cyber security Crossword Puzzles

Jobs Are Here 2015-04-27

Jobs Are Here crossword puzzle
Across
  1. Healty
  2. Cook
  3. Farm
  4. Game
  5. Justice
  6. Electricity
  7. Mrs Doctor
Down
  1. Security
  2. Fire
  3. Good Sound
  4. School
  5. Mystery - Murder
  6. Draw - Paint
  7. Find Precious Stones

14 Clues: CookFireFarmGameHealtySchoolJusticeSecurityGood SoundMrs DoctorElectricityDraw - PaintMystery - MurderFind Precious Stones

chapter 5 2022-10-24

chapter 5 crossword puzzle
Across
  1. principles of policing
  2. bureau
  3. security
  4. marshals
  5. watch system
  6. peels
  7. patrol model
Down
  1. services
  2. system
  3. Vollmer
  4. Police Model
  5. Policing
  6. reeve
  7. enforcement administration

14 Clues: reevepeelsbureausystemVollmerservicessecuritymarshalsPolicingPolice Modelwatch systempatrol modelprinciples of policingenforcement administration

ELSABET CROSS WORD QUESTI 2025-03-06

ELSABET CROSS WORD QUESTI crossword puzzle
Across
  1. computing is a networking model in which data, applications, and processing power are managed by servers on the Internet
  2. - Refers to cloud functions that process data in some way. This typically refers primarily to running VMs or applications in the cloud, and can also refer to developer tools used to create, test, and deploy applications.
  3. – Cloud services can be designed to auto-scale in order to avoid capacity-related problems. If this auto-scaling is not adjusting to current demands, you might need to adjust the related configurations or check for security issues that might be causing unexpected problems.
  4. vNICs(virtual NICs Virtual switch(vSwitch),Common networking modes
  5. – The ISP might be down. Other problems can originate from your local network hardware, or from endpoint configurations. Or you might have dedicated connections to a public exchange, and your connectivity is suffering from a routing misconfiguration
  6. also called “hosted infrastructure”, it allows a company to use storage or entire virtual servers
Down
  1. Compute,Storage,Network,Security
  2. reduced physical plant costs, reduced upfront costs, reduced personnel costs (employment)
  3. AWS (aws.amazon.com),Oracle Cloud (cloud.oracle.com),Microsoft Azure (azure.microsoft.com)
  4. – Slow or delayed connectivity. Latency is often caused by poor routing, insufficient bandwidth, or a bottleneck. Latency might be the ISP’s responsibility, or you might need to upgrade your service with either your ISP or your CSP.
  5. Usually offered as a subscription based on the number of users
  6. – Cloud computing brings its own set of security vulnerabilities. When troubleshooting cloud services, you’ll need to become familiar with the unique indicators of cloud-based security issues.

12 Clues: Compute,Storage,Network,SecurityUsually offered as a subscription based on the number of usersvNICs(virtual NICs Virtual switch(vSwitch),Common networking modesreduced physical plant costs, reduced upfront costs, reduced personnel costs (employment)AWS (aws.amazon.com),Oracle Cloud (cloud.oracle.com),Microsoft Azure (azure.microsoft.com)...

Your Local Crossword 2023-10-17

Your Local Crossword crossword puzzle
Across
  1. A place to keep valuables secure.
  2. They shield your eyes from the bright sun.
  3. Provides security for doors and gates.
  4. Ensures safety at the swimming pool.
  5. A cool spot to escape the direct sunlight.
  6. Sounds a warning if there's a threat.
  7. Protects your skin from harmful UV rays.
  8. Waters the lawn on a hot summer day.
Down
  1. Measures the temperature of the air.
  2. Provides shade over windows or patios.
  3. A professional who deals with security.
  4. Used to water plants during hot spells.
  5. Helps circulate air and keep things cool.
  6. Cools down a room on a scorching day.
  7. Used for cooking outdoors in summer.
  8. Staying well ___ is important in hot weather.
  9. Keeps beverages cold during picnics.
  10. A popular way to cool off in summer.

18 Clues: A place to keep valuables secure.Measures the temperature of the air.Used for cooking outdoors in summer.Ensures safety at the swimming pool.Keeps beverages cold during picnics.Waters the lawn on a hot summer day.A popular way to cool off in summer.Cools down a room on a scorching day.Sounds a warning if there's a threat....

Katrina Webber 2020-01-28

Katrina Webber crossword puzzle
Across
  1. Talking/interacting with people online
  2. Your usage of the internet
  3. Buying and selling online
  4. Enables users to share content online
  5. Computer network that provides information communication to users
Down
  1. Beginning connected to another computer or network
  2. Full electronic participation in society.
  3. The usage of technology
  4. The security level of personal things posted to the internet
  5. The safety of users against security risks
  6. Portable electronic device
  7. Rumors spread on the internet by unreliable sources

12 Clues: The usage of technologyBuying and selling onlineYour usage of the internetPortable electronic deviceEnables users to share content onlineTalking/interacting with people onlineFull electronic participation in society.The safety of users against security risksBeginning connected to another computer or network...

Lesson 1: Introduction to Java 2016-04-24

Lesson 1: Introduction to Java crossword puzzle
Across
  1. For small and memory-constrained devices is ___ Edition
  2. For large-scale is ___ Edition
  3. Responsible for security is called ___ Manager
  4. A simple, general purpose, object-oriented language.
  5. Portable applications for desktop is ___ Edition
  6. A software for developing, editing, compiling, building, and debugging
Down
  1. Java was developed by
  2. The first line of defense is ___ verifier
  3. Once Run Anywhere
  4. Responsible for loading the classes into the interpreter is called ___ Loader
  5. Java was developed at ___ Microsystems
  6. It contains JVM

12 Clues: It contains JVMOnce Run AnywhereJava was developed byFor large-scale is ___ EditionJava was developed at ___ MicrosystemsThe first line of defense is ___ verifierResponsible for security is called ___ ManagerPortable applications for desktop is ___ EditionA simple, general purpose, object-oriented language....

Medical-Legal Partnership 2025-10-31

Medical-Legal Partnership crossword puzzle
Across
  1. Abbreviation for Supplemental Security Income
  2. Legal end of a marriage
  3. Money or help from a program or job
  4. Legal document that distributes property after death
  5. A person over the age of 18
  6. Legal right to care for a child
  7. A person who inherits
Down
  1. A choice you make about your life
  2. Money you receive
  3. Disability insurance program by Social Security
  4. Person who helps with legal problems
  5. Person chosen to make decisions for someone who can’t

12 Clues: Money you receiveA person who inheritsLegal end of a marriageA person over the age of 18Legal right to care for a childA choice you make about your lifeMoney or help from a program or jobPerson who helps with legal problemsAbbreviation for Supplemental Security IncomeDisability insurance program by Social Security...

¡Vamos de viaje! 2022-10-24

¡Vamos de viaje! crossword puzzle
Across
  1. screen
  2. suitcase
  3. to go through security
  4. to pack a suitcase
  5. to get in line
  6. to go on vacation
  7. airport
  8. ticket
Down
  1. itinerary
  2. flight
  3. travel agency
  4. identification
  5. travel
  6. departure
  7. luggage
  8. to board
  9. gate
  10. passport

18 Clues: gateflightscreentravelticketluggageairportsuitcaseto boardpassportitinerarydeparturetravel agencyidentificationto get in lineto go on vacationto pack a suitcaseto go through security

Vocabulary 2022-11-08

Vocabulary crossword puzzle
Across
  1. Financial gain
  2. Means of transport
  3. Service/set-up
  4. Request
  5. Task
  6. Financial plan
  7. Costs
  8. Buy
  9. Bill
  10. Guarantee
  11. Rental agreement
Down
  1. Work table/checkout
  2. Boss
  3. Trader/merchant
  4. Network security device
  5. Close observation
  6. Down payment
  7. Trainee

18 Clues: BuyBossTaskBillCostsRequestTraineeGuaranteeDown paymentFinancial gainService/set-upFinancial planTrader/merchantRental agreementClose observationMeans of transportWork table/checkoutNetwork security device

Vocabulary #3 2024-09-19

Vocabulary #3 crossword puzzle
Across
  1. a person tending to work with energy.
  2. a system of interconected people.
  3. data held in a computer.
  4. the act of of converting waste into reusable material.
  5. my house has a security ________
  6. something that gets your attention and is apealing to you.
  7. a formal request to an authority.
  8. Our teacher gave us an _________ from the office.
Down
  1. a loud cry or call.
  2. a form you fill with a complain about the service.
  3. slightly irritated or angry.
  4. a firm decision
  5. a piece of equipment for a specific task.
  6. the singer forgot her ________ now no one can hear her voice.
  7. the teacher tried to __________ us to recycle.

15 Clues: a firm decisiona loud cry or call.data held in a computer.slightly irritated or angry.my house has a security ________a system of interconected people.a formal request to an authority.a person tending to work with energy.a piece of equipment for a specific task.the teacher tried to __________ us to recycle....

JOBS 2023-09-18

JOBS crossword puzzle
Across
  1. 6
  2. 8
  3. 12
  4. 3
  5. 5
Down
  1. 1
  2. 10
  3. 2
  4. 9
  5. 11
  6. 7
  7. 4

12 Clues: 129678435101112

Paula M2u2 2016-04-21

Paula M2u2 crossword puzzle
Across
  1. a person who helps you when you're ill.
  2. a certain person in a play ch...
  3. someone whose job is to keep an eye on something (e.g. in a museum)
  4. something you have to know is ….
  5. two people who have something together e.g. They … go to school at .
  6. when you haven’t eaten enough, you are … hungry
  7. when someone posesses something it … to him/her (3rd person!).
  8. English word for “Boden“.
  9. a precious stone.
  10. a chair where you can sit during a concert.
  11. a small bag where you put your money in.
Down
  1. = when you clean the plates
  2. when someone tells you that you have to do something, s/he gives you a c...
  3. the English word for “security”
  4. tells you the position of a house.
  5. a thing that nobody should know.
  6. a machine you can fly with.
  7. opposite of dirty.
  8. another word for big.
  9. English word for “lösen“.

20 Clues: a precious stone.opposite of dirty.another word for big.English word for “Boden“.English word for “lösen“.= when you clean the platesa machine you can fly with.the English word for “security”a certain person in a play ch...something you have to know is ….a thing that nobody should know.tells you the position of a house....

travel vocab 2020-04-10

travel vocab crossword puzzle
Across
  1. seat belt
  2. luggage
  3. ticket window
  4. flight attendant
  5. second class
  6. departure
  7. passenger
  8. enter a country
  9. to miss a flight/train
  10. bunk
  11. train stop
  12. to see
  13. to turn
  14. arrival
  15. car wagon
  16. gate
  17. to go through security
  18. controller
  19. to take off
  20. to land
  21. visa
  22. in the train station
  23. to get/obtain
  24. flight connection
  25. delayed
  26. coach (plane)
  27. in the airport
  28. boarding pass
  29. event ticket
Down
  1. passport
  2. carry-on
  3. aisle
  4. platform
  5. suitcase
  6. layover
  7. luggage scan
  8. sleeping car
  9. baggage claim
  10. security agent
  11. seat
  12. ticket
  13. on time
  14. international airport
  15. to check luggage
  16. counter check-in
  17. travel
  18. first class
  19. ticket
  20. to hope
  21. flight
  22. to go straight
  23. window
  24. waiting room
  25. to give
  26. to board

55 Clues: seatbunkgatevisaaisleticketto seetravelticketflightwindowluggagelayoveron timeto turnarrivalto hopeto landto givedelayedpassportcarry-onplatformsuitcaseto boardseat beltdeparturepassengercar wagontrain stopcontrollerfirst classto take offluggage scansleeping carsecond classwaiting roomevent ticketticket windowbaggage claimto get/obtaincoach (plane)...

Investing Vocabulary 2023-12-11

Investing Vocabulary crossword puzzle
Across
  1. Where shares are bought & sold
  2. Degree of Uncertainty
  3. A low fee portfolio of Stocks
  4. Annual interest payment on a bond
  5. putting your money into assets
  6. Index of 500 companies
  7. Risk free investment
  8. World's largest stock
  9. Increased stock trading & rising stock prices
Down
  1. Prices are falling, Encouraging selling
  2. The practice of investing in a large variety of stocks
  3. A retirement account
  4. Collections of financial investments
  5. A financial asset that can be bought and sold in a financial market
  6. Reward Paid to the Shareholders
  7. Rate of Increase prices over a period of time
  8. Federal program that provides monthly benefits to millions of Americans
  9. A share of value of a company, which can be bought,sold, or traded as an investment & which gives the investor small partial ownership of the company
  10. A security in which the investor loans money to a company or government
  11. Second largest stock

20 Clues: A retirement accountRisk free investmentSecond largest stockDegree of UncertaintyWorld's largest stockIndex of 500 companiesA low fee portfolio of StocksWhere shares are bought & soldputting your money into assetsReward Paid to the ShareholdersAnnual interest payment on a bondCollections of financial investments...

