cyber security Crossword Puzzles
Jobs Are Here 2015-04-27
14 Clues: Cook • Fire • Farm • Game • Healty • School • Justice • Security • Good Sound • Mrs Doctor • Electricity • Draw - Paint • Mystery - Murder • Find Precious Stones
chapter 5 2022-10-24
14 Clues: reeve • peels • bureau • system • Vollmer • services • security • marshals • Policing • Police Model • watch system • patrol model • principles of policing • enforcement administration
ELSABET CROSS WORD QUESTI 2025-03-06
Across
- computing is a networking model in which data, applications, and processing power are managed by servers on the Internet
- - Refers to cloud functions that process data in some way. This typically refers primarily to running VMs or applications in the cloud, and can also refer to developer tools used to create, test, and deploy applications.
- – Cloud services can be designed to auto-scale in order to avoid capacity-related problems. If this auto-scaling is not adjusting to current demands, you might need to adjust the related configurations or check for security issues that might be causing unexpected problems.
- vNICs(virtual NICs Virtual switch(vSwitch),Common networking modes
- – The ISP might be down. Other problems can originate from your local network hardware, or from endpoint configurations. Or you might have dedicated connections to a public exchange, and your connectivity is suffering from a routing misconfiguration
- also called “hosted infrastructure”, it allows a company to use storage or entire virtual servers
Down
- Compute,Storage,Network,Security
- reduced physical plant costs, reduced upfront costs, reduced personnel costs (employment)
- AWS (aws.amazon.com),Oracle Cloud (cloud.oracle.com),Microsoft Azure (azure.microsoft.com)
- – Slow or delayed connectivity. Latency is often caused by poor routing, insufficient bandwidth, or a bottleneck. Latency might be the ISP’s responsibility, or you might need to upgrade your service with either your ISP or your CSP.
- Usually offered as a subscription based on the number of users
- – Cloud computing brings its own set of security vulnerabilities. When troubleshooting cloud services, you’ll need to become familiar with the unique indicators of cloud-based security issues.
12 Clues: Compute,Storage,Network,Security • Usually offered as a subscription based on the number of users • vNICs(virtual NICs Virtual switch(vSwitch),Common networking modes • reduced physical plant costs, reduced upfront costs, reduced personnel costs (employment) • AWS (aws.amazon.com),Oracle Cloud (cloud.oracle.com),Microsoft Azure (azure.microsoft.com) • ...
Your Local Crossword 2023-10-17
Across
- A place to keep valuables secure.
- They shield your eyes from the bright sun.
- Provides security for doors and gates.
- Ensures safety at the swimming pool.
- A cool spot to escape the direct sunlight.
- Sounds a warning if there's a threat.
- Protects your skin from harmful UV rays.
- Waters the lawn on a hot summer day.
Down
- Measures the temperature of the air.
- Provides shade over windows or patios.
- A professional who deals with security.
- Used to water plants during hot spells.
- Helps circulate air and keep things cool.
- Cools down a room on a scorching day.
- Used for cooking outdoors in summer.
- Staying well ___ is important in hot weather.
- Keeps beverages cold during picnics.
- A popular way to cool off in summer.
18 Clues: A place to keep valuables secure. • Measures the temperature of the air. • Used for cooking outdoors in summer. • Ensures safety at the swimming pool. • Keeps beverages cold during picnics. • Waters the lawn on a hot summer day. • A popular way to cool off in summer. • Cools down a room on a scorching day. • Sounds a warning if there's a threat. • ...
Katrina Webber 2020-01-28
Across
- Talking/interacting with people online
- Your usage of the internet
- Buying and selling online
- Enables users to share content online
- Computer network that provides information communication to users
Down
- Beginning connected to another computer or network
- Full electronic participation in society.
- The usage of technology
- The security level of personal things posted to the internet
- The safety of users against security risks
- Portable electronic device
- Rumors spread on the internet by unreliable sources
12 Clues: The usage of technology • Buying and selling online • Your usage of the internet • Portable electronic device • Enables users to share content online • Talking/interacting with people online • Full electronic participation in society. • The safety of users against security risks • Beginning connected to another computer or network • ...
Lesson 1: Introduction to Java 2016-04-24
Across
- For small and memory-constrained devices is ___ Edition
- For large-scale is ___ Edition
- Responsible for security is called ___ Manager
- A simple, general purpose, object-oriented language.
- Portable applications for desktop is ___ Edition
- A software for developing, editing, compiling, building, and debugging
Down
- Java was developed by
- The first line of defense is ___ verifier
- Once Run Anywhere
- Responsible for loading the classes into the interpreter is called ___ Loader
- Java was developed at ___ Microsystems
- It contains JVM
12 Clues: It contains JVM • Once Run Anywhere • Java was developed by • For large-scale is ___ Edition • Java was developed at ___ Microsystems • The first line of defense is ___ verifier • Responsible for security is called ___ Manager • Portable applications for desktop is ___ Edition • A simple, general purpose, object-oriented language. • ...
Medical-Legal Partnership 2025-10-31
Across
- Abbreviation for Supplemental Security Income
- Legal end of a marriage
- Money or help from a program or job
- Legal document that distributes property after death
- A person over the age of 18
- Legal right to care for a child
- A person who inherits
Down
- A choice you make about your life
- Money you receive
- Disability insurance program by Social Security
- Person who helps with legal problems
- Person chosen to make decisions for someone who can’t
12 Clues: Money you receive • A person who inherits • Legal end of a marriage • A person over the age of 18 • Legal right to care for a child • A choice you make about your life • Money or help from a program or job • Person who helps with legal problems • Abbreviation for Supplemental Security Income • Disability insurance program by Social Security • ...
¡Vamos de viaje! 2022-10-24
18 Clues: gate • flight • screen • travel • ticket • luggage • airport • suitcase • to board • passport • itinerary • departure • travel agency • identification • to get in line • to go on vacation • to pack a suitcase • to go through security
Vocabulary 2022-11-08
18 Clues: Buy • Boss • Task • Bill • Costs • Request • Trainee • Guarantee • Down payment • Financial gain • Service/set-up • Financial plan • Trader/merchant • Rental agreement • Close observation • Means of transport • Work table/checkout • Network security device
Vocabulary #3 2024-09-19
Across
- a person tending to work with energy.
- a system of interconected people.
- data held in a computer.
- the act of of converting waste into reusable material.
- my house has a security ________
- something that gets your attention and is apealing to you.
- a formal request to an authority.
- Our teacher gave us an _________ from the office.
Down
- a loud cry or call.
- a form you fill with a complain about the service.
- slightly irritated or angry.
- a firm decision
- a piece of equipment for a specific task.
- the singer forgot her ________ now no one can hear her voice.
- the teacher tried to __________ us to recycle.
15 Clues: a firm decision • a loud cry or call. • data held in a computer. • slightly irritated or angry. • my house has a security ________ • a system of interconected people. • a formal request to an authority. • a person tending to work with energy. • a piece of equipment for a specific task. • the teacher tried to __________ us to recycle. • ...
JOBS 2023-09-18
Paula M2u2 2016-04-21
Across
- a person who helps you when you're ill.
- a certain person in a play ch...
- someone whose job is to keep an eye on something (e.g. in a museum)
- something you have to know is ….
- two people who have something together e.g. They … go to school at .
- when you haven’t eaten enough, you are … hungry
- when someone posesses something it … to him/her (3rd person!).
- English word for “Boden“.
- a precious stone.
- a chair where you can sit during a concert.
- a small bag where you put your money in.
Down
- = when you clean the plates
- when someone tells you that you have to do something, s/he gives you a c...
- the English word for “security”
- tells you the position of a house.
- a thing that nobody should know.
- a machine you can fly with.
- opposite of dirty.
- another word for big.
- English word for “lösen“.
20 Clues: a precious stone. • opposite of dirty. • another word for big. • English word for “Boden“. • English word for “lösen“. • = when you clean the plates • a machine you can fly with. • the English word for “security” • a certain person in a play ch... • something you have to know is …. • a thing that nobody should know. • tells you the position of a house. • ...
travel vocab 2020-04-10
Across
- seat belt
- luggage
- ticket window
- flight attendant
- second class
- departure
- passenger
- enter a country
- to miss a flight/train
- bunk
- train stop
- to see
- to turn
- arrival
- car wagon
- gate
- to go through security
- controller
- to take off
- to land
- visa
- in the train station
- to get/obtain
- flight connection
- delayed
- coach (plane)
- in the airport
- boarding pass
- event ticket
Down
- passport
- carry-on
- aisle
- platform
- suitcase
- layover
- luggage scan
- sleeping car
- baggage claim
- security agent
- seat
- ticket
- on time
- international airport
- to check luggage
- counter check-in
- travel
- first class
- ticket
- to hope
- flight
- to go straight
- window
- waiting room
- to give
- to board
55 Clues: seat • bunk • gate • visa • aisle • ticket • to see • travel • ticket • flight • window • luggage • layover • on time • to turn • arrival • to hope • to land • to give • delayed • passport • carry-on • platform • suitcase • to board • seat belt • departure • passenger • car wagon • train stop • controller • first class • to take off • luggage scan • sleeping car • second class • waiting room • event ticket • ticket window • baggage claim • to get/obtain • coach (plane) • ...
Investing Vocabulary 2023-12-11
Across
- Where shares are bought & sold
- Degree of Uncertainty
- A low fee portfolio of Stocks
- Annual interest payment on a bond
- putting your money into assets
- Index of 500 companies
- Risk free investment
- World's largest stock
- Increased stock trading & rising stock prices
Down
- Prices are falling, Encouraging selling
- The practice of investing in a large variety of stocks
- A retirement account
- Collections of financial investments
- A financial asset that can be bought and sold in a financial market
- Reward Paid to the Shareholders
- Rate of Increase prices over a period of time
- Federal program that provides monthly benefits to millions of Americans
- A share of value of a company, which can be bought,sold, or traded as an investment & which gives the investor small partial ownership of the company
- A security in which the investor loans money to a company or government
- Second largest stock
20 Clues: A retirement account • Risk free investment • Second largest stock • Degree of Uncertainty • World's largest stock • Index of 500 companies • A low fee portfolio of Stocks • Where shares are bought & sold • putting your money into assets • Reward Paid to the Shareholders • Annual interest payment on a bond • Collections of financial investments • ...
