cyber security Crossword Puzzles

The Positive Work Conditions 2025-11-17

The Positive Work Conditions crossword puzzle
Across
  1. Long-term growth direction and advancement opportunities
  2. Medical, allowances, perks, incentives, and non-cash rewards
  3. Monthly financial compensation and perceived fairness
  4. Leadership behavior, decisions, and culture setting
  5. Role clarity, workload, autonomy, challenge, and meaning
Down
  1. Physical and psychological workspace conditions
  2. Job security, safety, stability, and risk protection
  3. Processes, clarity, structure, workflows, and policies
  4. Direct supervisor relationship and support
  5. Equity, consistency, justice, and transparent decisions
  6. Skill-building, learning, and capability improvement

11 Clues: Direct supervisor relationship and supportPhysical and psychological workspace conditionsLeadership behavior, decisions, and culture settingJob security, safety, stability, and risk protectionSkill-building, learning, and capability improvementMonthly financial compensation and perceived fairness...

Julia Zorrilla, block 6 2024-05-09

Julia Zorrilla, block 6 crossword puzzle
Across
  1. Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
  2. Is a security that pays interest over terms ranging from 2-10 years.
  3. Means that money is the common measure of worth or price of a good.
  4. Is the process of transferring from one individual/organization to another.
  5. Is money used in exchange for goods and services needed by individuals and governments.
  6. Allows customers to pay for a purchase directly from their checking account.
  7. Is a security that matures in a year or less.
Down
  1. Is a transfer of money from one bank account to another one.
  2. Means money can also be save and stored for later.
  3. Is the mechanism a nation uses to provide and manage money for itself.
  4. Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
  5. Is the name of currency in the U.S
  6. Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
  7. Is the state of being or feeling secure; freedom from fear, anxiety, and danger.

14 Clues: Is the name of currency in the U.SIs a security that matures in a year or less.Means money can also be save and stored for later.Is a transfer of money from one bank account to another one.Means that money is the common measure of worth or price of a good.Is a security that pays interest over terms ranging from 2-10 years....

SN33003FP Chapter 2 Crossword 2024-07-03

SN33003FP Chapter 2 Crossword crossword puzzle
Across
  1. Prevents disclosure of information to unauthorized people, also known as privacy
  2. Defines security objectives, behavioral rules, and system requirements to secure assets
  3. Provides technical direction for implementing and configuring technology to fulfill policy directives
  4. Relates to organization's cybersecurity policies, procedures, and guidelines set by upper management
  5. Focuses on protecting all states of data: at rest or in storage, in transit, or in process
  6. The goals to protect cyberspace, including confidentiality, integrity, and availability (CIA Triad)
  7. Data being sent from one device to another
Down
  1. Making security awareness part of employee onboarding and ongoing training
  2. Software, hardware, network, and cloud-based tools used to safeguard an organization's assets
  3. Accuracy, consistency, and trustworthiness of data throughout its lifecycle
  4. Ensures access to information systems and services at all times
  5. Data during input, modification, computation, or output stages
  6. Identifies expertise required for protection, including technology, policies/procedures/guidelines, and people
  7. Stored data retained on storage devices when not actively used

14 Clues: Data being sent from one device to anotherData during input, modification, computation, or output stagesStored data retained on storage devices when not actively usedEnsures access to information systems and services at all timesMaking security awareness part of employee onboarding and ongoing training...

The WSJ Daily Crossword 2024-06-02

The WSJ Daily Crossword crossword puzzle
Across
  1. Underrepresentation
  2. Terrorism
  3. Journal
  4. Gen Therapy
  5. The black market
  6. Asian flue
  7. Money managment
  8. Breacking News
Down
  1. Infrestructure
  2. The artic
  3. Star wars
  4. Treasure
  5. Children
  6. security policies

14 Clues: JournalTreasureChildrenThe articTerrorismStar warsAsian flueGen TherapyInfrestructureBreacking NewsMoney managmentThe black marketsecurity policiesUnderrepresentation

Profession 2024-10-09

Profession crossword puzzle
Across
  1. Tourist place
  2. Store
  3. Vehicle
  4. Building
  5. Restaurant
  6. Malls or office
Down
  1. Office or Field
  2. Business place
  3. Barber shop
  4. Garage
  5. Gym
  6. Meat shop
  7. Art studio
  8. Stage

14 Clues: GymStoreStageGarageVehicleBuildingMeat shopArt studioRestaurantBarber shopBusiness placeTourist placeOffice or FieldMalls or office

Profession 2024-10-09

Profession crossword puzzle
Across
  1. Tourist place
  2. Store
  3. Vehicle
  4. Building
  5. Restaurant
  6. Malls or office
Down
  1. Office or Field
  2. Business place
  3. Barber shop
  4. Garage
  5. Gym
  6. Meat shop
  7. Art studio
  8. Stage

14 Clues: GymStoreStageGarageVehicleBuildingMeat shopArt studioRestaurantBarber shopBusiness placeTourist placeOffice or FieldMalls or office

Aeropuerto y Viajes 2025-05-01

Aeropuerto y Viajes crossword puzzle
Across
  1. Check-in
  2. Prohibited Items
  3. Fasten
  4. Security Check
  5. National Flight
  6. To check in
  7. Security Check
  8. Passport
Down
  1. Local Flight
  2. Time
  3. Airline
  4. Screen
  5. International Flight
  6. Customs
  7. Air Ticket

15 Clues: TimeFastenScreenAirlineCustomsCheck-inPassportAir TicketTo check inLocal FlightSecurity CheckSecurity CheckNational FlightProhibited ItemsInternational Flight

Duolingo Stories -124 : The Exhibition 2022-10-15

Duolingo Stories -124 : The Exhibition crossword puzzle
Across
  1. leather
  2. famous
  3. line
  4. to let in
  5. exhibition
  6. you're kidding
  7. it's cold
Down
  1. to the end
  2. outside
  3. warm
  4. a long time
  5. for hours
  6. to go in
  7. after
  8. security guard

15 Clues: warmlineafterfamousleatheroutsideto go infor hoursto let init's coldto the endexhibitiona long timesecurity guardyou're kidding

Hotel crossword puzzle 2024-05-01

Hotel crossword puzzle crossword puzzle
Across
  1. Taman
  2. Biaya Tambahan
  3. Kamar mandi uap
  4. Pelayan
  5. Ruang pertemuan
  6. Kamar tipe VIP
Down
  1. Meja resepsionis
  2. Koper
  3. Masuk
  4. Kasur tambahan
  5. Keamanan
  6. Pemesanan
  7. Ruang santai
  8. Keluar
  9. Paket yang ditawarkan hotel

15 Clues: TamanKoperMasukKeluarPelayanKeamananPemesananRuang santaiKasur tambahanBiaya TambahanKamar tipe VIPKamar mandi uapRuang pertemuanMeja resepsionisPaket yang ditawarkan hotel

chapter 8 2015-04-06

chapter 8 crossword puzzle
Across
  1. / The Trust Services Framework reliability principle that states personal information should be protected from unauthorized disclosure is known as____
  2. / A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system, is known as a(n) _________
  3. / If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack, then security is________
  4. /_______ specifies the structure of packets sent over the internet and the route to get them to the proper destination.(2words)
  5. / ________ is/are an example of a preventive control.
  6. / Restricting access of users to specific portions of the system as well as specific tasks, is an example of _________
  7. / The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as ______
  8. / The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as_________
Down
  1. / the primary means of protecting data stored in a cloud from unauthorized access.
  2. / Virtualization refers to the ability of running _____ systems simultaneously on one physical computer.
  3. / process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as _________filtering (2words)
  4. / _________authentication involves the use of two or more basic authentication methods.(2words)
  5. / Information security procedures protect information integrity by _________ fictitious transactions.
  6. / ________ is/are an example of a detective control.(2words)
  7. / _______ teams is an example of a corrective control? (2words)
  8. / The Trust Services Framework reliability principle that states that users must be able to enter, update, and retrieve data during agreed-upon times is known as _________
  9. / awareness _______is one of preventive controls that is necessary to provide adequate security for social engineering threats?

17 Clues: / ________ is/are an example of a preventive control./ ________ is/are an example of a detective control.(2words)/ _______ teams is an example of a corrective control? (2words)/ the primary means of protecting data stored in a cloud from unauthorized access....

