and deposits it into the customers account
- Money is a common measure of the worth or price of a good or service
- Maintain its value over time
- document guaranteeing payment of a specific amount of money
- Authentic money immediately recognizable
Down
- is any organization that provides services related to money
- issued the first tally sticks in 1100AD
- is a financial institution that offer savings and loan services
- is anything of value that is accepted in return for goods or services; currency
- is a security that plans interest over terms ranging from two to ten years
- Series EE
- is a security that pays interest over terms of ten to thirty
- is a nonprofit finical institution that is privately owned and provides banking services for its members
- s action taken to manage supply of money and interest rates
- is a technique ofr estimating the number of years required to double your money at a given rate of return
- Companies are for profit businesses that sell insurance products
- money is used in exchange for goods and services needed by individuals, businesses and governments
- Divide money into smaller units
- is the mechanism a nation uses to provide and manage money for itself
- is the use of long-term savings to earn a financial return
- largest category of deposit institution
33 Clues: Series EE • The official currency • Maintain its value over time • central bank of United States • is money placed into an account • Divide money into smaller units • People must be able to carry money • issued the first tally sticks in 1100AD • largest category of deposit institution • Authentic money immediately recognizable • money can be saved and used at a later date • ...
Cybersecurity 2 2024-11-26
Across
- Business Email Compromise, a type of fraud targeting organizations for financial gain.
- IT Unauthorized use of IT systems or software within an organization.
- National Institute of Standards and Technology, a U.S. organization providing cybersecurity frameworks.
- Modeling A process to identify, understand, and mitigate potential threats to systems.
- Dashboard A visual interface displaying security events and analytics.
- Software or hardware that records keystrokes to steal information.
- Hijacking Taking control of an active session between a user and a system.
- Self-replicating malware that spreads without user intervention.
- Kit A toolkit used to automate exploitation of vulnerabilities in systems.
- Threat A malicious threat originating from within the organization.
- Engineering Psychological manipulation of individuals to divulge confidential information.
- Actor An individual or group engaged in malicious cyber activities.
- A layered approach to cybersecurity with multiple defensive mechanisms.
Down
- ATT&CK A framework describing adversary tactics and techniques used in cyberattacks.
- Force Attack A trial-and-error method used to gain access to accounts or systems.
- Common Vulnerabilities and Exposures, a database of publicly disclosed vulnerabilities.
- Protocols that encrypt data in transit to secure communications.
- The process of moving laterally within a network to access other systems.
- Trust Architecture A security model where no entity is trusted by default, even within the network.
- Positive A benign event flagged as malicious by a detection tool.
- A network of compromised devices controlled by an attacker.
- Malicious software designed to gain unauthorized root-level access to a system.
- Injection An attack method to exploit vulnerabilities in databases through SQL queries.
- Address A unique identifier assigned to a network interface for communication.
- Escalation Exploiting a vulnerability to gain higher access permissions.
- Privilege A principle ensuring users have only the permissions necessary to perform their roles.
- Proof of Concept, a demonstration of a security vulnerability.
- Table A precomputed table used to crack password hashes.
- Positive A legitimate security event correctly identified by a detection tool.
- Spoofing A cyberattack that redirects a domain to a malicious IP address.
30 Clues: Table A precomputed table used to crack password hashes. • A network of compromised devices controlled by an attacker. • Proof of Concept, a demonstration of a security vulnerability. • Protocols that encrypt data in transit to secure communications. • Self-replicating malware that spreads without user intervention. • ...
OPS-CA Summer 2023 2023-09-06
18 Clues: Wahl • Höhe • Muster • wählen • anwenden • Beispiel • Werkschutz • Entwicklung • vertraulich • Herangehensweise • gelten (für) (5,2) • damit zu tun haben • zeitaufwendig (4,9) • sicher stellen (4,4) • Druck mindern (4,3,8) • teilnehmen (an) (4,4,2) • Zeitverschwendung (1,5,2,4) • sich darauf verlassen (4,2)
SLMS Staff + Baker 2025-03-18
20 Clues: Nurse • Librarian • Custodian • Principal • PE Teacher • PE Teacher • PE Teacher • ELA Teacher • Art Teacher • Band Teacher • Front Office • Math Teacher • Science Teacher • School Security • Attendance Window • 7th Grade Counselor • Connections Teacher • 6th Grade Counselor • Assistant Principal • Social Studies Teacher
Legend ESOP Crossword 2025-02-20
21 Clues: you • heir • gift • safety • sharer • maturity • customers • core value • core value • core value • possession • core value • money manager • employee owned • endless vacation • shares of company • stock ownership plan • regulatory legislation • summary plan description • stock price determination • manages for others' benefit
The iron curtain 2025-05-07
spelling words unit 11 2025-02-13
Profession 2024-10-09
Across
- A businessman works in an office.
- A magician does magic tricks.
- A security guard keeps places safe.
- A cashier takes money when people buy things.
- waiter brings food to people.
- An electrician fixes lights and wires.
Down
- A mechanic fixes cars.
- A driver drives people or things.
- An artist makes drawings or paintings.
- A barber cuts hair.
10 Clues: A barber cuts hair. • A mechanic fixes cars. • A magician does magic tricks. • waiter brings food to people. • A businessman works in an office. • A driver drives people or things. • A security guard keeps places safe. • An artist makes drawings or paintings. • An electrician fixes lights and wires. • A cashier takes money when people buy things.
Extension Knowledge 2021-08-10
24 Clues: 41189 • 41742 • 41748 • 41171 • 41765 • 41262 • 41122 • 41793 • 41218 • 41128 • 41049 • 41169 • 41100 • 41179 • 41345 • 41174 • 45001 • 41347 • 41064 • 41836 or 41046 • 41160 or 41161 • 41089 or 41086 • 41373 or 41103 • 62018 or 62041 or 41704 or 62059
Leccion Deck 5 2018-02-28
23 Clues: ruins • island • welcome • lodging • to sail • expired • seatbelt • passport • traveler • itinerary • dangerous • to return • campground • adventurer • to be full • to take off • high quality • room service • tourist (adj.) • to take a trip • (car) accident • excursion; tour • safety; security
jobs 2018-11-02
23 Clues: pilot • model • doktor • kelner • chemik • kasjer • fryzjer • strażak • prawnik • dentysta • policiant • listonosz • taksówkarz • ochroniarz • progrmista • sprzedawca • szef kuchni • bibliotekarz • pielegniarka • pracownik banku • agent turystyczny • projektant modowy • czytelnik wiadomosci
pop42 2024-06-17
20 Clues: Google OS • Apple device • Microsoft OS • Data measure • Internet hub • Google phone • Mobile device • Typing device • Search engine • Wireless tech • Chip material • Flying gadget • Network security • Amazon assistant • Wireless internet • Portable computer • Microblogging site • Electric car brand • Touchscreen device • Universal Serial Bus
21a 2024-06-22
20 Clues: Scouts • Marksmen • Sea force • Ground force • Foot soldiers • Mounted troops • Special forces • Elite army unit • Combat builders • Underwater navy • Heavy firepower • Air superiority • Armored division • Maritime security • Amphibious troops • Airborne soldiers • Supply management • Naval special ops • Aircraft operators • Battlefield healers
TIKTOK 2024-09-09
27 Clues: sögn • efni • tækni • skapa • hljóð • hanna • áhrif • ásaka • áróður • öryggi • hvetja • áhætta • tjáning • vinsæll • nafnorð • bæta-við • málfræði • hnattrænt • hæfileiki • atviksorð • fela-í-sér • fara-á-flug • koma-út-með • lýsingarorð • lagafrumvarp • hugmyndaflug • um-allan-heim
EC 3 U2 Vocab ASD 1-2 2024-12-02
20 Clues: user • profile • to cite • purpose • to trust • footprint • to verify • recipient • an account • to contain • to download • domain name • to find traces • to belong (to) • update/updating • number/statistic • total/whole/group • profit/obtained benefit • security/trustworthiness • pertaining to advertising
les Voyages en Avion (2A: Pages 14-22) 2025-05-02
25 Clues: tag • meal • signs • flight • airline • customs • landing • takeoff • check-in • boarding • passport • stopover • departure • seat belt • aisle seat • connection • window seat • flight time • boarding pass • boarding pass • baggage claim • security guard • Have a good trip! • Have a good flight! • overhead compartment
En el avión 2025-09-26
24 Clues: sign • trip • aisle • ticket • window • flight • counter • airport • arrival • customs • luggage • airline • pilot(m) • to-board • passport • security • suitcase • airplane • departure • passenger(m) • travel agent • excess luggage • foreing country • flight attendant
Traveling Vocabulary Verbs Nouns and Expressions 2025-12-22
22 Clues: trip • train • ticket • to pack • station • on time • airport • arrival • luggage • suitcase • passport • airplane • to board • to leave • to arrive • departure • to travel • round trip • on vacation • to take the • to take a trip • to go through security
Vocabulario 1.2 2021-03-12
16 Clues: Seat • Delay • Aisle • Flight • To show • Landing • Take off • Restroom • To board • Fastened • Airplane • Passport • Desination • cola To stand in line • de salida Departure gate • de seguridad Security Gate
@WORK UNIT 7/2 2019-09-29
15 Clues: luvata • tilanne • viivästys • järjestää • uskomaton • työkaveri • aihetttaa • lentoyhtiö • matkustaja • kiinalainen • turistiluokka • noutaa, hakea • myöhästyä lennolta • turvatarkastuspiste • olla nälkäinen, nähdä nälkää
Mr Müller's last week's vocabulary 2020-05-13
Across
- electrial device
- rising
- you can post photos there
- as quickly as possible
- the age between child and adult
- for all the time
- find something good, want to know more about it
- books,device,the internet
- pretend something,fake something
- very often
Down
- to play a new viedeogame whit other people
- when i look at your eyes an d you look at mine
- a pattern on a t-shirt
- help someone and be there for him
- the place where you are after death
- when i say to you do something and you really do that
- to be not very nice
- when we think not the same about a theme
- bully when someone is not very nice to you over the internet
19 Clues: rising • very often • electrial device • for all the time • to be not very nice • a pattern on a t-shirt • as quickly as possible • you can post photos there • books,device,the internet • the age between child and adult • pretend something,fake something • help someone and be there for him • the place where you are after death • when we think not the same about a theme • ...