RU ITEC411 Chapter 5 2023-11-29
Across
- bug that exploited a weakness in OpenSSL
- accessing systems that you are not authorized to access
- use of voice print of fingerprint
- a route that skips regular security in software
- malicious software that can change and wreak havoc on your system
- malware that locks users out of the system via encryption
- email scams
- the James Bond of malware
- malicious software that disguises itself
- devices that use rfid to capture data
- fake website scam
Down
- is not a joke Jim
- worm that attacked Iran's nuclear centrifuges
- hacking for a cause
- acronym, attack that slows down a server with requests
- beginnings of the internet
- country that was targeted by Russia and attacked its power grid
- an amalgamation of malicious devices that creates zombies
- scrambling code to make it unreadable for security
- one of its kind was named Conficker
20 Clues: email scams • is not a joke Jim • fake website scam • hacking for a cause • the James Bond of malware • beginnings of the internet • use of voice print of fingerprint • one of its kind was named Conficker • devices that use rfid to capture data • bug that exploited a weakness in OpenSSL • malicious software that disguises itself • worm that attacked Iran's nuclear centrifuges • ...
CTF-CW-3S 2025-11-17
Across
- Granting users permission to resources
- Network security system for filtering traffic
- Internal Tekion tool for catching secret leaks in source code repositories.
- Separating affected systems during security event
- Visual map showing how personal information moves through systems
- Step-by-step plan for responding to threat scenarios
- Testing how well controls perform
- Step to limit damage during an event
- Science of investigating digital evidence
Down
- Organized written information
- Source code and CI/CD home for Tekion software teams.
- Weakness that can be exploited in a system
- Temporary interaction between user and system
- Transparent communication about data collection and processing
- Goal a control is designed to achieve
- Strengthening defenses of computers or networks
- Static code scanner in Tekion development workflows.
- Manager for data integrity and compliance
- European Union's comprehensive data protection regulation
- Rules governing how long personal data can be stored
20 Clues: Organized written information • Testing how well controls perform • Step to limit damage during an event • Goal a control is designed to achieve • Granting users permission to resources • Manager for data integrity and compliance • Science of investigating digital evidence • Weakness that can be exploited in a system • Temporary interaction between user and system • ...
Indian contact act 1872 2025-11-30
Across
- created by contract.
- condition to validate agreement.
- of rescinding a contract.
- contract made without free consent is
- who makes an offer.
- proposal made by one party to another.
- essential to contract purpose.
- or security on goods.
- for breach of contract.
- in exchange for a promise.
- who sells goods.
Down
- that becomes void later.
- false statement that induces a contract.
- DAMAGES,Liability for late delivery of goods.
- must be to be valid.
- who buys goods.
- paid in advance as security.
- GOODS,Goods not specific at contract time.
- of ownership.
- enforceable by law.
- GOODS,Goods manufactured or acquired after agreement
- TO SELL,Contract in which goods are delivered later.
- GOODS,Goods identified at the time of making the contract.
- by buyer to seller.
24 Clues: of ownership. • who buys goods. • who sells goods. • enforceable by law. • who makes an offer. • by buyer to seller. • created by contract. • must be to be valid. • or security on goods. • for breach of contract. • that becomes void later. • of rescinding a contract. • in exchange for a promise. • paid in advance as security. • essential to contract purpose. • condition to validate agreement. • ...
Investing-Taylor McNicol 2026-03-20
Across
- the ease that an asset can be converted to cash
- Stock prices are generally going down
- we love
- when a company shares parts of its products
- A place people can buy sell pieces of company to make money
- contributions are made post tax
- currencies are created and backed by the government
- the total value of a companies stock
- pension plans are managed by….
Down
- fica is social security and ____ taxes combined
- How much of a company you can own
- Crypto is considered this
- contributions are made pre tax
- Stock prices are generally going up
- loan given to a company or government
- a virtual currency which gains value based on community involvement
- can we count on social security (yes or no)
- Initial Public Offering
- when you leave a job you can have your 401K plan…
- exchange traded funds
20 Clues: we love • exchange traded funds • Initial Public Offering • Crypto is considered this • contributions are made pre tax • pension plans are managed by…. • contributions are made post tax • How much of a company you can own • Stock prices are generally going up • the total value of a companies stock • Stock prices are generally going down • loan given to a company or government • ...
Unit 4 Crossword puzzle 2023-02-06
15 Clues: läpi • satama • portti • saapua • tuhota • teltta • lähteä • poistaa • uupunut • tähän asti • asemalaituri • välittömästi • tarpeellinen • ilmoittautua • turvatarkastus
Unit 11 2026-03-16
15 Clues: gps • sour • proceed • partner • snuggle • lifelike • importance • protection • successfully • unreasonable • make certain • urgent request • sudden arrival • to choose carefully • to assign or arrange
Valpak – November 2023 2023-10-20
Across
- What sport is played on Thanksgiving?
- This online shopping day occurs on ____ Monday
- A Thanksgiving side dish made from bread
- Sweet potato casserole is topped with this fluffy, sweet treat
- The centerpiece of the classic Thanksgiving meal
- Festive event held in New York City every Thanksgiving
Down
- A sauce often put on mashed potatoes, turkey and stuffing
- A common Thanksgiving decoration
- Black _____ is the busiest shopping day of the year
- Popular Black Friday shopping destination
- This Thanksgiving-themed dish is made from green beans
- First President credited with proclaiming Thanksgiving a National holiday
- Synonym for sweet potatoes
- Thanksgiving pie with a flaky crust
14 Clues: Synonym for sweet potatoes • A common Thanksgiving decoration • Thanksgiving pie with a flaky crust • What sport is played on Thanksgiving? • A Thanksgiving side dish made from bread • Popular Black Friday shopping destination • This online shopping day occurs on ____ Monday • The centerpiece of the classic Thanksgiving meal • ...
Bullying Crossword Puzzle 2025-03-11
Across
- type of bullying that happens online
- does something to help the target
- type of bullying that involves putting hands on each other
- sees bullying happen and does not tell anyone
- something you can be when someone is being bullied
- type of bullying that involves rumors and gossip
- changing the conversation
Down
- person who is bullied
- intentional, unwanted, aggressive behavior that causes severe harm
- telling an adult about bullying
- something you can do to solve the problem
- person who bullies others
- type of bullying that involves a characteristic about someone that they cannot change
- an argument between two connected people
14 Clues: person who is bullied • person who bullies others • changing the conversation • telling an adult about bullying • does something to help the target • type of bullying that happens online • an argument between two connected people • something you can do to solve the problem • sees bullying happen and does not tell anyone • type of bullying that involves rumors and gossip • ...
worlsa 2025-01-13
Income Taxes 2022-02-08
Across
- a child or other person who lives in the home
- another name for social security tax
- used to provide for retired or disabled
- income amount after adjustments are taken out
- used to provide medical benefits for elderly
- short for Social Security Number
- amounts deducted from the adjusted gross income to determine the taxable income
- federal withholdings tax
- short for Employer Identification Number
- the organization that taxes are paid to.
Down
- document given for other income (e.g. contractors)
- the month that income taxes are due.
- document showing ones income from an employer
- short for Earned income credit
- requesting more time to pay taxes.
- the amount of money owned to the government
- income from work, shown on W2
- document used to file for income tax Return
18 Clues: federal withholdings tax • income from work, shown on W2 • short for Earned income credit • short for Social Security Number • requesting more time to pay taxes. • the month that income taxes are due. • another name for social security tax • used to provide for retired or disabled • short for Employer Identification Number • the organization that taxes are paid to. • ...
US GOV UNIT #7 2023-10-21
Across
- In charge of US transportation
- Domestic Intelligence and Security Agency
- US Justice Department
- Predicts the weather and natural disasters
- Oversees agriculture in America
Down
- In charge of defending national security
- Oversees food safety
- Combination of all the leaders of each US military branch
- Oversees national involvement in space
- Oversees United States mail
10 Clues: Oversees food safety • US Justice Department • Oversees United States mail • In charge of US transportation • Oversees agriculture in America • Oversees national involvement in space • In charge of defending national security • Domestic Intelligence and Security Agency • Predicts the weather and natural disasters • Combination of all the leaders of each US military branch
SN43004FP Chapter 4.2 2022-10-19
Across
- A tested set of hotfixes, security updates and critical updates
- Enable software programs to be updated automatically
Down
- Microsoft service which automates downloading and installing software updates
- Update fix for a problem addressing a critical, non security related bug
- Update fix for a product-specific security-related vulnerability
- Service which provides management and distribution of updates
- Software to fix problems or update the operating system
7 Clues: Enable software programs to be updated automatically • Software to fix problems or update the operating system • Service which provides management and distribution of updates • A tested set of hotfixes, security updates and critical updates • Update fix for a product-specific security-related vulnerability • ...
worlsa 2025-01-13
Private and public places 2024-05-03
Across
- synonym for "illness"
- The English for "promouvoir"
- The English for "dossier médical"
- the English for "médicament"
- the identification of the nature of an illness
- when confidential information is exposed
- The English for "mettre en place"
- The English for un "scientifique"
- synonym for "revolutionary"
Down
- It is a thread-like structure made up of DNA
- cause someone to be vulnerable or at risk; endanger
- Stealing of information through unauthorized access to computer systems.
- The English for "recherche"
- the English for "avancé, sophistiqué"
- the abbreviation for Artifical Intelligence
- a self-replicating material that is present in nearly all living organisms as the main constituent of chromosomes
- a secondary and undesirable effect of medical treatment.
- a sudden and important discovery
18 Clues: synonym for "illness" • The English for "recherche" • synonym for "revolutionary" • The English for "promouvoir" • the English for "médicament" • a sudden and important discovery • The English for "dossier médical" • The English for "mettre en place" • The English for un "scientifique" • the English for "avancé, sophistiqué" • when confidential information is exposed • ...
Crowd Control 2022-12-09
Across
- Hostile crowd
- Avoid unnecessary conversation and maintain a ____ demeanor
- Mass ____ which usually involves hundreds or thousands of people
- Security officers must protect life and ____
- ____ Disputes can be a complex issue while balancing right
- the systematic planning for and supervision of and assembly of people
- The restriction or limitation of group behavior and movement
- Security Officers must not be ____
Down
- Crowd with no organization of unified purpose
- Civil ____ is usually nonviolent but use tactics that can get them arrested
- The First Amendment does not protect against ____ behavior
- Always remain ____
- Always provide clear and concise ____
- Labor Disputes involve ____ lines
- Uncontrolled and violent disturbance of the public
15 Clues: Hostile crowd • Always remain ____ • Labor Disputes involve ____ lines • Security Officers must not be ____ • Always provide clear and concise ____ • Security officers must protect life and ____ • Crowd with no organization of unified purpose • Uncontrolled and violent disturbance of the public • The First Amendment does not protect against ____ behavior • ...