RU ITEC411 Chapter 5 2023-11-29

RU ITEC411 Chapter 5 crossword puzzle
Across
  1. bug that exploited a weakness in OpenSSL
  2. accessing systems that you are not authorized to access
  3. use of voice print of fingerprint
  4. a route that skips regular security in software
  5. malicious software that can change and wreak havoc on your system
  6. malware that locks users out of the system via encryption
  7. email scams
  8. the James Bond of malware
  9. malicious software that disguises itself
  10. devices that use rfid to capture data
  11. fake website scam
Down
  1. is not a joke Jim
  2. worm that attacked Iran's nuclear centrifuges
  3. hacking for a cause
  4. acronym, attack that slows down a server with requests
  5. beginnings of the internet
  6. country that was targeted by Russia and attacked its power grid
  7. an amalgamation of malicious devices that creates zombies
  8. scrambling code to make it unreadable for security
  9. one of its kind was named Conficker

20 Clues: email scamsis not a joke Jimfake website scamhacking for a causethe James Bond of malwarebeginnings of the internetuse of voice print of fingerprintone of its kind was named Confickerdevices that use rfid to capture databug that exploited a weakness in OpenSSLmalicious software that disguises itselfworm that attacked Iran's nuclear centrifuges...

CTF-CW-3S 2025-11-17

CTF-CW-3S crossword puzzle
Across
  1. Granting users permission to resources
  2. Network security system for filtering traffic
  3. Internal Tekion tool for catching secret leaks in source code repositories.
  4. Separating affected systems during security event
  5. Visual map showing how personal information moves through systems
  6. Step-by-step plan for responding to threat scenarios
  7. Testing how well controls perform
  8. Step to limit damage during an event
  9. Science of investigating digital evidence
Down
  1. Organized written information
  2. Source code and CI/CD home for Tekion software teams.
  3. Weakness that can be exploited in a system
  4. Temporary interaction between user and system
  5. Transparent communication about data collection and processing
  6. Goal a control is designed to achieve
  7. Strengthening defenses of computers or networks
  8. Static code scanner in Tekion development workflows.
  9. Manager for data integrity and compliance
  10. European Union's comprehensive data protection regulation
  11. Rules governing how long personal data can be stored

20 Clues: Organized written informationTesting how well controls performStep to limit damage during an eventGoal a control is designed to achieveGranting users permission to resourcesManager for data integrity and complianceScience of investigating digital evidenceWeakness that can be exploited in a systemTemporary interaction between user and system...

Indian contact act 1872 2025-11-30

Indian contact act 1872 crossword puzzle
Across
  1. created by contract.
  2. condition to validate agreement.
  3. of rescinding a contract.
  4. contract made without free consent is
  5. who makes an offer.
  6. proposal made by one party to another.
  7. essential to contract purpose.
  8. or security on goods.
  9. for breach of contract.
  10. in exchange for a promise.
  11. who sells goods.
Down
  1. that becomes void later.
  2. false statement that induces a contract.
  3. DAMAGES,Liability for late delivery of goods.
  4. must be to be valid.
  5. who buys goods.
  6. paid in advance as security.
  7. GOODS,Goods not specific at contract time.
  8. of ownership.
  9. enforceable by law.
  10. GOODS,Goods manufactured or acquired after agreement
  11. TO SELL,Contract in which goods are delivered later.
  12. GOODS,Goods identified at the time of making the contract.
  13. by buyer to seller.

24 Clues: of ownership.who buys goods.who sells goods.enforceable by law.who makes an offer.by buyer to seller.created by contract.must be to be valid.or security on goods.for breach of contract.that becomes void later.of rescinding a contract.in exchange for a promise.paid in advance as security.essential to contract purpose.condition to validate agreement....

Investing-Taylor McNicol 2026-03-20

Investing-Taylor McNicol crossword puzzle
Across
  1. the ease that an asset can be converted to cash
  2. Stock prices are generally going down
  3. we love
  4. when a company shares parts of its products
  5. A place people can buy sell pieces of company to make money
  6. contributions are made post tax
  7. currencies are created and backed by the government
  8. the total value of a companies stock
  9. pension plans are managed by….
Down
  1. fica is social security and ____ taxes combined
  2. How much of a company you can own
  3. Crypto is considered this
  4. contributions are made pre tax
  5. Stock prices are generally going up
  6. loan given to a company or government
  7. a virtual currency which gains value based on community involvement
  8. can we count on social security (yes or no)
  9. Initial Public Offering
  10. when you leave a job you can have your 401K plan…
  11. exchange traded funds

20 Clues: we loveexchange traded fundsInitial Public OfferingCrypto is considered thiscontributions are made pre taxpension plans are managed by….contributions are made post taxHow much of a company you can ownStock prices are generally going upthe total value of a companies stockStock prices are generally going downloan given to a company or government...

Unit 4 Crossword puzzle 2023-02-06

Unit 4 Crossword puzzle crossword puzzle
Across
  1. asemalaituri
  2. saapua
  3. tuhota
  4. tähän asti
  5. välittömästi
  6. tarpeellinen
  7. uupunut
Down
  1. satama
  2. portti
  3. läpi
  4. turvatarkastus
  5. teltta
  6. poistaa
  7. lähteä
  8. ilmoittautua

15 Clues: läpisatamaporttisaapuatuhotatelttalähteäpoistaauupunuttähän astiasemalaiturivälittömästitarpeellinenilmoittautuaturvatarkastus

Unit 11 2026-03-16

Unit 11 crossword puzzle
Across
  1. to assign or arrange
  2. proceed
  3. gps
  4. partner
  5. snuggle
  6. to choose carefully
  7. make certain
  8. sour
Down
  1. successfully
  2. urgent request
  3. sudden arrival
  4. importance
  5. lifelike
  6. unreasonable
  7. protection

15 Clues: gpssourproceedpartnersnugglelifelikeimportanceprotectionsuccessfullyunreasonablemake certainurgent requestsudden arrivalto choose carefullyto assign or arrange

Valpak – November 2023 2023-10-20

Valpak – November 2023 crossword puzzle
Across
  1. What sport is played on Thanksgiving?
  2. This online shopping day occurs on ____ Monday
  3. A Thanksgiving side dish made from bread
  4. Sweet potato casserole is topped with this fluffy, sweet treat
  5. The centerpiece of the classic Thanksgiving meal
  6. Festive event held in New York City every Thanksgiving
Down
  1. A sauce often put on mashed potatoes, turkey and stuffing
  2. A common Thanksgiving decoration
  3. Black _____ is the busiest shopping day of the year
  4. Popular Black Friday shopping destination
  5. This Thanksgiving-themed dish is made from green beans
  6. First President credited with proclaiming Thanksgiving a National holiday
  7. Synonym for sweet potatoes
  8. Thanksgiving pie with a flaky crust

14 Clues: Synonym for sweet potatoesA common Thanksgiving decorationThanksgiving pie with a flaky crustWhat sport is played on Thanksgiving?A Thanksgiving side dish made from breadPopular Black Friday shopping destinationThis online shopping day occurs on ____ MondayThe centerpiece of the classic Thanksgiving meal...

Bullying Crossword Puzzle 2025-03-11

Bullying Crossword Puzzle crossword puzzle
Across
  1. type of bullying that happens online
  2. does something to help the target
  3. type of bullying that involves putting hands on each other
  4. sees bullying happen and does not tell anyone
  5. something you can be when someone is being bullied
  6. type of bullying that involves rumors and gossip
  7. changing the conversation
Down
  1. person who is bullied
  2. intentional, unwanted, aggressive behavior that causes severe harm
  3. telling an adult about bullying
  4. something you can do to solve the problem
  5. person who bullies others
  6. type of bullying that involves a characteristic about someone that they cannot change
  7. an argument between two connected people

14 Clues: person who is bulliedperson who bullies otherschanging the conversationtelling an adult about bullyingdoes something to help the targettype of bullying that happens onlinean argument between two connected peoplesomething you can do to solve the problemsees bullying happen and does not tell anyonetype of bullying that involves rumors and gossip...

worlsa 2025-01-13

worlsa crossword puzzle
Across
  1. Security
  2. Food
  3. Justice
  4. Dignity
Down
  1. Civil Rights
  2. Employment
  3. Education

7 Clues: FoodJusticeDignitySecurityEducationEmploymentCivil Rights

Income Taxes 2022-02-08

Income Taxes crossword puzzle
Across
  1. a child or other person who lives in the home
  2. another name for social security tax
  3. used to provide for retired or disabled
  4. income amount after adjustments are taken out
  5. used to provide medical benefits for elderly
  6. short for Social Security Number
  7. amounts deducted from the adjusted gross income to determine the taxable income
  8. federal withholdings tax
  9. short for Employer Identification Number
  10. the organization that taxes are paid to.
Down
  1. document given for other income (e.g. contractors)
  2. the month that income taxes are due.
  3. document showing ones income from an employer
  4. short for Earned income credit
  5. requesting more time to pay taxes.
  6. the amount of money owned to the government
  7. income from work, shown on W2
  8. document used to file for income tax Return

18 Clues: federal withholdings taxincome from work, shown on W2short for Earned income creditshort for Social Security Numberrequesting more time to pay taxes.the month that income taxes are due.another name for social security taxused to provide for retired or disabledshort for Employer Identification Numberthe organization that taxes are paid to....

US GOV UNIT #7 2023-10-21

US GOV UNIT #7 crossword puzzle
Across
  1. In charge of US transportation
  2. Domestic Intelligence and Security Agency
  3. US Justice Department
  4. Predicts the weather and natural disasters
  5. Oversees agriculture in America
Down
  1. In charge of defending national security
  2. Oversees food safety
  3. Combination of all the leaders of each US military branch
  4. Oversees national involvement in space
  5. Oversees United States mail

10 Clues: Oversees food safetyUS Justice DepartmentOversees United States mailIn charge of US transportationOversees agriculture in AmericaOversees national involvement in spaceIn charge of defending national securityDomestic Intelligence and Security AgencyPredicts the weather and natural disastersCombination of all the leaders of each US military branch

SN43004FP Chapter 4.2 2022-10-19

SN43004FP Chapter 4.2 crossword puzzle
Across
  1. A tested set of hotfixes, security updates and critical updates
  2. Enable software programs to be updated automatically
Down
  1. Microsoft service which automates downloading and installing software updates
  2. Update fix for a problem addressing a critical, non security related bug
  3. Update fix for a product-specific security-related vulnerability
  4. Service which provides management and distribution of updates
  5. Software to fix problems or update the operating system

7 Clues: Enable software programs to be updated automaticallySoftware to fix problems or update the operating systemService which provides management and distribution of updatesA tested set of hotfixes, security updates and critical updatesUpdate fix for a product-specific security-related vulnerability...

worlsa 2025-01-13

worlsa crossword puzzle
Across
  1. Food
  2. Justice
  3. Education
  4. Dignity
Down
  1. Employment
  2. Rights Civil Rights
  3. Security

7 Clues: FoodJusticeDignitySecurityEducationEmploymentRights Civil Rights

Private and public places 2024-05-03

Private and public places crossword puzzle
Across
  1. synonym for "illness"
  2. The English for "promouvoir"
  3. The English for "dossier médical"
  4. the English for "médicament"
  5. the identification of the nature of an illness
  6. when confidential information is exposed
  7. The English for "mettre en place"
  8. The English for un "scientifique"
  9. synonym for "revolutionary"
Down
  1. It is a thread-like structure made up of DNA
  2. cause someone to be vulnerable or at risk; endanger
  3. Stealing of information through unauthorized access to computer systems.
  4. The English for "recherche"
  5. the English for "avancé, sophistiqué"
  6. the abbreviation for Artifical Intelligence
  7. a self-replicating material that is present in nearly all living organisms as the main constituent of chromosomes
  8. a secondary and undesirable effect of medical treatment.
  9. a sudden and important discovery

18 Clues: synonym for "illness"The English for "recherche"synonym for "revolutionary"The English for "promouvoir"the English for "médicament"a sudden and important discoveryThe English for "dossier médical"The English for "mettre en place"The English for un "scientifique"the English for "avancé, sophistiqué"when confidential information is exposed...

Crowd Control 2022-12-09

Crowd Control crossword puzzle
Across
  1. Hostile crowd
  2. Avoid unnecessary conversation and maintain a ____ demeanor
  3. Mass ____ which usually involves hundreds or thousands of people
  4. Security officers must protect life and ____
  5. ____ Disputes can be a complex issue while balancing right
  6. the systematic planning for and supervision of and assembly of people
  7. The restriction or limitation of group behavior and movement
  8. Security Officers must not be ____
Down
  1. Crowd with no organization of unified purpose
  2. Civil ____ is usually nonviolent but use tactics that can get them arrested
  3. The First Amendment does not protect against ____ behavior
  4. Always remain ____
  5. Always provide clear and concise ____
  6. Labor Disputes involve ____ lines
  7. Uncontrolled and violent disturbance of the public

15 Clues: Hostile crowdAlways remain ____Labor Disputes involve ____ linesSecurity Officers must not be ____Always provide clear and concise ____Security officers must protect life and ____Crowd with no organization of unified purposeUncontrolled and violent disturbance of the publicThe First Amendment does not protect against ____ behavior...