Organelles 2017-12-06

Organelles crossword puzzle
Across
  1. “Recycling center”
  2. solar power plant
  3. grass
  4. city limit sign
  5. FedEx trucks
  6. cellular highway
  7. cellular FedEx
  8. cellular highway
  9. city wall
Down
  1. Security guards
  2. city hall
  3. powerplant
  4. garbage men
  5. Traffic cops
  6. factories
  7. water storage facility
  8. railroad tracks
  9. street sweepers

18 Clues: grasscity hallfactoriescity wallpowerplantgarbage menTraffic copsFedEx truckscellular FedExSecurity guardsrailroad trackscity limit signstreet sweeperscellular highwaycellular highwaysolar power plant“Recycling center”water storage facility

Col's 80th Birthday 2022-12-16

Col's 80th Birthday crossword puzzle
Across
  1. Middle Child
  2. Labourer, What did I do while working for Frank Tydd (8,9)
  3. Where did I repair mowers
  4. Easy one. Wife's name
  5. Name of security company
  6. Drink, What did the factory I worked at produce? (4,5)
  7. Officer, What did I hold as an honorary position before holding a qualified position? (9,7)
  8. Another place I repaired mowers at
Down
  1. Where was the Preston Mine Sit-In held?
  2. Youngest Child
  3. Oldest Child
  4. Guard, What job had a tell tail blue shirt? (8,5)
  5. Five, How many days underground did I spend at the Preston Sit-In? (5,4)
  6. Day, Day of the year I was born (6,3)

14 Clues: Middle ChildOldest ChildYoungest ChildEasy one. Wife's nameName of security companyWhere did I repair mowersAnother place I repaired mowers atDay, Day of the year I was born (6,3)Where was the Preston Mine Sit-In held?Guard, What job had a tell tail blue shirt? (8,5)Drink, What did the factory I worked at produce? (4,5)...

test 2021-08-16

test crossword puzzle
Across
  1. One of our IPS Platforms
  2. Technology architecture that scale as per demand
  3. Find vulnerabilities in applications while they are running in production (Abbr)
  4. Cloud TCO Savings tool
  5. Elastic and Flexible Assets
  6. Mechanism that makes blockchain very resistant to tampering
  7. One of the CIA Triad
Down
  1. iPaaS Platform and Accenture Alliance
  2. One of the 5 R’s in Cloud Migration Strategy
  3. In Depth Concept of multiple layers of failsafes (3 Words)
  4. Appraoch that Integrate security into the rapid-release cycles that are typical of modern application development and deployment
  5. Smallest unit of a bitcoin
  6. Outermost security layer in Defence in Depth Approach
  7. One of the MAAG

14 Clues: One of the MAAGOne of the CIA TriadCloud TCO Savings toolOne of our IPS PlatformsSmallest unit of a bitcoinElastic and Flexible AssetsiPaaS Platform and Accenture AllianceOne of the 5 R’s in Cloud Migration StrategyTechnology architecture that scale as per demandOutermost security layer in Defence in Depth Approach...

JOBS 2024-08-28

JOBS crossword puzzle
Across
  1. Sells food or different products in a small shop
  2. Can sell different items in a shop
  3. Works for the security of citizens, makes law being respected
  4. Likes making plants and vegetables grow
  5. Must precisely know what justice is about
  6. Makes bread or pastries
  7. Works outside, surrounded by trees, flowers
  8. Works in schools, learns to pupils
Down
  1. Operates on people in hospitals
  2. Makes sure nobody causes troubles in a bank, a supermarket
  3. Looks after animals, walks them and feeds them
  4. Takes care of people at home, or in hospitals
  5. Must always check he's got the right numbers
  6. Cuts fabric and sews to make clothes

14 Clues: Makes bread or pastriesOperates on people in hospitalsCan sell different items in a shopWorks in schools, learns to pupilsCuts fabric and sews to make clothesLikes making plants and vegetables growMust precisely know what justice is aboutWorks outside, surrounded by trees, flowersMust always check he's got the right numbers...

Not All MFA Is Equal 2025-06-12

Not All MFA Is Equal crossword puzzle
Across
  1. Abbreviation for Time-based One-Time Password
  2. Text-based codes sent to your phone
  3. Two-____Verification
  4. Not all MFA is _________ (title of the newsletter)
  5. Answers to ________ questions are easy to look up on social media or social engineer.
  6. A password or PIN is something you _______
  7. A device frequently used for MFA
Down
  1. Unique personal trait like your face or fingerprint
  2. A secret word or phrase you must know to log in
  3. A kind of security token
  4. Abbreviation for Multi-Factor Authentication
  5. A convenient MFA method used by TaxHawk
  6. A physical MFA device, like a Google Titan Key
  7. A hardware token is something you _________

14 Clues: Two-____VerificationA kind of security tokenA device frequently used for MFAText-based codes sent to your phoneA convenient MFA method used by TaxHawkA password or PIN is something you _______A hardware token is something you _________Abbreviation for Multi-Factor AuthenticationAbbreviation for Time-based One-Time Password...

Database User Administration & Security Crossword 2025-08-26

Database User Administration & Security Crossword crossword puzzle
Across
  1. Users connecting from outside the local server
  2. Database object used to enforce user restrictions and resources
  3. Connection between two databases to share data
  4. Management task: Updating details of existing users
  5. SQL statement used to give user permissions
  6. Removing access of a user permanently
  7. Collection of permissions grouped for assignment
Down
  1. Process of verifying identity of a user before access
  2. Predefined accounts available in DBMS
  3. SQL statement used to take back permissions
  4. Recommended practice: separating duties for better security
  5. Feature in SQL Server for connecting external servers
  6. Security measure that enforces rules for account credentials
  7. A connection configuration for servers to communicate
  8. SQL command used to give a user a role

15 Clues: Predefined accounts available in DBMSRemoving access of a user permanentlySQL command used to give a user a roleSQL statement used to take back permissionsSQL statement used to give user permissionsUsers connecting from outside the local serverConnection between two databases to share dataCollection of permissions grouped for assignment...

Test 2025-09-30

Test crossword puzzle
Across
  1. — Secondary copy to restore data after loss or attack
  2. — Tool that detects and removes malicious code
  3. — Encrypted tunnel that protects traffic over untrusted networks
  4. — Install latest software versions for security/features
  5. — Filters network traffic by rules to block threats
  6. — Tricking users into revealing info via fake messages
  7. — Malicious software (virus, worm, trojan, ransomware)
  8. — Information that needs protection from loss/theft
Down
  1. — Scrambles data so only authorized parties can read it
  2. — Common attack vector for scams and payloads
  3. — Any endpoint (laptop/phone) connecting to a network
  4. — Unsolicited/bulk messages often carrying scams
  5. — Software fix that closes security holes
  6. — Secret used to verify identity; should be strong/unique
  7. — Person who exploits systems (ethical or malicious)

15 Clues: — Software fix that closes security holes— Common attack vector for scams and payloads— Tool that detects and removes malicious code— Unsolicited/bulk messages often carrying scams— Filters network traffic by rules to block threats— Information that needs protection from loss/theft— Person who exploits systems (ethical or malicious)...

fundmentals of thecnolocey 2023-08-28

fundmentals of thecnolocey crossword puzzle
Across
  1. or data which can be accessed when needed
  2. sure a person is who they say they are
  3. used to determine user privileges or access levels to the system
  4. to or damage sensitive information on a computer
  5. ransomware and the numerous other programs used by hackers to gain
  6. information is protected
  7. or weakness which undermines an organization’s security efforts
  8. an individual or organization has over information and how it is used
  9. of being private or secret
Down
  1. of being complete or uncorrupted
  2. rules
  3. of doing harm
  4. which have been programmed to carry out malicious intent
  5. assessment of potential threats to an organization’s security
  6. for "malicious software" and covers threats such as viruses, worms, Trojan
  7. of computers and devices managed as a unit with the same procedures
  8. Virus

17 Clues: rulesVirusof doing harminformation is protectedof being private or secretof being complete or uncorruptedsure a person is who they say they areor data which can be accessed when neededto or damage sensitive information on a computerwhich have been programmed to carry out malicious intentassessment of potential threats to an organization’s security...