Security Meeting Q4 - 2021 2021-12-08
Across
- Overnight cash limit
- The color of our robbery folder
- 877-511-9797
- A device designed to explode in order to injure or kill people or to destroy property
- The two things you should always lock before stepping away from your station
- Our SECOND evacuation location
- You should call this number in an emergency
- a cybercrime that targets individuals by email, luring them into providing personal information such as banking information, credit card details, and passwords
- If time allows, search for suspicious items around the store after receiving a bomb threat
- Our FIRST evacuation location
Down
- These should stay with you at all times
- All confidential customer information should be ______ at night
- The folder is located behind ____
- Top drawer limit
- Working cash Limit
- The act of illegally printing, changing or reproducing a copy of a genuine currency to purposely deceive someone
- Our OSM
- Our shelter in place
- We test the alarm every ____
19 Clues: Our OSM • 877-511-9797 • Top drawer limit • Working cash Limit • Overnight cash limit • Our shelter in place • We test the alarm every ____ • Our FIRST evacuation location • Our SECOND evacuation location • The color of our robbery folder • The folder is located behind ____ • These should stay with you at all times • You should call this number in an emergency • ...
Social security and relationships 2023-01-30
19 Clues: tulot • kunta • vamma • avioero • puoliso • huoltaja • syrjintä • päiväkoti • äitipuoli • sukupolvi • kummipoika • alaikäinen • siskontytär • kansalainen • kansallisuus • lainsäädäntö • viranomaiset • maahanmuuttaja • jäädä eläkkeelle
Vamos De Viaje Vocab Quiz 2016-10-01
15 Clues: gate • screen • flight • ticket • luggage • airport • suitcase • to arive • passport • passenger • departure • bathing suit • identification • to get in line • to go through security
Nehme 2026-03-25
15 Clues: Mask • late • oxygen • flight • to land • a delay • on time • Take off • security • The track • the takeoff • compartment • the service • The Hallway • international
Christmas knowledge quiz 2021-12-12
Across
- Whose Christmas advert features Kevin the Carrot?
- Whose slogan is "just do it"
- Whose slogan is "taste the rainbow"
- Which supermarket uses orange as its main colour
- Which city did the first Primark open in?
Down
- Whose slogan is "I'm lovin it"
- In retail which Monday falls after Black Friday?
- Which supermarket says "every little helps"?
- Whose Christmas advert talks about carving turkeys with lasers?
- Which supermarket was voted the cheapest in 2020?
10 Clues: Whose slogan is "just do it" • Whose slogan is "I'm lovin it" • Whose slogan is "taste the rainbow" • Which city did the first Primark open in? • Which supermarket says "every little helps"? • In retail which Monday falls after Black Friday? • Which supermarket uses orange as its main colour • Whose Christmas advert features Kevin the Carrot? • ...
Cancer Control 2013-04-16
Across
- Can be affected by cancer, found in females
- Obesity, Age and Genetic Predisposition
- Health promotion strategy, tobacco
- Pain and suffering endured
- Can be affected by cancer, found in males
- Medical Treatment
- Lost productivity, social security payments and carers
Down
- SES, work, food security, stress
- Health promotion strategy, breast
- Tobacco smoking, alcohol consumption and exposure to sunlight and UV
- Health promotion strategy, sun
11 Clues: Medical Treatment • Pain and suffering endured • Health promotion strategy, sun • SES, work, food security, stress • Health promotion strategy, breast • Health promotion strategy, tobacco • Obesity, Age and Genetic Predisposition • Can be affected by cancer, found in males • Can be affected by cancer, found in females • Lost productivity, social security payments and carers • ...
Department of Homeland Security 2013-12-08
Across
- Former DHS Secretary
- DHS came into being because of this
- Screens flyers
- Beers Current DHS Secretary
- Helps boaters
- Computer area protected by DHS
- DHS oversees this when people come in and out of the country
- The area around the United States protected by DHS
- Highest threat level
- State helped by DHS after hurricane
Down
- Found in the center of the DHS seal
- The main DHS objective is...
- Way to identify travelers
- Ridge First DHS Secretary
- Protects president
- Major entry point protected by TSA
- State helped by DHS after hurricane
- You go through this when you enter the country
- Part of DHS that handles emergencies
- and Rita Two major hurricanes
20 Clues: Helps boaters • Screens flyers • Protects president • Former DHS Secretary • Highest threat level • Way to identify travelers • Ridge First DHS Secretary • Beers Current DHS Secretary • The main DHS objective is... • and Rita Two major hurricanes • Computer area protected by DHS • Major entry point protected by TSA • Found in the center of the DHS seal • ...
Chapter 9 Security Plus 2024-03-21
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
Chapter 7 Security Plus 2024-03-11
Across
- Granting access that is limited
- Standard preconfigured passwords
- Single sign-on for networks owned by different organizations
- An access control scheme that is the most restrictive
- evidence or proof of something
- features and characteristics of the individual
- Removing user accounts
- Granting or denying approval to use specific resources
- The ability of systems to exchange information
Down
- Requiring the user to provide proof that they are the unique user.
- The point in time when a password is no longer valid
- allows secure web domains to exchange user authentication and authorization data
- enables users to access a network resource through a directory service
- An access control scheme that is the least restrictive
- Using more than one type of authentication credential
- Adding a random string to a hash algorithm for enhanced security
- A key pair “burned” into a security key
- small number of passwords used when trying several different user accounts
- provide control over user validation and the resources that may be accessed
- An open-source federation framework
20 Clues: Removing user accounts • evidence or proof of something • Granting access that is limited • Standard preconfigured passwords • An open-source federation framework • A key pair “burned” into a security key • features and characteristics of the individual • The ability of systems to exchange information • The point in time when a password is no longer valid • ...
ITF-Chapter4-KeyTerms 2019-12-10
Across
- A security concern regarding network devices, and other devices such a smartphones that give the option of using the device without a password.
- An early example of encryption used by Julius Caesar to send confidential military messages.
- Attempting to secretively discover private information about a person, company, or other entity.
- A development model that breaks down project activities into a series of sequential or linear phases, each phase depending on the deliverables from the previous phase.
- Regularly scheduled backups.
- TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
- Backups that are stored in the same building or even the same room as the computer systems they are taken from.
- Software that help remove unwanted, unsolicited email.
- The passive gathering of information about a potential victim.
- An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
- Works whose copyrights have expired and are free for anyone to reproduce, display, and make derivatives.
- The use of deception to gain personal and/or private information for unlawful purposes.
- The SDLC phase that involves studying existing information systems that are already in place and the requirements for new information systems.
- A device that contains one or more hard drives that users can access over the network.
- A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
- Unscheduled backups performed periodically.
- Data that are being transported from one device to another, whether by radio, electrical, or light signals.
- Any word, picture, or symbol that's used to distinguish a good from other similar goods.
- The study and design of a system by examining its components and their interactions.
- The ability to ensure that someone can't deny that they performed a certain act.
- The various forms of information systems including transaction processing, management, and expert systems.
- A development model that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design.
- An attribute used to classify information based on the risk of public disclosure.
- A scheme for classifying information based on different levels of public/private distinctions.
- The identification, evaluation, and prioritization of risks followed by activities that minimizes, monitors, and controls the impact of the risk.
- A device that controls the flow of network traffic to protect systems from unauthorized network connections.
- An activity that involves integrating various computing systems and software applications to function together as a whole.
- Exploiting a victim using email messages
- A project management process that divides a large or complex project into smaller, more manageable projects that can be completed as part of an incremental or iterative process.
- A reasonable belief that personal information collected by an information system is controlled and protected and not shared or used beyond its original intent.
- The practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time.
- A method of increasing fault tolerance by providing multiple network paths between hosts.
Down
- The SDLC phase that involves purchasing and installing new hardware and software, integrating the various system components, and testing the operation of the new system.
- The SDLC phase that involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project.
- A type of access control that restricts access based on the users role in an organization.
- An attempt to connect to a server by capturing and resending of authentication information.
- A method of increasing fault tolerance by providing power backups and power failover.
- Tricking a victim into revealing sensitive information under false pretenses.
- Convincing a victim that they are performing a legitimate task within their web browser window, when in fact they are being tricked into revealing sensitive information or installing malware on their computer
- A type of access control where a user has complete control over a resource, and also determines the permissions other users have those those resources.
- Anything that is owned by a copyright holder.
- A scheme for classifying information based on government and military requirements.
- combination of technology, people, and procedures used to organize, analyze, and store data.
- The SDLC phase that involves monitoring and evaluating the new information system.
- A methodology or framework that defines steps and tasks for developing and maintaining information systems.
- A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.
- Data in a persistent storage medium, such as a hard drive or optical disc.
- An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
- A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face or voice.
- Directions for disposing and even destroying data when it's no longer needed or when a storage device needs to be replaced.
- A type of authentication that requires the user to provide something that they know, such as a password or PIN.
- Authentication that requires two or more evidences of authentication, usually of different types.
- A type of authentication that requires the user to provide something that they have, such as a key, fob, electronic chip, or smart card.
- A method of authenticating with one system to gain access to other related systems.
- A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
- An attack where the an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
- A backup of the system software, including operating system files.
- Concerning security, a person responsible for securing networks and responding to intrusions.
- A backup of data stored in a database.
- The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
- Software that helps protect against malicious software infections.
- Protections granted by the federal government to creators, writers, and inventors regarding rights to reproduce, display, make derivatives, sell, rent, or lend a work.
- Software where anyone can inspect, enhance, and modify the source code.
- The SDLC phase that involves reviewing the system requirements document from the analysis phase and producing detailed specifications that cover all aspects of the system.
- A person who is in charge of designing and implementing security methods to protect an organization's computer systems and networks.
- Any software where the publisher retains intellectual property rights to the source code.
- A systematic process for determining and addressing needs, or "gaps" between current conditions, and desired conditions or "wants".
- The capturing and storing of computer and user events.
- Backups that are stored at a location far enough from a possible natural disaster, while being close enough to recover the data and systems within a reasonable amount of time.
- The process of turning data points into useful information.
- The crime of using someone else's intellectual property in a way that should be reserved for the copyright holder.
- An exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public.
- The process of keeping track of user activity while attached to a system.
- The buying and selling of products or services electronically, typically through the Internet.
- A license given by a government that provides inventors a temporary monopoly on their invention.
- A type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources. The security manager controls the security policy and users aren't able to override the policy.
76 Clues: Regularly scheduled backups. • A backup of data stored in a database. • Exploiting a victim using email messages • Unscheduled backups performed periodically. • Anything that is owned by a copyright holder. • Software that help remove unwanted, unsolicited email. • The capturing and storing of computer and user events. • ...
ITF-Capt4-1-keyterms 2019-12-05
Across
- A security concern regarding network devices, and other devices such a smartphones that give the option of using the device without a password.
- An early example of encryption used by Julius Caesar to send confidential military messages.
