cyber security Crossword Puzzles
Unit 11 2023-02-27
Unit 11 Crossword Puzzle 2025-02-13
bullying crossword 2014-06-05
Across
- when its done face to face
- is a crime
- : use of words that upset the victim
- a person who is watching but doesnt do anything about it
- making someone feel as they have to do what you tell them to do
- groups that hep you with bullying
- Someone not telling the truth
Down
- when its done through social media
- when things are said that arnt true
- when you leave someone out of the group
- threatening someone or making them scared enough to make them do what you want
- attacking the victim and contact with the victim
- the person who is getting bullied
- the person who is being mean to the victim
- hitting or hurting someone
- when you call someone names.
16 Clues: is a crime • when its done face to face • hitting or hurting someone • when you call someone names. • Someone not telling the truth • the person who is getting bullied • groups that hep you with bullying • when its done through social media • when things are said that arnt true • : use of words that upset the victim • when you leave someone out of the group • ...
RCHR TIMES 2023-01-21
Across
- Project in which one group met a politician
- Tum Hi Ho...
- Medium-scale Club Service project
- First Sports project
- Mascot for the 20th We Are The World
- A word describing our love for RCHR
- Something that the Cyber Media had in store for us after Exploring India
- An obstacle in the way of FYJCs when preparing for the 20th WATW
Down
- First word for the Weekly Wordle
- PC: Album: 37 Track 7:
- Title of the first REPLAY
- Community Service x Task Force project
- This country won first place for Fashion Show at FIESTA
- That one moment at EI that changed everything for us
- First PR & Marketing project
- First project with the 37th General Body
16 Clues: Tum Hi Ho... • First Sports project • PC: Album: 37 Track 7: • Title of the first REPLAY • First PR & Marketing project • First word for the Weekly Wordle • Medium-scale Club Service project • A word describing our love for RCHR • Mascot for the 20th We Are The World • Community Service x Task Force project • First project with the 37th General Body • ...
Unit 9 - Science & Technology 2022-11-15
Across
- pulpit
- połączyć
- chemik
- bezprzewodowy
- środowisko
- urządzenie
- wtyczka
- zarazki,bakterie
- genetyka
- baza danych
- przyłączać,dołączać
Down
- załadować,wysłać (np. pliki na serwer)
- szczepionka
- obserwować
- oprogramowanie
- wynaleźć
- przenośny (o sprzęcie)
- opracowywać, rozwijać
- błąd
- gniazdko
- wyniki
- bezpieczeństwo
- klawiatura
- para wodna
24 Clues: błąd • pulpit • chemik • wyniki • wtyczka • wynaleźć • gniazdko • połączyć • genetyka • obserwować • środowisko • urządzenie • klawiatura • para wodna • szczepionka • baza danych • bezprzewodowy • oprogramowanie • bezpieczeństwo • zarazki,bakterie • przyłączać,dołączać • opracowywać, rozwijać • przenośny (o sprzęcie) • załadować,wysłać (np. pliki na serwer)
Vocabulary Unit 2 2019-10-31
29 Clues: Affe • Eimer • Führer • Strauß • Mensch • riesig • schwer • Kollege • nutzlos • Ausgang • Elefant • positiv • Knochen • Nilpferd • Nachteil • regieren • insgesamt • Eisenbahn • aggressiv • Sicherheit • enttäuscht • Ausbildung • elektrisch • Rad fahren • unbewaffnet • Schulbildung • Rechtsanwalt • Überschwemmung • reich, wohlhabend
QUIZ 2019-12-30
30 Clues: kale • ünlü • kapı • marş • uçuş • sisli • kemer • ahlak • güven • gurur • bütçe • değer • pençe • kazak • terlik • deprem • cansız • harabe • korumak • güvenlik • şerefonur • eskiantik • havalanmak • uçağabinmek • gökgürültülü • uçağıninmesi • vatanseverlik • davranıştavır • misafirperverlik • birlikberaberlik
MY SPELING CROSSWORD PUZZLE 2013-04-03
20 Clues: Iknow • so sad • oh yes • my wish • is less • is lock • has fame • is clear • my image • too firm • very bad • the light • pay money • so common • how it is • same equal • so special • be penalized • exmple costume • same community
abc 2013-08-05
20 Clues: clue 2 • clue 6 • clue 8 • clue 5 • clue 7 • clue 1 • clue 3 • clue 9 • clue 14 • clue 11 • clue 12 • clue 16 • clue 20 • clue 19 • clue 18 • clue 15 • clue 13 • clur 17 • clue 10 • clue 4 c
Investigations 2016-12-15
Monsters, Inc. Day 9 2023-07-17
25 Clues: 생일 • 의견 • 역사 • 우연 • 벽장 • 위험한 • 보내다 • 편안한 • 피곤한 • 목격자 • 궁금하다 • 전문가의 • 설명하다 • 확인하다 • 폭발시키다 • 정상,보통 • 보안,경비 • 비어 있는 • 항상,언제나 • 사기꾼,협잡꾼 • 얻다, 집어들다 • 우연히 마주치다 • (상품을)주문하다 • 망치다,엉망으로 만들다 • (더욱더 잘 되도록)복돋다
puzzle 2024-03-15
30 Clues: log • kiss • cast • dove • gate • evil • hero • tower • plane • brave • delay • cheek • glass • statue • clever • flight • bridge • common • strong • honest • wedding • foreign • airport • weather • greeting • security • handshake • tradition • historical • boardingpass
Security crossword 2016-05-04
Across
- SSN is classified as
- SOW is classified as ____ type of data
- one of the requirements for getting a patent
- Business Continuity Management programme for Infosys
Down
- use email spoofing to collect client data
- Technique used to ensure electronic data interchange security
- embedded within programs provided officially by companies
- Dedicated group for Information Security related activities
8 Clues: SSN is classified as • SOW is classified as ____ type of data • use email spoofing to collect client data • one of the requirements for getting a patent • Business Continuity Management programme for Infosys • embedded within programs provided officially by companies • Dedicated group for Information Security related activities • ...
Internet Security 2015-10-11
Across
- /a way of online banking that keeps your bank details secure
- /allows criminals to get access to bank accounts, or other accounts like shopping, auction or gaming accounts.
- /is a kind of software that can be installed on a computer without approval from the computer's owner.
- /isthe misuse of online services such as e-mail, cellphones and social media websites, to harass or attack a person or a group.
- /a website such as facebook that allows instant communication between people and allows people to share pictures and details
Down
- /a phrase or combination of letters or numbers that protects online accounts or other online services
- /an attempt to gain sensitive information that would allow a criminal to gain something usually money
- /a service that allows pareents to filter the content their children can access on the internet
8 Clues: /a way of online banking that keeps your bank details secure • /a service that allows pareents to filter the content their children can access on the internet • /a phrase or combination of letters or numbers that protects online accounts or other online services • ...
Computer Security 2018-11-28
Across
- Fernando _____ : "Father of the password"
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- a printed or written letter or symbol.
- not subject to threat; certain to remain or continue safe and unharmed.
Down
- keep safe from harm or injury.
- a secret word or phrase that must be used to gain admission to something.
- restricts access to the full functionality or data of (a computer, mobile phone, file, etc.), especially by requiring a user to verify their identity with a passcode or other form of authentication.
- belonging to or for the use of one particular person or group of people only.
8 Clues: keep safe from harm or injury. • a printed or written letter or symbol. • Fernando _____ : "Father of the password" • not subject to threat; certain to remain or continue safe and unharmed. • a secret word or phrase that must be used to gain admission to something. • belonging to or for the use of one particular person or group of people only. • ...
Security Controls 2022-05-30
Across
- A type of security control that acts against in-person intrusion attempts
- The hardware and software components that protect a system against cyberattacks.