bullying 2014-06-19
Across
- what do you do if someone is getting bullied
- what is the person being mean to you called
- what is the website people get bullied most with
- what is a good bulling movie called
- what type of bullying is used on the internet
Down
- where does bullying most happen
- what type of bully hurts you
- what do you do when your getting bullied
- what is the person watching called
- what is the person getting bullied called
10 Clues: what type of bully hurts you • where does bullying most happen • what is the person watching called • what is a good bulling movie called • what do you do when your getting bullied • what is the person getting bullied called • what is the person being mean to you called • what do you do if someone is getting bullied • what type of bullying is used on the internet • ...
ATHG kelompok 4 2024-05-14
Across
- Ancaman militer
- Ancaman non militer
- Suatu Hal yang menghalangi usaha untuk mencapai tujuan
- gabungan antara Ancaman bersenjata Dan nonbersenjata
- cyber warfare merupakan contoh Ancaman dalam bidang nonmiliter, pernyataan tersebut benar atau salah
Down
- usaha Dan kegiatan yang membahayakan
- Identitas ... meliputi negara kepulauan Dan pluralisme suku,bahasa,budaya serta agama dan kepercayaan
- Suatu Hal atau object yang perlu ditanggulangi untuk mewujudkan integrasi nasional
- faktor penghambat integrasi nasional yaitu ketidakmerataan pembangunan, pernyataan tersebut benar atau salah
- Identitas fundamental
10 Clues: Ancaman militer • Ancaman non militer • Identitas fundamental • usaha Dan kegiatan yang membahayakan • gabungan antara Ancaman bersenjata Dan nonbersenjata • Suatu Hal yang menghalangi usaha untuk mencapai tujuan • Suatu Hal atau object yang perlu ditanggulangi untuk mewujudkan integrasi nasional • ...
Identity Theft 2023-08-14
Across
- federal commission to protect consumers
- limits access to your credit report (two words)
- request to confirm details by clicking a link
- dishonest scheme or fraud
- get a free credit report www._.com
Down
- _crime: use of a computer to commit a crime
- use of someone's ___ is the most common type of identity theft (two words)
- stolen personal information (two words)
- requires that your identity is verified before new credit is issued (two words)
- three reporting bureaus: Equifax, Experian,_
10 Clues: dishonest scheme or fraud • get a free credit report www._.com • federal commission to protect consumers • stolen personal information (two words) • _crime: use of a computer to commit a crime • three reporting bureaus: Equifax, Experian,_ • request to confirm details by clicking a link • limits access to your credit report (two words) • ...
Fakhita hafidzah mutiara 2024-09-14
Across
- sebuah metode pengiriman dan penerimaan layanan melalui internet
- kemampuan untuk melakukan pencarian informasi melalui internet dengan menggunakan search engine
- kumpulan data yang berukuran sangat besar
Down
- tempat untuk menyimpan aplikasi beserta database
- sering disebut juga dengan cyber physical system
- jumlah data yang dihasilkan
- semua data terstruktur dan tidak terstruktur yang memiliki kemungkinan dihasilkan oleh manusia atau mesin
- sebuah akurasi pada saat melakukan pengumpulan data
- kecerdasan buatan
- sistem kecerdasan buatan yang telah dilatih untuk berinteraksi dalam percakapan berbasis teks
10 Clues: kecerdasan buatan • jumlah data yang dihasilkan • kumpulan data yang berukuran sangat besar • tempat untuk menyimpan aplikasi beserta database • sering disebut juga dengan cyber physical system • sebuah akurasi pada saat melakukan pengumpulan data • sebuah metode pengiriman dan penerimaan layanan melalui internet • ...
Service Desk May Security Activity 2025-05-20
Across
- - Fake email scan to steal your info
- - A cyber trick used to mislead and exploit.
- - Login method using two or more verification steps
- - Malicious attempt to damage or access systems
- - Secret codes that grant access to your accounts
Down
- - Secures your internet connection and hides your IP
- - Someone skilled at breaking into systems
- - The process of claiming who you are, before verification
- - Software designed to harm your computer or data
- - Imitating a trusted source to trick someone
10 Clues: - Fake email scan to steal your info • - Someone skilled at breaking into systems • - A cyber trick used to mislead and exploit. • - Imitating a trusted source to trick someone • - Malicious attempt to damage or access systems • - Software designed to harm your computer or data • - Secret codes that grant access to your accounts • ...
Crossword Set 04 2025-07-18
Across
- When data is incomplete, it lacks this data quality
- System of regular data duplication
- A central place where all important data is stored
- Data made unreadable without a key
- Online storage system for data
Down
- Sending data outside the organization without permission
- Number of principles in BCBS239
- Type of cyber attach using fake emails
- Unauthorized data access or theft
- The data lifecycle phase where data is analyzed, accessed or consumed for business insights, decisions or operations
10 Clues: Online storage system for data • Number of principles in BCBS239 • Unauthorized data access or theft • System of regular data duplication • Data made unreadable without a key • Type of cyber attach using fake emails • A central place where all important data is stored • When data is incomplete, it lacks this data quality • ...
Secure Application Development 2023-09-14
Across
- Makes sure the system is updated/configured
- Automation is key to cloud computing, Entire application instances can be instantly provisioned, instances can move around the world as needed,
- Secure environment, Writing code, Developers test code in sandboxes
- the use of tools and methods to help perform tasks
- making sure what is supposed to be input is being input
- Safely move from a non-production phase to full production
- Application is live
- deployments, application software security, network security, software deployed to workstations
- Single Points Of Failure, Things dependent upon on piece of code
- the base for building scripts, Helps save time when building applications
- Once changes are made, they make it to the production
- also known as software development kits (SDK), Save a lot of time, Increase the functionality of a language
- How does it work with real data? Run performance tests, Test usability and features.
- the first step of validating inputs, It checks to make sure if the answer looks “normal”
- using old code to help in the making of new applications
- defined functions that are stored in a database engine
- Scripts monitor whether an event happens or not
- Prevents user errors, Multiple processes at once
- increases capacity during high-demand times, Decreases capacity during low-demand times
- Installing new web server, database server, middleware server, user workstation configurations, certificate updates
- what it produces is useless to the rest of the code, Need to eliminate if possible
- Open Web Application Security Project, Works to improve the security of software
- Firewall settings, patch levels, OS file versions, Failure requires immediate correction
- Program that translates computer code into binary
Down
- Actions/Work that are automatically completed
- Guarantee apps are provisioned, Guarantee apps are deprovisioned, Verify code has not been tampered with
- A system can take on bigger workloads by adding resources
- Dismantling and removing an application instance
- Track changes/updates, revert back to a previous version
- Language of computers
- IT departments can work off this schedule and plan around it
- Operating system changes, application changes
- an isolated testing environment, Try some code, break some code, nobody gets hurt
- Secure VLAN, internal access, external access
- losing control of data during operations
- All pieces put together, Does it all work as expected?
- validation that checks for errors on the client’s app
- Merging developer’s changes with main branch
- Automatically updates changes to environments
- Check for malicious code, Verify security posture of workstation
- taking something super easy and making it very hard to understand, Developers will take very simple code and make it very unreadable
- validation that checks for errors on the server
42 Clues: Application is live • Language of computers • losing control of data during operations • Makes sure the system is updated/configured • Merging developer’s changes with main branch • Actions/Work that are automatically completed • Operating system changes, application changes • Secure VLAN, internal access, external access • Automatically updates changes to environments • ...
Homeland Security Corssword 2023-02-27
Across
- The Federal Emergency Management Agency is responsible for dealing with _______ disasters
- This group is responsible for airport security
- Customs and ______ patrol
- Homeland Security was formed after the attack of...
Down
- This group enforces maritime law and ensures that the waters are safe
- These people are responsible for keeping the president safe
- U.S. Citizenship and...
- In addition to responding to attacks, Homeland security also puts emphasis on _______terrorism
8 Clues: U.S. Citizenship and... • Customs and ______ patrol • This group is responsible for airport security • Homeland Security was formed after the attack of... • These people are responsible for keeping the president safe • This group enforces maritime law and ensures that the waters are safe • ...