Crack the Cyber Code 2025-06-10

Crack the Cyber Code crossword puzzle
Across
  1. It is used to filter unwanted websites
  2. The act of watching someone's activity secretly online
  3. A fake software that harms devices
  4. The term for copying software without permission
  5. A harmful program that spread between computers
  6. The person who breaks into computer systems
  7. A online chatting tool
  8. A online chatting place
  9. A spying system
  10. A fake online identity
Down
  1. The set of rules for using the internet respectfully
  2. We call stealing someone's digital work or content
  3. A software protects you from your device from threats
  4. A secret code to protect accounts
  5. A common social media risk
  6. The act of sending rude or threatening messages online

16 Clues: A spying systemA online chatting toolA fake online identityA online chatting placeA common social media riskA secret code to protect accountsA fake software that harms devicesIt is used to filter unwanted websitesThe person who breaks into computer systemsA harmful program that spread between computers...

Language and Cyber Fun 2025-05-19

Language and Cyber Fun crossword puzzle
Across
  1. a online music platform
  2. translator for assembly language
  3. popular antivirus software
  4. inventor of Java Programming Language
  5. translate the whole program at a time
  6. process of writing specific instructions
  7. message for authentication
  8. translates language line by line
Down
  1. software helps in preventing unauthorised access
  2. is a language that uses for AI
  3. illegal intrusion into a computer system via network
  4. language consists 0 and 1
  5. a video conferencing application
  6. fourth-generation programming language
  7. first Internet framework
  8. misleads user as a trusted person or organization

16 Clues: a online music platformfirst Internet frameworklanguage consists 0 and 1popular antivirus softwaremessage for authenticationis a language that uses for AItranslator for assembly languagea video conferencing applicationtranslates language line by lineinventor of Java Programming Languagetranslate the whole program at a time...

tosta 2024-05-17

tosta crossword puzzle
Across
  1. administrator
  2. substantial
  3. consider
  4. Control
  5. agility
  6. present
Down
  1. conducted
  2. General
  3. suitable
  4. dependent
  5. security

11 Clues: GeneralControlagilitypresentsuitablesecurityconsiderconducteddependentsubstantialadministrator

Scientific Management 2023-01-17

Scientific Management crossword puzzle
Across
  1. control
  2. workflows
  3. efficiency
  4. synthesis
  5. security
  6. ethic
Down
  1. inequality
  2. engineering
  3. sector
  4. globalization
  5. rationality
  6. productivity

12 Clues: ethicsectorcontrolsecurityworkflowssynthesisinequalityefficiencyengineeringrationalityproductivityglobalization

M&L_DRAFT_1 2016-02-02

M&L_DRAFT_1 crossword puzzle
Across
  1. Entry on the left side of an account
  2. The date on which a debt becomes due or the termination date on which an installment loan must be repaid in full
  3. Business contract in which a borrower agrees to pay interest for the use of the lenders funds
  4. Money paid by the borrower for the use of the lender's funds
  5. It is a kind of security which one offers for taking an advance or loan from someone
  6. Code help uniquely identifies a specific securities issue
  7. A financial institution that holds customers' securities for safekeeping
  8. The difference between prices at which a market maker can buy and sell a security
  9. A slang term used by mortgage-backed securities (MBS) traders and investors to refer to an MBS that is seasoned over some time period
Down
  1. It is an independent, unaffiliated research company that rates fixed income securities
  2. A person licensed to sell or lease real property, acting as an agent for others
  3. Federal National Mortgage Association
  4. When a customer refuses to pay the rest of amount due on a loan
  5. Arrangement of characters representing a particular security listed on an exchange
  6. Distribution of a portion of a company's earnings

15 Clues: Entry on the left side of an accountFederal National Mortgage AssociationDistribution of a portion of a company's earningsCode help uniquely identifies a specific securities issueMoney paid by the borrower for the use of the lender's fundsWhen a customer refuses to pay the rest of amount due on a loan...

Human Services Crossword By: Lindsay 2021-12-02

Human Services Crossword By: Lindsay crossword puzzle
Across
  1. A _____ guide is under Hospitality and tourism and they hand out pamphlets and schedule group activities.
  2. This common four year degree is called a _______’s degree and is needed for many jobs.
  3. Tax examiners explain ___ information to people and companies.
  4. This job is under law, public safety, corrections, and security and is sometimes called an attorney.
  5. _______ trainers tech creatures like dogs to do tricks and help them to stop mis-behaving.
  6. These kind of clerks interview people for things like dog and marriage licenses.
  7. Coroners investigate the cause of death so the must have a high school ______ along with other schooling.
  8. Animal control workers enforce the ____ of animal control. Hint: this job is under Law, public safety, corrections and security.
Down
  1. Teacher aides work with ______ and students in the classroom.
  2. people under Education and Training guide and _____ young people.
  3. Tailors use ______ to make articles of clothing
  4. Crossing _______ direct people and cars at intersection and work zones.
  5. Law, public _______, corrections, and security.
  6. People under human services deal with ______ and families to meet their needs.

14 Clues: Tailors use ______ to make articles of clothingLaw, public _______, corrections, and security.Teacher aides work with ______ and students in the classroom.Tax examiners explain ___ information to people and companies.people under Education and Training guide and _____ young people....

Julia Zorrilla, block 6 2024-05-09

Julia Zorrilla, block 6 crossword puzzle
Across
  1. Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
  2. Is a security that pays interest over terms ranging from 2-10 years.
  3. Means that money is the common measure of worth or price of a good.
  4. Is the process of transferring from one individual/organization to another.
  5. Is money used in exchange for goods and services needed by individuals and governments.
  6. Allows customers to pay for a purchase directly from their checking account.
  7. Is a security that matures in a year or less.
Down
  1. Is a transfer of money from one bank account to another one.
  2. Means money can also be save and stored for later.
  3. Is the mechanism a nation uses to provide and manage money for itself.
  4. Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
  5. Is the name of currency in the U.S
  6. Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
  7. Is the state of being or feeling secure; freedom from fear, anxiety, and danger.

14 Clues: Is the name of currency in the U.SIs a security that matures in a year or less.Means money can also be save and stored for later.Is a transfer of money from one bank account to another one.Means that money is the common measure of worth or price of a good.Is a security that pays interest over terms ranging from 2-10 years....

Draeko Cybersecurity Crossword 2024-10-26

Draeko Cybersecurity Crossword crossword puzzle
Across
  1. A form of malware that encrypts a user’s data and demands payment to unlock it.
  2. Malware that gathers information about a person or organization without their knowledge.
  3. Malware that gathers information about a person or organization without their knowledge.
  4. A network security device or software that monitors and controls incoming and outgoing traffic.
  5. A simulated cyberattack to evaluate the security of a system.
  6. An extra layer of security requiring two forms of identification for access.
Down
  1. The psychological manipulation of people to disclose confidential information.
  2. Software intentionally designed to cause damage, such as viruses, worms, and Trojans.
  3. The process of converting information into a code to prevent unauthorized access.
  4. A type of social engineering attack where attackers trick users into revealing personal information.
  5. A trial-and-error method used to guess passwords or encryption keys.
  6. An attack where multiple systems flood a target, causing denial of service.
  7. A tool that encrypts internet traffic and hides a user’s IP address.
  8. A flaw in software that is unknown to the vendor and, therefore, unpatched.
  9. A network of infected devices controlled remotely by a hacker, typically to launch large-scale attacks.

15 Clues: A simulated cyberattack to evaluate the security of a system.A trial-and-error method used to guess passwords or encryption keys.A tool that encrypts internet traffic and hides a user’s IP address.An attack where multiple systems flood a target, causing denial of service.A flaw in software that is unknown to the vendor and, therefore, unpatched....

about computers 2022-11-22

about computers crossword puzzle
Across
  1. local area network
  2. the brain of the computer
  3. allow users to collaborate
  4. a device use to put and get out information out of a computer
  5. dealing with strangers on the interact
  6. wide area network
  7. when someone uses your account to see your private information
  8. junk message that sent in bulk
  9. a data storage device
Down
  1. drive to keep your own information in it
  2. a network security that keeps what goes in and what goes out
  3. Security network use to protect the computer from the outside
  4. use copyright law permitted by a limited use
  5. a hardware unit use to connect and function as a part of a larger system
  6. short term memory storage
  7. kind of like copyright but it's not illegal
  8. thing that plugs into the usb fort of a computer
  9. like plagiarism but it's illegal
  10. storage device

19 Clues: storage devicewide area networklocal area networka data storage devicethe brain of the computershort term memory storageallow users to collaboratejunk message that sent in bulklike plagiarism but it's illegaldealing with strangers on the interactdrive to keep your own information in itkind of like copyright but it's not illegal...