- The security controls that provide oversight of the information system.
- A control that acts to eliminate or reduce the likelihood that an attack can succeed
- a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.
Down
- A type of security control that acts against in-person intrusion attempts
- A control acts to eliminate or reduce the impact of an intrusion event
- A control may not prevent or deter access, but it will identify and record any attempted or successful intrusion
- Security controls focused on the things done by people.
9 Clues: Security controls focused on the things done by people. • A control acts to eliminate or reduce the impact of an intrusion event • The security controls that provide oversight of the information system. • A type of security control that acts against in-person intrusion attempts • A type of security control that acts against in-person intrusion attempts • ...
Network security 2022-10-31
Across
- there are a lot of features of anti-malware software, including scanning your computer or emails for malware, and ............
- is a way of gaining sensitive information by influencing people
- is designed to find and stop malware from damaging a network and the device on it
Down
- is when crimsles send emails or texts to people claiming to be from a well-known business
- to protect something
- is installed on someone's device without their knowledge
- to block unauthorised access
- is when data is translated into a code which only someone with the correct key can text
8 Clues: to protect something • to block unauthorised access • is installed on someone's device without their knowledge • is a way of gaining sensitive information by influencing people • is designed to find and stop malware from damaging a network and the device on it • is when data is translated into a code which only someone with the correct key can text • ...
Airport Security 2022-10-20
Across
- is to keep ppl from going on to a space
- An official annoucment that gives ppl information
- A Device that detects metal
- Area a place travellers are not allowed to enter
Down
- A Device that records some areas of an airport.
- a system that checks what's in the bag or luggage
- An official rule
- its to show where something is with something else
8 Clues: An official rule • A Device that detects metal • is to keep ppl from going on to a space • A Device that records some areas of an airport. • Area a place travellers are not allowed to enter • a system that checks what's in the bag or luggage • An official annoucment that gives ppl information • its to show where something is with something else
Perimeter Security 2023-09-13
Across
- Vehicle, rail, and ________ are the three types of traffic at the facility.
- Each employee has a ________ that allows them access to the facility.
- There are _______ two-way gates onsite.
- Boiler operators are required to perform checks on the _________ every shift.
Down
- Security solutions that utilize physical and software technology systems to protect from unauthorized access.
- You are not allowed to ___________ through the gate after another individual.
- Each visitor and contractor has to ________ upon arriving at the site.
- Fencing, Gates, and _________ make up the main parts of our security system.
8 Clues: There are _______ two-way gates onsite. • Each employee has a ________ that allows them access to the facility. • Each visitor and contractor has to ________ upon arriving at the site. • Vehicle, rail, and ________ are the three types of traffic at the facility. • Fencing, Gates, and _________ make up the main parts of our security system. • ...
Food security 2024-02-21
Across
- can be damaged in conflict decreasing food security
- submerging of dry land with a large amount of water
- can allow pests to travel into new countries
- animals that can reduce food security (crops)
Down
- can deprive local communities of food
- causes an increase in population
- having enough food to feed a population
- growing crops and raising livestock
8 Clues: causes an increase in population • growing crops and raising livestock • can deprive local communities of food • having enough food to feed a population • can allow pests to travel into new countries • animals that can reduce food security (crops) • can be damaged in conflict decreasing food security • submerging of dry land with a large amount of water
Data Security 2024-02-27
Across
- Enables users to view and use data
- Used to validate a user’s access and make sure they claim who they are
- A stricter type of authentication
Down
- What you use with a username to log in
- The total of all data exposed to a person during a single sign in
- the fraudulent practice of sending emails to reveal personal information
- a type of malicious software designed to block access to a computer system until a sum of money is paid
- A periodical review of security actions and user activity
8 Clues: A stricter type of authentication • Enables users to view and use data • What you use with a username to log in • A periodical review of security actions and user activity • The total of all data exposed to a person during a single sign in • Used to validate a user’s access and make sure they claim who they are • ...
Security pops 2023-03-23
Food Security 2024-12-17
Across
- A person who grows food or raises animals. (6 letters)
- A type of fruit that is often used to make juice, high in Vitamin C.
- A place where food is kept safe and fresh. (5 letters)
- King of all fruits.(5 letters)
Down
- A place where food is stored. (6 letters)
- A nutrient that helps build muscles and repair tissue. (7 letters)
- A type of food that comes from animals and provides protein, like milk or eggs. (3 letters)
- A nutrient that helps keep our teeth and bones strong(7 letters)
8 Clues: King of all fruits.(5 letters) • A place where food is stored. (6 letters) • A person who grows food or raises animals. (6 letters) • A place where food is kept safe and fresh. (5 letters) • A nutrient that helps keep our teeth and bones strong(7 letters) • A nutrient that helps build muscles and repair tissue. (7 letters) • ...
Unit 8 boll weevil 2024-05-07
Across
- deal public work projects
- weevil what was the reason cotton production went down
- thirty nine when did it end
- what factories did people start to work
- Electrification Administration electricity needs
- great depression why did the bank and stock market fail
Down
- twenty nine when did is start
- Security Administration social security
- lending what caused reduction in purchasing
- where did people start To move after boll weevil
- ships what were the ships ww2 used to win
- bombers what were the planes they used in ww2
- what did Georgia do after boll weevil
- material factory
14 Clues: material factory • deal public work projects • thirty nine when did it end • twenty nine when did is start • what did Georgia do after boll weevil • what factories did people start to work • Security Administration social security • ships what were the ships ww2 used to win • lending what caused reduction in purchasing • bombers what were the planes they used in ww2 • ...
Buddy Ruski 2022-12-22
8 Clues: your car • side by side • home sweet home • goes with the salad • mythical collage of animals • G Yamazawa's salad of choice • psychological security system • Sleepy Holloway security system
Instagram 2018-06-04
Across
- Auf Instagram hat jeder seinen eigenen ........
- Was kann man auf Instagram machen Auser Bilder, Videos und Storys?
- In der Story kann man ........ machen.
- Wie nennt man "Hass Kommentare"?
Down
- Was sollte man ändern wenn sein account gehackt wurde?
- Welche person hat die meisten Follower auf Instagram?
- Was ist das Symbol von Instagram?
- Ab wann darf man die App verwenden?
- Welche Social-Media Plattform hat Instagram gekauft?
- Wo kann man Bilder posten die nach 24h wieder verschwinden?
10 Clues: Wie nennt man "Hass Kommentare"? • Was ist das Symbol von Instagram? • Ab wann darf man die App verwenden? • In der Story kann man ........ machen. • Auf Instagram hat jeder seinen eigenen ........ • Welche Social-Media Plattform hat Instagram gekauft? • Welche person hat die meisten Follower auf Instagram? • Was sollte man ändern wenn sein account gehackt wurde? • ...
Digital Realities 2023-05-09
Across
- Meaning like too complex not needing special
- AR the needs expensive equipment
- Taking notes or to add comments, an image etc
- Reality immersive technology that includes physical and virtual worlds
- Using aspects of gaming to encourage in an activity
- A virtual model of a users body
Down
- Meaning like interested and fascinated
- A material that transfers information
- An interconnected system system, network, or environment
- Sickness getting nausea and discomfort from VR or AR
10 Clues: A virtual model of a users body • AR the needs expensive equipment • A material that transfers information • Meaning like interested and fascinated • Meaning like too complex not needing special • Taking notes or to add comments, an image etc • Using aspects of gaming to encourage in an activity • Sickness getting nausea and discomfort from VR or AR • ...
Tech Words-Mitchel Giggey 2019-11-06
Across
- /the programs and other operating information used by a computer.
- /is any malware which misleads users of its true intent.