Security Meeting Q4 - 2021 2021-12-08

Security Meeting Q4 - 2021 crossword puzzle
Across
  1. Overnight cash limit
  2. The color of our robbery folder
  3. 877-511-9797
  4. A device designed to explode in order to injure or kill people or to destroy property
  5. The two things you should always lock before stepping away from your station
  6. Our SECOND evacuation location
  7. You should call this number in an emergency
  8. a cybercrime that targets individuals by email, luring them into providing personal information such as banking information, credit card details, and passwords
  9. If time allows, search for suspicious items around the store after receiving a bomb threat
  10. Our FIRST evacuation location
Down
  1. These should stay with you at all times
  2. All confidential customer information should be ______ at night
  3. The folder is located behind ____
  4. Top drawer limit
  5. Working cash Limit
  6. The act of illegally printing, changing or reproducing a copy of a genuine currency to purposely deceive someone
  7. Our OSM
  8. Our shelter in place
  9. We test the alarm every ____

19 Clues: Our OSM877-511-9797Top drawer limitWorking cash LimitOvernight cash limitOur shelter in placeWe test the alarm every ____Our FIRST evacuation locationOur SECOND evacuation locationThe color of our robbery folderThe folder is located behind ____These should stay with you at all timesYou should call this number in an emergency...

Social security and relationships 2023-01-30

Social security and relationships crossword puzzle
Across
  1. kummipoika
  2. siskontytär
  3. lainsäädäntö
  4. jäädä eläkkeelle
  5. sukupolvi
  6. vamma
  7. syrjintä
  8. viranomaiset
Down
  1. kansallisuus
  2. päiväkoti
  3. äitipuoli
  4. avioero
  5. tulot
  6. kunta
  7. huoltaja
  8. maahanmuuttaja
  9. kansalainen
  10. alaikäinen
  11. puoliso

19 Clues: tulotkuntavammaavioeropuolisohuoltajasyrjintäpäiväkotiäitipuolisukupolvikummipoikaalaikäinensiskontytärkansalainenkansallisuuslainsäädäntöviranomaisetmaahanmuuttajajäädä eläkkeelle

Vamos De Viaje Vocab Quiz 2016-10-01

Vamos De Viaje Vocab Quiz crossword puzzle
Across
  1. gate
  2. screen
  3. bathing suit
  4. to go through security
  5. passenger
  6. to get in line
  7. airport
Down
  1. suitcase
  2. identification
  3. flight
  4. luggage
  5. to arive
  6. passport
  7. ticket
  8. departure

15 Clues: gatescreenflightticketluggageairportsuitcaseto arivepassportpassengerdeparturebathing suitidentificationto get in lineto go through security

Nehme 2026-03-25

Nehme crossword puzzle
Across
  1. to land
  2. The Hallway
  3. international
  4. flight
  5. Mask
  6. security
Down
  1. the takeoff
  2. compartment
  3. The track
  4. the service
  5. a delay
  6. Take off
  7. oxygen
  8. on time
  9. late

15 Clues: Masklateoxygenflightto landa delayon timeTake offsecurityThe trackthe takeoffcompartmentthe serviceThe Hallwayinternational

Christmas knowledge quiz 2021-12-12

Christmas knowledge quiz crossword puzzle
Across
  1. Whose Christmas advert features Kevin the Carrot?
  2. Whose slogan is "just do it"
  3. Whose slogan is "taste the rainbow"
  4. Which supermarket uses orange as its main colour
  5. Which city did the first Primark open in?
Down
  1. Whose slogan is "I'm lovin it"
  2. In retail which Monday falls after Black Friday?
  3. Which supermarket says "every little helps"?
  4. Whose Christmas advert talks about carving turkeys with lasers?
  5. Which supermarket was voted the cheapest in 2020?

10 Clues: Whose slogan is "just do it"Whose slogan is "I'm lovin it"Whose slogan is "taste the rainbow"Which city did the first Primark open in?Which supermarket says "every little helps"?In retail which Monday falls after Black Friday?Which supermarket uses orange as its main colourWhose Christmas advert features Kevin the Carrot?...

Cancer Control 2013-04-16

Cancer Control crossword puzzle
Across
  1. Can be affected by cancer, found in females
  2. Obesity, Age and Genetic Predisposition
  3. Health promotion strategy, tobacco
  4. Pain and suffering endured
  5. Can be affected by cancer, found in males
  6. Medical Treatment
  7. Lost productivity, social security payments and carers
Down
  1. SES, work, food security, stress
  2. Health promotion strategy, breast
  3. Tobacco smoking, alcohol consumption and exposure to sunlight and UV
  4. Health promotion strategy, sun

11 Clues: Medical TreatmentPain and suffering enduredHealth promotion strategy, sunSES, work, food security, stressHealth promotion strategy, breastHealth promotion strategy, tobaccoObesity, Age and Genetic PredispositionCan be affected by cancer, found in malesCan be affected by cancer, found in femalesLost productivity, social security payments and carers...

Department of Homeland Security 2013-12-08

Department of Homeland Security crossword puzzle
Across
  1. Former DHS Secretary
  2. DHS came into being because of this
  3. Screens flyers
  4. Beers Current DHS Secretary
  5. Helps boaters
  6. Computer area protected by DHS
  7. DHS oversees this when people come in and out of the country
  8. The area around the United States protected by DHS
  9. Highest threat level
  10. State helped by DHS after hurricane
Down
  1. Found in the center of the DHS seal
  2. The main DHS objective is...
  3. Way to identify travelers
  4. Ridge First DHS Secretary
  5. Protects president
  6. Major entry point protected by TSA
  7. State helped by DHS after hurricane
  8. You go through this when you enter the country
  9. Part of DHS that handles emergencies
  10. and Rita Two major hurricanes

20 Clues: Helps boatersScreens flyersProtects presidentFormer DHS SecretaryHighest threat levelWay to identify travelersRidge First DHS SecretaryBeers Current DHS SecretaryThe main DHS objective is...and Rita Two major hurricanesComputer area protected by DHSMajor entry point protected by TSAFound in the center of the DHS seal...

Chapter 9 Security Plus 2024-03-21

Chapter 9 Security Plus crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

Chapter 7 Security Plus 2024-03-11

Chapter 7 Security Plus crossword puzzle
Across
  1. Granting access that is limited
  2. Standard preconfigured passwords
  3. Single sign-on for networks owned by different organizations
  4. An access control scheme that is the most restrictive
  5. evidence or proof of something
  6. features and characteristics of the individual
  7. Removing user accounts
  8. Granting or denying approval to use specific resources
  9. The ability of systems to exchange information
Down
  1. Requiring the user to provide proof that they are the unique user.
  2. The point in time when a password is no longer valid
  3. allows secure web domains to exchange user authentication and authorization data
  4. enables users to access a network resource through a directory service
  5. An access control scheme that is the least restrictive
  6. Using more than one type of authentication credential
  7. Adding a random string to a hash algorithm for enhanced security
  8. A key pair “burned” into a security key
  9. small number of passwords used when trying several different user accounts
  10. provide control over user validation and the resources that may be accessed
  11. An open-source federation framework

20 Clues: Removing user accountsevidence or proof of somethingGranting access that is limitedStandard preconfigured passwordsAn open-source federation frameworkA key pair “burned” into a security keyfeatures and characteristics of the individualThe ability of systems to exchange informationThe point in time when a password is no longer valid...

ITF-Chapter4-KeyTerms 2019-12-10

ITF-Chapter4-KeyTerms crossword puzzle
Across
  1. A security concern regarding network devices, and other devices such a smartphones that give the option of using the device without a password.
  2. An early example of encryption used by Julius Caesar to send confidential military messages.
  3. Attempting to secretively discover private information about a person, company, or other entity.
  4. A development model that breaks down project activities into a series of sequential or linear phases, each phase depending on the deliverables from the previous phase.
  5. Regularly scheduled backups.
  6. TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
  7. Backups that are stored in the same building or even the same room as the computer systems they are taken from.
  8. Software that help remove unwanted, unsolicited email.
  9. The passive gathering of information about a potential victim.
  10. An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
  11. Works whose copyrights have expired and are free for anyone to reproduce, display, and make derivatives.
  12. The use of deception to gain personal and/or private information for unlawful purposes.
  13. The SDLC phase that involves studying existing information systems that are already in place and the requirements for new information systems.
  14. A device that contains one or more hard drives that users can access over the network.
  15. A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
  16. Unscheduled backups performed periodically.
  17. Data that are being transported from one device to another, whether by radio, electrical, or light signals.
  18. Any word, picture, or symbol that's used to distinguish a good from other similar goods.
  19. The study and design of a system by examining its components and their interactions.
  20. The ability to ensure that someone can't deny that they performed a certain act.
  21. The various forms of information systems including transaction processing, management, and expert systems.
  22. A development model that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design.
  23. An attribute used to classify information based on the risk of public disclosure.
  24. A scheme for classifying information based on different levels of public/private distinctions.
  25. The identification, evaluation, and prioritization of risks followed by activities that minimizes, monitors, and controls the impact of the risk.
  26. A device that controls the flow of network traffic to protect systems from unauthorized network connections.
  27. An activity that involves integrating various computing systems and software applications to function together as a whole.
  28. Exploiting a victim using email messages
  29. A project management process that divides a large or complex project into smaller, more manageable projects that can be completed as part of an incremental or iterative process.
  30. A reasonable belief that personal information collected by an information system is controlled and protected and not shared or used beyond its original intent.
  31. The practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time.
  32. A method of increasing fault tolerance by providing multiple network paths between hosts.
Down
  1. The SDLC phase that involves purchasing and installing new hardware and software, integrating the various system components, and testing the operation of the new system.
  2. The SDLC phase that involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project.
  3. A type of access control that restricts access based on the users role in an organization.
  4. An attempt to connect to a server by capturing and resending of authentication information.
  5. A method of increasing fault tolerance by providing power backups and power failover.
  6. Tricking a victim into revealing sensitive information under false pretenses.
  7. Convincing a victim that they are performing a legitimate task within their web browser window, when in fact they are being tricked into revealing sensitive information or installing malware on their computer
  8. A type of access control where a user has complete control over a resource, and also determines the permissions other users have those those resources.
  9. Anything that is owned by a copyright holder.
  10. A scheme for classifying information based on government and military requirements.
  11. combination of technology, people, and procedures used to organize, analyze, and store data.
  12. The SDLC phase that involves monitoring and evaluating the new information system.
  13. A methodology or framework that defines steps and tasks for developing and maintaining information systems.
  14. A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.
  15. Data in a persistent storage medium, such as a hard drive or optical disc.
  16. An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
  17. A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face or voice.
  18. Directions for disposing and even destroying data when it's no longer needed or when a storage device needs to be replaced.
  19. A type of authentication that requires the user to provide something that they know, such as a password or PIN.
  20. Authentication that requires two or more evidences of authentication, usually of different types.
  21. A type of authentication that requires the user to provide something that they have, such as a key, fob, electronic chip, or smart card.
  22. A method of authenticating with one system to gain access to other related systems.
  23. A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
  24. An attack where the an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
  25. A backup of the system software, including operating system files.
  26. Concerning security, a person responsible for securing networks and responding to intrusions.
  27. A backup of data stored in a database.
  28. The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
  29. Software that helps protect against malicious software infections.
  30. Protections granted by the federal government to creators, writers, and inventors regarding rights to reproduce, display, make derivatives, sell, rent, or lend a work.
  31. Software where anyone can inspect, enhance, and modify the source code.
  32. The SDLC phase that involves reviewing the system requirements document from the analysis phase and producing detailed specifications that cover all aspects of the system.
  33. A person who is in charge of designing and implementing security methods to protect an organization's computer systems and networks.
  34. Any software where the publisher retains intellectual property rights to the source code.
  35. A systematic process for determining and addressing needs, or "gaps" between current conditions, and desired conditions or "wants".
  36. The capturing and storing of computer and user events.
  37. Backups that are stored at a location far enough from a possible natural disaster, while being close enough to recover the data and systems within a reasonable amount of time.
  38. The process of turning data points into useful information.
  39. The crime of using someone else's intellectual property in a way that should be reserved for the copyright holder.
  40. An exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public.
  41. The process of keeping track of user activity while attached to a system.
  42. The buying and selling of products or services electronically, typically through the Internet.
  43. A license given by a government that provides inventors a temporary monopoly on their invention.
  44. A type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources. The security manager controls the security policy and users aren't able to override the policy.