Crossword Puzzle - Managed Edition 2024-09-27

Crossword Puzzle - Managed Edition crossword puzzle
Across
  1. Available for MFAP but not other Managed Accounts
  2. The one trading on the account's best interest
  3. Process of replacing a security in an asset allocation
  4. Soft closed product
  5. Realigns asset weightings
  6. Consists of series of checkpoints before account can be released for trading
  7. Where advisors create and maintain models
  8. Can be entered as security or sectors
  9. Consists of client's financial profile and investment experience and objectives
  10. A party role for Joint Account
  11. Customizable asset allocation and flexible model
  12. Offers access to Taxable and municipal bond portfolios
Down
  1. Change in Account ownership an / or strategy for CSP
  2. A Party Role for UTMA
  3. Designed to be short term account and no BUYS are permitted.
  4. Must be met when funding managed accounts
  5. Good for 60 days
  6. Used to copy all existing holdings and % to a new model
  7. Min program10K, 250K and 750K

19 Clues: Good for 60 daysSoft closed productA Party Role for UTMARealigns asset weightingsMin program10K, 250K and 750KA party role for Joint AccountCan be entered as security or sectorsMust be met when funding managed accountsWhere advisors create and maintain modelsThe one trading on the account's best interest...

ITS OLYMPICS 2025-09-18

ITS OLYMPICS crossword puzzle
Across
  1. Measures to protect computers, networks, and data
  2. Being responsible for one’s actions
  3. Assigning tasks to others effectively
  4. Software installed on a computer to perform tasks
  5. Working from a distance using technology
  6. Transferring data from your device to the internet or server
  7. A storage container for documents or data
  8. Understanding and sharing the feelings of others
  9. Ability to see and plan for the future
  10. Online meeting platform
  11. A web link that directs you to another page or file
Down
  1. Ensuring only authorized users can access a system
  2. The ability to use technology regardless of ability or disability
  3. Programming language used to make web pages interactive
  4. Security process requiring two steps to verify identity
  5. Ability to recover from setbacks or challenges
  6. Working together toward a common goal
  7. A program designed to harm or steal data
  8. Information given to improve performance

19 Clues: Online meeting platformBeing responsible for one’s actionsAssigning tasks to others effectivelyWorking together toward a common goalAbility to see and plan for the futureWorking from a distance using technologyA program designed to harm or steal dataInformation given to improve performanceA storage container for documents or data...

Safety Switch Crossword 2024-05-11

Safety Switch Crossword crossword puzzle
Across
  1. Who you take safety concerns to.
  2. What is available if we are injured at work?
  3. What we do with near misses.
  4. What to complete after a safety incident.
  5. What comes first, always?
Down
  1. What you always need for cleaning tasks.
  2. What we remember with security incidents.
  3. The step before fixing hazards.
  4. What to do if you see unsafe behaviour?
  5. What should we do after mistakes?
  6. How do you report security incidents?

11 Clues: What comes first, always?What we do with near misses.The step before fixing hazards.Who you take safety concerns to.What should we do after mistakes?How do you report security incidents?What to do if you see unsafe behaviour?What you always need for cleaning tasks.What we remember with security incidents.What to complete after a safety incident....

Instagram 2018-06-04

Instagram crossword puzzle
Across
  1. Welcher Plattform ähnelt Instagram immer mehr?
  2. Was kann man machen um seine eigene Privatsphäre zu schützen?
  3. Bei welcher Altergruppe ist diese Plattform hoch im Gebrauch?
Down
  1. Ein Grund warum Instgaram Snap Chat immer mehr ähnelt.
  2. Was ist das Mindestalter um Instagram nutzen zu dürfen?
  3. Wie nennt man "Hass-Kommentare" noch?
  4. Was sollte man ändern wenn das Konto gehackt wurde?
  5. Was ist Instagram?
  6. Was ist das Symbol von Instgram?

9 Clues: Was ist Instagram?Was ist das Symbol von Instgram?Wie nennt man "Hass-Kommentare" noch?Welcher Plattform ähnelt Instagram immer mehr?Was sollte man ändern wenn das Konto gehackt wurde?Ein Grund warum Instgaram Snap Chat immer mehr ähnelt.Was ist das Mindestalter um Instagram nutzen zu dürfen?...

Talk To Me in Cybersecurity 2021-09-16

Talk To Me in Cybersecurity crossword puzzle
Across
  1. Three aspects of management that, when well-coordinated, ensure a company and its people behave ethically, run the business effectively, mitigate risks appropriately and comply with internal policies and external regulations
  2. A formal and approved list of users who have defined access rights to an asset
  3. Attempts to disrupt normal traffic of a targeted server, service or network to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources
  4. Software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
  5. A technology and business process designed to detect and prevent violations to corporate policies regarding the use, storage, and transmission of sensitive data
  6. Surveillance software that can record every keystroke made on a computer’s keyboard
  7. The practice of testing a computer system or network to find vulnerabilities that cybercriminals could exploit
  8. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
  9. Represents a rapidly growing class of non-traditional computing devices that are connected to the internet to drive some sort of intelligent operation
  10. The psychological manipulation of people into performing actions or divulging confidential information
  11. Computer program used to prevent, detect, and remove malware
Down
  1. The U.S. federal agency responsible for developing and maintaining the “Framework for Improving Critical Infrastructure Cybersecurity,” a collection of voluntary guidelines to help organizations manage their information security risks
  2. Software used to monitor, log, provide alerts and analyze security events to support threat detection and incident response
  3. Refers to a company security policy that allows for employees’ personal devices to be used in business
  4. Devices or software designed to find and prevent malicious activity on corporate networks
  5. Actions a company takes to manage the aftermath of a security breach or cyberattack
  6. A type of authentication method where the proof of a user’s identity is gained by different independent sources

17 Clues: Computer program used to prevent, detect, and remove malwareA formal and approved list of users who have defined access rights to an assetSurveillance software that can record every keystroke made on a computer’s keyboardActions a company takes to manage the aftermath of a security breach or cyberattack...

physical security 2022-01-13

physical security crossword puzzle
Across
  1. a form of security to prevent damage to cabling and stop any destruction of cables.
  2. Alarms are a deterrent that also signals authorities if any breach is detected within the system
  3. cameras used to monitor a specific location.
  4. any form of human features that are used to unlock a lock or open a system. This could be a fingerprint to scan on the lock
Down
  1. hired people that will monitor a location or assets to physically keep potential threats away and to stop any issues
  2. Card entry systems use a card as key and a scanner as a lock to remotely open some form of lock. These cards wirelessly work on the scanner to unlock the lock
  3. made of pins that need to line up to open. A key is used to move these pins into place
  4. These keep any threats out from the physical assets, by locking a box

8 Clues: cameras used to monitor a specific location.These keep any threats out from the physical assets, by locking a boxa form of security to prevent damage to cabling and stop any destruction of cables.made of pins that need to line up to open. A key is used to move these pins into place...

Computer security 2020-09-08

Computer security crossword puzzle
Across
  1. scam that users' private data of internet
  2. detect and remove virus and other programs
  3. store information about you
  4. designed to infiltrate your device
Down
  1. software that collects information from computer
  2. prevent unauthorized access
  3. alter the functioning of the computer
  4. is the unsolicited email that a person receives

8 Clues: prevent unauthorized accessstore information about youdesigned to infiltrate your devicealter the functioning of the computerscam that users' private data of internetdetect and remove virus and other programsis the unsolicited email that a person receivessoftware that collects information from computer

Internet Security 2013-04-19

Internet Security crossword puzzle
Across
  1. unwanted emails
  2. the style of design which helps prevent strains from using a computer alot
  3. someone who breaks into a computer system
  4. computer security which blocks unorthorised access
Down
  1. short distance method of exchanging data, common with mobile phones
  2. A way of trying to obtain personal information for financial gain
  3. a group of computers exchanging data
  4. Can be downloaded and may damage programs and data

8 Clues: unwanted emailsa group of computers exchanging datasomeone who breaks into a computer systemCan be downloaded and may damage programs and datacomputer security which blocks unorthorised accessA way of trying to obtain personal information for financial gainshort distance method of exchanging data, common with mobile phones...