Cliques 2018-01-15
8 Clues: To push • Name of a Queen Bee. • Name of a Target Bee. • A way to bully using the internet. • A way to push others by the things you say. • Someone around the same age, grade and size. • An exclusive group of friends that leave others out. • A way to push others or their things by touching them.
spelling words unit 11 2025-02-13
COMMERCE INVESTMENT 2022-06-07
Across
- A list of income and likely expenditures (a step that can minimise impacts of events)
- A practice of funding a project by raising money from a large number of people
- when a person gives up control of their assets and finances, voluntary or by court order
- Expand your portfolio with different types of shares
- items of value
- A legally binding agreement
- spending more money than your disposable income allows (a threat to financial security)
- Part of a firm’s profit that is divided amongst shareholders
- Money received on a regular basis from work, property, business, investment or welfare
- the profit you receive on your investment as a percentage of your original investment
- illegal business practice (a threat to financial security)
- Part ownership of a company
- a type of scam that sends fraudulent messages & emails to access details of a consumer (a threat to financial security)
- setting aside a pool of money in case of an emergency (a step that can minimise impacts of events)
- Investments that provide regulate profits
Down
- a collection of financial investments like stocks and cash etc.
- Any investment that grows or has potential to grow
- Real estate that is bought with the aim of earning some kind of financial return
- A method of resolving disputes where parties discuss issues, and attempt to reach a compromise
- Someone who purchases goods and services to satisfy need and wants
- a payment made into a fund by an employee towards a future pension
- personal group with lots of money that are willing to lose it
- to overcharge or swindle (a threat to financial security)
- money owing to external sources (e.g a bank)
- The swapping or exchanging of one good or another
- a type of investment that is acceptable to society’s current standards
- Australian Stock exchange
- use of money to purchase equipment for a new business or an existing business
- A currency used to invest in stocks, shares as well as goods and services etc.
29 Clues: items of value • Australian Stock exchange • A legally binding agreement • Part ownership of a company • Investments that provide regulate profits • money owing to external sources (e.g a bank) • The swapping or exchanging of one good or another • Any investment that grows or has potential to grow • Expand your portfolio with different types of shares • ...
Investing Vocabulary Review 2022-11-01
Across
- Disliking or being opposed to something.
- Type of account which is comprised primarily of different currencies throughout the world. You can write checks from this. (2 words)
- Type of account at a bank which allows you to use the money for transactions directly but often does not offer interest.
- Mutual fund or ETF designed to mimic the performance of an exchange as a whole. (2 words)
- Non-fungible tokens. (Abbr.)
- A new type of money utilizing the concept of blockchain.
- Animal representing an overall negative stock market.
- Market where securities are bought and sold.
- All investments carry some degree of this. Different people have different tolerance levels for it.
- Often a synonym for interest, this is generally expressed as a percentage or decimal.
- Animal representing an overall positive stock market.
- A tradeable financial asset.
- The act of trading away your time or money now for more of one or both later.
- A resource one can buy in bulk like wheat, gold, or oil; a risky investment.
- Debt security
- Type of account at a bank which frequently offers interest but does not allow you to use the money for transactions directly.
- Exchange-traded Fund. (Abbr.)
- Unit of a securuity, such a stock.
- A compilation of securities.
Down
- Collection of securities organized by a manager. (2 words)
- How often compound interest is calculated.
- Financial model where equal payments are made at regular intervals.
- Called CDs, these are like savings accounts except your money is held for a certain amount of time, usually at a slightly higher rate. (3 words)
- To not put all your eggs in one basket.
- Government bonds, usually at the federal level.
- Type of security representing a piece of a company
- The charge for borrowing money.
- Dow Jones Industrial Average, sometimes called "The Dow". (Abbr.)
- Type of security often involving land and houses. (2 words)
- National Association of Securities Dealers Automated Quotations. (Abbr.)
- New York Stock Exchange. (Abbr.)
- Very important to investing, and money can't really buy it.
32 Clues: Debt security • A tradeable financial asset. • A compilation of securities. • Non-fungible tokens. (Abbr.) • The charge for borrowing money. • Exchange-traded Fund. (Abbr.) • New York Stock Exchange. (Abbr.) • Unit of a securuity, such a stock. • To not put all your eggs in one basket. • Disliking or being opposed to something. • How often compound interest is calculated. • ...
The United Nations and the International Criminal Court 2019-03-26
Across
- The number of permanent members of the UN Security Council
- The city in Kenya that hosts an ICC field office
- This author (surname only) considered the ICC 'a necessary step towards global justice'
- The city in Côte d'Ivoire that hosts an ICC field office
- The United Nations Office on Drugs and Crime (UNODC) is headquartered in this European city
- This global superpower signed the Rome Treaty but never ratified (joined)
- MISSING WORD: The UN has 193 ______
- Surname of the current Executive Director of the United Nations Office on Drugs and Crime (UNODC)
- MISSING WORD: On 26 June every year, UNODC marks the International Day against Drug Abuse and Illicit _______.
- MISSING WORD: The US to deny _____ for ICC members investigating alleged war crimes
- This country withdrew from the ICC in March 2019
- The first meeting of the UN was in this European city in 1946
- MISSING WORD: ICC judges have issued 34 ______ warrants
- The ICC was established in this month in 2002
Down
- The number of ICC organs
- The first organ of the ICC
- The city in Uganda that hosts an ICC field office
- The UN Charter gives primary responsibility for maintaining international peace and security to this organ
- This country withdrew from the ICC in October 2017
- The ICC does not prosecute those under this age when a crime was committed
- The UN was officially formed in this month in 1945
- The number of principal organs in the UN system
- The American city that hosts the UN headquarters
- Each of the permanent members of the UN Security Council has one of these
- MISSING WORD: The guiding principles of the UN are the UN ______
- The majority of ICC investigations have been in this continent
- The number of summonses to appear issued by ICC judges
- MISSING WORD: The ICC has over 900 _____ members?
- Nation that hold presidency of UN Security Council in April 2019
- The number of situations under investigation by the ICC
- The founding treaty of the ICC is named after this Italian city
31 Clues: The number of ICC organs • The first organ of the ICC • MISSING WORD: The UN has 193 ______ • The ICC was established in this month in 2002 • The number of principal organs in the UN system • The city in Kenya that hosts an ICC field office • The American city that hosts the UN headquarters • This country withdrew from the ICC in March 2019 • ...
The United Nations and the International Criminal Court 2019-03-26
Across
- The United Nations Office on Drugs and Crime (UNODC) is headquartered in this European city
- The number of summonses to appear issued by ICC judges
- Surname of the current Executive Director of the United Nations Office on Drugs and Crime (UNODC)
- Nation that hold presidency of UN Security Council in April 2019
- The city in Côte d'Ivoire that hosts an ICC field office
- MISSING WORD: The guiding principles of the UN are the UN ______
- The number of permanent members of the UN Security Council
- The first meeting of the UN was in this European city in 1946
- The UN Charter gives primary responsibility for maintaining international peace and security to this organ
- This country withdrew from the ICC in October 2017
- The American city that hosts the UN headquarters
- The number of situations under investigation by the ICC
- This author (surname only) considered the ICC 'a necessary step towards global justice'
- This global superpower signed the Rome Treaty but never ratified (joined)
- Each of the permanent members of the UN Security Council has one of these
- MISSING WORD: The ICC has over 900 _____ members?
Down
- The majority of ICC investigations have been in this continent
- The founding treaty of the ICC is named after this Italian city
- The number of ICC organs
- The ICC does not prosecute those under this age when a crime was committed
- The city in Kenya that hosts an ICC field office
- MISSING WORD: On 26 June every year, UNODC marks the International Day against Drug Abuse and Illicit _______.
- The UN was officially formed in this month in 1945
- This country withdrew from the ICC in March 2019
- The ICC was established in this month in 2002
- MISSING WORD: ICC judges have issued 34 ______ warrants
- The first organ of the ICC
- The number of principal organs in the UN system
- The city in Uganda that hosts an ICC field office
- MISSING WORD: The UN has 193 ______
- MISSING WORD: The US to deny _____ for ICC members investigating alleged war crimes
31 Clues: The number of ICC organs • The first organ of the ICC • MISSING WORD: The UN has 193 ______ • The ICC was established in this month in 2002 • The number of principal organs in the UN system • The city in Kenya that hosts an ICC field office • This country withdrew from the ICC in March 2019 • The American city that hosts the UN headquarters • ...