- /In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
Down
- /the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- /a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
- /comprises of malicious code that is distributed in email messages, and this code can be activated when a user opens an email attachment, clicks on a link in an email message, or interacts in a totally different way with the infected email message.
- / type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected"
7 Clues: /is any malware which misleads users of its true intent. • /the programs and other operating information used by a computer. • /the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. • ...
jobs 2015-12-10
ADVANTAGES OF E-WALLET 2025-05-06
12 Clues: - AKSES • -DIKESAN • -GANJARAN • - KEBAIKAN • - PEMBELIAN • MENGELAKKAN • - MENAWARKAN • - KESELAMATAN • -PEMBELANJAAN • - MENGURUSKAN • - DENGAN SENANG • - SELESA /MUDAH
DevSecOps Tools Challenge 2023-05-17
Across
- A widely-used vulnerability assessment tool that scans networks, systems, and applications to identify potential security issues.
- An open-source automation tool that enables you to automate the provisioning, configuration, and deployment of infrastructure and applications.
- An open-source containerization platform that allows you to package applications and their dependencies into lightweight, portable containers.
Down
- A container security platform that scans container images for vulnerabilities and enforces security policies throughout the container lifecycle.
- An open-source automation server that facilitates continuous integration and delivery of software projects.
- A platform for continuous code quality inspection that identifies bugs, vulnerabilities, and code smells in your codebase.
- A secure, scalable, and secrets management tool that provides a central repository for storing and accessing sensitive information.
- A web application security scanner that helps you find security vulnerabilities during the development and testing phases.
8 Clues: An open-source automation server that facilitates continuous integration and delivery of software projects. • A platform for continuous code quality inspection that identifies bugs, vulnerabilities, and code smells in your codebase. • ...
Cisco Product Advanced Security Crossword Puzzle 2024-10-14
Across
- (10 letters) Security certifications help ensure that a product complies with important ________ standards and guidelines.
- (5 letters) This vulnerability management solution automates the process of prioritizing and addressing security risks in Cisco products
- (4 letters) A document that lists all the components and dependencies in a software product, helping to manage vulnerabilities
Down
- (7 letters) This detection engine is commonly paired with Falco to manage security policies and controls in containerized environments.
- (5 letters) The general term for security policies and frameworks used to monitor and address risks in cloud applications.
- (7 letters) This open-source engine is used for detecting anomalies and security threats in containerized environments
- (5 letters) A modern protocol used for securing network telemetry with real-time streaming, often used in telemetry dial-out
- (5 letters) AI-based method used to identify and block unauthorized access attempts or attacks
8 Clues: (5 letters) AI-based method used to identify and block unauthorized access attempts or attacks • (7 letters) This open-source engine is used for detecting anomalies and security threats in containerized environments • (5 letters) The general term for security policies and frameworks used to monitor and address risks in cloud applications. • ...
Di Sekolah 2015-01-19
13 Clues: pen • lab • office • pledge • canteen • stapler • uniform • cleaner • assembly • principal • ____ makan (food stall) • pengawal _______ (security guard) • latihan _________ (physical education)
Crime Vocabulary 2021-04-16
28 Clues: robo • juez • arma • jurado • ladrón • ladrón • prisión • testigo • experto • pistola • abogado • juzgado • pruebas • víctima • arrestar • cuchillo • criminal • detective • secuestrar • investigar • prisionero • falsificador • officer policía • huellas digitales • asesinar, asesinato • sospechoso, sospechar • guard guardia de seguridad • scientist investigador forense
Difficult words english 2020-10-08
25 Clues: kom • ziek • over • strip • agenda • anders • rooster • softbal • honkbal • leerling • afspraak • wiskunde • uitleggen • plotseling • hebben zin • doen alsof • voorstellen • heel slecht • beveiliging • aardrijkskunde • de schuld geven • de schuld geven • aan de overkant van • accident per ongeluk • and technology techniek
17실력 2023-12-19
23 Clues: 보험 • 풍경 • 여권 • 관광 • 비행 • 목적지 • 시차증 • 기념품 • 해외로 • 취소하다 • 예약하다 • 출발하다 • 안전 보안 • 짐 수하물 • 풍경(s-) • 안내원 종업원 • 지연 연기하다 • 탑승하다 승차하다 • 신청하다 지원하다 • 도착하다 도달하다 • 수표 점검 조사하다 • 요구 청구 주장하다 • 멀리가는 여행 여정
Unit 8 2024-04-02
25 Clues: věci • vlna • brána • vážit • pilot • selfie • trochu • přístav • semafor • nádraží • letiště • dálnice • ponorka • přistát • vzlétnout • nástupiště • ovlivňovat • ctižádostivost • kruhový objezd • dopravní zácpa • palubní letenka • bezpečnostní pás • bezpečnostní prohlídka • přihlásit se k odbavení • nerovný, hrbolatý, hrubý
Airport Spanish Vocab 2022-11-29
20 Clues: ticket • flight • arrival • to call • airport • passport • suitcase • to board • departure • itinerary • to travel • bathing suit • travel agency • monitar/screen • identification • to get in line • to go on vacation • to go through customs • to check ones luggage • to go through security
Travel Vocab 2022-11-28
20 Clues: gate • flight • ticket • airport • arrival • luggage • bus stop • to board • departure • passenger • train station • baggage claim • to get in line • tourist office • monitor/screen • to take a taxi • flight attendant • to check luggage • to go though costoms • to go though security
Chapter 5 2025-04-10
Across
- rauw
- bewaking, beveiliging
- genieten van
- waarschijnlijkheid
- opmerking
- erg populair
- weerspiegeling
- herkennen
- onpartijdig
- persoonlijk, subjectief
- vermoeiend
- oplichting
- gemeenschap
Down
- reageren
- met zich meebrengen
- onbetrouwbaar
- realistisch
- toegang
- plakken
- carrière
- bevatten
- belonend
- beïnvloeden
- verzoek
- afbeelding, beeld
- zoekopdracht
- belangrijkste
- geboorte
28 Clues: rauw • toegang • plakken • verzoek • reageren • carrière • bevatten • belonend • geboorte • opmerking • herkennen • vermoeiend • oplichting • realistisch • beïnvloeden • onpartijdig • gemeenschap • genieten van • erg populair • zoekopdracht • onbetrouwbaar • belangrijkste • weerspiegeling • afbeelding, beeld • waarschijnlijkheid • met zich meebrengen • bewaking, beveiliging • persoonlijk, subjectief
People and Places in the School 2022-12-02
13 Clues: office • hallway • library • student • bathroom • classroom • cafeteria • gymnasium • male-teacher • male-librarian • security-guard • female-secretary • female-principle
Dystopian Crossword 2021-01-14
Across
- A dystopia happens when there is an end to civilization because of a _________
- You must _________, you can’t be different
- The word “utopia” was created from 2 __________ words, eutopia & outopia
- Opposite of dystopia
- A dystopian government uses mass __________ to spy on its citizens
- Sir Thomas __________
- The word for mega-technological genre: “cyber-__________”
Down
- Spreading of rumors to control people is called
- Type of government that has total control over people’s lives
- Katniss from The Hunger Games is a __________
- Dystopian literature takes a current trend to the __________
- Kim Jong-Un is practically worshipped by citizens, making him the __________head of North Korea
12 Clues: Opposite of dystopia • Sir Thomas __________ • You must _________, you can’t be different • Katniss from The Hunger Games is a __________ • Spreading of rumors to control people is called • The word for mega-technological genre: “cyber-__________” • Dystopian literature takes a current trend to the __________ • ...