Security pops 2023-03-23

Security pops crossword puzzle
Across
  1. April
  2. Toby
  3. Mr.Huddleston
Down
  1. Melanie
  2. Ken
  3. Safety
  4. Elizabeth
  5. Marshall

8 Clues: KenTobyAprilSafetyMelanieMarshallElizabethMr.Huddleston

AI Security 2020-04-16

AI Security crossword puzzle
Across
  1. Artificial Assistant found in Apple devices
  2. a dangerous piece of software
  3. An AI with free thought
  4. AI that is made to socialize with people
Down
  1. Artificial Assistant found in newer Samsung devices
  2. The premise of CIS 1290
  3. AI made to sniff out malware
  4. The capability of a machine to imitate human behavior

8 Clues: The premise of CIS 1290An AI with free thoughtAI made to sniff out malwarea dangerous piece of softwareAI that is made to socialize with peopleArtificial Assistant found in Apple devicesArtificial Assistant found in newer Samsung devicesThe capability of a machine to imitate human behavior

Security council 2022-05-10

Security council crossword puzzle
Across
  1. An economic sanction
  2. someone forced to run away from their country
  3. To conquer a territory
  4. President of Russia
  5. A treaty between countries
Down
  1. Pact A treaty between ex soviet countries
  2. president of Ukraine
  3. To move a product or resource between countries

8 Clues: President of Russiapresident of UkraineAn economic sanctionTo conquer a territoryA treaty between countriesPact A treaty between ex soviet countriessomeone forced to run away from their countryTo move a product or resource between countries

Security council 2022-05-10

Security council crossword puzzle
Across
  1. someone forced to run away from their country
  2. President of Russia
  3. president of Ukraine
  4. A treaty between ex soviet countries
Down
  1. An economic sanction
  2. To move a product or resource between countries
  3. A treaty between countries
  4. To conquer a territory

8 Clues: President of RussiaAn economic sanctionpresident of UkraineTo conquer a territoryA treaty between countriesA treaty between ex soviet countriessomeone forced to run away from their countryTo move a product or resource between countries

Security Training 2022-08-01

Security Training crossword puzzle
Across
  1. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  2. The system that maintains the safety and security of the branch.
  3. gathering the cash in their cash box in one motion in the event of a robbery.
  4. A method used to introduce illegally obtained funds into the financial system to conceal the true ownership and source of funds.
Down
  1. A type of fraud that occurs mainly at a POS terminal using a device. The fraudster will swipe the card twice. The second swipe records data from the first and second track fields on the magnetic strip. The card information is then reprinted onto a counterfeit card.
  2. A job's four-digit unique identifier.
  3. any information the disclosure of which is prohibited or limited in accordance with applicable federal or state banking privileges, regulations, or laws.
  4. A deception made for personal gain.

8 Clues: A deception made for personal gain.A job's four-digit unique identifier.The system that maintains the safety and security of the branch.gathering the cash in their cash box in one motion in the event of a robbery.A method used to introduce illegally obtained funds into the financial system to conceal the true ownership and source of funds....

Internet security 2022-11-03

Internet security crossword puzzle
Across
  1. Designed to obtain personal information without the user's permission
  2. Company uses .... techniques to decode (or decipher) secret data
  3. Malware that is used to pose as different software
Down
  1. Encoding data so that unauthorized users can't read it is known as ...
  2. Protects a company intranet from outside attacks.
  3. Can infect your files and corrupt your hard drive
  4. Users have to enter a ... to gain access to a network.
  5. Person who uses their computer skills to enter computers and/or networks illegally

8 Clues: Protects a company intranet from outside attacks.Can infect your files and corrupt your hard driveMalware that is used to pose as different softwareUsers have to enter a ... to gain access to a network.Company uses .... techniques to decode (or decipher) secret dataDesigned to obtain personal information without the user's permission...

Energy security 2022-09-11

Energy security crossword puzzle
Across
  1. the uninterrupted availability of energy sources at an affordable price
  2. measures that keep prices for consumers below market levels or for producers above market levels, or reduce costs for consumers and producers
  3. Fuel that was formed in the earth in prehistoric times from remains of living-cell organisms
  4. policy that encourages the development of energy technologies to diversify energy supply sources, thus reducing reliance on conventional fuels
Down
  1. are virtually inexhaustible in duration but limited in the amount of energy that is available per unit of time
  2. An arrangement whereby the same company owns all the different aspects of making, selling, and delivering a product or service
  3. lack of access to modern energy services
  4. energy made available for future disposition.

8 Clues: lack of access to modern energy servicesenergy made available for future disposition.the uninterrupted availability of energy sources at an affordable priceFuel that was formed in the earth in prehistoric times from remains of living-cell organisms...

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. A round green or red fruit with a thin skin and crunchy flesh
  2. A citrus fruit, often orange or green in color
  3. A fruit with a hard shell and water or white flesh inside
  4. A small, dark purple or green fruit that grows in bunches
Down
  1. A tropical fruit with spiky skin and sweet yellow flesh
  2. A yellow fruit that monkeys love
  3. A fruit with a hard shell and water or white flesh inside
  4. A juicy red fruit with tiny seeds on its surface
  5. A small red fruit often used in pies

9 Clues: A yellow fruit that monkeys loveA small red fruit often used in piesA citrus fruit, often orange or green in colorA juicy red fruit with tiny seeds on its surfaceA tropical fruit with spiky skin and sweet yellow fleshA fruit with a hard shell and water or white flesh insideA fruit with a hard shell and water or white flesh inside...

INFORMATION SECURITY 2025-04-06

INFORMATION SECURITY crossword puzzle
Across
  1. To modernize
  2. An event that affects negatively
  3. … is used to restore the original in case of a data loss event
  4. Registration of all actions with information systems
  5. Physical … such as disks, flash drives, HDDs are used to store and transmit data
Down
  1. Security … allows access to sensitive information
  2. Cryptographic transformation of information
  3. A character string which helps to verify the user’s identity

8 Clues: To modernizeAn event that affects negativelyCryptographic transformation of informationSecurity … allows access to sensitive informationRegistration of all actions with information systemsA character string which helps to verify the user’s identity… is used to restore the original in case of a data loss event...

Cybersecurity Terms 2023-10-27

Cybersecurity Terms crossword puzzle
Across
  1. Mobile Acquisition
  2. Picus Security
  3. Incident Response
  4. GRC
  5. Razeen
  6. Toddlers
  7. Data Classification
  8. Philip Cherian
Down
  1. Mobile Device Management
  2. Video Forensics
  3. Checkmarx
  4. External Threat Landscape
  5. #NotTraditionalPAM
  6. Purple
  7. Teel Tech

15 Clues: GRCPurpleRazeenToddlersCheckmarxTeel TechPicus SecurityPhilip CherianVideo ForensicsIncident ResponseMobile Acquisition#NotTraditionalPAMData ClassificationMobile Device ManagementExternal Threat Landscape

5/20 - DO NOW (tener que) 2025-05-13

5/20 - DO NOW (tener que) crossword puzzle
Across
  1. el mapa
  2. la seguridad
  3. aeropuerto
  4. la playa
  5. el taxi
  6. la estación de autobús
  7. el volcán
  8. el viaje
Down
  1. pasaporte
  2. nadar
  3. las maletas
  4. la playa
  5. el boleto
  6. el ascensor
  7. hotel
  8. embarque

16 Clues: nadarhotelel mapael taxila playala playaembarqueel viajepasaporteel boletoel volcánaeropuertolas maletasel ascensorla seguridadla estación de autobús