Palabras de "Carta a Dios" 2015-05-29
31 Clues: ink • joy • will • seal • hope • hill • laugh • beast • faith • punch • storm • bills • coins • window • pearls • salary • corral • wailing • peasant • mailbox • rapping • postman • thieves • locusts • harvest • downpour • security • treasure • raindrops • delivered • consciences
My Mind Boggling Puzzle 2016-04-11
20 Clues: fresh,new • joly,holy • quiet,cool • aviod,forget • insane,silly • sunny,radiant • acute,pointed • gently,calmly • scared,nervous • blast,blizzard • active,powerful • afraid,doubtful • interest,inquir • exchange,barter • lightly,smoothly • freedom,security • certified,proved • strenght,violence • equipment,property • adventure,migration
Leccion Deck 5 2018-02-28
23 Clues: ruins • island • welcome • expired • to sail • lodging • passport • traveler • seatbelt • dangerous • to return • itinerary • campground • to be full • adventurer • to take off • room service • high quality • (car) accident • tourist (adj.) • to take a trip • excursion; tour • safety; security
Smart moves 2 kpl 17 2017-05-10
Across
- mennä joltakin ohi
- varusteet, tavarat
- läpi
- innostunut, jännittynyt
- kotikaupunki
- luokkakaveri
- osoittaa
- ymmärtää
- maisemat
- näky, näkeminen
- tuskin
- matkustaa
- laskeutua
- kolkko
- lentää
Down
- lentokenttä
- saapua (jonnekin)
- lopen uupunut
- poikki, ’rättiväsynyt’
- nuorisohotelli
- turvatarkastus
- bussimatka
- silti, kuitenkin
- kiivetä
- ylellisyys
- (tässä:) toimia
26 Clues: läpi • tuskin • kolkko • lentää • kiivetä • osoittaa • ymmärtää • maisemat • matkustaa • laskeutua • bussimatka • ylellisyys • lentokenttä • kotikaupunki • luokkakaveri • lopen uupunut • nuorisohotelli • turvatarkastus • näky, näkeminen • (tässä:) toimia • silti, kuitenkin • saapua (jonnekin) • mennä joltakin ohi • varusteet, tavarat • poikki, ’rättiväsynyt’ • innostunut, jännittynyt
Smart moves 2 kpl 17 2017-05-10
Across
- mennä joltakin ohi
- matkustaa
- (tässä:) toimia
- innostunut, jännittynyt
- maisemat
- bussimatka
- näky, näkeminen
- kotikaupunki
- lentokenttä
- ylellisyys
- lopen uupunut
- lentää
- nuorisohotelli
- kolkko
Down
- silti, kuitenkin
- saapua (jonnekin)
- ymmärtää
- varusteet, tavarat
- laskeutua
- poikki, ’rättiväsynyt’
- luokkakaveri
- turvatarkastus
- läpi
- tuskin
- osoittaa
- kiivetä
26 Clues: läpi • tuskin • lentää • kolkko • kiivetä • ymmärtää • maisemat • osoittaa • matkustaa • laskeutua • bussimatka • ylellisyys • lentokenttä • luokkakaveri • kotikaupunki • lopen uupunut • turvatarkastus • nuorisohotelli • (tässä:) toimia • näky, näkeminen • silti, kuitenkin • saapua (jonnekin) • mennä joltakin ohi • varusteet, tavarat • poikki, ’rättiväsynyt’ • innostunut, jännittynyt
Living online 2024-02-07
Across
- verbessern
- Schutz
- digital (Adverb)
- absichtlich
- verbreiten
- übertragen, senden
- manipulieren
- Sicherheit
- falsch, gefälscht
- Quelle
- Streich, Schwindel
- aktuell
- glaubwürdig
- Betrug
- öffentlich
Down
- süchtig machend
- Gewinnung (von Daten)
- Inhalt
- verändern
- provozieren
- Gerücht
- Bestätigung
- verzerrt
- Mobbing im Netz
- Zugang
- fördern, werben für
26 Clues: Inhalt • Schutz • Quelle • Zugang • Betrug • Gerücht • aktuell • verzerrt • verändern • verbessern • verbreiten • Sicherheit • öffentlich • provozieren • absichtlich • Bestätigung • glaubwürdig • manipulieren • süchtig machend • Mobbing im Netz • digital (Adverb) • falsch, gefälscht • übertragen, senden • Streich, Schwindel • fördern, werben für • Gewinnung (von Daten)
Unit 2 Viajar 2021-10-14
25 Clues: bag • bus • car • bank • late • cash • plane • train • to fly • to pay • subway • customs • luggage • on time • to walk • passport • security • suitcase • to leave • to carry • to begin • to drive • to arrive • to do/make • to look for
AVID crossword puzzle 2021-11-17
31 Clues: no • sad • Job • move • tell • size • hard • Risk • help • take • Safe • even • away • open • fully • brave • tired • smart • smart • police • energy • problem • present • created • Language • together • Long task • expensive • take away • dangerous • not enough
El Smartphone - Conexión 2+3 2025-01-28
20 Clues: risk • user • publish • to hide • profile • to send • privacy • password • to share • bullying • negligence • supervision • to threaten • to have fun • safety/security • data/informations • to trust/to rely on • to indicate/highlight • to look for/to search • to consider/keep in mind
Year 1 Reading File II - Text 1 to 6 2021-05-27
24 Clues: level • to ban • placard • to slip • whether • opposite • recently • dangling • confused • to waste • probably • to ignore • to reduce • poisonous • to survive • vegetables • to involve • ultimately • to disturb • frightened • to practice • security bars • to throw away • are allowed to
Human Rights 2025-07-11
Across
- – ta'lim
- – qadriyatlar
- – xavfsizlik
- – tenglik
- – faollik
- – diskriminatsiya
- – xalqaro
- – hurmat
- – qo‘llab-quvvatlash
- – buzilish
- – tashkilot
- – huquqiy
- – qonun
- – ozodlik
- – sog‘liqni saqlash
Down
- – universal
- – demokratiya
- – e'lon
- – iqtisodiy
- – erkinlik
- – sha'ni
- – konstitutsiya
- – himoya
- – zo‘ravonlik
- – siyosiy
- – huquqlar
- – insoniyat
- – fuqarolik
- – adolat
- – ijtimoiy
30 Clues: – e'lon • – qonun • – ta'lim • – sha'ni • – himoya • – hurmat • – adolat • – tenglik • – faollik • – xalqaro • – siyosiy • – huquqiy • – ozodlik • – erkinlik • – huquqlar • – buzilish • – ijtimoiy • – universal • – iqtisodiy • – insoniyat • – fuqarolik • – tashkilot • – xavfsizlik • – demokratiya • – qadriyatlar • – zo‘ravonlik • – konstitutsiya • – diskriminatsiya • – sog‘liqni saqlash • – qo‘llab-quvvatlash
Un Viaje en Avión 2022-11-15
23 Clues: scale • flight • ticket • customs • layover • airline • passport • airplane • suitcase • passenger • seat number • destination • baggage tag • travel agent • waiting area • baggage claim • departure gate • one way ticket • security control • check in counter • trunk of the car • roundtrip ticket • departure & arrival screen
UNIT 4 2022-11-23
30 Clues: acil • kaza • amaç • sonuç • mesaj • yüzde • anket • fatura • farklı • aramak • sohbet • soygun • pahalı • kızgın • müsait • zararlı • yüzyüze • faydalı • utanmış • telefon • uygulama • kapatmak • güvenlik • iletişim • toplantı • beklemek • bağlanmak • devametmek • sosyalmedya • numaratuşlamak
C6T2 2021-12-28
Safer Internet 2023-04-24
Across
- Was einmal im Netz veröffentlicht wurde bleibt für...dort
- Dies schicken Betrüger unter anderem ihren Opfern
- Inhalte verbreiten sich im... rasend schnell
- Durch dieses Gerät schicken Betrüger Betrugnachrichten
Down
- Eine der Wege Hass im Internet zu bekämpfen
- Ein Beispiel für Cyber-Mobbing
- Hasspostings werden auch...genannt
7 Clues: Ein Beispiel für Cyber-Mobbing • Hasspostings werden auch...genannt • Eine der Wege Hass im Internet zu bekämpfen • Inhalte verbreiten sich im... rasend schnell • Dies schicken Betrüger unter anderem ihren Opfern • Durch dieses Gerät schicken Betrüger Betrugnachrichten • Was einmal im Netz veröffentlicht wurde bleibt für...dort
Cybersecurity 2020-11-18
Across
- A piece of property that cannot be viewed by the public.
- A thing that comes before another of the same kind.
- A person who tries to penetrate a computer system to find weaknesses.
- A type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
- When a hacker uses a compromised email account to impersonate the account owner.
- The name of the bot.
- Makes sure that users do not send important or valuable data to outside sources.
- A malicious attempt to disrupt the normal traffic of a targeted server.
- Luring someone into a relationship by means of a fictional online persona.
- Someone who breaks into a computer’s system.
- The process of undermining a company's cyber defences by going after its vulnerable partner network.
- The path a hacker takes to deliver the malicious software.
- An extra copy of data from a computer.
- Software tools that enable an unauthorized user to gain control of a system without being noticed.
- Criminals who break into computer networks with malicious intent.
- A software that demands payment in order to access the system again.
- An accessory that can be added to a computer. (??)
- Confidential or personal information that may be used for fraudulent purposes.
- Allows access of specific data to certain members of a group.
- A software that displayed advertisements.
- A threat agent is any person or thing that acts to cause, carry, transmit, or support a threat.
- used to confirm the identity of a user or computer.
- A set of instructions used to help staff members respond to a security incident.
- To change into a coded form.
- A type of attack that doesn’t allow the owner to access their data.
- A number that is associated with a specific computer.
- The process of protecting important data from corruption.