- Attempting to secretively discover private information about a person, company, or other entity.
- A development model that breaks down project activities into a series of sequential or linear phases, each phase depending on the deliverables from the previous phase.
- Regularly scheduled backups.
- TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
- Backups that are stored in the same building or even the same room as the computer systems they are taken from.
- Software that help remove unwanted, unsolicited email.
- The passive gathering of information about a potential victim.
- An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
- Works whose copyrights have expired and are free for anyone to reproduce, display, and make derivatives.
- The use of deception to gain personal and/or private information for unlawful purposes.
- The SDLC phase that involves studying existing information systems that are already in place and the requirements for new information systems.
- A device that contains one or more hard drives that users can access over the network.
- A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
- Unscheduled backups performed periodically.
- Data that are being transported from one device to another, whether by radio, electrical, or light signals.
- Any word, picture, or symbol that's used to distinguish a good from other similar goods.
- The study and design of a system by examining its components and their interactions.
- The ability to ensure that someone can't deny that they performed a certain act.
- The various forms of information systems including transaction processing, management, and expert systems.
- A development model that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design.
- An attribute used to classify information based on the risk of public disclosure.
- A scheme for classifying information based on different levels of public/private distinctions.
- The identification, evaluation, and prioritization of risks followed by activities that minimizes, monitors, and controls the impact of the risk.
- A device that controls the flow of network traffic to protect systems from unauthorized network connections.
- An activity that involves integrating various computing systems and software applications to function together as a whole.
- Exploiting a victim using email messages
- A project management process that divides a large or complex project into smaller, more manageable projects that can be completed as part of an incremental or iterative process.
- A reasonable belief that personal information collected by an information system is controlled and protected and not shared or used beyond its original intent.
- The practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time.
- A method of increasing fault tolerance by providing multiple network paths between hosts.
Down
- The SDLC phase that involves purchasing and installing new hardware and software, integrating the various system components, and testing the operation of the new system.
- The SDLC phase that involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project.
- A type of access control that restricts access based on the users role in an organization.
- An attempt to connect to a server by capturing and resending of authentication information.
- A method of increasing fault tolerance by providing power backups and power failover.
- Tricking a victim into revealing sensitive information under false pretenses.
- Convincing a victim that they are performing a legitimate task within their web browser window, when in fact they are being tricked into revealing sensitive information or installing malware on their computer
- A type of access control where a user has complete control over a resource, and also determines the permissions other users have those those resources.
- Anything that is owned by a copyright holder.
- A scheme for classifying information based on government and military requirements.
- combination of technology, people, and procedures used to organize, analyze, and store data.
- The SDLC phase that involves monitoring and evaluating the new information system.
- A methodology or framework that defines steps and tasks for developing and maintaining information systems.
- A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.
- Data in a persistent storage medium, such as a hard drive or optical disc.
- An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
- A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face or voice.
- Directions for disposing and even destroying data when it's no longer needed or when a storage device needs to be replaced.
- A type of authentication that requires the user to provide something that they know, such as a password or PIN.
- Authentication that requires two or more evidences of authentication, usually of different types.
- A type of authentication that requires the user to provide something that they have, such as a key, fob, electronic chip, or smart card.
- A method of authenticating with one system to gain access to other related systems.
- A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
- An attack where the an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
- A backup of the system software, including operating system files.
- Concerning security, a person responsible for securing networks and responding to intrusions.
- A backup of data stored in a database.
- The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
- Software that helps protect against malicious software infections.
- Protections granted by the federal government to creators, writers, and inventors regarding rights to reproduce, display, make derivatives, sell, rent, or lend a work.
- Software where anyone can inspect, enhance, and modify the source code.
- The SDLC phase that involves reviewing the system requirements document from the analysis phase and producing detailed specifications that cover all aspects of the system.
- A person who is in charge of designing and implementing security methods to protect an organization's computer systems and networks.
- Any software where the publisher retains intellectual property rights to the source code.
- A systematic process for determining and addressing needs, or "gaps" between current conditions, and desired conditions or "wants".
- The capturing and storing of computer and user events.
- Backups that are stored at a location far enough from a possible natural disaster, while being close enough to recover the data and systems within a reasonable amount of time.
- The process of turning data points into useful information.
- The crime of using someone else's intellectual property in a way that should be reserved for the copyright holder.
- An exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public.
- The process of keeping track of user activity while attached to a system.
- The buying and selling of products or services electronically, typically through the Internet.
- A license given by a government that provides inventors a temporary monopoly on their invention.
- A type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources. The security manager controls the security policy and users aren't able to override the policy.
76 Clues: Regularly scheduled backups. • A backup of data stored in a database. • Exploiting a victim using email messages • Unscheduled backups performed periodically. • Anything that is owned by a copyright holder. • Software that help remove unwanted, unsolicited email. • The capturing and storing of computer and user events. • ...
Bullying Crossword 2013-06-17
Across
- This people are usually insecure teens
- Involves no physical contact but a lot of yelling
- A type of bullying that messes with the head
- Age the late middle age of their lives
- Someone who is not necessarily being the bully but is seeing it
Down
- Examples; Anxiety, Depression effects
- Involves harassment and bullying online
- Someone everyone can do that will help the victim
- Someone that often comes from a home where they don't feel safe
- Involves harming someone
10 Clues: Involves harming someone • Examples; Anxiety, Depression effects • This people are usually insecure teens • Age the late middle age of their lives • Involves harassment and bullying online • A type of bullying that messes with the head • Someone everyone can do that will help the victim • Involves no physical contact but a lot of yelling • ...
bullying 2014-06-19
Across
- what do you do if someone is getting bullied
- what is the person being mean to you called
- what is the website people get bullied most with
- what is a good bulling movie called
- what type of bullying is used on the internet
Down
- where does bullying most happen
- what type of bully hurts you
- what do you do when your getting bullied
- what is the person watching called
- what is the person getting bullied called
10 Clues: what type of bully hurts you • where does bullying most happen • what is the person watching called • what is a good bulling movie called • what do you do when your getting bullied • what is the person getting bullied called • what is the person being mean to you called • what do you do if someone is getting bullied • what type of bullying is used on the internet • ...
bullying 2014-06-19
Across
- what do you do if someone is getting bullied
- what is the person being mean to you called
- what is the website people get bullied most with
- what is a good bulling movie called
- what type of bullying is used on the internet
Down
- where does bullying most happen
- what type of bully hurts you
- what do you do when your getting bullied
- what is the person watching called
- what is the person getting bullied called
10 Clues: what type of bully hurts you • where does bullying most happen • what is the person watching called • what is a good bulling movie called • what do you do when your getting bullied • what is the person getting bullied called • what is the person being mean to you called • what do you do if someone is getting bullied • what type of bullying is used on the internet • ...
Bulling 2025-04-23
Across
- Έτσι αισθάνεται το άτομο που δεν έχει υποστήριξη.
- Μετά την κακοποίηση μένει στο θύμα ......τραύμα.
- Το άτομα που κάνει εκφοβισμό ή κακοποιεί άλλους.
- Εκτός από τη σωματική υπάρχει και η .....βία.
- Το bulling μπορεί να προκαλέσει έως και........
Down
- Αλλιώς η περιθωριοποίηση που βιώνει το θύμα.
- Ένας τρόπος να προσπαθήσεις να βοηθήσεις το θύμα ή να σταματήσεις τον εκφοβισμό.
- Το άτομο που δέχεται κακοποίηση ή εκφοβισμό.
- Το bulling στην ελληνική γλώσσα.
- Η επιθετική συμπεριφορά στο .......... λέγεται Cyber bulling
10 Clues: Το bulling στην ελληνική γλώσσα. • Αλλιώς η περιθωριοποίηση που βιώνει το θύμα. • Το άτομο που δέχεται κακοποίηση ή εκφοβισμό. • Εκτός από τη σωματική υπάρχει και η .....βία. • Το bulling μπορεί να προκαλέσει έως και........ • Μετά την κακοποίηση μένει στο θύμα ......τραύμα. • Το άτομα που κάνει εκφοβισμό ή κακοποιεί άλλους. • ...
SECCON 2025 2025-07-31
Across
- A software update to fix vulnerabilities
- A secret word or phrase to access accounts
- Acronym for using more than one method to verify identity
- Blocks unauthorized access to or from a network
- A secure way to connect remotely to a network
Down
- A type of malicious software
- Fake emails used to trick users into revealing information
- Unwanted or junk email
- What we are trying to protect from cyber threats
- To convert data into a secure format
10 Clues: Unwanted or junk email • A type of malicious software • To convert data into a secure format • A software update to fix vulnerabilities • A secret word or phrase to access accounts • A secure way to connect remotely to a network • Blocks unauthorized access to or from a network • What we are trying to protect from cyber threats • ...
Get to know the Tech world better! 2022-12-13
Across
- - A principle of economics that captures the consumer's desire to buy the product or service
- Virus - First computer virus
- - Expense Claim tool
- Friday - The day after Thanksgiving
- - Programming language exclusively used for AI
Down
- - Company's goods and products that are ready to sell
- - Site where an associate can raise Technology request
- Monday - Marketing term for e-commerce transactions on the Monday after Thanksgiving Day
- - Team workspace where knowledge and collaboration meet
- - A measure of the stability or consistency
10 Clues: - Expense Claim tool • Virus - First computer virus • Friday - The day after Thanksgiving • - A measure of the stability or consistency • - Programming language exclusively used for AI • - Company's goods and products that are ready to sell • - Site where an associate can raise Technology request • - Team workspace where knowledge and collaboration meet • ...
Cybersecurity Terminology 2025-06-25
Across
- Prefix meaning harmful or bad
- The act of keeping something safe from harm
- Software used to stop or remove viruses
- Prefix related to computers, networks, or the internet
- A hacker who helps protect systems legally
- Fraudulent email tricking people into giving personal information
Down
- Malicious software that locks access until a ransom is paid.
- A weakness that can be exploited in a system.
- Software that secretly collects user data
- The process of encoding data to protect it
10 Clues: Prefix meaning harmful or bad • Software used to stop or remove viruses • Software that secretly collects user data • The process of encoding data to protect it • A hacker who helps protect systems legally • The act of keeping something safe from harm • A weakness that can be exploited in a system. • Prefix related to computers, networks, or the internet • ...
Types of Bullying 2013-08-12
Across
- Using information and communication technologies to bullying someone.
- Treating someone like an outcast.
- Secretly hurting a person such as spreading rumours.
- Affecting someone's relationship, excluding, making the person feel left out etc.
Down
- Name calling, saying hurtful things.
- Hurting someone.
- Hurting a person's feelings.