English IT Crossword 2020-05-09

English IT Crossword crossword puzzle
Across
  1. - wprowadzenie
  2. - komunikacja
  3. - nadgarstkowy
  4. - roczny
  5. - projektant
  6. - dane
  7. - elektroniczny
  8. - projekt
  9. - efektywnie
  10. - analizuj
  11. - nośnik
  12. - współpracownik
  13. - dodatek
  14. - tło
  15. - konsultant
  16. - finanse
  17. - laboratorium
  18. - zatrudnić
  19. - dyskusja
  20. - utworzyć
  21. - analitycy
  22. - firma
  23. - funkcja
  24. - wdrożenie
  25. - szef
  26. - rozdział
  27. - programista
  28. - finansowe
  29. - przemęczenie oczu
  30. - baza danych
  31. - zaliczka
  32. - środowisko
  33. - certyfikacja
  34. - architekt
  35. - skoncentrować się
  36. - zaangażowany
  37. - wirtualne
  38. - rozwój
  39. - szczegółowy
  40. - umiejętność
Down
  1. - wiedza
  2. - administrator
  3. - opinia
  4. - znacznie
  5. - powstanie
  6. - inżynieria
  7. - inżynier
  8. - instytucja
  9. - sprzęt komputerowy
  10. - cel
  11. - sprawa
  12. - intranet
  13. - analiza
  14. - informatyka
  15. - konkurencyjny
  16. - przedsiębiorstwo
  17. - klient
  18. - powszechny
  19. - biznes
  20. - instalacja
  21. - spadek
  22. - żądanie
  23. - komputer
  24. - sprzęt
  25. - moc
  26. - konsulting
  27. - obszar
  28. - ubezpieczenie
  29. - klawiatura
  30. - komunikować się
  31. - księgowość
  32. - zastosowanie
  33. - określenia
  34. - odpowiednie
  35. - kod
  36. - ukończyć
  37. - zintegrować
  38. - współrzędna
  39. - wydajność
  40. - instrukcja

80 Clues: - cel- tło- moc- kod- dane- szef- firma- wiedza- opinia- roczny- nośnik- sprawa- klient- biznes- spadek- sprzęt- obszar- rozwój- projekt- analiza- dodatek- finanse- żądanie- funkcja- znacznie- inżynier- analizuj- intranet- dyskusja- utworzyć- komputer- rozdział- zaliczka- ukończyć- powstanie- zatrudnić- analitycy- wdrożenie- finansowe- wydajność...

PDHPE Crossword 2016-08-23

PDHPE Crossword crossword puzzle
Across
  1. The part of the body you taste with
  2. A example of the meat food group
  3. The muscle that pumps blood around your body
  4. Mental or emotional strain
  5. A type of bullying that happens online
  6. The part of the body you smell with
  7. The organ that does the most digesting
  8. A example of the dairy food group
  9. An example of the fruit food group
  10. The part of the body you see with
Down
  1. A feeling of unease, worry or nervousness
  2. The organ that oxygenates your blood
  3. The scaffolding of your body
  4. A example of the vegetable food group
  5. It can happen to anyone
  6. bullying Excluding someone or spreading rumours
  7. The biggest organ in the human body
  8. A example of the carbohydrates food groups
  9. The part of the body you hear with
  10. The part of your body that pumps blood to your organs

20 Clues: It can happen to anyoneMental or emotional strainThe scaffolding of your bodyA example of the meat food groupA example of the dairy food groupThe part of the body you see withAn example of the fruit food groupThe part of the body you hear withThe part of the body you taste withThe part of the body you smell withThe biggest organ in the human body...

11/23/2021 Crossword 2021-11-23

11/23/2021 Crossword crossword puzzle
Across
  1. 50 Cent grew up here: Jamaica ___
  2. Moana's dad (2 words)
  3. "Infinity War" antagonist
  4. "Family Feud" host (2 words)
  5. Not Black Friday, but ___ Monday
  6. Movie "___ Evil: Welcome to Raccoon City"
  7. His death started WWI
  8. Edible soup bowl
  9. "The Lottery" author
  10. "sauce" put on turkey
  11. Thanksgiving dessert ___ pie
  12. Snoop Dogg's cousin "Moesha"
  13. He plays Joe on "You"
  14. Ship the Pilgrims took
Down
  1. Rafferty song "___ Street" used in "GTA V"
  2. Netflix animated series "Big ___"
  3. Card game for one
  4. Show her some R.E.S.P.E.C.T
  5. Turkey leg
  6. Thanksgiving side dish ___ yams
  7. White Stripes song "Seven ___ Army"
  8. Rihanna country of origin
  9. Cornucopia meaning "horn of ___"
  10. "Aladdin" song "___ Like Me"
  11. Prayer before dinner
  12. Bread mixture that goes in the bird
  13. Video game "___ 2K"
  14. "Levitating" singer (2 words)
  15. Cavs rookie ___ Mobley
  16. -ology means "the ___ of"
  17. Thanksgiving month
  18. Edible soup bowl
  19. "Vampire Diaries" spinoff

33 Clues: Turkey legEdible soup bowlEdible soup bowlCard game for oneThanksgiving monthVideo game "___ 2K"Prayer before dinner"The Lottery" authorMoana's dad (2 words)His death started WWI"sauce" put on turkeyHe plays Joe on "You"Cavs rookie ___ MobleyShip the Pilgrims took"Infinity War" antagonistRihanna country of origin-ology means "the ___ of"...

Crossword 2022-05-14

Crossword crossword puzzle
Across
  1. the adjective from innovation
  2. Portable computer
  3. to change in to stronger or more advanced from
  4. present ideas and method
  5. nort in use anymore, having been replaced by something better
  6. a device that operates
  7. To develop towards an improved or more advanced state
  8. behavior of something or someone
  9. to change something in order to make in better
  10. a person who know a lot about technology especially computer
  11. computers
Down
  1. the physical part of a computer or related device
  2. The effect of something
  3. something you could not manage without; absolutely necessary
  4. The power to have an effect on the character, development
  5. of the present time;
  6. complete or dramatic or improvement
  7. Involving or causing
  8. connected to the internet
  9. Relating to or involving technology
  10. electronic current passing through it
  11. The right to keep personal information secret
  12. Involving, using or relating to computers

23 Clues: computersPortable computerof the present time;Involving or causinga device that operatesThe effect of somethingpresent ideas and methodconnected to the internetthe adjective from innovationbehavior of something or someonecomplete or dramatic or improvementRelating to or involving technologyelectronic current passing through it...

Health Crossword 2023-11-06

Health Crossword crossword puzzle
Across
  1. feeling influenced to do something
  2. something you make and then actively try to reach
  3. a mean person
  4. online way of communication (2 words)
  5. someone who learn with their hands
  6. A hazardous situtation, syn.
  7. to stop something from happening
  8. psychological well-being (2 words)
  9. a connection between two people
  10. someone who learns best by seeing
Down
  1. a profession
  2. to joke around with someone
  3. strong body, strong mind
  4. forcing someone to do something under a threat
  5. unlike any other
  6. a type of bullying done online
  7. A group of people who intend to cause harm
  8. any action by a person/group that causes physical or emotional harm
  9. An "i'm not failing, i'm learning" attitude (2 words)
  10. someone who is of the same age or group as you
  11. when one is extremely poor
  12. someone who learns best by listening

22 Clues: a professiona mean personunlike any otherstrong body, strong mindwhen one is extremely poorto joke around with someoneA hazardous situtation, syn.a type of bullying done onlinea connection between two peopleto stop something from happeningsomeone who learns best by seeingfeeling influenced to do somethingsomeone who learn with their hands...

Barkmans Crossword 2024-01-04

Barkmans Crossword crossword puzzle
Across
  1. - How computers are wirelessly connected
  2. Firewall - protects your computer from viruses
  3. Compression Tool - shrinks the size of files
  4. device - what shows the user info
  5. computing - using less energy to compute
  6. - etiquette of the internet
  7. Extortionist - stop hacking in exchange currency
  8. Vision Syndrome - computer affected eyesight
  9. - an integrated interface within devices
  10. device - how you enter info
  11. - what gives your device info
Down
  1. - business online
  2. Device Convergence - technology that needs less computers
  3. Web Design - the resolution matches the screen
  4. - unaware of a virus
  5. System - made of 1s and 0s
  6. - your position whilst computing
  7. - accessing a device illegally
  8. - how clear the screen is
  9. social network - users alike can engage together
  10. - organized data
  11. - stores info on you computer
  12. Aggregation - a compilations of information
  13. Defragmenter - organizer of data on a disk
  14. Protector - protects electronics against power surges

25 Clues: - organized data- business online- unaware of a virus- how clear the screen isSystem - made of 1s and 0s- etiquette of the internetdevice - how you enter info- stores info on you computer- what gives your device info- accessing a device illegally- your position whilst computingdevice - what shows the user info...