76 Clues: Regularly scheduled backups.A backup of data stored in a database.Exploiting a victim using email messagesUnscheduled backups performed periodically.Anything that is owned by a copyright holder.Software that help remove unwanted, unsolicited email.The capturing and storing of computer and user events....

ITF-Capt4-1-keyterms 2019-12-05

ITF-Capt4-1-keyterms crossword puzzle
Across
  1. A security concern regarding network devices, and other devices such a smartphones that give the option of using the device without a password.
  2. An early example of encryption used by Julius Caesar to send confidential military messages.
  3. Attempting to secretively discover private information about a person, company, or other entity.
  4. A development model that breaks down project activities into a series of sequential or linear phases, each phase depending on the deliverables from the previous phase.
  5. Regularly scheduled backups.
  6. TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
  7. Backups that are stored in the same building or even the same room as the computer systems they are taken from.
  8. Software that help remove unwanted, unsolicited email.
  9. The passive gathering of information about a potential victim.
  10. An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
  11. Works whose copyrights have expired and are free for anyone to reproduce, display, and make derivatives.
  12. The use of deception to gain personal and/or private information for unlawful purposes.
  13. The SDLC phase that involves studying existing information systems that are already in place and the requirements for new information systems.
  14. A device that contains one or more hard drives that users can access over the network.
  15. A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
  16. Unscheduled backups performed periodically.
  17. Data that are being transported from one device to another, whether by radio, electrical, or light signals.
  18. Any word, picture, or symbol that's used to distinguish a good from other similar goods.
  19. The study and design of a system by examining its components and their interactions.
  20. The ability to ensure that someone can't deny that they performed a certain act.
  21. The various forms of information systems including transaction processing, management, and expert systems.
  22. A development model that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design.
  23. An attribute used to classify information based on the risk of public disclosure.
  24. A scheme for classifying information based on different levels of public/private distinctions.
  25. The identification, evaluation, and prioritization of risks followed by activities that minimizes, monitors, and controls the impact of the risk.
  26. A device that controls the flow of network traffic to protect systems from unauthorized network connections.
  27. An activity that involves integrating various computing systems and software applications to function together as a whole.
  28. Exploiting a victim using email messages
  29. A project management process that divides a large or complex project into smaller, more manageable projects that can be completed as part of an incremental or iterative process.
  30. A reasonable belief that personal information collected by an information system is controlled and protected and not shared or used beyond its original intent.
  31. The practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time.
  32. A method of increasing fault tolerance by providing multiple network paths between hosts.
Down
  1. The SDLC phase that involves purchasing and installing new hardware and software, integrating the various system components, and testing the operation of the new system.
  2. The SDLC phase that involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project.
  3. A type of access control that restricts access based on the users role in an organization.
  4. An attempt to connect to a server by capturing and resending of authentication information.
  5. A method of increasing fault tolerance by providing power backups and power failover.
  6. Tricking a victim into revealing sensitive information under false pretenses.
  7. Convincing a victim that they are performing a legitimate task within their web browser window, when in fact they are being tricked into revealing sensitive information or installing malware on their computer
  8. A type of access control where a user has complete control over a resource, and also determines the permissions other users have those those resources.
  9. Anything that is owned by a copyright holder.
  10. A scheme for classifying information based on government and military requirements.
  11. combination of technology, people, and procedures used to organize, analyze, and store data.
  12. The SDLC phase that involves monitoring and evaluating the new information system.
  13. A methodology or framework that defines steps and tasks for developing and maintaining information systems.
  14. A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.
  15. Data in a persistent storage medium, such as a hard drive or optical disc.
  16. An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
  17. A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face or voice.
  18. Directions for disposing and even destroying data when it's no longer needed or when a storage device needs to be replaced.
  19. A type of authentication that requires the user to provide something that they know, such as a password or PIN.
  20. Authentication that requires two or more evidences of authentication, usually of different types.
  21. A type of authentication that requires the user to provide something that they have, such as a key, fob, electronic chip, or smart card.
  22. A method of authenticating with one system to gain access to other related systems.
  23. A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
  24. An attack where the an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
  25. A backup of the system software, including operating system files.
  26. Concerning security, a person responsible for securing networks and responding to intrusions.
  27. A backup of data stored in a database.
  28. The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
  29. Software that helps protect against malicious software infections.
  30. Protections granted by the federal government to creators, writers, and inventors regarding rights to reproduce, display, make derivatives, sell, rent, or lend a work.
  31. Software where anyone can inspect, enhance, and modify the source code.
  32. The SDLC phase that involves reviewing the system requirements document from the analysis phase and producing detailed specifications that cover all aspects of the system.
  33. A person who is in charge of designing and implementing security methods to protect an organization's computer systems and networks.
  34. Any software where the publisher retains intellectual property rights to the source code.
  35. A systematic process for determining and addressing needs, or "gaps" between current conditions, and desired conditions or "wants".
  36. The capturing and storing of computer and user events.
  37. Backups that are stored at a location far enough from a possible natural disaster, while being close enough to recover the data and systems within a reasonable amount of time.
  38. The process of turning data points into useful information.
  39. The crime of using someone else's intellectual property in a way that should be reserved for the copyright holder.
  40. An exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public.
  41. The process of keeping track of user activity while attached to a system.
  42. The buying and selling of products or services electronically, typically through the Internet.
  43. A license given by a government that provides inventors a temporary monopoly on their invention.
  44. A type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources. The security manager controls the security policy and users aren't able to override the policy.

76 Clues: Regularly scheduled backups.A backup of data stored in a database.Exploiting a victim using email messagesUnscheduled backups performed periodically.Anything that is owned by a copyright holder.Software that help remove unwanted, unsolicited email.The capturing and storing of computer and user events....

Bullying Crossword 2013-06-17

Bullying Crossword crossword puzzle
Across
  1. This people are usually insecure teens
  2. Involves no physical contact but a lot of yelling
  3. A type of bullying that messes with the head
  4. Age the late middle age of their lives
  5. Someone who is not necessarily being the bully but is seeing it
Down
  1. Examples; Anxiety, Depression effects
  2. Involves harassment and bullying online
  3. Someone everyone can do that will help the victim
  4. Someone that often comes from a home where they don't feel safe
  5. Involves harming someone

10 Clues: Involves harming someoneExamples; Anxiety, Depression effectsThis people are usually insecure teensAge the late middle age of their livesInvolves harassment and bullying onlineA type of bullying that messes with the headSomeone everyone can do that will help the victimInvolves no physical contact but a lot of yelling...

bullying 2014-06-19

bullying crossword puzzle
Across
  1. what do you do if someone is getting bullied
  2. what is the person being mean to you called
  3. what is the website people get bullied most with
  4. what is a good bulling movie called
  5. what type of bullying is used on the internet
Down
  1. where does bullying most happen
  2. what type of bully hurts you
  3. what do you do when your getting bullied
  4. what is the person watching called
  5. what is the person getting bullied called

10 Clues: what type of bully hurts youwhere does bullying most happenwhat is the person watching calledwhat is a good bulling movie calledwhat do you do when your getting bulliedwhat is the person getting bullied calledwhat is the person being mean to you calledwhat do you do if someone is getting bulliedwhat type of bullying is used on the internet...

bullying 2014-06-19

bullying crossword puzzle
Across
  1. what do you do if someone is getting bullied
  2. what is the person being mean to you called
  3. what is the website people get bullied most with
  4. what is a good bulling movie called
  5. what type of bullying is used on the internet
Down
  1. where does bullying most happen
  2. what type of bully hurts you
  3. what do you do when your getting bullied
  4. what is the person watching called
  5. what is the person getting bullied called

10 Clues: what type of bully hurts youwhere does bullying most happenwhat is the person watching calledwhat is a good bulling movie calledwhat do you do when your getting bulliedwhat is the person getting bullied calledwhat is the person being mean to you calledwhat do you do if someone is getting bulliedwhat type of bullying is used on the internet...

Bulling 2025-04-23

Bulling crossword puzzle
Across
  1. Έτσι αισθάνεται το άτομο που δεν έχει υποστήριξη.
  2. Μετά την κακοποίηση μένει στο θύμα ......τραύμα.
  3. Το άτομα που κάνει εκφοβισμό ή κακοποιεί άλλους.
  4. Εκτός από τη σωματική υπάρχει και η .....βία.
  5. Το bulling μπορεί να προκαλέσει έως και........
Down
  1. Αλλιώς η περιθωριοποίηση που βιώνει το θύμα.
  2. Ένας τρόπος να προσπαθήσεις να βοηθήσεις το θύμα ή να σταματήσεις τον εκφοβισμό.
  3. Το άτομο που δέχεται κακοποίηση ή εκφοβισμό.
  4. Το bulling στην ελληνική γλώσσα.
  5. Η επιθετική συμπεριφορά στο .......... λέγεται Cyber bulling

10 Clues: Το bulling στην ελληνική γλώσσα.Αλλιώς η περιθωριοποίηση που βιώνει το θύμα.Το άτομο που δέχεται κακοποίηση ή εκφοβισμό.Εκτός από τη σωματική υπάρχει και η .....βία.Το bulling μπορεί να προκαλέσει έως και........Μετά την κακοποίηση μένει στο θύμα ......τραύμα.Το άτομα που κάνει εκφοβισμό ή κακοποιεί άλλους....

SECCON 2025 2025-07-31

SECCON 2025 crossword puzzle
Across
  1. A software update to fix vulnerabilities
  2. A secret word or phrase to access accounts
  3. Acronym for using more than one method to verify identity
  4. Blocks unauthorized access to or from a network
  5. A secure way to connect remotely to a network
Down
  1. A type of malicious software
  2. Fake emails used to trick users into revealing information
  3. Unwanted or junk email
  4. What we are trying to protect from cyber threats
  5. To convert data into a secure format

10 Clues: Unwanted or junk emailA type of malicious softwareTo convert data into a secure formatA software update to fix vulnerabilitiesA secret word or phrase to access accountsA secure way to connect remotely to a networkBlocks unauthorized access to or from a networkWhat we are trying to protect from cyber threats...

Get to know the Tech world better! 2022-12-13

Get to know the Tech world better! crossword puzzle
Across
  1. - A principle of economics that captures the consumer's desire to buy the product or service
  2. Virus - First computer virus
  3. - Expense Claim tool
  4. Friday - The day after Thanksgiving
  5. - Programming language exclusively used for AI
Down
  1. - Company's goods and products that are ready to sell
  2. - Site where an associate can raise Technology request
  3. Monday - Marketing term for e-commerce transactions on the Monday after Thanksgiving Day
  4. - Team workspace where knowledge and collaboration meet
  5. - A measure of the stability or consistency

10 Clues: - Expense Claim toolVirus - First computer virusFriday - The day after Thanksgiving- A measure of the stability or consistency- Programming language exclusively used for AI- Company's goods and products that are ready to sell- Site where an associate can raise Technology request- Team workspace where knowledge and collaboration meet...

Cybersecurity Terminology 2025-06-25

Cybersecurity Terminology crossword puzzle
Across
  1. Prefix meaning harmful or bad
  2. The act of keeping something safe from harm
  3. Software used to stop or remove viruses
  4. Prefix related to computers, networks, or the internet
  5. A hacker who helps protect systems legally
  6. Fraudulent email tricking people into giving personal information
Down
  1. Malicious software that locks access until a ransom is paid.
  2. A weakness that can be exploited in a system.
  3. Software that secretly collects user data
  4. The process of encoding data to protect it

10 Clues: Prefix meaning harmful or badSoftware used to stop or remove virusesSoftware that secretly collects user dataThe process of encoding data to protect itA hacker who helps protect systems legallyThe act of keeping something safe from harmA weakness that can be exploited in a system.Prefix related to computers, networks, or the internet...

Types of Bullying 2013-08-12

Types of Bullying crossword puzzle
Across
  1. Using information and communication technologies to bullying someone.
  2. Treating someone like an outcast.
  3. Secretly hurting a person such as spreading rumours.
  4. Affecting someone's relationship, excluding, making the person feel left out etc.
Down
  1. Name calling, saying hurtful things.
  2. Hurting someone.
  3. Hurting a person's feelings.

7 Clues: Hurting someone.Hurting a person's feelings.Treating someone like an outcast.Name calling, saying hurtful things.Secretly hurting a person such as spreading rumours.Using information and communication technologies to bullying someone.Affecting someone's relationship, excluding, making the person feel left out etc.