- When data is copied or transferred from one place to another without authorization.
- A process used to determine which components of the system need to be protected and the types of security risks they should be protected from.
Down
- A place where data is stored on the internet and not on the computer’s hard drive.
- A security method where information is encoded so it can only be accessed with a key.
- A software tool made to take advantage of a weakness in a computer.
- A piece of code put in to correct an error.
- A value with a unique length to identify data.
- The study of codes and the art of writing or solving them.
- A stealthy attacker that remains undetected for a long time.
- When a hacker submitts many passwords in hopes of eventually guessing the real one.
- A software application that scans and records passwords that are used or broadcasted on a computer or network interface.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Used to block unauthorized access while permitting outward communication.
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- A number of internet connected computers that are all running one or more bots.
- Process that checks the identity of the user is what it is supposed to be.
- The controller of the bot that provides direction for the bot.
- Analyzing large databases to get information.
- A term used to describe the overall process or method where you: Identify hazards and risk factors that have the potential to cause harm.
- The unauthorized movement of classified information to unauthorized users.
- An encrypted connection over the internet from a device to a network.
- A decoy computer system designed to attract cyber attacks.
- A kind of monitoring software to keep track of keystrokes made by the user.
- A group that helps organizations to improve themselves by providing opposition to the point of view of the organization that they are helping.
- A program used to distinguish between a person and an automated access website.
- The act of disguising a communication from an unknown source as being from a known, trusted source.
- A self multiplying system that spreads itself across a network.
- A resource that is released under a copyright licence and allows anyone to use it.
- An online threat that hides itself in computers and mobile devices.
- A collective name for a variety of malicious software variants.
- List of things that are untrustworthy and should be avoided.
- The practice of determining the credibility and seriousness of a potential threat, as well as the probability that the threat will become a reality.
- The identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
- Malware that is disguised as actual software.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- A watering hole attack is a targeted attack designed to compromise users within a specific industry or group of users by infecting websites they typically visit and luring them to a malicious site.
- An autonomous program on the internet that can interact with systems or users.
64 Clues: The name of the bot. • To change into a coded form. • An extra copy of data from a computer. • A software that displayed advertisements. • A piece of code put in to correct an error. • Someone who breaks into a computer’s system. • Analyzing large databases to get information. • Malware that is disguised as actual software. • A value with a unique length to identify data. • ...
AZ-900 Crossword 3 2021-12-21
Across
- Azure _____________ is a service that allows network traffic filtering across multiple Azure subscriptions.
- Private IP addresses in Azure are a ___________ offering.
- _______________ is the act of validating that users are whom they claim to be. It is the first step in any security process.
- Every property in Azure is protected by Azure DDoS Protection __________ at no additional cost.
- ________________ security groups allow you to configure network security as a natural extension of an application's structure by allowing you to group virtual machines and define network security policies based on those groups.
- Office 365 is considered a ____________ offering.
- Azure Cosmos DB is a _____________ offering.
- Azure _____________ Analytics is a fully managed data warehouse in Azure.
- _____________ is an example of elasticity.
- Microsoft ____________ delivers intelligent security analytics and threat intelligence across the enterprise and provides a single solution for attack detection, threat visibility, proactive hunting, and threat response.
- For all VMs that have two or more instances deployed across two or more Availability ______________ in the same Azure region, Microsoft guarantees you will have Virtual Machine Connectivity to at least one instance at least 99.99% of the time.
- The Apache Spark-based analytics service available in Azure is called Azure _________________.
- The Blue Widget Corp has a Software Assurance agreement that covers Windows Server licenses. Because of this, the organization can leverage the Azure _________ Benefit to minimize licensing costs when deploying VMs.
Down
- ______________ in system security is the process of giving a user permission to access a specific resource or function.
- To run a PowerShell script on a computer that runs macOS, you must first install PowerShell ___________ on the machine.
- Azure _______________ is a managed Apache Hadoop cluster in Azure that can be used to process mass amounts of data.
- Before encrypting a VM in Azure, you must first create an Azure Key __________.
- ________________ refers to the ability to add compute resources when needed, while reducing compute resources when not needed.
- Azure Key Vault can be used to securely store tokens, passwords, ______________, API keys, and other secrets.
- For all VMs that have two or more instances deployed in the same Availability ___________, Microsoft guarantees you will have Virtual Machine Connectivity to at least one instance at least 99.95% of the time.
- Azure Cosmos DB supports _____________.
- An Azure VM is an example of _________.
- The Azure App Service is an example of a ____________ offering.
- Azure ________________ are used to define the requirements for Azure resource properties during deployment and for pre-exsiting resources.
- Azure DDoS Protection _____________ is a paid offering that when combined with application design best practices, provides enhanced DDoS mitigation features to defend against DDoS attacks.
- In Azure AD Identity Protection, a _________ risk represents the probability that a specific authentication request is not authorized by the identity's owner.
- Public IP addresses in Azure are a ___________ offering.
- Azure __________ is a distributed network of servers that can efficiently deliver web content to users. It stores cached content on edge servers in point-of-presence locations that are close to end-users, to minimize latency.
- You can use an _______________ to filter network traffic to and from Azure resources in an Azure virtual network.
- Azure _________ Apps is a cloud-based platform that you can use to create and run automated workflows that integrate apps, data, services, and systems.
30 Clues: Azure Cosmos DB supports _____________. • An Azure VM is an example of _________. • _____________ is an example of elasticity. • Azure Cosmos DB is a _____________ offering. • Office 365 is considered a ____________ offering. • Public IP addresses in Azure are a ___________ offering. • Private IP addresses in Azure are a ___________ offering. • ...
Overzicht 2013 2014-01-15
Across
- In welke maand is Nelson Mandela overleden ?
- Wat was er op de luchthaven gestolen ?
- wie treed er in Nederland van de troon ?
- In Syrie vallen er 1500 doden door ?
- hoe noemt de jongen dat naar Syrie was vertrokken ?
- Welke paus treed aaf ?
- wat was de voornaam van de president van Venezuela ?
- waar was er een meteor gevallen ?
- Rusland wilt met ... een vreedzame oplossing
Down
- wat was er in Boston tijdens de de beroemde marathon gebeurt ?
- aan wat werd ACW beschuldigt ?
- Hoe noemt de typhoon dat in Fillipijnen plaats vond ?
- waar was er een kleding fabriek ingestort ?
- Willem ... wordt koning van Nederland
- wie was de slachtoffer van cyber spionage ?
- Koning Albert II maakt plaats voor prins ...
16 Clues: Welke paus treed aaf ? • aan wat werd ACW beschuldigt ? • waar was er een meteor gevallen ? • In Syrie vallen er 1500 doden door ? • Willem ... wordt koning van Nederland • Wat was er op de luchthaven gestolen ? • wie treed er in Nederland van de troon ? • waar was er een kleding fabriek ingestort ? • wie was de slachtoffer van cyber spionage ? • ...
CROSSWORD 4: OCTOBER 28 2024-10-27
Across
- Cold War conflict, fought in the 1960’s, and won by the communist north.
- An institution that has administrative duties, like helping tourists in another country with their visas, passports, recording births etc.
- War Cold War conflict, fought in the 1950’s, was a draw.
- The desire and need for oil and other resources could be a __________ for war.
- Where our central government is located.
- ___________ without Borders offers medical care to those with little access.
- This Melanie runs our embassies and consulates around the world
- NGO’s are usually independent of any ______________ help or control
- These wars are within countries and often include guerilla warfare.
- What do China, the USA, the UK, France and Russia share?
- These differences between groups of people can often lead to tension and conflict
- Embassies are found in these cities.
- During bargaining ____________, political and military strength is used.
- The Security Council seeks to stop the flow of _____________ around the world since these are needed to fight wars.
- In a war situation, people tell who is there for the UN by searching for this colour?
- The intention that justifies war must be sincere. There must be no ________ hidden agenda.
- Force can only be used to correct serious acts. It must be a __________ cause or war.
- War must only be used when all other possible means, for example, negotiations, have been exhausted. In other words it must be a last _____________
- One _______________ of the ICC is that too many countries do not accept its jurisdiction.
- The provinces of Canada have little say in our foreign policy since it is under the power of the ___________ government.
- International Criminal _____________.
- After a war, when _________ acts are discovered they are dealt with by the ICC.
- After World War II many African and Asian nations sought _____________.
- Amnesty International ensures that human rights are respected.
- In your PowerPoint, there are how many sources of tension and conflict?
- What is the total membership of the UN Security Council?
- During _____________ states discuss their differences and try to reach an acceptable compromise. If things don’t work out, they can try to bargain.
Down
- The Blue helmets try to be ___________ or impartial and not actually fight.
- This NGO will send help to people hard hit by war or even disasters.
- If a country or group is refusing to stop fighting the UN Security Council may impose economic ______________.
- Peacekeeping ____________ support the disarmament process, and protect civilian populations, run elections, and promote human rights.
- This war started after World War II, and saw the formation of NATO.
- It is only ___________ that the expected damages of a war must not be greater than the problem that led to the war in the first place.
- The Security Council will ______________ to find out why a war started.
- This minister is responsible for our ________ affairs and diplomacy.