Project 2024-01-08

Project crossword puzzle
Across
  1. - collection of computers
  2. - a small text stored on the computer
  3. Protector - minimize chance of overcharge
  4. - radio frequency technology
  5. - collection of data to allow retrieval
  6. Extortionist - demands payment to stop their attack
  7. - an electrical disturbance
  8. - files waiting in the buffer
  9. Vision Syndrome - computer related eye health condition
  10. - accesses a computer illegally
  11. Aggregation - users collect and compile the data
  12. - number of horizontal and vertical pixels
Down
  1. - delivers webpages to your computer
  2. - unaware the device is compromised
  3. - mobile operating system
  4. - more expensive DVD format
  5. System - unique numbers 0 and 1
  6. - a display technology that uses liquid compound
  7. - aircraft controlled with a controller
  8. - programs for assistance
  9. - business transaction over the internet
  10. - applied science for comfort and efficiency
  11. - request of specific data from database
  12. - internet etiquette
  13. Aggregation - called a curation website
  14. Firewall - protects a personal computer from viruses
  15. Compression Tool - tool that compresses files

27 Clues: - internet etiquette- collection of computers- mobile operating system- programs for assistance- more expensive DVD format- an electrical disturbance- radio frequency technology- files waiting in the bufferSystem - unique numbers 0 and 1- accesses a computer illegally- unaware the device is compromised- delivers webpages to your computer...

Futurama 2024-05-14

Futurama crossword puzzle
Across
  1. Where did Fry meet Bender?
  2. President of Earth at the end of the fourth season
  3. "Bachelor Chow, now with ____!"
  4. Lrr rules
  5. Home of amy's parents
  6. ___ don't work that way! GOOD NIGHT!
  7. Leela's boyfriend in "The Cyber House Rules"
  8. What is Leela
  9. Fry's favorite drink
  10. fry and bender's apartment complex
  11. In "Parasites Lost" what does fry eat that had the parasites?
  12. two meals in one week
  13. What's strange about Zoidberg?
  14. If it wasn't torpedo three, what was it?
  15. Brother of Fry
  16. Original voice of Robot Santa
  17. Planet at the exact center of the universe
  18. Leela Surname
Down
  1. Reward for saving the earth from global warming
  2. Cutest pet in the universe
  3. Zoidberg and Calculon Movie
  4. Fry was named after a ____
  5. Voice of fry
  6. Zapp's ride
  7. What is Bender
  8. First Tagline

26 Clues: Lrr rulesZapp's rideVoice of fryWhat is LeelaFirst TaglineLeela SurnameWhat is BenderBrother of FryFry's favorite drinkHome of amy's parentstwo meals in one weekWhere did Fry meet Bender?Cutest pet in the universeFry was named after a ____Zoidberg and Calculon MovieOriginal voice of Robot SantaWhat's strange about Zoidberg?...

M Jangki Dausad X-E 21 2025-04-15

M Jangki Dausad X-E 21 crossword puzzle
Across
  1. Singkatan dari Hak atas Kekayaan Intelektual?
  2. Proses membuat isi digital?
  3. Proses memastikan data benar?
  4. Nama lain dari isi digital?
  5. Ahli dalam jaringan komputer?
  6. Pelanggaran HAKI disebut juga?
  7. Ahli keamanan sistem komputer?
  8. Kata yang diketik di mesin pencari?
  9. Tempat kita mengetik kata kunci untuk mencari informasi?
  10. Orang yang membuat aplikasi?
  11. Profesi yang membuat tampilan web menarik?
  12. Salah satu karya seni yang dilindungi HAKI?
  13. Aplikasi populer untuk konten video?
Down
  1. Proses membuat video untuk media sosial?
  2. Format email dicek dengan proses ini?
  3. Hasil yang muncul dari pencarian?
  4. Profesi yang bertugas mengelola jaringan komputer?
  5. Mesin pencari paling populer di dunia?
  6. Hak yang dimiliki pencipta atas karyanya?
  7. Profesi yang bekerja di bidang IT?
  8. Validasi mencegah terjadinya?
  9. Validasi menjamin data?
  10. Validasi dilakukan sebelum data?
  11. Tujuan utama membuat konten?
  12. engine Istilah lain dari mesin pencari?
  13. HAKI melindungi jenis karya ini?
  14. Orang yang membuat konten?

27 Clues: Validasi menjamin data?Orang yang membuat konten?Proses membuat isi digital?Nama lain dari isi digital?Tujuan utama membuat konten?Orang yang membuat aplikasi?Validasi mencegah terjadinya?Proses memastikan data benar?Ahli dalam jaringan komputer?Pelanggaran HAKI disebut juga?Ahli keamanan sistem komputer?Validasi dilakukan sebelum data?...

tech 2024-10-09

tech crossword puzzle
Across
  1. design designing online
  2. a arrangement of horizontal and vertical lines
  3. docs online website for document
  4. funny meme
  5. place to find information
  6. a set of instructions for a program
  7. online currency
  8. programs used by a computer
  9. theory guidelines designers use to create visually appealing color combination
  10. something with the alphabet
  11. something people use to program robots
  12. something that will take over the world
  13. fonts fonts online
Down
  1. something that connects something to your phone wirelessly
  2. kanani best teacher in the world
  3. mapping system
  4. bullying bullying online
  5. something that people disconnect
  6. turn your device back on
  7. somebody that has influence
  8. something that's in star wars
  9. most bought thing from apple
  10. games online games
  11. something you can charge things with
  12. somthing websites give you
  13. media social platform
  14. something that projects something
  15. has every answer
  16. something that gives you internet
  17. remote something that controls a tv

30 Clues: funny mememapping systemonline currencyhas every answergames online gamesfonts fonts onlinemedia social platformdesign designing onlinebullying bullying onlineturn your device back onplace to find informationsomthing websites give yousomebody that has influenceprograms used by a computersomething with the alphabetmost bought thing from apple...

Grow in Grace 2013-10-19

Grow in Grace crossword puzzle
Across
  1. In Christian term, it is the act of maturing.
  2. The condition of man.
  3. Every person has come _______ of the glory...
  4. Our security comes from God's __________.
  5. Not knowing for sure.
  6. Book in the Bible that teaches that there are two types of people.
  7. You are saved through _________.
  8. According to his ________ we are saved. (Titus 3:5)
Down
  1. Salvation is really a new __________.
  2. Salvation is like this, it is always free.
  3. Another term for payment.
  4. Equitable in character or act.
  5. It is the assurance of Salvation.
  6. It is a paper, the value of which depends upon its acceptance by the person implicated.

14 Clues: The condition of man.Not knowing for sure.Another term for payment.Equitable in character or act.You are saved through _________.It is the assurance of Salvation.Salvation is really a new __________.Our security comes from God's __________.Salvation is like this, it is always free.In Christian term, it is the act of maturing....

Round 3 Finance Crossword 2024-11-14

Round 3 Finance Crossword crossword puzzle
Across
  1. India's Financial Capital
  2. An asset pledged as security for the repayment of a loan
  3. The date on which the instrument becomes due
  4. Which country has the most Billionaires
  5. india's biggest philanthropist (Current)
  6. The term for the number of employees assigned to a manager
Down
  1. Tradable financial instruments that represent ownership (stocks)
  2. Airlines that has the biggest customer base during 2008-2011 (Named after a bird)
  3. In USP, P stands for?
  4. India's largest Cars and Trucks exporter
  5. The one organizes a company's Funances
  6. Current chairperson of NITI Ayog
  7. Largest finance company in India
  8. Indian Bank with most branches in foreign country

14 Clues: In USP, P stands for?India's Financial CapitalCurrent chairperson of NITI AyogLargest finance company in IndiaThe one organizes a company's FunancesWhich country has the most BillionairesIndia's largest Cars and Trucks exporterindia's biggest philanthropist (Current)The date on which the instrument becomes due...

QAF5.2.IAM301 2025-11-03

QAF5.2.IAM301 crossword puzzle
Across
  1. Linking identities across organizations or systems
  2. Single Sign-On allowing one login for multiple apps
  3. Result of unsynchronized clocks in SSO systems
  4. Restricting token use to one specific device
  5. Multi-Factor Authentication adding extra login security
  6. Granting only the access needed to perform a job
  7. Privileged Access Management for admin accounts
Down
  1. Security model that verifies every access request
  2. Attack type limited by short token lifespans
  3. Temporary credential used for authentication
  4. Digital credential whose misconfiguration causes trust issues
  5. Analogy for IAM verifying user access like a club guard
  6. Protocol that uses timestamps to prevent tampering
  7. Manages who can access which systems or resources

14 Clues: Attack type limited by short token lifespansTemporary credential used for authenticationRestricting token use to one specific deviceResult of unsynchronized clocks in SSO systemsPrivileged Access Management for admin accountsGranting only the access needed to perform a jobSecurity model that verifies every access request...