Safer Internet 2026-03-19

Safer Internet crossword puzzle
Across
  1. Anzeichen für Handysucht?
  2. Gesetze zu beachten wenn du was auf instagram postest
  3. Was gehört auch zu Cyber Mobbing?
  4. Was bekommt man nachdem man seine Bildschirm zeit reduziert?
Down
  1. Wie ist alles auf Instagram?
  2. Was kann besonders süchtig machen?
  3. Was machen wenn man hilfe braucht

7 Clues: Anzeichen für Handysucht?Wie ist alles auf Instagram?Was machen wenn man hilfe brauchtWas gehört auch zu Cyber Mobbing?Was kann besonders süchtig machen?Gesetze zu beachten wenn du was auf instagram postestWas bekommt man nachdem man seine Bildschirm zeit reduziert?

unit 6; 2014-04-13

unit 6; crossword puzzle
Across
  1. to hit somebody
  2. a kitchen device that keeps food fresh and cold
  3. rule which you must obey
  4. a card which resembles a debt to your bank
  5. somebody who investigates crimes
  6. to have done something you shouldn't
  7. to steel object from a shop
  8. a person who does ar has done illigal things
  9. somebody who is incredibly stupid
  10. a commited action which was illigal
Down
  1. a person who owns a shop
  2. a short coat
  3. a group of people who protect humans and things
  4. a card which shows your personal information
  5. a very sharp blade you use to shave body hair
  6. breaking things that aren't yours
  7. to forced somebody to hand over things that aren't yours
  8. somebody who steals things from pockets and purses
  9. to be your own boss
  10. a camera system used to maintain security

20 Clues: a short coatto hit somebodyto be your own bossa person who owns a shoprule which you must obeyto steel object from a shopsomebody who investigates crimesbreaking things that aren't yourssomebody who is incredibly stupida commited action which was illigalto have done something you shouldn'ta camera system used to maintain security...

sdl 2018-06-12

sdl crossword puzzle
Across
  1. you can buy medicines here
  2. if you can’t find a place, you can ask here
  3. you can have the curruncy of the country here
  4. people who use flight services
  5. where aircrafts land and take off
  6. a place you can buy stuffs without tax
  7. moving stairs
  8. if you bought first or business class, you can rest here in airport
  9. you can get your ticket and send your luggage here
  10. you must be checked here to go into airside
Down
  1. the way aircrafts move to runway
  2. where aircrafts parked
  3. if you are sweating so much, you can wash tour body
  4. ticket
  5. instead of stairs
  6. what you get on security areas
  7. travelers come out from here
  8. final enterance to get on aircrafts
  9. you must have this and boarding pass to go into airside
  10. stuffs to remember a place or country

20 Clues: ticketmoving stairsinstead of stairswhere aircrafts parkedyou can buy medicines heretravelers come out from herepeople who use flight serviceswhat you get on security areasthe way aircrafts move to runwaywhere aircrafts land and take offfinal enterance to get on aircraftsstuffs to remember a place or countrya place you can buy stuffs without tax...

Aviation 2023-11-19

Aviation crossword puzzle
Across
  1. One of their duties is to load & unload aircraft
  2. Not allowed on aircraft
  3. Relating each letter of alphabet to a word
  4. Built for passengers to use at the airport
  5. Full term for ASO
  6. This role helps prevent any incidents from international trade & travel
  7. Used to help stop drugs and explosives being smuggled into country
  8. This document is required to be able to travel
  9. Security process to check luggage for any explosive
  10. Area where public has access to
  11. Short term for Aviation Security
Down
  1. Area where passengers pass through to Airside
  2. Full term for UM
  3. Also known as the boarding gate
  4. Staff must be wearing this to have access to airside
  5. Full term for PSA
  6. Skills, knowledge & ...
  7. Area where counters are located
  8. Area where only passengers have access to
  9. Time of your flights ( Departure & Arrival)

20 Clues: Full term for UMFull term for PSAFull term for ASONot allowed on aircraftSkills, knowledge & ...Also known as the boarding gateArea where counters are locatedArea where public has access toShort term for Aviation SecurityArea where only passengers have access toRelating each letter of alphabet to a wordBuilt for passengers to use at the airport...

CyberNewspaper 2024-09-16

CyberNewspaper crossword puzzle
Across
  1. Online harassment or bullying
  2. Impersonating someone or something to deceive
  3. Software update to fix security vulnerabilities
  4. Measures taken to protect data
  5. Function that converts data into a fixed size
  6. Network of compromised computers under attacker control)
  7. Securing data by converting it into code
  8. Distributed Denial of Service attack to overwhelm a network)
  9. Investment scam involving fake accounts
  10. Self-replicating malware that spreads across networks)
  11. Software that shows unwanted ads
  12. A system that protects networks
Down
  1. Fraudulent attempts to steal sensitive information)
  2. Malware that encrypts files demanding ransom
  3. Zero Trust Architecture
  4. Hidden way of bypassing security controls
  5. Malware disguised as legitimate software
  6. Attack using trial and error to guess passwords)
  7. Software that records keystrokes
  8. Virtual Private Network for secure connections
  9. Vulnerabilities exploited before being patched
  10. Software that collects data secretly
  11. Multi-Factor Authentication

23 Clues: Zero Trust ArchitectureMulti-Factor AuthenticationOnline harassment or bullyingMeasures taken to protect dataA system that protects networksSoftware that records keystrokesSoftware that shows unwanted adsSoftware that collects data secretlyInvestment scam involving fake accountsMalware disguised as legitimate software...

Banking Glossary Crossword 2025-04-29

Banking Glossary Crossword crossword puzzle
Across
  1. System of money used by a country
  2. Money borrowed with agreement to repay later
  3. Adding money into your account
  4. Move money from one account to another
  5. Sign the back of a cheque for deposit
  6. Loan used to buy property
  7. Deliberate deception to obtain money
  8. Property used to secure a loan
  9. Personal information used for banking security
  10. Fee paid for borrowing money
  11. Security code for account access
  12. Attempt to trick someone financially
Down
  1. Plan for managing income and expenses
  2. Funds allocated to generate future returns
  3. Taking money out of your account
  4. A written order directing a bank to pay money
  5. Borrowed money requiring repayment with interest
  6. Direct withdrawal from an account
  7. Replacing a loan with a new agreement
  8. Withdrawal exceeding account balance
  9. Monthly record of transactions and balance
  10. Account to securely store and grow funds
  11. Confirm information or authenticity
  12. Amount of money currently in account

24 Clues: Loan used to buy propertyFee paid for borrowing moneyAdding money into your accountProperty used to secure a loanTaking money out of your accountSecurity code for account accessSystem of money used by a countryDirect withdrawal from an accountConfirm information or authenticityWithdrawal exceeding account balanceDeliberate deception to obtain money...

Taxes 2025-04-30

Taxes crossword puzzle
Across
  1. Deduction that lowers your taxable income
  2. money paid to you from a companies profit
  3. Range of income that is taxed at a specific rate
  4. Tax system where higher income earners pay a larger percentage
  5. Money you make from selling something
  6. Percentage at which income is taxed
  7. Government program that provides healthcare
  8. Amount of money taken out of your paycheck for taxes
  9. Number you put on a tax form
  10. Money you get back from the gov
Down
  1. Money you make from working
  2. Amount of your income that is subject to tax
  3. When the IRS checks your tax return to make sure its correct
  4. Amount directly reduces amount of tax you owe
  5. Tax of specific goods
  6. Federal program that provides money to old people
  7. Taxes taken out of paycheck to fund social security
  8. Someone you support financially
  9. Tax you pay on the money you earn
  10. Tax taken for social security

20 Clues: Tax of specific goodsMoney you make from workingNumber you put on a tax formTax taken for social securitySomeone you support financiallyMoney you get back from the govTax you pay on the money you earnPercentage at which income is taxedMoney you make from selling somethingDeduction that lowers your taxable income...

Civics - Australia's International Relations and Obligations 2025-05-29

Civics - Australia's International Relations and Obligations crossword puzzle
Across
  1. A country where citizens vote for their leader
  2. A country where citizens don't choose their leader
  3. the UN aims to promote international peace and _________
  4. A migrant who has fled their country due to fear of persecution
  5. Someone seeking to live in another country
  6. the freedoms and protections belonging to all humans
  7. the General _______ is the main body of the UN
  8. ________ Declaration of Human Rights
  9. Australia mostly trades with countries around the _______.
Down
  1. foreign ___ - a country providing assistance to another
  2. Refugee ________; another word for 'treaty'
  3. involving more than two countries
  4. Australia's main ______ are coal, iron ore, gold and natural gas
  5. the Paris Agreement aims to combat ______ change
  6. Nationally Determined ________ - (NDCs)
  7. non-_________ - the concept of non-return of refugees
  8. an international legal agreement
  9. ______ seeker - someone who seeks protection in another country
  10. the UN Security _______ has five permanent members with veto powers
  11. involving two countries

20 Clues: involving two countriesan international legal agreementinvolving more than two countries________ Declaration of Human RightsNationally Determined ________ - (NDCs)Someone seeking to live in another countryRefugee ________; another word for 'treaty'A country where citizens vote for their leaderthe General _______ is the main body of the UN...

Economics Terms 2023-01-03

Economics Terms crossword puzzle
Across
  1. A security that provides ownership rights
  2. A security that promises repayment to a lender
  3. The act of exchanging goods and services
  4. Karl ______
  5. Revenue in excess of costs (revenue - costs)
  6. Gross ______ Product
  7. The relationship between price and quantity.
  8. Warren _______ the CEO of Berkshire Hathaway
  9. A payment for using money.
  10. When a few large sellers dominate the market
  11. A company's overall income
  12. A tax on trade
  13. Payment of profits to shareholders
Down
  1. ______ cost Next best alternative
  2. When inflation and unemployment increase
  3. There aren't enough resources for everyone
  4. Purchasing Power ________
  5. The condition of not having a job
  6. The tools and equipment used in production.
  7. Everything that is owned by an individual.
  8. The usefulness or satisfaction of doing something
  9. A general increase in the overall price level.
  10. The ability to buy a good or service

23 Clues: Karl ______A tax on tradeGross ______ ProductPurchasing Power ________A payment for using money.A company's overall income______ cost Next best alternativeThe condition of not having a jobPayment of profits to shareholdersThe ability to buy a good or serviceWhen inflation and unemployment increaseThe act of exchanging goods and services...

The negotiable instruments Act 1881 2025-12-01

The negotiable instruments Act 1881 crossword puzzle
Across
  1. created by contract.
  2. condition to validate agreement.
  3. of rescinding a contract.
  4. contract made without free consent is
  5. who makes an offer.
  6. proposal made by one party to another.
  7. essential to contract purpose.
  8. or security on goods.
  9. for breach of contract.
  10. in exchange for a promise.
  11. who sells goods.
Down
  1. that becomes void later.
  2. false statement that induces a contract.
  3. DAMAGES,Liability for late delivery of goods.
  4. must be to be valid.
  5. who buys goods.
  6. paid in advance as security.
  7. GOODS,Goods not specific at contract time.
  8. of ownership.
  9. enforceable by law.
  10. GOODS,Goods manufactured or acquired after agreement
  11. TO SELL,Contract in which goods are delivered later.
  12. GOODS,Goods identified at the time of making the contract.
  13. by buyer to seller.

24 Clues: of ownership.who buys goods.who sells goods.enforceable by law.who makes an offer.by buyer to seller.created by contract.must be to be valid.or security on goods.for breach of contract.that becomes void later.of rescinding a contract.in exchange for a promise.paid in advance as security.essential to contract purpose.condition to validate agreement....

Computer Lingo 2015-02-03

Computer Lingo crossword puzzle
Across
  1. a unit equal to one billion
  2. arrangement of words and phrases
  3. mid-level support staff
  4. a set of type
Down
  1. most effective way to achieve data security
  2. isolation
  3. an icon containing related files
  4. a program designed to breach the security
  5. to obtain from a foreign supplier
  6. execution of more than one program

10 Clues: isolationa set of typemid-level support staffa unit equal to one billionarrangement of words and phrasesan icon containing related filesto obtain from a foreign supplierexecution of more than one programa program designed to breach the securitymost effective way to achieve data security

Money Matter 2024-03-20

Money Matter crossword puzzle
Across
  1. taxes are paid at a future date
  2. funds free from financial risk
  3. government-imposed charges
  4. deposit account that provides principal security
  5. deposit account held at a financial institution
Down
  1. non-profit institution that accepts deposits
  2. compensation from all sources
  3. defines type of individual tax treatment
  4. amount of income taxed
  5. Social Security, and Medicare taxes

10 Clues: amount of income taxedgovernment-imposed chargescompensation from all sourcesfunds free from financial risktaxes are paid at a future dateSocial Security, and Medicare taxesdefines type of individual tax treatmentnon-profit institution that accepts depositsdeposit account held at a financial institution...