Transportation 2024-10-09
Across
- Common Winter Transportation For Icey Terrian
- A Vehicle That Touches the Ground With Only One Wheel. Variation have a Frame with a Saddle
- Tony Hawk's Favorite Way To Travel
- Typically found On The Tracks
- An aircraft without wings, consisting of a very large bag filled with gas
- Honda, KIA, or Ford for example
Down
- Chopper, Whirlybird, or Eggbeater
- Also Called a Pedal Cycle, This is a Human-Powered or Pedal-Driven, Single-Track Vehicle
- How Some People Come To School
- Dump, Cyber, or Pickup
- Need To Wait For These At The Airport
- Very Long Car For Prom and Weddings
12 Clues: Dump, Cyber, or Pickup • Typically found On The Tracks • How Some People Come To School • Honda, KIA, or Ford for example • Chopper, Whirlybird, or Eggbeater • Tony Hawk's Favorite Way To Travel • Very Long Car For Prom and Weddings • Need To Wait For These At The Airport • Common Winter Transportation For Icey Terrian • ...
Bullying 2025-05-08
Across
- an organized group of criminal activity
- type of bullying that happens over the internet
- type of bullying where you call somebody names
- what to do if somebody is bullying you- ____ somebody
- type of bullying where you hit somebody
- a reason somebody would bully
- someone who uses strength, power or words to harm or intimidate others
Down
- a popular belief about specific types of individuals
- to put up with somebody or something unpleasant
- what to do if you're a bystander - _____ up
- somebody who is present at a bullying event
- a preconceived opinion or feeling
12 Clues: a reason somebody would bully • a preconceived opinion or feeling • an organized group of criminal activity • type of bullying where you hit somebody • what to do if you're a bystander - _____ up • somebody who is present at a bullying event • type of bullying where you call somebody names • to put up with somebody or something unpleasant • ...
Bullying 2012-11-13
Across
- / If you get bullied you should tell an
- / when the bully hits or kicks the victim
- / the type of bullying that happend over the internet
- / The first step to making a bully stop is to ___ them
Down
- / when the bully tells them mean stuff
- / the person getting bullied
- / the person doing the mean act
- / where can bullying happen
8 Clues: / where can bullying happen • / the person getting bullied • / the person doing the mean act • / when the bully tells them mean stuff • / If you get bullied you should tell an • / when the bully hits or kicks the victim • / the type of bullying that happend over the internet • / The first step to making a bully stop is to ___ them
FITD: 2013-05-14
Across
- a websites that provides tips to stop cyber issues
- a portable hand held electronic
- where you plug in flash drive
- short-term memory
Down
- a service that lets people's or group's website be accessed online
- where you plug in headphones
- a program for the retrieval of data from a database or network
- the brain of the computer
8 Clues: short-term memory • the brain of the computer • where you plug in headphones • where you plug in flash drive • a portable hand held electronic • a websites that provides tips to stop cyber issues • a program for the retrieval of data from a database or network • a service that lets people's or group's website be accessed online
cybersecurity 2021-02-12
Across
- make sure you password doesn't contain ________ information
- it is malware which Uses vulnerabilities to move into your machine.
- it should be 8 or more letters
- never tell your _______ passwords
Down
- what is the shortened word for malicious software
- cyber = _______
- you password needs to be hard to _____
- it is scams which are mostly found in emails or fake log in pages
8 Clues: cyber = _______ • it should be 8 or more letters • never tell your _______ passwords • you password needs to be hard to _____ • what is the shortened word for malicious software • make sure you password doesn't contain ________ information • it is scams which are mostly found in emails or fake log in pages • ...
Cybercrimes and Cyber Laws 2020-12-10
Across
- when someone operates a computer disrupting part of the national electronic infrastructure.
- The use of IT to harm or harass other people in a deliberate, repeated, and hostile manner
- Developing a program intended to damage or disable computers and their systems
- disrupting, damaging, or destroying a website or computer network
- adopting the identity of another computer user, or creating a false identity on a computer website in order to commit fraud.
- Literary theft
- Gaining unauthorized access to data in a computer or an entire network
- Any criminal activity associated with a computer
Down
- The control or suppression of what can be accessed, published, or viewed on the Internet.
- using a computer to steal computer data stored in a digital format.
- warfare, transmitting computer viruses to people to destroy their computer system or files.
- fraudulent practice of sending emails that appear to be from reputable companies to induce individuals to reveal personal information, like passwords and credit card numbers.
- area of law which concerns computer and computer-related crimes.
- using a computer to steal computer data stored in a digital format.
- tort, The invasion, theft, falsification, misuse, or deletion of data stored in a computer to commit a tort
- Use of a variety of media, including photos, film, video, and video games depicting the engagement in acts of a sexual nature
- theft, using a computer to steal financial, employment, educational, medical, and personal data.
17 Clues: Literary theft • Any criminal activity associated with a computer • area of law which concerns computer and computer-related crimes. • disrupting, damaging, or destroying a website or computer network • using a computer to steal computer data stored in a digital format. • using a computer to steal computer data stored in a digital format. • ...
The Cyber Threat - Crossword 2025-11-18
Across
- A user’s keyboard inputs are secretly being recorded and sent to a hacker.
- A security scan shows repeated failed login attempts using different passwords until one works.
- A user downloads a file that causes all their documents to become locked, with a ransom message demanding payment.
- A worker finds a USB stick in the car park and plugs it into their computer, which later becomes infected.
- An employee installs free software that secretly shows ads and collects browsing data.
- An attacker enters extra commands into a website search box and gains access to customer data.
- Attackers infect a popular industry blog so that anyone who visits it unknowingly downloads malware.
Down
- Unknown software connects remotely to a hacker’s computer, giving them full access to the system.
- Company computers suddenly slow down and begin sending out large amounts of network traffic automatically.
- Hackers post fake DNS entries so users visiting a real website are redirected to a copycat site.
- A senior manager receives a personalised email pretending to be from the CEO, asking them to transfer money urgently.
- Users report that the company website shows pop-up messages containing strange code like <script>alert('Hacked!')</script>.
- An employee gets a text message with a link to “update payroll details.”
- A program runs too much data in memory, causing it to crash and allowing code execution by an attacker.
- A user receives an email that looks like it’s from IT support asking them to “confirm their password.”
- A staff member answers a call from “tech support” asking for their login details to fix an issue.
16 Clues: An employee gets a text message with a link to “update payroll details.” • A user’s keyboard inputs are secretly being recorded and sent to a hacker. • An employee installs free software that secretly shows ads and collects browsing data. • An attacker enters extra commands into a website search box and gains access to customer data. • ...
Airport 2023-11-01
Across
- Claim - The place where passengers retrieve their checked luggage after arriving at their destination.
- - The area where officials check for items that may not be brought into a country or require declaration.
- - The airplane that passengers will board for their flight.
- - The location where planes take off and land, and passengers go to board and disembark from flights.
- Check/Security Screening - The process of having your bags and personal belongings inspected to ensure safety.
- - The process of registering for a flight and obtaining a boarding pass.
- Pass - The document that allows a passenger to board a plane.
Down
- - A document that verifies a traveler's identity and citizenship.
- - The checkpoint where travelers entering a new country have their passports and visas checked.
- - A scheduled journey on an airplane.
- - The specific location where passengers wait to board their flight.
- Crew - The flight attendants who provide services on the plane.
- - The building at the airport where passengers check in, go through security, and wait for their flights.