- War must be waged by _______ authorities, never individuals
- Psychological or physical struggles between different groups, often leading to violence and war
- How many non-permanent members of the UN Security Council are there?
- The Preliminary condition to diplomacy is that states must have a ______ interest to negotiate.
- Economic system of the USA, was opposed to Communism of the USSR
- NGO which looks for solutions to problems of poverty.
- This institution facilitates communications between home and host governments.
- In the case of North Korea invading South Korea, the UN Security council took _______ action. They went to war.
- The _______________ council of the UN exists to maintain international peace.
- _________ to negotiations do states identify common interests and present their demands.
- NGO’s engage in ______________ efforts.
- This organization prevents attacks by using this defense.
- Every _____ years countries are elected to UN Security Council.
- Center of this economic system was in Moscow during the Cold War
- The fourth state of the diplomatic process, when there can be the threat of sanctions or promise of rewards.
- When a country or a group of people want to gain power over their governance.
- The final state or the ___________ of negotiations.
- An existing hostility or opposition between different groups, with a threat of conflict
- Most often, wars involve control over this.
- Surprisingly, this country has not ratified the Rome statue, which founded the ICC.
55 Clues: Embassies are found in these cities. • International Criminal _____________. • NGO’s engage in ______________ efforts. • Where our central government is located. • Most often, wars involve control over this. • The final state or the ___________ of negotiations. • NGO which looks for solutions to problems of poverty. • ...
Cyber Awareness Month Puzzle 2024-10-08
Across
- The “I” in the C-I-A Triad; protection from unauthorized changes.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
- Facebook, Twitter, Instagram, etc. (Two words)
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- The process of taking plain text and scrambling it into an unreadable format.
Down
- Verifying identity.
- The “A” in the C-I-A Triad. It ensures authorized users have access.
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- Should be constructed of upper and lower case letters, numbers, and special characters.
- Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- Unauthorized access to a network, information systems, or application.
- The address of a webpage. Check the validity of it before clicking on it.
16 Clues: Verifying identity. • Facebook, Twitter, Instagram, etc. (Two words) • The “I” in the C-I-A Triad; protection from unauthorized changes. • The “A” in the C-I-A Triad. It ensures authorized users have access. • Unauthorized access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
Depot 2024-07-04
9 Clues: your fur babies • your favorite color • your primary insurance • your case managers name • Another word for apartment • this person cleans your home • What you use to color your hair • security guard that works the morning • Security guard during that works the evening
ACCESS CONTROL AND SECURITY 2024-09-05
Across
- is a connectionless transport protocol.
- is a type of message authentication code that is acquired by executing a cryptographic hash function on the data that is to be authenticated and a secret shared key.
- protocol To establish the validity of identification data, it is necessary to rely on an AP.
- Layer Security is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet.
- verifies that the data has not been forged or tampered with.
Down
- analyzes what access should be provided to AR based on the AR’s identity, permission level, attempted request, and an organization’s established access policy.
- is used to send and distribute outgoing emails.
- Layer provides security to the data that is transferred between web browser and server.
- Protocol is used to establish sessions.
- layer transfers services from the network layer to the application layer and breaks down data into data frames for error checking at the network segment level.
10 Clues: is a connectionless transport protocol. • Protocol is used to establish sessions. • is used to send and distribute outgoing emails. • verifies that the data has not been forged or tampered with. • Layer provides security to the data that is transferred between web browser and server. • ...
Specialty Crossword 2022-07-19
Across
- Hijacks your computer and ask you for money.
- an indication of future developments of construction costs
- type of cyber attack where server is flooded with forged requests using bots
- Rating Platform for Aviation Business
- Shape parameter of the most commonly used severity distribution
Down
- risk associated with storing of goods at one place
- Rating platform for agriculture business
- Pricing tool for agriculture index insurance
- Rating platform for Marine Business
- an international club of marine insurance providers
10 Clues: Rating platform for Marine Business • Rating Platform for Aviation Business • Rating platform for agriculture business • Hijacks your computer and ask you for money. • Pricing tool for agriculture index insurance • risk associated with storing of goods at one place • an international club of marine insurance providers • ...
Bully busters - Evie 2023-11-28
Across
- I kept harassing my mum
- A teacher didn't help Erza because he was Muslim
- I saw my friend being bullied so i stood up for them
- Amelia's pop mocked her friend
Down
- She stood by and watched someone get bashed
- I disagreed with my friend
- bulling The teacher kept calling me dumb
- The teacher was teasing the boy
- I bullied an 8 year old on Roblox because they won the game
- The boy was getting bullied
10 Clues: I kept harassing my mum • I disagreed with my friend • The boy was getting bullied • Amelia's pop mocked her friend • The teacher was teasing the boy • bulling The teacher kept calling me dumb • She stood by and watched someone get bashed • A teacher didn't help Erza because he was Muslim • I saw my friend being bullied so i stood up for them • ...
BULLYING/ HARASSMENT CROSSWORD PUZZLE 2019-10-28
Across
- calling someone baby is what kind of harassment
- be sure to visit the (blank) center
- if your bf/gf threatens suicide they are
- inappropriate touching is an example of what kind of harassment
- a social media where cyber bullying takes place
- example of verbal bullying
Down
- example of physical bullying
- bullying can cause people to have this
- the use of force, to abuse, dominate or intimidate
- word that describes someone who hates gay people
10 Clues: example of verbal bullying • example of physical bullying • be sure to visit the (blank) center • bullying can cause people to have this • if your bf/gf threatens suicide they are • calling someone baby is what kind of harassment • a social media where cyber bullying takes place • word that describes someone who hates gay people • ...
Effects of SOCIAL MEDIA on education 2023-06-13
Across
- hormone that gets released while endlessly scrolling leading to overstimulated mind
- social media app famous for dances (Chinese company)
- famous social media app for communicating
- positive of social media that helps people around the world stay in touch
- - opposite of physical
- negative of social media that a lot of students struggle with
Down
- - a sense of determination triggered by something
- famous social media app where you can watch reels
- - opposite of mental
- bullying online
10 Clues: bullying online • - opposite of mental • - opposite of physical • famous social media app for communicating • - a sense of determination triggered by something • famous social media app where you can watch reels • social media app famous for dances (Chinese company) • negative of social media that a lot of students struggle with • ...
Thanksgiving 2024-11-14
Across
- the month when it's celebrated
- the name of the holiday
- the day celebrated after Thanksgiving:Black...
- one of the popular foods that they eat on this day
Down
- what kind of holiday is Thanksgiving?
- many people doing this on a specific Friday...
- the name of the sauce that they use at the dinner
- the day when it's celebrated
- what do they have at the table on this day?
- the Monday when people continue the shopping online
10 Clues: the name of the holiday • the day when it's celebrated • the month when it's celebrated • what kind of holiday is Thanksgiving? • what do they have at the table on this day? • many people doing this on a specific Friday... • the day celebrated after Thanksgiving:Black... • the name of the sauce that they use at the dinner • ...
COMMERCE INVESTMENT 2022-06-07
Across
- Australian Stock exchange
- The swapping or exchanging of one good or another
- A loan from a financial institution where something is held as security in case the money is not repaid
- A method of resolving disputes where parties discuss issues, and attempt to reach a compromise
- Place where shares in public companies are bought and sold
- A legally binding agreement
- spending more money than your disposable income allows (a threat to financial security)
- Money received on a regular basis from work, property, business, investment or welfare
- when a person gives up control of their assets and finances, voluntary or by court order
- The amount of money a consumer is prepared to pay in exchange of a good or service
- items of value
- setting aside a pool of money in case of an emergency (a step that can minimise impacts of events)
- Any investment that grows or has potential to grow
- illegal business practice (a threat to financial security)
- Real estate that is bought with the aim of earning some kind of financial return
- A promis to repair any defects that are in a product
- Expand your portfolio with different types of shares
Down
- the profit you receive on your investment as a percentage of your original investment
- Part ownership of a company
- What remains after all business expenses are deducted from sales revenue
- Investments that provide regulate profits
- a type of investment that is acceptable to society’s current standards
- A list of income and likely expenditures (a step that can minimise impacts of events)
- a type of scam that sends fraudulent messages & emails to access details of a consumer (a threat to financial security)
- Someone who purchases goods and services to satisfy need and wants
- personal group with lots of money that are willing to lose it
- electronic funds transfer point of sale
- Buy goos in large quantities from the manufacturer
- A currency used to invest in stocks, shares as well as goods and services etc.
- to overcharge or swindle (a threat to financial security)
- A person who works for a wage or salary
- a collection of financial investments like stocks and cash etc.
- money set aside during life for retirement (a step that can minimise the impact of events)
- use of money to purchase equipment for a new business or an existing business
- money owing to external sources (e.g a bank)
- A practice of funding a project by raising money from a large number of people
- Part of a firm’s profit that is divided amongst shareholders
- Regularly putting aside some money for future use
38 Clues: items of value • Australian Stock exchange • Part ownership of a company • A legally binding agreement • electronic funds transfer point of sale • A person who works for a wage or salary • Investments that provide regulate profits • money owing to external sources (e.g a bank) • The swapping or exchanging of one good or another • ...