PBR27 2025-09-22

PBR27 crossword puzzle
Across
  1. shouldn't be the only option
  2. our resident SAP expert
  3. delivering modern and advanced warfighting capabilities
  4. they call him "Mr. Munitions"
  5. see this AO for Ground Combat systems
  6. if Marcus Aurelis met this officer, he would've joined the Acquisition Corps
  7. programming network, IT, and cyber across the Army
Down
  1. keeper of this time-killer
  2. our newest Acquisition or a place to go in the summer
  3. things that go boom
  4. a PDD legend and Sustaining PEG icon
  5. our resident IAMD SME
  6. he's known as "A Colonel's Colonel"
  7. a Maritime savant and living la dolce vita
  8. maintenance, logistics, and industrial base
  9. Our DD and DBS whisperer a true SME
  10. known as the patron saint of Army Watercraft
  11. two-time PAE returning champion
  12. Accepted Lee's surrender and also known as "Mr. Aviation"

19 Clues: things that go boomour resident IAMD SMEour resident SAP expertkeeper of this time-killershouldn't be the only optionthey call him "Mr. Munitions"two-time PAE returning championhe's known as "A Colonel's Colonel"Our DD and DBS whisperer a true SMEa PDD legend and Sustaining PEG iconsee this AO for Ground Combat systems...

Bullying 2012-11-13

Bullying crossword puzzle
Across
  1. / the type of bullying that happend over the internet
  2. / the person getting bullied
  3. / where can bullying happen
  4. / the person doing the mean act
  5. / if you get bullied you should tell an
Down
  1. / when the bully hits or kicks the victim
  2. / the first step to making a bully stop is to ___ them
  3. / when the bully tells them mean stuff

8 Clues: / where can bullying happen/ the person getting bullied/ the person doing the mean act/ when the bully tells them mean stuff/ when the bully hits or kicks the victim/ if you get bullied you should tell an/ the first step to making a bully stop is to ___ them/ the type of bullying that happend over the internet

week 10 crossword puzzle 2021-11-05

week 10 crossword puzzle crossword puzzle
Across
  1. bullying - the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  2. - he ability to understand and share the feelings of another.
  3. theft
  4. scam
Down
  1. media
  2. sharing
  3. that is threatening or offensive to other people
  4. drama - Describes everyday tiffs and disputes that occur between friends or acquaintances online or via text.

8 Clues: scammediatheftsharingthat is threatening or offensive to other people- he ability to understand and share the feelings of another.drama - Describes everyday tiffs and disputes that occur between friends or acquaintances online or via text....

KnowCrowe 2025-03-12

KnowCrowe crossword puzzle
Across
  1. The first stage of a cyber attack.
  2. The colour of the pinnacle logo.
  3. The alignment of text in a paragraph.
  4. What our new firm email address starts with.
Down
  1. If the word "Crowe" = Logotype, therefore the "Pinnacle" = ?
  2. The Art of ______.
  3. The title of our upcoming global conference
  4. The typographical term for spacing between two lines of text.

8 Clues: The Art of ______.The colour of the pinnacle logo.The first stage of a cyber attack.The alignment of text in a paragraph.The title of our upcoming global conferenceWhat our new firm email address starts with.If the word "Crowe" = Logotype, therefore the "Pinnacle" = ?The typographical term for spacing between two lines of text.

Federal Weekly 2022-02-09

Federal Weekly crossword puzzle
Across
  1. Largest agency in the civilian government
  2. FSI that lead in acquisitions in 2021
  3. The biggest unknown in Federal software
Down
  1. What devsecops leaders aspire to
  2. Largest non-DoD department, after the VA
  3. Tier 1 FSI that is a known leader in cyber
  4. Best source for compiled RFP and vendor info
  5. Largest office within the Executive Office of the President

8 Clues: What devsecops leaders aspire toFSI that lead in acquisitions in 2021The biggest unknown in Federal softwareLargest non-DoD department, after the VALargest agency in the civilian governmentTier 1 FSI that is a known leader in cyberBest source for compiled RFP and vendor infoLargest office within the Executive Office of the President

PitchBook 2Q 2019 PlayBook 2019-05-17

PitchBook 2Q 2019 PlayBook crossword puzzle
Across
  1. use of a good or service instead of cash
  2. a request for a portion of a loan
  3. an unsecured loan certificate backed by general credit
  4. debt repayment at a regular schedule
  5. order of priorities of claims
  6. loan agreements that don’t contain usual protections
  7. the right to purchase equity
  8. stretch riskier than a senior loan, in an accommodative way
  9. condition in a bond or loan
  10. a hybrid loan structure
Down
  1. financing offered by a group
  2. between bank loans and equity
  3. something pledged as security for repayment
  4. a form of security interest granted
  5. a giant credit manager that recently agreed to be acquired
  6. lending by unregulated institutions and/or under unregulated conditions
  7. covering an interval between two transactions
  8. a provider of funds
  9. a variable line of credit allowing for drawdowns and repayments

19 Clues: a provider of fundsa hybrid loan structurecondition in a bond or loanfinancing offered by a groupthe right to purchase equitybetween bank loans and equityorder of priorities of claimsa request for a portion of a loana form of security interest granteddebt repayment at a regular scheduleuse of a good or service instead of cash...

CSIT - Cybersecurity Vocab 2024-12-02

CSIT - Cybersecurity Vocab crossword puzzle
Across
  1. A person or entity responsible for an event that has been identified as a security incident or as a risk
  2. Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted
  3. Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
  4. The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data
  5. Data that can be used to identify or contact an individual
  6. A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication
Down
  1. A number used in conjunction with authentication devices
  2. Scans that allow access to a physical space or program by verifying unique body features
  3. unauthorized use is detected or attempted
  4. Security control that can enforce a virtual boundary based on real-world geography
  5. A basic principle of security stating that a person should be allocated the minimum necessary rights, privileges, or information to perform its role

11 Clues: unauthorized use is detected or attemptedA number used in conjunction with authentication devicesData that can be used to identify or contact an individualSecurity control that can enforce a virtual boundary based on real-world geographyScans that allow access to a physical space or program by verifying unique body features...

Unit 1/1 2018-09-24

Unit 1/1 crossword puzzle
Across
  1. Krankheit
  2. Sicherheit
  3. Rucksacktourist
  4. Strauß
  5. Ausländer
Down
  1. Konzert
  2. ansehen/betrachten
  3. (be)halten
  4. Reisender
  5. Mode
  6. klingen
  7. montieren
  8. einzig/einziger

13 Clues: ModeStraußKonzertklingenKrankheitReisendermontierenAusländer(be)haltenSicherheitRucksacktouristeinzig/einzigeransehen/betrachten

PAYCHECK TERMINOLOGY 2015-03-11

PAYCHECK TERMINOLOGY crossword puzzle
Across
  1. the total amount of money earned during a pay period before deductions
  2. mandatory charges imposed on citizens by local, state, and federal governments
  3. the total amount of money left after all deductions have been withheld
  4. a type of withholding tax that funds the state government
  5. the amount of money subtracted from the gross pay earned for taxes and medical/retirement benefits
  6. this type of tax includes two separate taxes, Social Security and Medicare
  7. this type of information states the name of the employee, address, and social security number
  8. a type of withholding tax that funds the federal government
  9. an agency that collects federal taxes and enforces tax laws
  10. this type of security is based on a tax percentage of (6.2%)
Down
  1. a plan, such as a 401K or 403B
  2. a health care program for the elderly and disabled
  3. this type of deduction is based on a tax percentage of (1.45%)
  4. this type of security funds the retirement plan of the nation

14 Clues: a plan, such as a 401K or 403Ba health care program for the elderly and disableda type of withholding tax that funds the state governmenta type of withholding tax that funds the federal governmentan agency that collects federal taxes and enforces tax lawsthis type of security is based on a tax percentage of (6.2%)...

Hotel crossword puzzle 2024-05-01

Hotel crossword puzzle crossword puzzle
Across
  1. Koper
  2. Pelayan
  3. Taman
  4. Biaya Tambahan
  5. Ruang santai
  6. Ruang pertemuan
  7. Meja resepsionis
Down
  1. Kasur tambahan
  2. lobi
  3. Pemesanan
  4. Keamanan
  5. Masuk
  6. Kamar mandi uap
  7. Keluar
  8. Kamar tipe VIP

15 Clues: lobiKoperTamanMasukKeluarPelayanKeamananPemesananRuang santaiKasur tambahanBiaya TambahanKamar tipe VIPKamar mandi uapRuang pertemuanMeja resepsionis

Unit 11 2020-02-18

Unit 11 crossword puzzle
Across
  1. Paket
  2. übertragen
  3. Applikation
  4. Verschlüsselung
  5. Analog
  6. kopieren
Down
  1. Sicherheit
  2. Prüfsumme
  3. Kommunikation
  4. Sitzung
  5. Daten
  6. kodieren

12 Clues: PaketDatenAnalogSitzungkodierenkopierenPrüfsummeSicherheitübertragenApplikationKommunikationVerschlüsselung

PDU 12 - Nominalization 2020-11-24

PDU 12 - Nominalization crossword puzzle
Across
  1. obedience
  2. responsible
  3. fair
  4. independent
  5. mature
  6. reliable
Down
  1. develop
  2. capable
  3. permit
  4. strict
  5. secure
  6. lenient

12 Clues: fairpermitstrictsecurematuredevelopcapablelenientreliableobedienceresponsibleindependent

The image of who I am 2023-10-11

The image of who I am crossword puzzle
Across
  1. safe
  2. behappyaboutdoingit
  3. smile
  4. enlarge
  5. lookfixedly
  6. close
Down
  1. reliance
  2. revive
  3. value
  4. excite
  5. help
  6. fulfill

12 Clues: safehelpsmilevalueclosereviveexciteenlargefulfillreliancelookfixedlybehappyaboutdoingit

Vocab 2026-02-10

Vocab crossword puzzle
Across
  1. arrange
  2. choosy
  3. ridiculous
  4. sour
  5. standard
Down
  1. guide
  2. protection
  3. sensible
  4. landslide
  5. insure
  6. cuddle
  7. appeal

12 Clues: sourguideinsurechoosycuddleappealarrangesensiblestandardlandslideprotectionridiculous

Overzicht 2013 2014-01-15

Overzicht 2013 crossword puzzle
Across
  1. aan wat werd ACW beschuldigt ?
  2. Willem ... wordt koning van Nederland
  3. wie treed er in Nederland van de troon ?
  4. Rusland wilt met ... een vreedzame oplossing
  5. In Syrie vallen er 1500 doden door ?
  6. wat was de voornaam van de president van Venezuela ?
  7. wat was er in Boston tijdens de de beroemde marathon gebeurt ?
  8. Welke paus treed aaf ?
  9. Hoe noemt de typhoon dat in Fillipijnen plaats vond ?
  10. hoe noemt de jongen dat naar Syrie was vertrokken ?
Down
  1. Wat was er op de luchthaven gestolen ?
  2. wie was de slachtoffer van cyber spionage ?
  3. Koning Albert II maakt plaats voor prins ...
  4. waar was er een kleding fabriek ingestort ?
  5. waar was er een meteor gevallen ?
  6. In welke maand is Nelson Mandela overleden ?

16 Clues: Welke paus treed aaf ?aan wat werd ACW beschuldigt ?waar was er een meteor gevallen ?In Syrie vallen er 1500 doden door ?Willem ... wordt koning van NederlandWat was er op de luchthaven gestolen ?wie treed er in Nederland van de troon ?wie was de slachtoffer van cyber spionage ?waar was er een kleding fabriek ingestort ?...

Black Friday & Cyber Monday 2017-11-29

Black Friday & Cyber Monday crossword puzzle
Across
  1. three times as great
  2. increasing in size, number
  3. sellers of merchandise directly to customers
  4. building blocks made from clay, then baked in a kiln or in the sun
  5. lifting, taking
  6. things devised to publicize a product or event
  7. a combining form meaning computer, computer network or online
  8. people who shop
  9. having a likeness in a general way to other things
Down
  1. showing how something performs or operates
  2. competitor for the same goal
  3. bargains, financial discounts
  4. computer that isn't portable; not a laptop or tablet
  5. before all others; before the second; the initial one
  6. mixture of cement, sand & water used to bond bricks & other building materials together
  7. systematic inquiry or investigation of a subject

16 Clues: lifting, takingpeople who shopthree times as greatincreasing in size, numbercompetitor for the same goalbargains, financial discountsshowing how something performs or operatessellers of merchandise directly to customersthings devised to publicize a product or eventsystematic inquiry or investigation of a subject...

Comp Sci Study Guide 2025-04-09

Comp Sci Study Guide crossword puzzle
Across
  1. Malicious Software
  2. Arithmetic Logic Unit
  3. Component that holds all other components
  4. Cyber crime that steals information through sketchy links through email or text
  5. Basic Input/Output System, firmware in the motherboard
  6. Components that manage the flow of data between the CPU, GPU, RAM, storage, and peripherals
  7. Renders graphics and visuals
Down
  1. Used to amplify or switch electronic signals and electrical power
  2. The delay before data follows an instruction for transfer
  3. Uses a laser light to read data from or write data to an optical disc
  4. International character encoding standard
  5. American Standard Code for Information Interchange
  6. Stores data on flash memory
  7. Pathways that allow components to exchange data
  8. Uses magnetic disks to store digital information
  9. One billion hertz

16 Clues: One billion hertzMalicious SoftwareArithmetic Logic UnitStores data on flash memoryRenders graphics and visualsInternational character encoding standardComponent that holds all other componentsPathways that allow components to exchange dataUses magnetic disks to store digital informationAmerican Standard Code for Information Interchange...