7 Clues: Hurting someone. • Hurting a person's feelings. • Treating someone like an outcast. • Name calling, saying hurtful things. • Secretly hurting a person such as spreading rumours. • Using information and communication technologies to bullying someone. • Affecting someone's relationship, excluding, making the person feel left out etc.
Safer Internet 2026-03-19
7 Clues: Anzeichen für Handysucht? • Wie ist alles auf Instagram? • Was machen wenn man hilfe braucht • Was gehört auch zu Cyber Mobbing? • Was kann besonders süchtig machen? • Gesetze zu beachten wenn du was auf instagram postest • Was bekommt man nachdem man seine Bildschirm zeit reduziert?
unit 6; 2014-04-13
Across
- to hit somebody
- a kitchen device that keeps food fresh and cold
- rule which you must obey
- a card which resembles a debt to your bank
- somebody who investigates crimes
- to have done something you shouldn't
- to steel object from a shop
- a person who does ar has done illigal things
- somebody who is incredibly stupid
- a commited action which was illigal
Down
- a person who owns a shop
- a short coat
- a group of people who protect humans and things
- a card which shows your personal information
- a very sharp blade you use to shave body hair
- breaking things that aren't yours
- to forced somebody to hand over things that aren't yours
- somebody who steals things from pockets and purses
- to be your own boss
- a camera system used to maintain security
20 Clues: a short coat • to hit somebody • to be your own boss • a person who owns a shop • rule which you must obey • to steel object from a shop • somebody who investigates crimes • breaking things that aren't yours • somebody who is incredibly stupid • a commited action which was illigal • to have done something you shouldn't • a camera system used to maintain security • ...
sdl 2018-06-12
Across
- you can buy medicines here
- if you can’t find a place, you can ask here
- you can have the curruncy of the country here
- people who use flight services
- where aircrafts land and take off
- a place you can buy stuffs without tax
- moving stairs
- if you bought first or business class, you can rest here in airport
- you can get your ticket and send your luggage here
- you must be checked here to go into airside
Down
- the way aircrafts move to runway
- where aircrafts parked
- if you are sweating so much, you can wash tour body
- ticket
- instead of stairs
- what you get on security areas
- travelers come out from here
- final enterance to get on aircrafts
- you must have this and boarding pass to go into airside
- stuffs to remember a place or country
20 Clues: ticket • moving stairs • instead of stairs • where aircrafts parked • you can buy medicines here • travelers come out from here • people who use flight services • what you get on security areas • the way aircrafts move to runway • where aircrafts land and take off • final enterance to get on aircrafts • stuffs to remember a place or country • a place you can buy stuffs without tax • ...
Aviation 2023-11-19
Across
- One of their duties is to load & unload aircraft
- Not allowed on aircraft
- Relating each letter of alphabet to a word
- Built for passengers to use at the airport
- Full term for ASO
- This role helps prevent any incidents from international trade & travel
- Used to help stop drugs and explosives being smuggled into country
- This document is required to be able to travel
- Security process to check luggage for any explosive
- Area where public has access to
- Short term for Aviation Security
Down
- Area where passengers pass through to Airside
- Full term for UM
- Also known as the boarding gate
- Staff must be wearing this to have access to airside
- Full term for PSA
- Skills, knowledge & ...
- Area where counters are located
- Area where only passengers have access to
- Time of your flights ( Departure & Arrival)
20 Clues: Full term for UM • Full term for PSA • Full term for ASO • Not allowed on aircraft • Skills, knowledge & ... • Also known as the boarding gate • Area where counters are located • Area where public has access to • Short term for Aviation Security • Area where only passengers have access to • Relating each letter of alphabet to a word • Built for passengers to use at the airport • ...
CyberNewspaper 2024-09-16
Across
- Online harassment or bullying
- Impersonating someone or something to deceive
- Software update to fix security vulnerabilities
- Measures taken to protect data
- Function that converts data into a fixed size
- Network of compromised computers under attacker control)
- Securing data by converting it into code
- Distributed Denial of Service attack to overwhelm a network)
- Investment scam involving fake accounts
- Self-replicating malware that spreads across networks)
- Software that shows unwanted ads
- A system that protects networks
Down
- Fraudulent attempts to steal sensitive information)
- Malware that encrypts files demanding ransom
- Zero Trust Architecture
- Hidden way of bypassing security controls
- Malware disguised as legitimate software
- Attack using trial and error to guess passwords)
- Software that records keystrokes
- Virtual Private Network for secure connections
- Vulnerabilities exploited before being patched
- Software that collects data secretly
- Multi-Factor Authentication
23 Clues: Zero Trust Architecture • Multi-Factor Authentication • Online harassment or bullying • Measures taken to protect data • A system that protects networks • Software that records keystrokes • Software that shows unwanted ads • Software that collects data secretly • Investment scam involving fake accounts • Malware disguised as legitimate software • ...
Banking Glossary Crossword 2025-04-29
Across
- System of money used by a country
- Money borrowed with agreement to repay later
- Adding money into your account
- Move money from one account to another
- Sign the back of a cheque for deposit
- Loan used to buy property
- Deliberate deception to obtain money
- Property used to secure a loan
- Personal information used for banking security
- Fee paid for borrowing money
- Security code for account access
- Attempt to trick someone financially
Down
- Plan for managing income and expenses
- Funds allocated to generate future returns
- Taking money out of your account
- A written order directing a bank to pay money
- Borrowed money requiring repayment with interest
- Direct withdrawal from an account
- Replacing a loan with a new agreement
- Withdrawal exceeding account balance
- Monthly record of transactions and balance
- Account to securely store and grow funds
- Confirm information or authenticity
- Amount of money currently in account
24 Clues: Loan used to buy property • Fee paid for borrowing money • Adding money into your account • Property used to secure a loan • Taking money out of your account • Security code for account access • System of money used by a country • Direct withdrawal from an account • Confirm information or authenticity • Withdrawal exceeding account balance • Deliberate deception to obtain money • ...
Taxes 2025-04-30
Across
- Deduction that lowers your taxable income
- money paid to you from a companies profit
- Range of income that is taxed at a specific rate
- Tax system where higher income earners pay a larger percentage
- Money you make from selling something
- Percentage at which income is taxed
- Government program that provides healthcare
- Amount of money taken out of your paycheck for taxes
- Number you put on a tax form
- Money you get back from the gov
Down
- Money you make from working
- Amount of your income that is subject to tax
- When the IRS checks your tax return to make sure its correct
- Amount directly reduces amount of tax you owe
- Tax of specific goods
- Federal program that provides money to old people
- Taxes taken out of paycheck to fund social security
- Someone you support financially
- Tax you pay on the money you earn
- Tax taken for social security
20 Clues: Tax of specific goods • Money you make from working • Number you put on a tax form • Tax taken for social security • Someone you support financially • Money you get back from the gov • Tax you pay on the money you earn • Percentage at which income is taxed • Money you make from selling something • Deduction that lowers your taxable income • ...
Civics - Australia's International Relations and Obligations 2025-05-29
Across
- A country where citizens vote for their leader
- A country where citizens don't choose their leader
- the UN aims to promote international peace and _________
- A migrant who has fled their country due to fear of persecution
- Someone seeking to live in another country
- the freedoms and protections belonging to all humans
- the General _______ is the main body of the UN
- ________ Declaration of Human Rights
- Australia mostly trades with countries around the _______.
Down
- foreign ___ - a country providing assistance to another
- Refugee ________; another word for 'treaty'
- involving more than two countries
- Australia's main ______ are coal, iron ore, gold and natural gas
- the Paris Agreement aims to combat ______ change
- Nationally Determined ________ - (NDCs)
- non-_________ - the concept of non-return of refugees
- an international legal agreement
- ______ seeker - someone who seeks protection in another country
- the UN Security _______ has five permanent members with veto powers
- involving two countries
20 Clues: involving two countries • an international legal agreement • involving more than two countries • ________ Declaration of Human Rights • Nationally Determined ________ - (NDCs) • Someone seeking to live in another country • Refugee ________; another word for 'treaty' • A country where citizens vote for their leader • the General _______ is the main body of the UN • ...
Economics Terms 2023-01-03
Across
- A security that provides ownership rights
- A security that promises repayment to a lender
- The act of exchanging goods and services
- Karl ______
- Revenue in excess of costs (revenue - costs)
- Gross ______ Product
- The relationship between price and quantity.
- Warren _______ the CEO of Berkshire Hathaway
- A payment for using money.
- When a few large sellers dominate the market
- A company's overall income
- A tax on trade
- Payment of profits to shareholders
Down
- ______ cost Next best alternative
- When inflation and unemployment increase
- There aren't enough resources for everyone
- Purchasing Power ________
- The condition of not having a job
- The tools and equipment used in production.
- Everything that is owned by an individual.
- The usefulness or satisfaction of doing something
- A general increase in the overall price level.
- The ability to buy a good or service
23 Clues: Karl ______ • A tax on trade • Gross ______ Product • Purchasing Power ________ • A payment for using money. • A company's overall income • ______ cost Next best alternative • The condition of not having a job • Payment of profits to shareholders • The ability to buy a good or service • When inflation and unemployment increase • The act of exchanging goods and services • ...
The negotiable instruments Act 1881 2025-12-01
Across
- created by contract.
- condition to validate agreement.
- of rescinding a contract.
- contract made without free consent is
- who makes an offer.
- proposal made by one party to another.
- essential to contract purpose.
- or security on goods.
- for breach of contract.
- in exchange for a promise.
- who sells goods.
Down
- that becomes void later.
- false statement that induces a contract.
- DAMAGES,Liability for late delivery of goods.
- must be to be valid.
- who buys goods.
- paid in advance as security.
- GOODS,Goods not specific at contract time.
- of ownership.
- enforceable by law.
- GOODS,Goods manufactured or acquired after agreement
- TO SELL,Contract in which goods are delivered later.
- GOODS,Goods identified at the time of making the contract.
- by buyer to seller.
24 Clues: of ownership. • who buys goods. • who sells goods. • enforceable by law. • who makes an offer. • by buyer to seller. • created by contract. • must be to be valid. • or security on goods. • for breach of contract. • that becomes void later. • of rescinding a contract. • in exchange for a promise. • paid in advance as security. • essential to contract purpose. • condition to validate agreement. • ...