Travel 2023-04-04
13 Clues: toll • padi • pagas • rabav • kandik • kohver • aksessuaar • turvalisus • ürgne loodus • reisiterminal • registreerimine • pass pardapääse • baggage käsipagas
Digital Citizenship 2025-02-06
Across
- Bullying that happens through digital means
- Think twice before sharing personal_____
- Protect your _____ by being a responsible digital citizen
- regular periods where you completely disconnect from technology
- Before engaging with online content, consider how it might affect your mood
Down
- ______real-life connections
- Carefully choose who you follow on _____ to minimize exposure to negative content
- You should limit this
8 Clues: You should limit this • ______real-life connections • Think twice before sharing personal_____ • Bullying that happens through digital means • Protect your _____ by being a responsible digital citizen • regular periods where you completely disconnect from technology • Before engaging with online content, consider how it might affect your mood • ...
Overzicht 2013 2014-01-15
Across
- wat was de voornaam van de president van Venezuela ?
- Rusland wilt met ... een vreedzame oplossing
- wat was er in Boston tijdens de de beroemde marathon gebeurt ?
- Wat was er op de luchthaven gestolen ?
- In Syrie vallen er 1500 doden door ?
- hoe noemt de jongen dat naar Syrie was vertrokken ?
- Welke paus treed aaf ?
- wie treed er in Nederland van de troon ?
Down
- Koning Albert II maakt plaats voor prins ...
- wie was de slachtoffer van cyber spionage ?
- waar was er een meteor gevallen ?
- Hoe noemt de typhoon dat in Fillipijnen plaats vond ?
- waar was er een kleding fabriek ingestort ?
- In welke maand is Nelson Mandela overleden ?
- Willem ... wordt koning van Nederland
- aan wat werd ACW beschuldigt ?
16 Clues: Welke paus treed aaf ? • aan wat werd ACW beschuldigt ? • waar was er een meteor gevallen ? • In Syrie vallen er 1500 doden door ? • Willem ... wordt koning van Nederland • Wat was er op de luchthaven gestolen ? • wie treed er in Nederland van de troon ? • wie was de slachtoffer van cyber spionage ? • waar was er een kleding fabriek ingestort ? • ...
cry 2023-11-05
Across
- You go to one of them once a month, weekly or biweekly
- You have been reviewed by your supervisors
- There is an optional week off in the week of
- You have set a check in with this department by the end of this day
- Department that focuses on the company's budget
- The department that made you a company email
- The department behind the policies.
Down
- You have been learning how to interview
- Who knows what they do
- You should keep yourself hydrated by drinking
- Hangout place on Discord
- Woof
- Department that focuses on gaining and maintaining customers.
- The department that is creating a coding bootcamp
- No one is _____ during meetings
- The department that focuses on environmental teachings
16 Clues: Woof • Who knows what they do • Hangout place on Discord • No one is _____ during meetings • The department behind the policies. • You have been learning how to interview • You have been reviewed by your supervisors • There is an optional week off in the week of • The department that made you a company email • You should keep yourself hydrated by drinking • ...
Crossword 5A 2022-10-09
Across
- A lot of water.
- The basic structual and functional unit of all organisms.
- All there is.
- The best comic book company after DC.
- a compulsive habit that people obtain through repitition.
- relating to or characteristic of the culture of computers, information technology, and virtual reality.
- A person who is 100 years old or more(Dima).
- The quality of being very dark.
Down
- Doing something for pleasure or interest, not as a job.
- Say what you expect to happen in the future.
- Visitor from another a different planet
- An animal with a backbone.
- Very large or important.
- a thing that is imagined.
- A strong feeling such as fear or anger.
- To move people out of a danger area.
16 Clues: All there is. • A lot of water. • Very large or important. • a thing that is imagined. • An animal with a backbone. • The quality of being very dark. • To move people out of a danger area. • The best comic book company after DC. • Visitor from another a different planet • A strong feeling such as fear or anger. • Say what you expect to happen in the future. • ...
Black Friday QPP Crossword 2016-11-25
Across
- Health Record system required
- 90 days of 2017 data
- One who diagnoses and treats patients
- 4____for 2017
- Certified Registered Nurse __________
- Higher level
- _________ Activities
- Leftovers for lunch
- 90 _______ days
- A sought-after category of Black Friday sale items
Down
- Medicare Access and CHIP Reauthorization Act of 2015
- Minimum amount of 2017 data
- 2017 is this kind of year
- One, six, or 15 of these measures
- Black Friday shoppers' goals
- Information given to you about your work to help you improve
- All those having a vested interest in a program
- _________ Monday holiday sales
- Most Black Friday Shoppers are in stores long before this
- Particularly good or worthy
- One who is designated to profit in a situation
- Final _________
- Organs affected by ESRD
- Resource online for free training and information
- May be applied for if a category is a hardship
- Replaces the value-based modifier
26 Clues: Higher level • 4____for 2017 • Final _________ • 90 _______ days • Leftovers for lunch • 90 days of 2017 data • _________ Activities • Organs affected by ESRD • 2017 is this kind of year • Minimum amount of 2017 data • Particularly good or worthy • Black Friday shoppers' goals • Health Record system required • _________ Monday holiday sales • One, six, or 15 of these measures • ...
Burlington English Module 7 Review 2023-11-01
Across
- When someone lies to benefit themselves financially
- A file attached to a email like a picture or document
- to show, able to see
- Something that you can not stop from happening
- To check to make sure something is correct
- To not allow, ban, reject
- to not allow, to forbid
- Someone or something that might be dangerous
- When something or someone does not look or feel right
- Many
- Something that can spread and replicate itself and cause harm
- Rules, advice that should be followed
Down
- To take something that is not yours without permission
- Not be able to wait for a long time
- to watch closely
- A person who had a crime committed against them
- Related to computers
- show, visible or seem, look like
- to take out something that is not acceptable
- Something that makes someone else feel uncomfortable, rude
20 Clues: Many • to watch closely • to show, able to see • Related to computers • to not allow, to forbid • To not allow, ban, reject • show, visible or seem, look like • Not be able to wait for a long time • Rules, advice that should be followed • To check to make sure something is correct • Someone or something that might be dangerous • to take out something that is not acceptable • ...
TTS PKK 2024-11-06
Across
- Produk yang ada dalam bentuk virtual atau digital
- Proses memahami apa yang konsumen rasakan dan butuhkan
- Barang yang tak mudah habis
- Metode untuk memecahkan masalah dalam waktu singkat
- Proses untuk mengenalkan produk ke distributor atau pengecer
- Dimensi yang memastikan prototipe sesuai dengan produk
- Proses desain untuk mendefinisikan kebutuhan konsumen
- Tahap siklus hidup dimana penjualan produk mnecapai puncak sebelum melambat
- Tindakan untuk memperluas pasar dengan masuk ke daerah baru
- Model dari suatu produk barang atau jasa yang akan dibuat
- Orang yang merancang dan membuat prototipe produk
Down
- Konsumen dengan pengetahuan tentang produk
- Dimensi yang menggambarkan prototipe melalui visual atau tulisan
- Proses pembuatan prototipe produk
- Nama atau simbol yang digunakan untuk membedakan produk
- Dimensi yang menilai perkiraan masa hidup produk
- Yang menjadi pemimpin dalam proses design sprint
- Mewujudkan
- Proses berfikir kreatif untuk menghasilkan berbagai solusi unik
- Proses hidup suatu produk dalam bisnis
20 Clues: Mewujudkan • Barang yang tak mudah habis • Proses pembuatan prototipe produk • Proses hidup suatu produk dalam bisnis • Konsumen dengan pengetahuan tentang produk • Dimensi yang menilai perkiraan masa hidup produk • Yang menjadi pemimpin dalam proses design sprint • Produk yang ada dalam bentuk virtual atau digital • Orang yang merancang dan membuat prototipe produk • ...
PERUNDUNGAN / BULLYING 2024-02-28
Across
- BANGGA MENGIRIMKAN FOTO TEMANNYA YANG SEDANG PIPIS,DAN DIJADIKAN BAHAN TERTAWAAN TEMAN, HAL INI MERUPAKAN TINDAKAN BULLYING APA
- MENGAKUI KESALAHAN
- DAPAT MENYELESAIKAN TUGAS SENDIRI DAN TIDAK BERGANTUNG PADA ORANG LAIN
- MEMUJI TEMAN YANG CANTIK APAKAH ITU BENTUK BULLYING?
- CONTOH BULLYING SOSIAL
- AKIBAT SERING DI BULLY
- SEBAGAI SESAMA SISWA SEBAIKNYA KITA MEMILIKI SIKAP SALING...
- MEMELUK TEMAN DENGAN KETAT MEMBUAT TEMAN AGAK KESAKITAN
- PENCEMARAN NAMA BAIK
- MANFAAT MEMBULLY TEMAN BAGI PEMBULLY
Down
- SALING MENDORONG DAN MEMELUK MENGGENDONG
- MENDORONG TEMAN AGAR BERANI BERBICARA ATAU TAMPIL ADALAH BENTUK
- PERILAKU TIDAK SOPAN SECARA VERBAL
- ORANG YANG SUKA MEMBULLY,BAHAGIA MELIHAT TEMANNYA KETAKUTAN DALAM PSIKOLOGI DIKELOMPOKKAN SEBAGAI ORANG YANG...