Bullying Is Wrong. 2021-10-27

Bullying Is Wrong. crossword puzzle
Across
  1. a bystander doesn’t help when they see someone getting bullied is _____ bullying
  2. can be done by an individual or Group?
  3. A form of looking down on yourself?
  4. I must be_____to everyone
  5. Being a bully makes you a smaller person, helping makes u a...
  6. What should you say to someone who stood up for you?
  7. I shouldn't_____ someone.
Down
  1. The act of gossiping or telling on someone, when they do non-hurtful things to get attention.
  2. ____ someone from a group is a form of bullying.
  3. Bullying online is called ___ bullying?
  4. Appreciate your inner
  5. Bullying is---
  6. you should___when bullied.
  7. bullying can be physical or ___.
  8. you ___ ask for help when bullied
  9. you can bully someone without ___

16 Clues: Bullying is---Appreciate your innerI must be_____to everyoneI shouldn't_____ someone.you should___when bullied.bullying can be physical or ___.you ___ ask for help when bulliedyou can bully someone without ___A form of looking down on yourself?can be done by an individual or Group?Bullying online is called ___ bullying?...

TTS tentang materi Bullying 2022-01-25

TTS tentang materi Bullying crossword puzzle
Across
  1. salah satu ciri-ciri bully relasional
  2. termasuk dalam bully fisik
  3. salah satu alat komunikasi yang dapat memicu cyber bullying
  4. salah satu faktor penyebab pembullyan
Down
  1. salah satu ciri bully verbal
  2. ciri-ciri bully relasional

6 Clues: termasuk dalam bully fisikciri-ciri bully relasionalsalah satu ciri bully verbalsalah satu ciri-ciri bully relasionalsalah satu faktor penyebab pembullyansalah satu alat komunikasi yang dapat memicu cyber bullying

Compliance Program 2021-05-05

Compliance Program crossword puzzle
Across
  1. Deals with the payment requirements to employees who work for contractors that work on federal and public buildings, typically related to the Davis-Bacon Act
  2. Relates to Price fixing, comparing bids, agreements to be noncompetitive or allocating bids
  3. Deals with cyber security and often is related to phishing attacks
  4. These are company personnel who have a vast knowledge of a specific topic – including policy, procedure, tools, and training. Operations should engage this role when dealing with a compliance topic area where support or expertise is required.
  5. The document will assist each location to assemble a functional set of procedures, monitoring measures, and training requirements that, when implemented, will minimize their compliance risk
Down
  1. Kiewit utilizes a USDOT number and requires an operator to be licensed to be able to operate commercial motor vehicles
  2. This category defines the process to transport equipment and material internationally
  3. Deals with the training of operators and the plans for how to operate manlifts (abbreviation)
  4. If required by a contract, requirements may apply to purchases of iron, steel and other manufactured products permanently incorporated into infrastructure projects. Further, these projects must be undertaken by U.S. states and municipalities with funds issued by certain U.S. federal departments and agencies
  5. Kiewit is required by the USCG to periodically provide a Certificate of Financial Responsibility(COFR), Certificate of Inspection (COI) and Certificate of Documentation(COD) for this category.
  6. The Federal Aviation Administration (FAA) sets regulations to adopt specific rules for the operation of small Unmanned Aircraft Systems for this compliance category
  7. The use of cranes and similar types of lifting equipment can pose special hazards for the Company and its employees. To avoid the risk of serious accidents, employees are required to follow policies within the Corporate Crane Procedures

12 Clues: Deals with cyber security and often is related to phishing attacksThis category defines the process to transport equipment and material internationallyRelates to Price fixing, comparing bids, agreements to be noncompetitive or allocating bidsDeals with the training of operators and the plans for how to operate manlifts (abbreviation)...

Air Travel Essentials Crossword 2024-10-08

Air Travel Essentials Crossword crossword puzzle
Across
  1. – Another term for luggage.
  2. – Main building where passengers arrive and depart.
  3. – Feeling tired after crossing time zones.
  4. – Where passengers come in after a flight.
  5. – Area where bags are screened and passengers go through checks.
  6. – Where planes take off and land.
  7. – Required travel document for international flights.
Down
  1. – A stop between flights.
  2. – Ticket required to get on the plane.
  3. – Process of registering and dropping off luggage.
  4. – When the plane leaves.
  5. – Where passengers wait to board their flight.
  6. – Inspection area after international flights.
  7. – Abbreviation for the agency in charge of airport security in the U.S.

14 Clues: – When the plane leaves.– A stop between flights.– Another term for luggage.– Where planes take off and land.– Ticket required to get on the plane.– Feeling tired after crossing time zones.– Where passengers come in after a flight.– Where passengers wait to board their flight.– Inspection area after international flights....

E-Safety 2017-06-06

E-Safety crossword puzzle
Across
  1. / when someone you don't want gets onto your private media
  2. / somewhere were lots of people can chat online
  3. / how you stay safe online
  4. / A formal way people can talk to you
  5. / sending and receiving inappropriate things
  6. / when you bully someone online
  7. / when a stranger tries to start a relationship with you
Down
  1. / Something you should do if someone you dont know messages you
  2. / what people view you on
  3. / personal detail you should never give anyone
  4. media / What talking apps online are called
  5. / something to lock your gadgets
  6. / another word for messaging
  7. / one of the main ways people text on
  8. / What you do on the internet

15 Clues: / what people view you on/ how you stay safe online/ another word for messaging/ What you do on the internet/ when you bully someone online/ something to lock your gadgets/ one of the main ways people text on/ A formal way people can talk to youmedia / What talking apps online are called/ sending and receiving inappropriate things...

Computer Processing Puzzle 2014-12-08

Computer Processing Puzzle crossword puzzle
Across
  1. something that helps something else that is bad; make it easier to do it
  2. obtaining something from somebody obtaining force
  3. a computer program that damages the computer
  4. the right to be left alone
  5. the state of not being known or identified
  6. unfair threatening or incriminating of somebody
  7. great interest in a particular thing to which a lot of time is devoted
  8. cyber exploiter of life
  9. binary digit
  10. not real, but existing in somebody’s imagination
Down
  1. smallest unit of information used in a computer
  2. a condition that is subject to change
  3. to release expression or strong feelings
  4. being accountable of someone or something
  5. excessive admiration or love shown for somebody or something

15 Clues: binary digitcyber exploiter of lifethe right to be left alonea condition that is subject to changeto release expression or strong feelingsbeing accountable of someone or somethingthe state of not being known or identifieda computer program that damages the computersmallest unit of information used in a computer...

Bullying Crossword! 2014-06-22

Bullying Crossword! crossword puzzle
Across
  1. When you are excluded from a group
  2. When you are by yourself you are _____
  3. A person that sees bullying happen
  4. A person that bullies
  5. When someone uses their fists to hurt someone it is ________
  6. A type of bullying where the bully is calling someone nasty names or saying nasty comments
  7. A type of bullying that happens online
  8. When you call someone nasty names you _____ them
Down
  1. Knowingly causing pain or distress to others is being _____
  2. A nasty comment can be very _______
  3. Something that is unpleasant, angering or irritating is _________
  4. When you have committed bullying you are ______
  5. Something that happens over and over again
  6. Done deliberately
  7. A person that gets bullied

15 Clues: Done deliberatelyA person that bulliesA person that gets bulliedWhen you are excluded from a groupA person that sees bullying happenA nasty comment can be very _______When you are by yourself you are _____A type of bullying that happens onlineSomething that happens over and over againWhen you have committed bullying you are ______...

Informatika 2023-10-19

Informatika crossword puzzle
Across
  1. buling Kako se zove zlostavljanje na interenetu?
  2. intivacija Što je dabar?
  3. Sto se smatra kada pisemo velikim slovima?
  4. Moodele je alat za izradu obrazovnih ?
  5. KAko se zove pravilno ponasanje na interenetu?
  6. Kako se zove drustvena mreza od ofice365?
  7. se Što je bitno da napravimo kada nečemo koristiti javno računalo?
Down
  1. zajednica Što je mrežna aplikacija kojom stvaramo pučne izrade?
  2. trag Kada oblavlujes fotografije ili videje na drustvene stranice ostavljas
  3. kako se zove istrazivacka mreza?
  4. Sto nam je bitno za ulugiranje u AAI?
  5. bonton Sto je netiquette?
  6. slovima Kada pišemo rečenicu pišemo? (kakvim slovima)
  7. ustanova Što je carnet?
  8. buton Kako se zove aplikacjia kojom prijavljujemo zlostavljanje na intrernetu?

15 Clues: ustanova Što je carnet?intivacija Što je dabar?bonton Sto je netiquette?kako se zove istrazivacka mreza?Sto nam je bitno za ulugiranje u AAI?Moodele je alat za izradu obrazovnih ?Kako se zove drustvena mreza od ofice365?Sto se smatra kada pisemo velikim slovima?KAko se zove pravilno ponasanje na interenetu?...

elektroničko nasilje 2024-04-24

elektroničko nasilje crossword puzzle
Across
  1. osoba koja radi nasilje nad drugim osobama
  2. nasilje na internetu
  3. širenje lažnih informacija neke osobe zbog zabave
  4. mreža svih mreža, globalna mreža
  5. osoba koja je izložena elektroničkom nasilju
  6. predstavljanje kao druge osobe zbog prijevare drugih
  7. govor mržnje kojim govore da će nauditi osobama
  8. engleski naziv za elektroničko nasilje
Down
  1. nagovaranje neke osobe na stvari koje ne želi raditi dobrom voljom
  2. nasilje koje je stalno u tijeku i ne prestaje duže vrijeme
  3. krađa nečijih osobnih podataka
  4. stalno slanje nasilnih poruka jednoj osobi
  5. namjerno izopćavanje, odbacivanje,ignoriranje drugih na internetu
  6. zajednički naziv za instagram, facebook, tiktok
  7. dugme koje kada se aktivira otvara stranicu policije za prijavu cyber bullyinga

15 Clues: nasilje na internetukrađa nečijih osobnih podatakamreža svih mreža, globalna mrežaengleski naziv za elektroničko nasiljeosoba koja radi nasilje nad drugim osobamastalno slanje nasilnih poruka jednoj osobiosoba koja je izložena elektroničkom nasiljuzajednički naziv za instagram, facebook, tiktokgovor mržnje kojim govore da će nauditi osobama...

jobs 2021-01-07

jobs crossword puzzle
Across
  1. Frisör/in
  2. Tierpfleger
  3. arbeiten
  4. Landwirtschaftsgehilfe
  5. Sicherheitsbediensteter
  6. Lehrer/in
Down
  1. Maler
  2. Gärtner
  3. Koch
  4. Verkäufer/in
  5. LKW-Fahrer
  6. Sicherheit
  7. Bäcker

13 Clues: KochMalerBäckerGärtnerarbeitenFrisör/inLehrer/inLKW-FahrerSicherheitTierpflegerVerkäufer/inLandwirtschaftsgehilfeSicherheitsbediensteter

Crybersecrity 2023-02-09

Crybersecrity crossword puzzle
Across
  1. Something online
  2. media A place people post pictures of themselves
  3. Something personal
Down
  1. Bullies online
  2. On the screen

5 Clues: On the screenBullies onlineSomething onlineSomething personalmedia A place people post pictures of themselves

Bullying Types 2025-05-02

Bullying Types crossword puzzle
Across
  1. Punching someone in the face
  2. Name calling
  3. Rumours being spread
Down
  1. Threatening to harm you
  2. Harmful words online

5 Clues: Name callingHarmful words onlineRumours being spreadThreatening to harm youPunching someone in the face

Chapter 22 Vocabulary 2014-03-12

Chapter 22 Vocabulary crossword puzzle
Across
  1. security/A system by which the participating nations agree to take joint action against a nation
  2. formal agreement between the governments of two or more countries
  3. avoidance of involvement in world affairs
  4. of members of both major political parties
  5. document entitling a traveler to certain protections established by international treaty
  6. attacks any one of them
  7. treaty/Agreement between two nations
  8. official of the government who represents the nation in diplomatic matters
  9. defense alliance/An agreement between nations to support each other in case of an attack
  10. military service; also called the draft
  11. special document, required by certain countries, that is issued by the government of the country
  12. agreement/An agreement made between the president and another head of state
Down
  1. security/Protection of a nation’s borders and territories against invasion or control by foreign
  2. security pact/A mutual defense treaty among nations of a region
  3. in world affairs
  4. policy designed to keep the Soviet Union from expanding its power
  5. ambassador’s official residence and offices in a foreign country
  6. measure such as withholding economic aid to influence a foreign government’s activities
  7. policy/The strategies and goals that guide a nation’s relations with other countries
  8. treaty/International agreement signed by several nations
  9. /Office that promotes American business and safeguards its travelers in a foreign country
  10. government official who heads a consulate in a foreign nation

22 Clues: in world affairsattacks any one of themtreaty/Agreement between two nationsmilitary service; also called the draftavoidance of involvement in world affairsof members of both major political partiestreaty/International agreement signed by several nationsgovernment official who heads a consulate in a foreign nation...