Computer Lingo 2015-02-03
10 Clues: isolation • a set of type • mid-level support staff • a unit equal to one billion • arrangement of words and phrases • an icon containing related files • to obtain from a foreign supplier • execution of more than one program • a program designed to breach the security • most effective way to achieve data security
Money Matter 2024-03-20
Across
- taxes are paid at a future date
- funds free from financial risk
- government-imposed charges
- deposit account that provides principal security
- deposit account held at a financial institution
Down
- non-profit institution that accepts deposits
- compensation from all sources
- defines type of individual tax treatment
- amount of income taxed
- Social Security, and Medicare taxes
10 Clues: amount of income taxed • government-imposed charges • compensation from all sources • funds free from financial risk • taxes are paid at a future date • Social Security, and Medicare taxes • defines type of individual tax treatment • non-profit institution that accepts deposits • deposit account held at a financial institution • ...
PBR27 2025-09-22
Across
- shouldn't be the only option
- our resident SAP expert
- delivering modern and advanced warfighting capabilities
- they call him "Mr. Munitions"
- see this AO for Ground Combat systems
- if Marcus Aurelis met this officer, he would've joined the Acquisition Corps
- programming network, IT, and cyber across the Army
Down
- keeper of this time-killer
- our newest Acquisition or a place to go in the summer
- things that go boom
- a PDD legend and Sustaining PEG icon
- our resident IAMD SME
- he's known as "A Colonel's Colonel"
- a Maritime savant and living la dolce vita
- maintenance, logistics, and industrial base
- Our DD and DBS whisperer a true SME
- known as the patron saint of Army Watercraft
- two-time PAE returning champion
- Accepted Lee's surrender and also known as "Mr. Aviation"
19 Clues: things that go boom • our resident IAMD SME • our resident SAP expert • keeper of this time-killer • shouldn't be the only option • they call him "Mr. Munitions" • two-time PAE returning champion • he's known as "A Colonel's Colonel" • Our DD and DBS whisperer a true SME • a PDD legend and Sustaining PEG icon • see this AO for Ground Combat systems • ...
Bullying 2012-11-13
Across
- / the type of bullying that happend over the internet
- / the person getting bullied
- / where can bullying happen
- / the person doing the mean act
- / if you get bullied you should tell an
Down
- / when the bully hits or kicks the victim
- / the first step to making a bully stop is to ___ them
- / when the bully tells them mean stuff
8 Clues: / where can bullying happen • / the person getting bullied • / the person doing the mean act • / when the bully tells them mean stuff • / when the bully hits or kicks the victim • / if you get bullied you should tell an • / the first step to making a bully stop is to ___ them • / the type of bullying that happend over the internet
week 10 crossword puzzle 2021-11-05
Across
- bullying - the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- - he ability to understand and share the feelings of another.
- theft
- scam
Down
- media
- sharing
- that is threatening or offensive to other people
- drama - Describes everyday tiffs and disputes that occur between friends or acquaintances online or via text.
8 Clues: scam • media • theft • sharing • that is threatening or offensive to other people • - he ability to understand and share the feelings of another. • drama - Describes everyday tiffs and disputes that occur between friends or acquaintances online or via text. • ...
KnowCrowe 2025-03-12
Across
- The first stage of a cyber attack.
- The colour of the pinnacle logo.
- The alignment of text in a paragraph.
- What our new firm email address starts with.
Down
- If the word "Crowe" = Logotype, therefore the "Pinnacle" = ?
- The Art of ______.
- The title of our upcoming global conference
- The typographical term for spacing between two lines of text.
8 Clues: The Art of ______. • The colour of the pinnacle logo. • The first stage of a cyber attack. • The alignment of text in a paragraph. • The title of our upcoming global conference • What our new firm email address starts with. • If the word "Crowe" = Logotype, therefore the "Pinnacle" = ? • The typographical term for spacing between two lines of text.
Federal Weekly 2022-02-09
Across
- Largest agency in the civilian government
- FSI that lead in acquisitions in 2021
- The biggest unknown in Federal software
Down
- What devsecops leaders aspire to
- Largest non-DoD department, after the VA
- Tier 1 FSI that is a known leader in cyber
- Best source for compiled RFP and vendor info
- Largest office within the Executive Office of the President
8 Clues: What devsecops leaders aspire to • FSI that lead in acquisitions in 2021 • The biggest unknown in Federal software • Largest non-DoD department, after the VA • Largest agency in the civilian government • Tier 1 FSI that is a known leader in cyber • Best source for compiled RFP and vendor info • Largest office within the Executive Office of the President
PitchBook 2Q 2019 PlayBook 2019-05-17
Across
- use of a good or service instead of cash
- a request for a portion of a loan
- an unsecured loan certificate backed by general credit
- debt repayment at a regular schedule
- order of priorities of claims
- loan agreements that don’t contain usual protections
- the right to purchase equity
- stretch riskier than a senior loan, in an accommodative way
- condition in a bond or loan
- a hybrid loan structure
Down
- financing offered by a group
- between bank loans and equity
- something pledged as security for repayment
- a form of security interest granted
- a giant credit manager that recently agreed to be acquired
- lending by unregulated institutions and/or under unregulated conditions
- covering an interval between two transactions
- a provider of funds
- a variable line of credit allowing for drawdowns and repayments
19 Clues: a provider of funds • a hybrid loan structure • condition in a bond or loan • financing offered by a group • the right to purchase equity • between bank loans and equity • order of priorities of claims • a request for a portion of a loan • a form of security interest granted • debt repayment at a regular schedule • use of a good or service instead of cash • ...
CSIT - Cybersecurity Vocab 2024-12-02
Across
- A person or entity responsible for an event that has been identified as a security incident or as a risk
- Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted
- Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
- The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data
- Data that can be used to identify or contact an individual
- A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication
Down
- A number used in conjunction with authentication devices
- Scans that allow access to a physical space or program by verifying unique body features
- unauthorized use is detected or attempted
- Security control that can enforce a virtual boundary based on real-world geography
- A basic principle of security stating that a person should be allocated the minimum necessary rights, privileges, or information to perform its role
11 Clues: unauthorized use is detected or attempted • A number used in conjunction with authentication devices • Data that can be used to identify or contact an individual • Security control that can enforce a virtual boundary based on real-world geography • Scans that allow access to a physical space or program by verifying unique body features • ...
Unit 1/1 2018-09-24
13 Clues: Mode • Strauß • Konzert • klingen • Krankheit • Reisender • montieren • Ausländer • (be)halten • Sicherheit • Rucksacktourist • einzig/einziger • ansehen/betrachten
PAYCHECK TERMINOLOGY 2015-03-11
Across
- the total amount of money earned during a pay period before deductions
- mandatory charges imposed on citizens by local, state, and federal governments
- the total amount of money left after all deductions have been withheld
- a type of withholding tax that funds the state government
- the amount of money subtracted from the gross pay earned for taxes and medical/retirement benefits
- this type of tax includes two separate taxes, Social Security and Medicare
- this type of information states the name of the employee, address, and social security number
- a type of withholding tax that funds the federal government
- an agency that collects federal taxes and enforces tax laws
- this type of security is based on a tax percentage of (6.2%)
Down
- a plan, such as a 401K or 403B
- a health care program for the elderly and disabled
- this type of deduction is based on a tax percentage of (1.45%)
- this type of security funds the retirement plan of the nation
14 Clues: a plan, such as a 401K or 403B • a health care program for the elderly and disabled • a type of withholding tax that funds the state government • a type of withholding tax that funds the federal government • an agency that collects federal taxes and enforces tax laws • this type of security is based on a tax percentage of (6.2%) • ...
Hotel crossword puzzle 2024-05-01
15 Clues: lobi • Koper • Taman • Masuk • Keluar • Pelayan • Keamanan • Pemesanan • Ruang santai • Kasur tambahan • Biaya Tambahan • Kamar tipe VIP • Kamar mandi uap • Ruang pertemuan • Meja resepsionis
Unit 11 2020-02-18
PDU 12 - Nominalization 2020-11-24
The image of who I am 2023-10-11
Vocab 2026-02-10
Overzicht 2013 2014-01-15
Across
- aan wat werd ACW beschuldigt ?
- Willem ... wordt koning van Nederland
- wie treed er in Nederland van de troon ?
- Rusland wilt met ... een vreedzame oplossing
- In Syrie vallen er 1500 doden door ?
- wat was de voornaam van de president van Venezuela ?
- wat was er in Boston tijdens de de beroemde marathon gebeurt ?
- Welke paus treed aaf ?
- Hoe noemt de typhoon dat in Fillipijnen plaats vond ?
- hoe noemt de jongen dat naar Syrie was vertrokken ?
Down
- Wat was er op de luchthaven gestolen ?
- wie was de slachtoffer van cyber spionage ?
- Koning Albert II maakt plaats voor prins ...
- waar was er een kleding fabriek ingestort ?
- waar was er een meteor gevallen ?
- In welke maand is Nelson Mandela overleden ?
16 Clues: Welke paus treed aaf ? • aan wat werd ACW beschuldigt ? • waar was er een meteor gevallen ? • In Syrie vallen er 1500 doden door ? • Willem ... wordt koning van Nederland • Wat was er op de luchthaven gestolen ? • wie treed er in Nederland van de troon ? • wie was de slachtoffer van cyber spionage ? • waar was er een kleding fabriek ingestort ? • ...
Black Friday & Cyber Monday 2017-11-29
Across
- three times as great
- increasing in size, number
- sellers of merchandise directly to customers
- building blocks made from clay, then baked in a kiln or in the sun
- lifting, taking
- things devised to publicize a product or event
- a combining form meaning computer, computer network or online
- people who shop
- having a likeness in a general way to other things
Down
- showing how something performs or operates
- competitor for the same goal
- bargains, financial discounts
- computer that isn't portable; not a laptop or tablet
- before all others; before the second; the initial one
- mixture of cement, sand & water used to bond bricks & other building materials together
- systematic inquiry or investigation of a subject
16 Clues: lifting, taking • people who shop • three times as great • increasing in size, number • competitor for the same goal • bargains, financial discounts • showing how something performs or operates • sellers of merchandise directly to customers • things devised to publicize a product or event • systematic inquiry or investigation of a subject • ...
Comp Sci Study Guide 2025-04-09
Across
- Malicious Software
- Arithmetic Logic Unit
- Component that holds all other components
- Cyber crime that steals information through sketchy links through email or text
- Basic Input/Output System, firmware in the motherboard
- Components that manage the flow of data between the CPU, GPU, RAM, storage, and peripherals
- Renders graphics and visuals
Down
- Used to amplify or switch electronic signals and electrical power
- The delay before data follows an instruction for transfer
- Uses a laser light to read data from or write data to an optical disc
- International character encoding standard
- American Standard Code for Information Interchange
- Stores data on flash memory
- Pathways that allow components to exchange data
- Uses magnetic disks to store digital information
- One billion hertz
16 Clues: One billion hertz • Malicious Software • Arithmetic Logic Unit • Stores data on flash memory • Renders graphics and visuals • International character encoding standard • Component that holds all other components • Pathways that allow components to exchange data • Uses magnetic disks to store digital information • American Standard Code for Information Interchange • ...