13 Clues: - A scheduled journey on an airplane. • - The airplane that passengers will board for their flight. • Pass - The document that allows a passenger to board a plane. • Crew - The flight attendants who provide services on the plane. • - A document that verifies a traveler's identity and citizenship. • ...
key terms 2012-12-20
Across
- a clash
- crime commited by gang members
- when poeple get violent because of beliefs or religion
- bullying done over the use of internet
- unwanted sexual hehavior
- to be mistreated verbablly physically or emotionally
Down
- any attack done by or to a partner in a dating relationship
- situation where someone has power over someone else, in intimadation of violence
- the beliefs of superiority of particular race
- fear of someone elses sexual preference
- crime that happens to a person or a group because of their "identifiable group"
11 Clues: a clash • unwanted sexual hehavior • crime commited by gang members • bullying done over the use of internet • fear of someone elses sexual preference • the beliefs of superiority of particular race • to be mistreated verbablly physically or emotionally • when poeple get violent because of beliefs or religion • any attack done by or to a partner in a dating relationship • ...
No place for hate! Bob 2015-10-12
Across
- someone who has been affected by hackers, viruses, or cyber bullies
- ability to have computer find problems and solutions
- type of software that is used to protect sensitive files
- type of virus that is used to extract data from one computer to another
- Type of internet protection
- illeagaly downloading content to your computer
- someone who steals identities using a computer
Down
- someone who abuses or bully’s someone through social media
- thief one who steals some ones credentials using a computer
- Junkmail that can sometimes contain viruses
- code used to protect data
11 Clues: code used to protect data • Type of internet protection • Junkmail that can sometimes contain viruses • illeagaly downloading content to your computer • someone who steals identities using a computer • ability to have computer find problems and solutions • type of software that is used to protect sensitive files • ...
CSI Newsletter 2019-03-05
Across
- A cyber group well known for hacking and wearing masks
- Virtual currency which has an equivalent value in real currency
- Created to make life easier but are often hacked or monitored
- What credit reporting bureau was hacked recently
Down
- What are automated pre recorded phone messages
- Electronics manufacturer sued for $2.2 million
- Who won the last $50 quiz
- Malicious software that denies access to data in return for payment
- Automated tools used for simple and repetitive tasks
- Device placed in gas pumps to steal consumer data
- Who is the CSI agent in charge
11 Clues: Who won the last $50 quiz • Who is the CSI agent in charge • What are automated pre recorded phone messages • Electronics manufacturer sued for $2.2 million • What credit reporting bureau was hacked recently • Device placed in gas pumps to steal consumer data • Automated tools used for simple and repetitive tasks • A cyber group well known for hacking and wearing masks • ...
Crossword Puzzle 1 2025-11-21
Across
- Safe; protected from attack.
- Online storage where data is kept instead of on your hard drive.
- Prefix relating to computers, information technology, and the internet.
- A secret string of characters used to gain access.
Down
- Malicious code that spreads from computer to computer.
- The most common way attackers send phishing links.
- The written instructions that make software work.
- Information that AI needs to analyze to learn.
- To break into a computer system illegally.
- An AI tool that has been trained on data to make predictions
- Short for "robot," an automated program.
11 Clues: Safe; protected from attack. • Short for "robot," an automated program. • To break into a computer system illegally. • Information that AI needs to analyze to learn. • The written instructions that make software work. • The most common way attackers send phishing links. • A secret string of characters used to gain access. • ...
Network Security Terminologies 2025-02-26
Across
- A principle ensuring data is accurate and unaltered.
- An attack that floods a network to disrupt service.
- A deceptive attack designed to steal sensitive information.
- A security method requiring more than just passwords.
Down
- A method to protect data by scrambling it.
- A tool that encrypts internet connections for privacy.
- A security approach that assumes no implicit trust.
- A security device that filters traffic between networks.
8 Clues: A method to protect data by scrambling it. • A security approach that assumes no implicit trust. • An attack that floods a network to disrupt service. • A principle ensuring data is accurate and unaltered. • A security method requiring more than just passwords. • A tool that encrypts internet connections for privacy. • ...
group 1 ohs tts 2021-09-28
Across
- gas that is needed by living is
- opening in the wall that is fitted with glass
- mechanical vibration that can interfere
- effort to maintain security
- Light Illuminance
Down
- Working environment intermediary
- maximum level of noise
- music genre that can reduce stress at work
- The most annoying smell come from?
- The place you put air circulator?
10 Clues: Light Illuminance • maximum level of noise • effort to maintain security • gas that is needed by living is • Working environment intermediary • The place you put air circulator? • The most annoying smell come from? • mechanical vibration that can interfere • music genre that can reduce stress at work • opening in the wall that is fitted with glass
Anime 2024-08-01
Across
- Bundgy gum
- The original anime deadbeat father
- inosuke breathing/sword style
- 1st anime we bonded over
- tanjuro sister
- a private security company consisting of the former Third Group of Chryse Guard Security.
Down
- when the world needed him most he disappeared
- Gohans Dad
- died & was reincarnated as a chimera Ant
- your favorite anime genre (per me)
10 Clues: Gohans Dad • Bundgy gum • tanjuro sister • 1st anime we bonded over • inosuke breathing/sword style • The original anime deadbeat father • your favorite anime genre (per me) • died & was reincarnated as a chimera Ant • when the world needed him most he disappeared • a private security company consisting of the former Third Group of Chryse Guard Security.
Security Crossword Puzzle 2018-08-03
Across
- Security Service Provides oversight and annual security reviews to DRS.
- Communication Plan DRS policy that outlines compliance and validation for electronic communications.
- Training Required annually as a part of the mitigation agreement between DRS, Leonardo, and the US Government.
- Aguirre Facility Security Officer
- Information Must be protected at all times.
- Badge Foreign Visitors-Escort required.
Down
- Information Jeopardizes integrity/character of a cleared employee. The ability to safe guard classified information may be at risk.
- Control Plan Specifies how we ensure proper control and exchange of technical data-applies to all interaction with all foreign persons, not just Leonardo or its subsidiaries.
- Clearance level of our Facility.
- Contact Effort to gain illegal or unauthorized access to classified and or other sensitive technology.
- Unclassified Information Sensitive information that includes, but not limited to Export Control information.
- Foreign interest that has the power, direct or indirect, to affect the management or operations of a company (FOCI).
12 Clues: Clearance level of our Facility. • Aguirre Facility Security Officer • Badge Foreign Visitors-Escort required. • Information Must be protected at all times. • Security Service Provides oversight and annual security reviews to DRS. • Communication Plan DRS policy that outlines compliance and validation for electronic communications. • ...
Introduction to Cybersecurity 2024-02-22
Across
- is the act of skirting or breaking through security boundaries.
- a type of hacker that is generally ethical and law-abiding.
- focuses on keeping applications or programs secure throughout their lifecycle.
- certification validates the holders have met the baseline of understanding required by all cybersecurity job positions.
Down
- is based on the key concepts of information assurance.
- an attack in which the attacker is connectedto a network and monitors an authenticated session.
- a set of policies and procedures meant to improve and guide anorganization’s cybersecurity practices.
- Is the protection of digital devices and their connected networks from danger and threats.
- a process in which organizations determine the information about themselves which should be kept private versus what can be shared with the public.
- prevents and protects unauthorized intrusions into the network.
- which is a set of security controls designed to protect payment account security.
- includes threats such as viruses, worms, Trojan horses.
12 Clues: is based on the key concepts of information assurance. • includes threats such as viruses, worms, Trojan horses. • a type of hacker that is generally ethical and law-abiding. • is the act of skirting or breaking through security boundaries. • prevents and protects unauthorized intrusions into the network. • ...
DAOD's 2025-01-06
Across
- Allows investors an easy way to add cryptocurrency exposure to their portfolios
- This device doesn't rely on something as simple as a facial expression or tone of voice. Instead, it delves deep into the unseen
- This bridge is designed to facilitate cross border transactions by bridging fiat and CBDCs using the Stellar blockchain
- More security that involves fingerprints and retinal scans
- Bank that can be used ANYWHERE
Down
- A bridge created to connect the core and anchor ledgers of the Stellar blockchain in the future
- A quantum security update that is isolated from geopolitical instability, natural disasters, and even physical sabotage
- Connects to MINDSAFE ICO. Provides a secure and exclusive environment where Stellar transactions can take place seamlessly. Think Apple or Droid
- "Used to maintain anonymity, privacy and security for Stellar internal transactions"
- "1ST space currency being developed with CBridge technology
- The most secure wallet ever
- Upgrade for secure cross-chain bridges and improved dApps.