Investing-Briana Cutaran 2025-03-25

Investing-Briana Cutaran crossword puzzle
Across
  1. investing all the money you have available
  2. the availability of cash
  3. Virtual currency
  4. how much Tom Brady lost on FTX
  5. when the stock market is high
  6. ability to move your 401k funds
  7. how old you need to be to invest in crypto
  8. initial public offering
  9. when your this old you must take the minimum out of your account annually
  10. a loan from you to the person you bought it from
  11. biggest financial fraud in US history
  12. Dollar cost averaging
  13. after working a certain amount of time with a company you get 100% of your 401k
Down
  1. what percentage you need to pay for social security tax if you work for an employer
  2. the person who takes care of your investments in a mutual fund
  3. system to record info so you can't cheat the system
  4. pool of money from multiple different investors
  5. currencies backed by the government that don't have a physical commodity
  6. the money you contribute here is after taxes
  7. Both you, your employer, and sometimes the state pays into this
  8. how much you can put into your IRA per year
  9. President of the Stanwood AAAA Booster club
  10. when the stock market is low
  11. a security that represents the ownership of a fraction of a corporation
  12. the investment game we've been playing
  13. how old do you need to be to receive full social security benefits

26 Clues: Virtual currencyDollar cost averaginginitial public offeringthe availability of cashwhen the stock market is lowwhen the stock market is highhow much Tom Brady lost on FTXability to move your 401k fundsbiggest financial fraud in US historythe investment game we've been playinginvesting all the money you have available...

Retirement terms 2025-10-16

Retirement terms crossword puzzle
Across
  1. Benefit Plan: A pension plan in which the amount of benefits paid to an
  2. age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
  3. make tax-deductible contributions.
  4. (Individual Retirement Account): A special type of account that allows investors
  5. IRA, the contributions are not tax deductible
  6. Contribution Plan: A pension plan wherein a certain amount or percentage
  7. conditions to a person following retirement or to surviving dependents.
  8. IRA: Roth IRAs allow investors who do not exceed a specific income level to
  9. plan.
  10. after retirement is fixed in advance in accordance with a formula given in
  11. money is set aside each year (by either the company and/or the employee) for the
  12. A type of defined contribution retirement account funded through pre-tax
Down
  1. of the employee. There are restrictions as to when and how you can
  2. include payment of hospital and medical expenses.
  3. Benefits: Benefits (compensation in addition to salary) that may be provided
  4. A federal program that provides some level of health benefits for people
  5. Security: A federal benefits program developed in 1935, Social Security is
  6. a limited amount of money toward retirement annually. Unlike the
  7. these funds without penalties.
  8. employees for sickness, accidental injury, or accidental death. These benefits
  9. through a tax levied on employers and employees.
  10. bonds, mutual funds or other assets, and are not taxed until they are
  11. deductions. The funds in the account can be invested in a number of different
  12. A sum of money paid regularly as a retirement benefit; money paid under

24 Clues: plan.these funds without penalties.make tax-deductible contributions.IRA, the contributions are not tax deductiblethrough a tax levied on employers and employees.include payment of hospital and medical expenses.a limited amount of money toward retirement annually. Unlike theof the employee. There are restrictions as to when and how you can...

retirement terms 2025-10-17

retirement terms crossword puzzle
Across
  1. Benefits: Benefits (compensation in addition to salary) that may be provided
  2. A federal program that provides some level of health benefits for people
  3. age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
  4. Benefit Plan: A pension plan in which the amount of benefits paid to an
  5. these funds without penalties.
  6. IRA, the contributions are not tax deductible
  7. money is set aside each year (by either the company and/or the employee) for the
  8. A sum of money paid regularly as a retirement benefit; money paid under
  9. include payment of hospital and medical expenses.
  10. employees for sickness, accidental injury, or accidental death. These benefits
  11. Security: A federal benefits program developed in 1935, Social Security is
  12. A type of defined contribution retirement account funded through pre-tax
Down
  1. after retirement is fixed in advance in accordance with a formula given in
  2. plan.
  3. of the employee. There are restrictions as to when and how you can
  4. a limited amount of money toward retirement annually. Unlike the
  5. (Individual Retirement Account): A special type of account that allows investors
  6. Contribution Plan: A pension plan wherein a certain amount or percentage
  7. IRA: Roth IRAs allow investors who do not exceed a specific income level to
  8. make tax-deductible contributions.
  9. through a tax levied on employers and employees.
  10. conditions to a person following retirement or to surviving dependents.
  11. deductions. The funds in the account can be invested in a number of different
  12. bonds, mutual funds or other assets, and are not taxed until they are

24 Clues: plan.these funds without penalties.make tax-deductible contributions.IRA, the contributions are not tax deductiblethrough a tax levied on employers and employees.include payment of hospital and medical expenses.a limited amount of money toward retirement annually. Unlike theof the employee. There are restrictions as to when and how you can...

dollar and sense 2025-10-17

dollar and sense crossword puzzle
Across
  1. Security: A federal benefits program developed in 1935, Social Security is
  2. these funds without penalties.
  3. make tax-deductible contributions.
  4. include payment of hospital and medical expenses.
  5. Contribution Plan: A pension plan wherein a certain amount or percentage
  6. of the employee. There are restrictions as to when and how you can
  7. money is set aside each year (by either the company and/or the employee) for the
  8. after retirement is fixed in advance in accordance with a formula given in
  9. Benefit Plan: A pension plan in which the amount of benefits paid to an
  10. Terms
  11. IRA: Roth IRAs allow investors who do not exceed a specific income level to
  12. bonds, mutual funds or other assets, and are not taxed until they are
Down
  1. deductions. The funds in the account can be invested in a number of different
  2. employees for sickness, accidental injury, or accidental death. These benefits
  3. IRA, the contributions are not tax deductible
  4. A federal program that provides some level of health benefits for people
  5. (Individual Retirement Account): A special type of account that allows investors
  6. plan.
  7. through a tax levied on employers and employees.
  8. age 65 or who collect Social Security for [OR INSTEAD OF FOR?] disability.
  9. a limited amount of money toward retirement annually. Unlike the
  10. conditions to a person following retirement or to surviving dependents.
  11. A sum of money paid regularly as a retirement benefit; money paid under
  12. Benefits: Benefits (compensation in addition to salary) that may be provided
  13. A type of defined contribution retirement account funded through pre-tax

25 Clues: plan.Termsthese funds without penalties.make tax-deductible contributions.IRA, the contributions are not tax deductiblethrough a tax levied on employers and employees.include payment of hospital and medical expenses.a limited amount of money toward retirement annually. Unlike theof the employee. There are restrictions as to when and how you can...

DFE Module 08 – Network Forensics 2025-11-05

DFE Module 08 – Network Forensics crossword puzzle
Across
  1. Intercepting unsecured connections to steal personal information
  2. Command line packet sniffer used to capture and analyze network packets
  3. Flooding a target with traffic to deny service to legitimate users
  4. Logs containing details about network connectivity and routing
  5. Decoy system designed to lure and study attacker behavior
  6. Capturing network traffic to obtain sensitive information
  7. Records of allowed or denied network traffic for security monitoring
  8. Contain assigned IP addresses and timestamps for network devices
  9. Capturing recording and analyzing network events to discover the source of security incidents
  10. Taking over an active user session to gain unauthorized access
Down
  1. GUI tool used to capture and analyze live or recorded network traffic
  2. Faking an IP address to appear as a trusted host
  3. Suspicious network communication caused by infected systems
  4. Records generated by intrusion detection systems to identify anomalies
  5. Analysis performed during an ongoing attack to respond quickly
  6. Intercepting and relaying messages between two parties
  7. Mapping attacker’s MAC address to victim’s IP address to intercept traffic
  8. Relating multiple events to identify patterns or root causes
  9. Digital forensic artifact indicating a potential security breach
  10. Unauthorized wireless access point set up to steal data
  11. Attempt to gain FTP credentials by repeated login failures
  12. Analysis of logs after an incident has already occurred
  13. Attack that overwhelms a server with half open TCP connections
  14. Converting data from different log formats into a common format
  15. Wireshark feature that allows filtering of captured packets for analysis

25 Clues: Faking an IP address to appear as a trusted hostIntercepting and relaying messages between two partiesUnauthorized wireless access point set up to steal dataAnalysis of logs after an incident has already occurredDecoy system designed to lure and study attacker behaviorCapturing network traffic to obtain sensitive information...

Investing - Braden Thompson 2026-03-23

Investing - Braden Thompson crossword puzzle
Across
  1. Money Currencies created and backed by the government, but not tied to a physical commodity
  2. A system of recording information that’s almost impossible to hack into
  3. How easy an asset can be converted into cash
  4. Can we count Social Security as a retirement plan?
  5. IRA An individual retirement account with contributions made pre tax
  6. Investing your money at equal amounts for regular intervals.
  7. IRA An individual retirement account, with contributions made post tax
  8. SUM Investing all your money at one time at one given time into the stock market.
  9. INTEREST Interest that compounds
  10. only invest what you are willing to lose for crypto
  11. Low risk, protects money
  12. High risk, potential to lose money
  13. Spreading investments across different sectors or types to reduce risk
Down
  1. A type of cryptocurrency
  2. Fund A fund built up from 3-6 months of living expenses
  3. An organized group of people who deal with your money.
  4. A virtual currency backed by nothing, with
  5. TRADING Buying or selling stocks based on MNPI
  6. SEVEN Age when you can collect full benefits of Social Security
  7. President who created social security
  8. A collection of one's financial assets
  9. A stock or investment that frequently goes up and down by a lot
  10. An employer- managed retirement plan, paid when you reach a certain number of years
  11. Moderate risk, grows money over time
  12. Employers will match how much you put into a 401K, up to 24,500 a year

25 Clues: A type of cryptocurrencyLow risk, protects moneyINTEREST Interest that compoundsHigh risk, potential to lose moneyModerate risk, grows money over timePresident who created social securityA collection of one's financial assetsA virtual currency backed by nothing, withHow easy an asset can be converted into cash...

Investing-Chloe Steinart 2026-03-24

Investing-Chloe Steinart crossword puzzle
Across
  1. Retirement plan managed by an employer
  2. A market where stock prices are rising over time
  3. Buying or selling stock based on nonpublic information
  4. Age to receive full social security benefits
  5. A system of recording information in a way that makes it difficult to hack or cheat
  6. Social Security and MEdicare taxes combined
  7. The ease with which an asset can be converted to cash
  8. Total Value of a companies stock
  9. A factor of something the company has done that may cause stock prices to change
  10. Having worked for a certain amount of time with a company
  11. Digital Seal on the security of crypto
Down
  1. A digital record of transactions
  2. Retirement plan that was created by Roosevelt
  3. How many days you have to rollover funds
  4. A loan that you give to a company or the government
  5. Investing all the money you have available at the given time
  6. Currencies that are created and backed by the government
  7. 100 of the largest nonfinancial companies
  8. Example of Fiat Money
  9. Something that crypto prices are
  10. A market where stock prices are falling over time
  11. Information that would change a person’s mind about buying or selling a stock
  12. Money paid to investors for owning a stock
  13. A factor of something that does not directly involve the company
  14. A strategy in which you invest your money in equal amounts of regular intervals

25 Clues: Example of Fiat MoneyA digital record of transactionsSomething that crypto prices areTotal Value of a companies stockRetirement plan managed by an employerDigital Seal on the security of cryptoHow many days you have to rollover funds100 of the largest nonfinancial companiesMoney paid to investors for owning a stock...

For Clients Portal 2017-12-20

For Clients Portal crossword puzzle
Across
  1. Nine
  2. One
  3. Six
  4. Four
  5. Seven
  6. Five
Down
  1. Two
  2. Twelve
  3. Ten
  4. Three
  5. Eleven
  6. Eight

12 Clues: TwoTenOneSixNineFourFiveThreeEightSevenTwelveEleven

UNit 11 words 2024-02-12

UNit 11 words crossword puzzle
Across
  1. arrange
  2. particular
  3. silly
  4. tangy
  5. creed
Down
  1. pilot
  2. protection
  3. reasonable
  4. landslide
  5. confirm
  6. snuggle
  7. cry

12 Clues: crypilotsillytangycreedarrangeconfirmsnugglelandslideprotectionreasonableparticular

Vocab 2026-02-11

Vocab crossword puzzle
Across
  1. protection
  2. arrange
  3. appeal
  4. guide
  5. landslide
  6. sensible
Down
  1. standard
  2. cuddle
  3. choosy
  4. insure
  5. sour
  6. ridiculous

12 Clues: sourguidecuddlechoosyappealinsurearrangestandardsensiblelandslideprotectionridiculous