Bullying Is Wrong. 2021-10-27
Across
- a bystander doesn’t help when they see someone getting bullied is _____ bullying
- can be done by an individual or Group?
- A form of looking down on yourself?
- I must be_____to everyone
- Being a bully makes you a smaller person, helping makes u a...
- What should you say to someone who stood up for you?
- I shouldn't_____ someone.
Down
- The act of gossiping or telling on someone, when they do non-hurtful things to get attention.
- ____ someone from a group is a form of bullying.
- Bullying online is called ___ bullying?
- Appreciate your inner
- Bullying is---
- you should___when bullied.
- bullying can be physical or ___.
- you ___ ask for help when bullied
- you can bully someone without ___
16 Clues: Bullying is--- • Appreciate your inner • I must be_____to everyone • I shouldn't_____ someone. • you should___when bullied. • bullying can be physical or ___. • you ___ ask for help when bullied • you can bully someone without ___ • A form of looking down on yourself? • can be done by an individual or Group? • Bullying online is called ___ bullying? • ...
TTS tentang materi Bullying 2022-01-25
6 Clues: termasuk dalam bully fisik • ciri-ciri bully relasional • salah satu ciri bully verbal • salah satu ciri-ciri bully relasional • salah satu faktor penyebab pembullyan • salah satu alat komunikasi yang dapat memicu cyber bullying
Compliance Program 2021-05-05
Across
- Deals with the payment requirements to employees who work for contractors that work on federal and public buildings, typically related to the Davis-Bacon Act
- Relates to Price fixing, comparing bids, agreements to be noncompetitive or allocating bids
- Deals with cyber security and often is related to phishing attacks
- These are company personnel who have a vast knowledge of a specific topic – including policy, procedure, tools, and training. Operations should engage this role when dealing with a compliance topic area where support or expertise is required.
- The document will assist each location to assemble a functional set of procedures, monitoring measures, and training requirements that, when implemented, will minimize their compliance risk
Down
- Kiewit utilizes a USDOT number and requires an operator to be licensed to be able to operate commercial motor vehicles
- This category defines the process to transport equipment and material internationally
- Deals with the training of operators and the plans for how to operate manlifts (abbreviation)
- If required by a contract, requirements may apply to purchases of iron, steel and other manufactured products permanently incorporated into infrastructure projects. Further, these projects must be undertaken by U.S. states and municipalities with funds issued by certain U.S. federal departments and agencies
- Kiewit is required by the USCG to periodically provide a Certificate of Financial Responsibility(COFR), Certificate of Inspection (COI) and Certificate of Documentation(COD) for this category.
- The Federal Aviation Administration (FAA) sets regulations to adopt specific rules for the operation of small Unmanned Aircraft Systems for this compliance category
- The use of cranes and similar types of lifting equipment can pose special hazards for the Company and its employees. To avoid the risk of serious accidents, employees are required to follow policies within the Corporate Crane Procedures
12 Clues: Deals with cyber security and often is related to phishing attacks • This category defines the process to transport equipment and material internationally • Relates to Price fixing, comparing bids, agreements to be noncompetitive or allocating bids • Deals with the training of operators and the plans for how to operate manlifts (abbreviation) • ...
Air Travel Essentials Crossword 2024-10-08
Across
- – Another term for luggage.
- – Main building where passengers arrive and depart.
- – Feeling tired after crossing time zones.
- – Where passengers come in after a flight.
- – Area where bags are screened and passengers go through checks.
- – Where planes take off and land.
- – Required travel document for international flights.
Down
- – A stop between flights.
- – Ticket required to get on the plane.
- – Process of registering and dropping off luggage.
- – When the plane leaves.
- – Where passengers wait to board their flight.
- – Inspection area after international flights.
- – Abbreviation for the agency in charge of airport security in the U.S.
14 Clues: – When the plane leaves. • – A stop between flights. • – Another term for luggage. • – Where planes take off and land. • – Ticket required to get on the plane. • – Feeling tired after crossing time zones. • – Where passengers come in after a flight. • – Where passengers wait to board their flight. • – Inspection area after international flights. • ...
E-Safety 2017-06-06
Across
- / when someone you don't want gets onto your private media
- / somewhere were lots of people can chat online
- / how you stay safe online
- / A formal way people can talk to you
- / sending and receiving inappropriate things
- / when you bully someone online
- / when a stranger tries to start a relationship with you
Down
- / Something you should do if someone you dont know messages you
- / what people view you on
- / personal detail you should never give anyone
- media / What talking apps online are called
- / something to lock your gadgets
- / another word for messaging
- / one of the main ways people text on
- / What you do on the internet
15 Clues: / what people view you on • / how you stay safe online • / another word for messaging • / What you do on the internet • / when you bully someone online • / something to lock your gadgets • / one of the main ways people text on • / A formal way people can talk to you • media / What talking apps online are called • / sending and receiving inappropriate things • ...
Computer Processing Puzzle 2014-12-08
Across
- something that helps something else that is bad; make it easier to do it
- obtaining something from somebody obtaining force
- a computer program that damages the computer
- the right to be left alone
- the state of not being known or identified
- unfair threatening or incriminating of somebody
- great interest in a particular thing to which a lot of time is devoted
- cyber exploiter of life
- binary digit
- not real, but existing in somebody’s imagination
Down
- smallest unit of information used in a computer
- a condition that is subject to change
- to release expression or strong feelings
- being accountable of someone or something
- excessive admiration or love shown for somebody or something
15 Clues: binary digit • cyber exploiter of life • the right to be left alone • a condition that is subject to change • to release expression or strong feelings • being accountable of someone or something • the state of not being known or identified • a computer program that damages the computer • smallest unit of information used in a computer • ...
Bullying Crossword! 2014-06-22
Across
- When you are excluded from a group
- When you are by yourself you are _____
- A person that sees bullying happen
- A person that bullies
- When someone uses their fists to hurt someone it is ________
- A type of bullying where the bully is calling someone nasty names or saying nasty comments
- A type of bullying that happens online
- When you call someone nasty names you _____ them
Down
- Knowingly causing pain or distress to others is being _____
- A nasty comment can be very _______
- Something that is unpleasant, angering or irritating is _________
- When you have committed bullying you are ______
- Something that happens over and over again
- Done deliberately
- A person that gets bullied
15 Clues: Done deliberately • A person that bullies • A person that gets bullied • When you are excluded from a group • A person that sees bullying happen • A nasty comment can be very _______ • When you are by yourself you are _____ • A type of bullying that happens online • Something that happens over and over again • When you have committed bullying you are ______ • ...
Informatika 2023-10-19
Across
- buling Kako se zove zlostavljanje na interenetu?
- intivacija Što je dabar?
- Sto se smatra kada pisemo velikim slovima?
- Moodele je alat za izradu obrazovnih ?
- KAko se zove pravilno ponasanje na interenetu?
- Kako se zove drustvena mreza od ofice365?
- se Što je bitno da napravimo kada nečemo koristiti javno računalo?
Down
- zajednica Što je mrežna aplikacija kojom stvaramo pučne izrade?
- trag Kada oblavlujes fotografije ili videje na drustvene stranice ostavljas
- kako se zove istrazivacka mreza?
- Sto nam je bitno za ulugiranje u AAI?
- bonton Sto je netiquette?
- slovima Kada pišemo rečenicu pišemo? (kakvim slovima)
- ustanova Što je carnet?
- buton Kako se zove aplikacjia kojom prijavljujemo zlostavljanje na intrernetu?
15 Clues: ustanova Što je carnet? • intivacija Što je dabar? • bonton Sto je netiquette? • kako se zove istrazivacka mreza? • Sto nam je bitno za ulugiranje u AAI? • Moodele je alat za izradu obrazovnih ? • Kako se zove drustvena mreza od ofice365? • Sto se smatra kada pisemo velikim slovima? • KAko se zove pravilno ponasanje na interenetu? • ...
elektroničko nasilje 2024-04-24
Across
- osoba koja radi nasilje nad drugim osobama
- nasilje na internetu
- širenje lažnih informacija neke osobe zbog zabave
- mreža svih mreža, globalna mreža
- osoba koja je izložena elektroničkom nasilju
- predstavljanje kao druge osobe zbog prijevare drugih
- govor mržnje kojim govore da će nauditi osobama
- engleski naziv za elektroničko nasilje
Down
- nagovaranje neke osobe na stvari koje ne želi raditi dobrom voljom
- nasilje koje je stalno u tijeku i ne prestaje duže vrijeme
- krađa nečijih osobnih podataka
- stalno slanje nasilnih poruka jednoj osobi
- namjerno izopćavanje, odbacivanje,ignoriranje drugih na internetu
- zajednički naziv za instagram, facebook, tiktok
- dugme koje kada se aktivira otvara stranicu policije za prijavu cyber bullyinga
15 Clues: nasilje na internetu • krađa nečijih osobnih podataka • mreža svih mreža, globalna mreža • engleski naziv za elektroničko nasilje • osoba koja radi nasilje nad drugim osobama • stalno slanje nasilnih poruka jednoj osobi • osoba koja je izložena elektroničkom nasilju • zajednički naziv za instagram, facebook, tiktok • govor mržnje kojim govore da će nauditi osobama • ...
jobs 2021-01-07
13 Clues: Koch • Maler • Bäcker • Gärtner • arbeiten • Frisör/in • Lehrer/in • LKW-Fahrer • Sicherheit • Tierpfleger • Verkäufer/in • Landwirtschaftsgehilfe • Sicherheitsbediensteter
Crybersecrity 2023-02-09
Bullying Types 2025-05-02
Chapter 22 Vocabulary 2014-03-12
Across
- security/A system by which the participating nations agree to take joint action against a nation
- formal agreement between the governments of two or more countries
- avoidance of involvement in world affairs
- of members of both major political parties
- document entitling a traveler to certain protections established by international treaty
- attacks any one of them
- treaty/Agreement between two nations
- official of the government who represents the nation in diplomatic matters
- defense alliance/An agreement between nations to support each other in case of an attack
- military service; also called the draft
- special document, required by certain countries, that is issued by the government of the country
- agreement/An agreement made between the president and another head of state
Down
- security/Protection of a nation’s borders and territories against invasion or control by foreign
- security pact/A mutual defense treaty among nations of a region
- in world affairs
- policy designed to keep the Soviet Union from expanding its power
- ambassador’s official residence and offices in a foreign country
- measure such as withholding economic aid to influence a foreign government’s activities
- policy/The strategies and goals that guide a nation’s relations with other countries
- treaty/International agreement signed by several nations
- /Office that promotes American business and safeguards its travelers in a foreign country
- government official who heads a consulate in a foreign nation
22 Clues: in world affairs • attacks any one of them • treaty/Agreement between two nations • military service; also called the draft • avoidance of involvement in world affairs • of members of both major political parties • treaty/International agreement signed by several nations • government official who heads a consulate in a foreign nation • ...