12 Clues: The most secure wallet ever • Bank that can be used ANYWHERE • Upgrade for secure cross-chain bridges and improved dApps. • More security that involves fingerprints and retinal scans • "1ST space currency being developed with CBridge technology • Allows investors an easy way to add cryptocurrency exposure to their portfolios • ...
vocab 2022-02-16
Across
- bank you make money off of accounts
- physical form of currency
- people that manage credit
- you write money out to people on it
- used if you want to pay later
- manage accounts of loans and savings
- put money in a bank account
- protection of something
- guarantee from bank that you will pay the money back on time
Down
- to move money somewhere else
- bank account if you plan to spend
- lets you borrow money when you need it
- institute you can't deposity money into
- where security is
- bank account if you plan to save
- a unit of value
- let you buy without carrying cash
17 Clues: a unit of value • where security is • protection of something • physical form of currency • people that manage credit • put money in a bank account • to move money somewhere else • used if you want to pay later • bank account if you plan to save • bank account if you plan to spend • let you buy without carrying cash • bank you make money off of accounts • ...
nates crossword 2023-08-28
Across
- or data which can be accessed when needed
- sure a person is who they say they are
- used to determine user privileges or access levels to the system
- to or damage sensitive information on a computer
- ransomware and the numerous other programs used by hackers to gain
- information is protected
- or weakness which undermines an organization’s security efforts
- an individual or organization has over information and how it is used
- of being private or secret
Down
- of being complete or uncorrupted
- rules
- of doing harm
- which have been programmed to carry out malicious intent
- assessment of potential threats to an organization’s security
- for "malicious software" and covers threats such as viruses, worms, Trojan
- of computers and devices managed as a unit with the same procedures
- Virus
17 Clues: rules • Virus • of doing harm • information is protected • of being private or secret • of being complete or uncorrupted • sure a person is who they say they are • or data which can be accessed when needed • to or damage sensitive information on a computer • which have been programmed to carry out malicious intent • assessment of potential threats to an organization’s security • ...
Chapter 8 Security Plus 2024-03-13
Across
- Open security standards that can help automate vulnerability management
- a threat actor positions themself in the middle between
- A session sampling protocol feature on Cisco routers
- bogus requests to overwhelm the recipient
- A product that consolidates real-time security monitoring and management
- helps protect organizations from email spoofing, phishing
- closed A failure mode in which the device shuts down when failure is detected
- Gathering data for monitoring user behavior
- validates the content of the email message
- Detecting and notifying operators about meaningful events
Down
- attacker to multiply the effect of their attack
- Isolating systems that have been compromised
- ensure critical data is protected
- baseline A standard of normal activities
- A standard of normal activities
- retains historical documents
- Collecting data without the need of monitoring agents
17 Clues: retains historical documents • A standard of normal activities • ensure critical data is protected • baseline A standard of normal activities • bogus requests to overwhelm the recipient • validates the content of the email message • Gathering data for monitoring user behavior • Isolating systems that have been compromised • attacker to multiply the effect of their attack • ...
Cyber safety- Keira 2016-06-07
Across
- something that you play with
- Something that tracks you down
- went you can get a app
- something that mess with your iPod or iPhone
Down
- Someone who is mean to you on the internet
- people could be mean using this
- A person who looks casually through Internet
- get destroy by a virus
- some times you need to be the
- People can send you mean thing
- Irrelevant or unsolicited messages sent over the internet
11 Clues: get destroy by a virus • went you can get a app • something that you play with • some times you need to be the • Something that tracks you down • People can send you mean thing • people could be mean using this • Someone who is mean to you on the internet • A person who looks casually through Internet • something that mess with your iPod or iPhone • ...
Cyber Safe Home 2024-05-02
Across
- The process of establishing the truth, accuracy, or validity of something
- The protection of personal data from those who should not have access to it
- Designed to detect and destroy computer viruses
- The total volume of cells, blocks, frames, packets, calls, messages, or other units of data carried over a circuit or network
- Practical work that needs to be done, as in gathering information
- A device which detects or measures a physical property and records, indicates, or otherwise responds to it.
Down
- A computer network security system that restricts internet traffic in to, out of, or within a private network
- The application of statistical analysis to biological data
- A patch, upgrade, or other modification to code that corrects security and/or functionality problems in software
- Observe and check the progress or quality of (something) over a period of time; keep under systematic review
- Broadcasting, computer networking, or other communication using radio signals, microwaves
11 Clues: Designed to detect and destroy computer viruses • The application of statistical analysis to biological data • Practical work that needs to be done, as in gathering information • The process of establishing the truth, accuracy, or validity of something • The protection of personal data from those who should not have access to it • ...
PROMISE - Data Security Puzzle! 2016-09-25
Across
- Main aim of Allianz Safe Campaign is to highlight the threats faced by whom all.
- These areas can pose a threat through tailgating
- A type of Sensitive Data dealing with special needs that indicate disabilities or doctor bills.
- A type of Security Control of Tracing Processing, e.g. by logging and check sums
- A type of Security Control of IDM processes, authentication, e.g. with user ID + password, certificate.
- The alteration of the substance of stored personal data.
Down
- The entry recording or preservation of personal data on a storage medium.
- Any information relating to an individual directly or indirectly, whether it relates to his or her private, professional or public life.
- A type of Sensitive Data dealing with Genome Profiles, fingerprints, DNA sequences or iris patterns.
- Required to Manage Risk and Enable Business Functionality.
- Balanced factor for both Privacy and Security.
- Labelling stored personal data so as to restrict their further processing or use.
- Technical and Organizational Measures.
13 Clues: Technical and Organizational Measures. • Balanced factor for both Privacy and Security. • These areas can pose a threat through tailgating • The alteration of the substance of stored personal data. • Required to Manage Risk and Enable Business Functionality. • The entry recording or preservation of personal data on a storage medium. • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
Security Awareness Week 2023-12-12
Across
- Background ___ is a common process in government hiring
- Conducts the security assessment, and sends the results electronically to CSCP.
- Government department overseeing the management of human resources in Canada.
- Period of validation : Top Secret or Control of Secret Material in an International Command (COSMIC) Top Secret
- A personnel security clearance is required before an employee may access this kind of information.
Down
- LES require, at a minimum, this Status as a condition of employment.
- To be notified of any changes in personal circumstances that may affect your security status or security clearance you may have been granted, including any criminal charges or convictions, and changes in marital status.
- Spouses and dependants of this Canadian individual require this level of clearance.
- helps determine the general suitability and reliability of an individual for local employment by a Canadian mission, and to have access to information, assets and facilities not classified in the national interest.
- Period of validation : Secret or North Atlantic Treaty Organization (NATO) Secret clearance
10 Clues: Background ___ is a common process in government hiring • LES require, at a minimum, this Status as a condition of employment. • Government department overseeing the management of human resources in Canada. • Conducts the security assessment, and sends the results electronically to CSCP. • ...