- KARENA SERING DI SEPELEKAN DAN DIHINA FISIKNYA ORANG AKAN ...
- PENYEBAR BERITA PALSU
- MENJAMBAK RAMBUT DAN MENDORONG DENGAN KASAR
- ADA BERMACAM BENTUK BULLYING SECARA FISIK ANTARA LAIN
- MENGHINA DAN MEMPERMALUKAN ORANG /ATAU MENTERTAWAKAN TERMASUK BULLYINGAPA
- BULLYING DIKELOMPOKKAN BERAPA MACAM?
20 Clues: MENGAKUI KESALAHAN • PENCEMARAN NAMA BAIK • PENYEBAR BERITA PALSU • CONTOH BULLYING SOSIAL • AKIBAT SERING DI BULLY • PERILAKU TIDAK SOPAN SECARA VERBAL • BULLYING DIKELOMPOKKAN BERAPA MACAM? • MANFAAT MEMBULLY TEMAN BAGI PEMBULLY • SALING MENDORONG DAN MEMELUK MENGGENDONG • MENJAMBAK RAMBUT DAN MENDORONG DENGAN KASAR • MEMUJI TEMAN YANG CANTIK APAKAH ITU BENTUK BULLYING? • ...
Vocab Set 6 2022-12-01
Across
- He shouldn't _________ when he only won the match on a technicality
- Allowing light to pass through
- The wall presented as a___________ to the White Walkers.
- The _____________ driver didn't have what it took to finish the race.
- The ____________ senior whined about having senioritis.
- To diminish or lessen the seriousness of an offense
Down
- confusing
- fertile
- genuine
- natural disaster
- Title of a movie Mrs. Cohen loves starring David Bowie.
- he cut his foot on the ___________ (n.)
- The belief that life is meaningless
- Their _________ meeting at the grocery store became their meet cute.
- She __________ed the grape with the prongs of her fork.
- She _________ from the norm when she shaved her head.
- he _________ed at the "sold out" button when he missed the cyber Monday Sale.
- toxic relationship
- The list of _____________needed in the rough draft was long.
- boost morale
20 Clues: fertile • genuine • confusing • boost morale • natural disaster • toxic relationship • Allowing light to pass through • The belief that life is meaningless • he cut his foot on the ___________ (n.) • To diminish or lessen the seriousness of an offense • She _________ from the norm when she shaved her head. • Title of a movie Mrs. Cohen loves starring David Bowie. • ...
Eagle 101 Crossword 2025-12-17
Across
- Something that has to do with harming yourself
- A very influential person
- What helps keep are city safe
- A tragic that can happen at schools (involves guns)
- A type of drug that has nicotine
- Refuse Explain Avoid Leave
- Something a lot of 6th graders deal with
- A thing that says it has so much flavors and contains nicotine
- A skill that we use to talk with eachother
Down
- How to control one of are emotions
- What beer medicine and those gummy's grandma eats is
- A cigarette that is powered threw battery's
- What it is to work together
- A movie we watched that is about emotions
- Something that is like bullying but on the internet
- everyone has these and they control your mood
- A type of drug
- A type of thing that is used for smoking
- used in vapes and in tobacco
- Drug Abuse Resistance Education
20 Clues: A type of drug • A very influential person • Refuse Explain Avoid Leave • What it is to work together • used in vapes and in tobacco • What helps keep are city safe • Drug Abuse Resistance Education • A type of drug that has nicotine • How to control one of are emotions • A type of thing that is used for smoking • Something a lot of 6th graders deal with • ...
Module 5 Unit 1 System Security 2023-04-24
Across
- Minimum rights required to perform ones duties
- Data maintained in case of system failure
- Information maintained to better secure the host or network
- Protecting information from unauthorized parties
- Security mechanisms should be as basic as possible
- Authenticity of Information
Down
- The way to ensure User's understand security policies
- The amount of effort necessary for a successful attack
- Information is accessible
- Systems should fail in a secure manner
- Separation of _________
11 Clues: Separation of _________ • Information is accessible • Authenticity of Information • Systems should fail in a secure manner • Data maintained in case of system failure • Minimum rights required to perform ones duties • Protecting information from unauthorized parties • Security mechanisms should be as basic as possible • ...
EQUATE Cybersecurity - Email edition 2023-05-18
Across
- Network security barrier against unauthorized access.
- Deceptive emails aiming to extract personal data.
- Identity verification for authorized access.
- Deceptive act of assuming someone's identity.
- Unwanted bulk emails.
- Data security through secret code conversion.
Down
- Malicious assault on computer systems or networks.
- Malicious software demanding payment for data release.
- Protective software against malware and viruses.
- Deceptive technique involving voice calls for extracting sensitive data.
- Website or email address identifier.
11 Clues: Unwanted bulk emails. • Website or email address identifier. • Identity verification for authorized access. • Deceptive act of assuming someone's identity. • Data security through secret code conversion. • Protective software against malware and viruses. • Deceptive emails aiming to extract personal data. • Malicious assault on computer systems or networks. • ...
Brock Crossword 2025-09-09
Across
- small text files to to gather together your data and store various amount of types of information logins and user settings their purpose is to identify and remember your information.
- a type of artificial intelligence that produces new content, such as text, images, music, video, and code, by learning from large datasets and responding to user prompts
- the brain of a computer, a primary component responsible for executing instructions, performing calculations, and managing most of the computer's functions
- an electro-mechanical data storage device that stores and retrieves digital data
- a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
- a clam like shape with a flat panel screen on the top part of the inside, with a keyboard at the bottom for your typing.
- an application for accessing websites.
- a security method known as a MFA or a security key it provides you the MFA to access to systems, accounts and applications and adds extra security and strength to your accounts it can be a question or a personal security pin that you made a smartphone or hardware security key and remembering who you are like fingerprints or facial recognition.
- the responsible, respectful and safe, use of technology in daily life, along with online safety, and privacy,
- a programmable electronic device that stores, retrieves, and processes data by following a set of instructions.
Down
- the theory and development of computer systems able to perform tasks that normally require a human intelligence, such as visual perception, speech recognition, decision making, and translation between languages
- a computing device designed to fit on top of a typical office desk.
- a a collection of communicating computers and all other devices/printers and small phones almost all of the computers are all connected to a computer network such as a global network or an embedded network such as modern cars.
- the ability to responsibly use digital technologies,and the internet to find,, use, share, and create i google
- Wi-Fi is a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- a security device that is a barrier between internal network and untrustworthy external network the network that regulates incoming/outgoing network traffic to help protect the network from none allowed access and intruders.
- a mobile device that combines traditional mobile technology with more advanced computing abilities.
- technology used to connect computers to peripheral devices, such as computer mouses and USB flash drives.
- an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
- a mouse, keyboard, or printer, that connect to a computer to provide input, output, or storage
- a quotation from or reference to a book, paper, or author,
- the practice of pretending on social media to be someone different, in order to trick or attract another person
- a combined device for modulation for example, between the digital data of a computer and the analog signal of a phone line,
- a form of social engineering and a scam where attackers on or installing malware such as viruses, worms, adware, or ransomware.
- a compact string of numbers, letters, and symbols that a computer uses to find a resource on a network and act upon it.
25 Clues: an application for accessing websites. • a quotation from or reference to a book, paper, or author, • a computing device designed to fit on top of a typical office desk. • an electro-mechanical data storage device that stores and retrieves digital data • a mouse, keyboard, or printer, that connect to a computer to provide input, output, or storage • ...
unidad 1.1 vamos de traje part 2 2022-01-31
20 Clues: gate • screen • bustop • flight • arrival • arrival • suitcase • pasenger • swimsuit • passport • to travel • departure • to take a bus • baggage claim • boarding pass • tourist office • to take a taxi • to stay in a hotel • to pass through customs • to pass through security
G.W. Farewell Address Chunks 1-3 Vocabulary 2025-11-13
19 Clues: Peace • Safety • Weaken • Friendly • Passions • Building • Secretly • Come from • Reduction • Brotherly • Strengthen • Make bitter • Chief Executive • Names and Titles • Help bring about • Subtle but harmful • Firmly held belief(s) • Attempt to do something • not helpful towards success
Health 2025-04-11
7 Clues: bullying mind bullying • A person who gets bullied • Bullying online bullying • A person who watches people get bullied • bullying When someone is leaving bruises on you • bullying when your saying stuff but it bullying • A person who makes others feel bad to make them feel good
Responds & Report Security Risks 2023-11-13
Across
- IT or tech professionals who can fix security issues.
- Action to take when you suspect a security problem – like turning off the water in a leaky house.
- Potential threats or vulnerabilities that could harm digital systems.
- Staying watchful and alert to potential security threats.
Down
- Unauthorized access
- One of the aspects compromised by security risks, involves protecting sensitive information.
- A collective effort to create a safer digital environment by addressing potential risks.
7 Clues: Unauthorized access • IT or tech professionals who can fix security issues. • Staying watchful and alert to potential security threats. • Potential threats or vulnerabilities that could harm digital systems. • A collective effort to create a safer digital environment by addressing potential risks. • ...