Investing-Briana Cutaran 2025-03-25
Across
- investing all the money you have available
- the availability of cash
- Virtual currency
- how much Tom Brady lost on FTX
- when the stock market is high
- ability to move your 401k funds
- how old you need to be to invest in crypto
- initial public offering
- when your this old you must take the minimum out of your account annually
- a loan from you to the person you bought it from
- biggest financial fraud in US history
- Dollar cost averaging
- after working a certain amount of time with a company you get 100% of your 401k
Down
- what percentage you need to pay for social security tax if you work for an employer
- the person who takes care of your investments in a mutual fund
- system to record info so you can't cheat the system
- pool of money from multiple different investors
- currencies backed by the government that don't have a physical commodity
- the money you contribute here is after taxes
- Both you, your employer, and sometimes the state pays into this
- how much you can put into your IRA per year
- President of the Stanwood AAAA Booster club
- when the stock market is low
- a security that represents the ownership of a fraction of a corporation
- the investment game we've been playing
- how old do you need to be to receive full social security benefits
26 Clues: Virtual currency • Dollar cost averaging • initial public offering • the availability of cash • when the stock market is low • when the stock market is high • how much Tom Brady lost on FTX • ability to move your 401k funds • biggest financial fraud in US history • the investment game we've been playing • investing all the money you have available • ...
Retirement terms 2025-10-16
Across
- Benefit Plan: A pension plan in which the amount of benefits paid to an
- age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
- make tax-deductible contributions.
- (Individual Retirement Account): A special type of account that allows investors
- IRA, the contributions are not tax deductible
- Contribution Plan: A pension plan wherein a certain amount or percentage
- conditions to a person following retirement or to surviving dependents.
- IRA: Roth IRAs allow investors who do not exceed a specific income level to
- plan.
- after retirement is fixed in advance in accordance with a formula given in
- money is set aside each year (by either the company and/or the employee) for the
- A type of defined contribution retirement account funded through pre-tax
Down
- of the employee. There are restrictions as to when and how you can
- include payment of hospital and medical expenses.
- Benefits: Benefits (compensation in addition to salary) that may be provided
- A federal program that provides some level of health benefits for people
- Security: A federal benefits program developed in 1935, Social Security is
- a limited amount of money toward retirement annually. Unlike the
- these funds without penalties.
- employees for sickness, accidental injury, or accidental death. These benefits
- through a tax levied on employers and employees.
- bonds, mutual funds or other assets, and are not taxed until they are
- deductions. The funds in the account can be invested in a number of different
- A sum of money paid regularly as a retirement benefit; money paid under
24 Clues: plan. • these funds without penalties. • make tax-deductible contributions. • IRA, the contributions are not tax deductible • through a tax levied on employers and employees. • include payment of hospital and medical expenses. • a limited amount of money toward retirement annually. Unlike the • of the employee. There are restrictions as to when and how you can • ...
retirement terms 2025-10-17
Across
- Benefits: Benefits (compensation in addition to salary) that may be provided
- A federal program that provides some level of health benefits for people
- age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
- Benefit Plan: A pension plan in which the amount of benefits paid to an
- these funds without penalties.
- IRA, the contributions are not tax deductible
- money is set aside each year (by either the company and/or the employee) for the
- A sum of money paid regularly as a retirement benefit; money paid under
- include payment of hospital and medical expenses.
- employees for sickness, accidental injury, or accidental death. These benefits
- Security: A federal benefits program developed in 1935, Social Security is
- A type of defined contribution retirement account funded through pre-tax
Down
- after retirement is fixed in advance in accordance with a formula given in
- plan.
- of the employee. There are restrictions as to when and how you can
- a limited amount of money toward retirement annually. Unlike the
- (Individual Retirement Account): A special type of account that allows investors
- Contribution Plan: A pension plan wherein a certain amount or percentage
- IRA: Roth IRAs allow investors who do not exceed a specific income level to
- make tax-deductible contributions.
- through a tax levied on employers and employees.
- conditions to a person following retirement or to surviving dependents.
- deductions. The funds in the account can be invested in a number of different
- bonds, mutual funds or other assets, and are not taxed until they are
24 Clues: plan. • these funds without penalties. • make tax-deductible contributions. • IRA, the contributions are not tax deductible • through a tax levied on employers and employees. • include payment of hospital and medical expenses. • a limited amount of money toward retirement annually. Unlike the • of the employee. There are restrictions as to when and how you can • ...
dollar and sense 2025-10-17
Across
- Security: A federal benefits program developed in 1935, Social Security is
- these funds without penalties.
- make tax-deductible contributions.
- include payment of hospital and medical expenses.
- Contribution Plan: A pension plan wherein a certain amount or percentage
- of the employee. There are restrictions as to when and how you can
- money is set aside each year (by either the company and/or the employee) for the
- after retirement is fixed in advance in accordance with a formula given in
- Benefit Plan: A pension plan in which the amount of benefits paid to an
- Terms
- IRA: Roth IRAs allow investors who do not exceed a specific income level to
- bonds, mutual funds or other assets, and are not taxed until they are
Down
- deductions. The funds in the account can be invested in a number of different
- employees for sickness, accidental injury, or accidental death. These benefits
- IRA, the contributions are not tax deductible
- A federal program that provides some level of health benefits for people
- (Individual Retirement Account): A special type of account that allows investors
- plan.
- through a tax levied on employers and employees.
- age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
- a limited amount of money toward retirement annually. Unlike the
- conditions to a person following retirement or to surviving dependents.
- A sum of money paid regularly as a retirement benefit; money paid under
- Benefits: Benefits (compensation in addition to salary) that may be provided
- A type of defined contribution retirement account funded through pre-tax
25 Clues: plan. • Terms • these funds without penalties. • make tax-deductible contributions. • IRA, the contributions are not tax deductible • through a tax levied on employers and employees. • include payment of hospital and medical expenses. • a limited amount of money toward retirement annually. Unlike the • of the employee. There are restrictions as to when and how you can • ...
DFE Module 08 – Network Forensics 2025-11-05
Across
- Intercepting unsecured connections to steal personal information
- Command line packet sniffer used to capture and analyze network packets
- Flooding a target with traffic to deny service to legitimate users
- Logs containing details about network connectivity and routing
- Decoy system designed to lure and study attacker behavior
- Capturing network traffic to obtain sensitive information
- Records of allowed or denied network traffic for security monitoring
- Contain assigned IP addresses and timestamps for network devices
- Capturing recording and analyzing network events to discover the source of security incidents
- Taking over an active user session to gain unauthorized access
Down
- GUI tool used to capture and analyze live or recorded network traffic
- Faking an IP address to appear as a trusted host
- Suspicious network communication caused by infected systems
- Records generated by intrusion detection systems to identify anomalies
- Analysis performed during an ongoing attack to respond quickly
- Intercepting and relaying messages between two parties
- Mapping attacker’s MAC address to victim’s IP address to intercept traffic
- Relating multiple events to identify patterns or root causes
- Digital forensic artifact indicating a potential security breach
- Unauthorized wireless access point set up to steal data
- Attempt to gain FTP credentials by repeated login failures
- Analysis of logs after an incident has already occurred
- Attack that overwhelms a server with half open TCP connections
- Converting data from different log formats into a common format
- Wireshark feature that allows filtering of captured packets for analysis
25 Clues: Faking an IP address to appear as a trusted host • Intercepting and relaying messages between two parties • Unauthorized wireless access point set up to steal data • Analysis of logs after an incident has already occurred • Decoy system designed to lure and study attacker behavior • Capturing network traffic to obtain sensitive information • ...
Investing - Braden Thompson 2026-03-23
Across
- Money Currencies created and backed by the government, but not tied to a physical commodity
- A system of recording information that’s almost impossible to hack into
- How easy an asset can be converted into cash
- Can we count Social Security as a retirement plan?
- IRA An individual retirement account with contributions made pre tax
- Investing your money at equal amounts for regular intervals.
- IRA An individual retirement account, with contributions made post tax
- SUM Investing all your money at one time at one given time into the stock market.
- INTEREST Interest that compounds
- only invest what you are willing to lose for crypto
- Low risk, protects money
- High risk, potential to lose money
- Spreading investments across different sectors or types to reduce risk
Down
- A type of cryptocurrency
- Fund A fund built up from 3-6 months of living expenses
- An organized group of people who deal with your money.
- A virtual currency backed by nothing, with
- TRADING Buying or selling stocks based on MNPI
- SEVEN Age when you can collect full benefits of Social Security
- President who created social security
- A collection of one's financial assets
- A stock or investment that frequently goes up and down by a lot
- An employer- managed retirement plan, paid when you reach a certain number of years
- Moderate risk, grows money over time
- Employers will match how much you put into a 401K, up to 24,500 a year
25 Clues: A type of cryptocurrency • Low risk, protects money • INTEREST Interest that compounds • High risk, potential to lose money • Moderate risk, grows money over time • President who created social security • A collection of one's financial assets • A virtual currency backed by nothing, with • How easy an asset can be converted into cash • ...
Investing-Chloe Steinart 2026-03-24
Across
- Retirement plan managed by an employer
- A market where stock prices are rising over time
- Buying or selling stock based on nonpublic information
- Age to receive full social security benefits
- A system of recording information in a way that makes it difficult to hack or cheat
- Social Security and MEdicare taxes combined
- The ease with which an asset can be converted to cash
- Total Value of a companies stock
- A factor of something the company has done that may cause stock prices to change
- Having worked for a certain amount of time with a company
- Digital Seal on the security of crypto
Down
- A digital record of transactions
- Retirement plan that was created by Roosevelt
- How many days you have to rollover funds
- A loan that you give to a company or the government
- Investing all the money you have available at the given time
- Currencies that are created and backed by the government
- 100 of the largest nonfinancial companies
- Example of Fiat Money
- Something that crypto prices are
- A market where stock prices are falling over time
- Information that would change a person’s mind about buying or selling a stock
- Money paid to investors for owning a stock
- A factor of something that does not directly involve the company
- A strategy in which you invest your money in equal amounts of regular intervals
25 Clues: Example of Fiat Money • A digital record of transactions • Something that crypto prices are • Total Value of a companies stock • Retirement plan managed by an employer • Digital Seal on the security of crypto • How many days you have to rollover funds • 100 of the largest nonfinancial companies • Money paid to investors for owning a stock • ...