My Mind Boggling Puzzle 2016-04-11
20 Clues: fresh,new • joly,holy • quiet,cool • aviod,forget • insane,silly • sunny,radiant • acute,pointed • gently,calmly • scared,nervous • blast,blizzard • active,powerful • afraid,doubtful • interest,inquir • exchange,barter • lightly,smoothly • freedom,security • certified,proved • strenght,violence • equipment,property • adventure,migration
Investigations 2016-12-15
Human Rights 2017-11-22
29 Clues: Asyl • Mensch • Folter • leiden • Rechte • gleich • to laut • Pflicht • Bildung • grausam • Gewissen • Freiheit • schützen • behandeln • Regierung • beitreten • Erklärung • Krankheit • Missbrauch • nicht nett • Verfolgung • entwickeln • Sicherheit • ausdrucken • Behinderung • Versammlung • Gesellschaft • Nationalität • Arbeitslosigkeit
MINI TEST 1 2017-11-06
27 Clues: 제안 • 의무 • 구독 • 진술 • 전략 • 가치 • 장점 • 전문가 • 정치가 • 성실한 • 익명의 • 제시하다 • 상대적인 • 남용하다 • 구독하다 • 확인하다 • 논리적인 • 판단하다 • 꽤,매우 • 인용하다 • 조직,기관 • 걱정스러운 • 원천,출처 • 내부고발자 • 부패,타락 • 안전,안보 • 무시하다,소홀히하다
jobs 2018-11-02
23 Clues: model • pilot • kasjer • chemik • doktor • kelner • prawnik • strażak • fryzjer • dentysta • policiant • listonosz • progrmista • taksówkarz • ochroniarz • sprzedawca • szef kuchni • bibliotekarz • pielegniarka • pracownik banku • agent turystyczny • projektant modowy • czytelnik wiadomosci
A trip to the USA 2018-11-17
21 Clues: guide • argent • tablet • voyage • effrayé • demander • aéroport • passager • vêtements • adaptateur • dictionnaire • embarquement • appareil photo • mobile ( USA ) • décalage horaire • hôtesse de l'air • vérifier contrôler • serviette de toilette • bag trousse de toilette • prendre soin de s'occuper de • officer officier chargé de la sécurité
Vocab 2022-11-15
23 Clues: Feo • Taza • Reloj • Canal • Receta • Espejo • Maleta • Comedor • Cuchilla • Ciclismo • Un plato • La comida • El bigote • Seguridad • La salida • Fotografía • Deprimente • El desayuno • Los anuncios • Casa adosada • Vagón de tren • Montar al caballo • La barba de varios días
Bridge 2022-11-17
25 Clues: 행동 • 토론 • 안전 • 요인 • 선호 • 개념 • 하다 • 단체 • 분석 • 거대한 • 사생활 • 결혼의 • 합치다 • 실시하다 • 소매업자 • 예측하다 • 제공하다 • 끊임없이 • 널리 퍼져있는 • 가능하게 하다 • on ~에 근거하여 • 저지르다 / 범하다 • 예방하다 / 방지하다 • 신원을 확인하다 / 알아보다 • 개인이 원하는 대로 할 수 있는
Difficult words english 2020-10-08
25 Clues: kom • ziek • over • strip • agenda • anders • rooster • softbal • honkbal • leerling • afspraak • wiskunde • uitleggen • plotseling • hebben zin • doen alsof • voorstellen • heel slecht • beveiliging • aardrijkskunde • de schuld geven • de schuld geven • aan de overkant van • accident per ongeluk • and technology techniek
Traditionen Part 2 2020-03-27
23 Clues: to tip • inform • either • totally • efforts • to brake • consider • way back • downhill • at first • dentists • urgently • for ever • furniture • apparatus • use (noun) • beforehand • several times • for no reason • because of that • safety, security • capable of repair • stop (temporarily)
Vocabulary Unit 1 Bebo 2020-11-20
Across
- contract
- beschermen
- werkgever
- onderzoeken
- voorkomen
- afschrikken
- noodgeval
- verantwoordelijk
- voorbereiden
- carrière
- veiligheid/beveiliging
- efficiènt
- uitdaging
- salaris
Down
- schade
- diefstal
- oplettend
- bedrijf
- aanwezigheid
- ingang
- assisteren/helpen
- eigendom
- realistisch
- georganiseerd
- slot
- rapporteren
- ploegendienst
- gebouw
- behulpzaam
29 Clues: slot • schade • ingang • gebouw • bedrijf • salaris • contract • diefstal • eigendom • carrière • oplettend • werkgever • voorkomen • noodgeval • efficiènt • uitdaging • beschermen • behulpzaam • onderzoeken • afschrikken • realistisch • rapporteren • aanwezigheid • voorbereiden • georganiseerd • ploegendienst • verantwoordelijk • assisteren/helpen • veiligheid/beveiliging
Spanish 2-Review words 2020-12-09
24 Clues: Sea • Trip • City • Lake • Ticket • Luggage • Customs • Illness • Security • To board • Currency • Souvenir • Suitcase • To Travel • Waterfall • Foreigner • To choose • To take off • Appropriate • Return Trip • To be located • To land(Plane) • To check luggage • Flight Attendant
Vocabulary 2024-08-30
23 Clues: meja • kursi • kantin • seragam • menyapa • upacara • bendera • berdiri • pengaman • istirahat • penghapus • dewan guru • papan tulis • perpustakaan • moda jejaring • siswa - siswi • teman sekelas • Kepala sekolah • mata pelajaran • tanpa jejaring • lapangan sekolah • putih(bahasa inggris) • Indonesia Raya is our....song
seri28 2024-06-20
Across
- Martial arts
- Security expert
- WWII Marines
- Apocalyptic angels
- Mysterious children
- Corrupt cops
- Bounty hunter
- Family drama
- Friendly alien
Down
- Virus outbreak
- Legalized crime
- Workplace comedy
- Texas family saga
- Good vs Evil
- French heroes
- Amnesiac spy
- Israeli espionage
- Crime drama
- Magical university
- Multidimensional mystery
20 Clues: Crime drama • Martial arts • WWII Marines • Good vs Evil • Amnesiac spy • Corrupt cops • Family drama • French heroes • Bounty hunter • Virus outbreak • Friendly alien • Legalized crime • Security expert • Workplace comedy • Texas family saga • Israeli espionage • Apocalyptic angels • Magical university • Mysterious children • Multidimensional mystery
27 2023-04-26
28 Clues: gum • door • walk • boat • bomb • trick • hotel • train • candy • plane • image • energy • skiier • simple • turtle • to fly • to flip • baggage • airport • avocado • to fish • weather • security • suitcase • to board • PERCHANCE • waterbottle • clothing store
Viajeros 2025-02-07
31 Clues: boat • delay • pilot • today • seats • price • ontime • ticket • luggage • customs • landing • flights • takeoff • arrival • security • boarding • airplane • passport • travelers • available • departure • waitingroom • crewmembers • cancelation • reservation • luggageclaim • customagents • ticketwindow • boardingpass • onewayticket • flightattendant
Bright Sparks 2025-11-04
29 Clues: viha • vaara • maine • neuvot • päätös • energia • luottaa • nuoriso • esittää • varoitus • vähentää • tutkimus • järjestö • varmasti • kilpailu • masennus • järjestää • ratkaista • yksinäinen • riippuvuus • keskustelu • työskennellä • turvallisuus • itseluottamus • ahdistuneisuus • maahanmuuttaja • kehittää,parantaa • perustaa,muodostaa • kaupunginosa,naapurusto
aMAYzing Mayfield 2021-03-25
Office roles and position vocabulary 2024-12-09
『명덕고등학교 2학년』Crossword (Practice) ④ 2025-12-02
Know your IOF? 2013-02-19
Across
- not sympathy, but we will show ____ towards our client
- making sure that we notate all accounts
- for security of your account... The reason why before doing something
- Probing. What agents will ask to find a solution.
- Thank you for calling Telus! Have a great day!
- no slang words, follow hold protocols
- Verified BAN and calling from about matched
- Actions that will need to be done by customer or agent after initial call
Down
- Sales Transition, avoid the risk of churn
- Show ownership
- going above and beyond
- Email verification, process order correctly, notes in Order Entry
- interaction will not generate unnecessary callback
- Dead air,paraphrasing
- promoting Telus.com, make payments on the IVR, check your balance
- summary of accepted or not accepted offer
- Extending yourself, summary of completed actions
17 Clues: Show ownership • Dead air,paraphrasing • going above and beyond • no slang words, follow hold protocols • making sure that we notate all accounts • Sales Transition, avoid the risk of churn • summary of accepted or not accepted offer • Verified BAN and calling from about matched • Thank you for calling Telus! Have a great day! • ...
vocab 2022-02-16
Across
- bank you make money off of accounts
- form of currency
- people that manage credit
- you write money out to people on it
- used if you want to pay later
- manage accounts of loans and savings
- put money in a bank account
- protection of something
- guarantee from bank that you will pay the money back on time
Down
- to move money somewhere else
- bank account if you plan to spend
- lets you borrow money when you need it
- institute you can't deposity money into
- where security is
- bank account if you plan to save
- a unit of value
- let you buy without carrying cash
17 Clues: a unit of value • form of currency • where security is • protection of something • people that manage credit • put money in a bank account • to move money somewhere else • used if you want to pay later • bank account if you plan to save • bank account if you plan to spend • let you buy without carrying cash • bank you make money off of accounts • you write money out to people on it • ...
IFF 2025-04-10
Across
- AML _________ Testing
- National _________ program
- ____ supervision
- FINRA’s premier annual innovation event
- Membership _____ program
- National _____ and financial crimes
- Occurs where a party enters a series of sell or buy orders, then executes a trade on the opposite side and cancels all, or most, previously placed orders.
Down
- FINRA learning and development system
- System to book flights/train/hotel
- Policies, procedures, and ______
- FINRA Values: collaboration, innovation, responsibility, ______
- Together we protect investors and ensure market ________
- Involves a pattern of entering multiple orders at various price levels on the buy or sell side of the markets. The layered orders may be entered with the intention of creating a false or misleading appearance of volume in the order book.
- Cyber and ________ Unit
- Left of
- Robert ________
- System to book cubicle/office
17 Clues: Left of • Robert ________ • ____ supervision • AML _________ Testing • Cyber and ________ Unit • Membership _____ program • National _________ program • System to book cubicle/office • Policies, procedures, and ______ • System to book flights/train/hotel • National _____ and financial crimes • FINRA learning and development system • FINRA’s premier annual innovation event • ...
Antivirus and Firewalls 2024-10-04
Across
- A unique string of data or code that identifies a specific virus. Antivirus software uses these signatures to recognize and eliminate known malware by scanning files.
- A program designed to detect, prevent, and remove malware (including viruses, worms, and trojans) from computers and networks.
- The process of inspecting data packets during transmission and allowing or blocking them based on security rules. Firewalls use this to prevent unauthorized access and protect against threats.
- A security application that monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between trusted and untrusted networks.
- The practices and technologies used to protect networks from unauthorized access, misuse, or attacks, significantly enhanced by antivirus and firewall software.
Down
- A network security technology that monitors network traffic for suspicious activity and potential threats, alerting administrators to possible security breaches.
- A method employed by antivirus software to detect unknown viruses by analyzing the behavior and characteristics of suspicious files, aiding in identifying new or modified malware.
- Malicious software designed to harm, exploit, or otherwise compromise computer systems and networks, including viruses, worms, trojans, and spyware.
- Data packets leaving a network; rules can allow or block traffic based on destination addresses.
- Data packets entering a network; rules can restrict access based on specific ports or IP addresses.
10 Clues: Data packets leaving a network; rules can allow or block traffic based on destination addresses. • Data packets entering a network; rules can restrict access based on specific ports or IP addresses. • A program designed to detect, prevent, and remove malware (including viruses, worms, and trojans) from computers and networks. • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
Current Events 2024-06-11
Across
- Place where Olympic rings have been mounted.
- Vehicle stolen by a 12-year-old.
- The kind of dinosaur that was recently found.
- City which hosts this year's Olympics.
- What has the UN Security Council adopted?
- Event where people were injured in the US.
- The month that Olympics will start.
- Kind of animal that jumped a fence.
- _____ and White terraces were destroyed by the eruption of Tarawera.
Down
- Location of a very expensive house.
- How a jet stream is being described.
- How old was the boy who stole the Ute?
- Name of the volcano that erupted in 1886.
- UN ________ Council.
- North and South _______ aren't mates.
- Number of million a mansion is expected to get.
- Bones of what animal were found in North Dakota.
- Things being sent between the two Koreas.
18 Clues: UN ________ Council. • Vehicle stolen by a 12-year-old. • Location of a very expensive house. • The month that Olympics will start. • Kind of animal that jumped a fence. • How a jet stream is being described. • North and South _______ aren't mates. • How old was the boy who stole the Ute? • City which hosts this year's Olympics. • Name of the volcano that erupted in 1886. • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
Alex- bullying 2022-03-08
Across
- Rider got mad and yelled at everyone for the first time
- Jake was leaving Hayden out of the friend group chat
- of power mike and Josiah are the same height so its a fair fight
- Alex and Austin were roasting each other an laughing
- Mike and Dustin always gets in fights
- Alex was calling rider names
- Kevin told max that he's stupid
- mike told everyone but Kyle about his birthday
Down
- someone was trying to pretend to be Obama
- jimmy pushed mike down the stairs
- mike was saying rumors about Dustin
- Eli made Ale tell a very big secret
- Alex trips Hunter in the hall everyday
13 Clues: Alex was calling rider names • Kevin told max that he's stupid • jimmy pushed mike down the stairs • mike was saying rumors about Dustin • Eli made Ale tell a very big secret • Mike and Dustin always gets in fights • Alex trips Hunter in the hall everyday • someone was trying to pretend to be Obama • mike told everyone but Kyle about his birthday • ...
unit 3 2022-04-21
18 Clues: vám • kapu • talán • késik • jóslat • utasok • rémálom • tetőterasz • konferencia • érkezési kapuk • indulási kapuk • átvesz, befogad • csomagkiadó (2 szó) • beszáll a repülőgépbe • biztonsági ellenörzés • csatlakozó járat (2 szó) • megbeszél egy nappot (3 szó) • agresszív közúti magatartás (2 szó)
Cyber Bullying Cross Word Puzzle 2025-05-02
Across
- A green logo support service
- A platform where you can send snap to your friends
- You should tell a trusted..
- A support service that has the number '1800 55 1800'
- When someone sends you mean messages online - it is..
Down
- Bullying can impact your..
- A cyber safety (cyberbullying) website under the Australian Government
- When you want to report, you should collect..
- A purple and yellow platform - where you can post photos
9 Clues: Bullying can impact your.. • You should tell a trusted.. • A green logo support service • When you want to report, you should collect.. • A platform where you can send snap to your friends • A support service that has the number '1800 55 1800' • When someone sends you mean messages online - it is.. • A purple and yellow platform - where you can post photos • ...
Science and Technology 2025-02-11
Across
- A computer-generated simulation of a three-dimensional environment
- The application of scientific knowledge for practical purposes
- The branch of technology dealing with robots
- Related to genes and heredity
- Avoiding depletion of natural resources for long-term balance
Down
- Information processed or stored by a computer (
- The use of technology to complete tasks with minimal human input
- Protection against cyber threats and attacks
- A new idea or method
9 Clues: A new idea or method • Related to genes and heredity • Protection against cyber threats and attacks • The branch of technology dealing with robots • Information processed or stored by a computer ( • Avoiding depletion of natural resources for long-term balance • The application of scientific knowledge for practical purposes • ...