Roberson Chapter 3 2013-06-09

Roberson Chapter 3 crossword puzzle
Across
  1. ___________ warning
  2. Court order
  3. Rodney _______
  4. Diplomatic ___________ (plural)
  5. recording an arrest
  6. Tennessee v. ____________
  7. __________ v. Bedinger
  8. _________ level stop
Down
  1. Federal Bureau of Investigation
  2. ________________ suspicion
  3. stop and _________
  4. Department of _________ Security
  5. ______________ detention
  6. Searches and __________
  7. __________ v. Municipal Court of
  8. A seizure
  9. Tom __________
  10. ________ pursuit

18 Clues: A seizureCourt orderRodney _______Tom __________________ pursuitstop and ____________________ warningrecording an arrest_________ level stop__________ v. BedingerSearches and ________________________ detentionTennessee v. ____________________________ suspicionFederal Bureau of InvestigationDiplomatic ___________ (plural)...

The Executive Cabinet 2025-03-10

The Executive Cabinet crossword puzzle
Across
  1. focuses on programs and services and services that improve the well-being of society (_______ and Human Services)
  2. handles foreign policy and international relations
  3. deals with housing programs and the development of highly populated areas (Housing and _____ Development)
  4. oversees policies and programs that affect schools and FAFSA
  5. oversees farming and food safety
  6. handles policies related to fuel sources and nuclear security
  7. manages national parks and natural resources
Down
  1. promotes economic growth and technological innovation
  2. serves former military personnel
  3. enforces federal laws
  4. oversees infrastructure related to roads, railroads and airports
  5. manages the nation's finances and collects taxes
  6. responsible for protecting the country against foreign invasion
  7. focusing on domestic security
  8. protects workers' rights

15 Clues: enforces federal lawsprotects workers' rightsfocusing on domestic securityserves former military personneloversees farming and food safetymanages national parks and natural resourcesmanages the nation's finances and collects taxeshandles foreign policy and international relationspromotes economic growth and technological innovation...

vocabulary pg 72 2024-04-17

vocabulary pg 72 crossword puzzle
Across
  1. - its something that is clean and maybe is a clue
  2. - in the act of killing something
  3. - a mark left by a foot, as in earth or sand:
  4. - look for
  5. - go after someone
  6. officers - is a person who arrest criminals
  7. - the police catch somebody
  8. - You see a lot of details of security
  9. - is an arm that police man use
Down
  1. - is a desing that all people have in her hands
  2. - a police officer or a private investigator whose job is to get information and evidence about crime
  3. - to seize or capture a criminal
  4. - the act of stealling
  5. - catch something that isn´t yours
  6. guard - a person who works in a place triying to prevent a crimen
  7. - find the solution
  8. - is a place where the criminals go
  9. - is a person who steal something

18 Clues: - look for- go after someone- find the solution- the act of stealling- the police catch somebody- is an arm that police man use- to seize or capture a criminal- in the act of killing something- is a person who steal something- catch something that isn´t yours- is a place where the criminals go- You see a lot of details of security...

vocabulary pg 72 2024-04-17

vocabulary pg 72 crossword puzzle
Across
  1. - its something that is clean and maybe is a clue
  2. - in the act of killing something
  3. - a mark left by a foot, as in earth or sand:
  4. - look for
  5. - go after someone
  6. officers - is a person who arrest criminals
  7. - the police catch somebody
  8. - You see a lot of details of security
  9. - is an arm that police man use
Down
  1. - is a desing that all people have in her hands
  2. - a police officer or a private investigator whose job is to get information and evidence about crime
  3. - to seize or capture a criminal
  4. - the act of stealling
  5. - catch something that isn´t yours
  6. guard - a person who works in a place triying to prevent a crimen
  7. - find the solution
  8. - is a place where the criminals go
  9. - is a person who steal something

18 Clues: - look for- go after someone- find the solution- the act of stealling- the police catch somebody- is an arm that police man use- to seize or capture a criminal- in the act of killing something- is a person who steal something- catch something that isn´t yours- is a place where the criminals go- You see a lot of details of security...

vocabulary pg 72 2024-04-17

vocabulary pg 72 crossword puzzle
Across
  1. - its something that is clean and maybe is a clue
  2. - in the act of killing something
  3. - a mark left by a foot, as in earth or sand:
  4. - look for
  5. - go after someone
  6. officers - is a person who arrest criminals
  7. - the police catch somebody
  8. - You see a lot of details of security
  9. - is an arm that police man use
Down
  1. - is a desing that all people have in her hands
  2. - a police officer or a private investigator whose job is to get information and evidence about crime
  3. - to seize or capture a criminal
  4. - the act of stealling
  5. - catch something that isn´t yours
  6. guard - a person who works in a place triying to prevent a crimen
  7. - find the solution
  8. - is a place where the criminals go
  9. - is a person who steal something

18 Clues: - look for- go after someone- find the solution- the act of stealling- the police catch somebody- is an arm that police man use- to seize or capture a criminal- in the act of killing something- is a person who steal something- catch something that isn´t yours- is a place where the criminals go- You see a lot of details of security...

Spanish Vocab 2024-05-10

Spanish Vocab crossword puzzle
Across
  1. passport
  2. immigration
  3. ticket booth
  4. life vest
  5. visa
  6. luggage
  7. ticket
  8. security
Down
  1. flight attendant
  2. window
  3. plane
  4. pilots

12 Clues: visaplanewindowpilotsticketluggagepassportsecuritylife vestimmigrationticket boothflight attendant

ASM 2020-11-22

ASM crossword puzzle
Across
  1. - This is how Office ID is called in ASM (2 words without space) (9)
  2. - It's used when MFA is activated for the application (4)
  3. - A component of the office ID (8)
  4. - A login, used to access the system and perform automated tasks within Amadeus application (7)
  5. - All changes to data stored in the system are logged and can be displayed using ... (7)
  6. - The graphical user interface of the Logon and Security Server (3)
  7. - A gateway, that routes messages to Logon and Security Server (2)
  8. - An aggregation of the Permissions or Sub-roles (4)
Down
  1. - We change the user status to ... when the employee has maternity leave (6)
  2. - You create ... when you want to group together offices within the Organization (2 words without a space) (16)
  3. - A component of the office mask (7)
  4. - Filter, used to define the format of the offices that can be attached to ORG or OGU (2 words without space) (10)
  5. - Payment Card Industry Data Security Standards (6)
  6. - This is the process for the users to use the same credentials to log into different Amadeus applications (3)
  7. - To change an office location within the Organization tree I use ... (4)

15 Clues: - A component of the office ID (8)- A component of the office mask (7)- Payment Card Industry Data Security Standards (6)- An aggregation of the Permissions or Sub-roles (4)- It's used when MFA is activated for the application (4)- A gateway, that routes messages to Logon and Security Server (2)...

Helloto 2025-11-19

Helloto crossword puzzle
Across
  1. – OSCE mediation format created to negotiate a political settlement of the Nagorno-Karabakh conflict.
  2. – 1994 document that formalized the ceasefire starting on 12 May 1994.
  3. – 2005 Council of Europe document condemning the occupation of one member state’s territory by another.
  4. – Principle emphasized by Azerbaijan to defend its internationally recognized borders.
  5. – Principle invoked by Armenia to justify claims regarding Nagorno-Karabakh’s status.
  6. – Autonomous region that became the main subject of the Armenia–Azerbaijan conflict.
  7. – 2007–2009 basic principles including liberation of territories, interim status and a future vote on Nagorno-Karabakh.
Down
  1. – Agreement brokered by Iran in May 1992 that collapsed after the occupation of Shusha.
  2. – 1996 OSCE summit that adopted principles affirming Azerbaijan’s territorial integrity.
  3. – First UN Security Council resolution demanding withdrawal of occupying forces from Kalbajar.
  4. – UN Security Council resolution of October 1993 that reaffirmed Nagorno-Karabakh as part of Azerbaijan.
  5. – Azerbaijani town where a massacre of civilians took place during the conflict.
  6. – 1994 OSCE meeting where the Minsk Group co-chairmanship and peacekeeping role were defined.
  7. – Azerbaijani district whose occupation led to UN Security Council Resolution 822 in 1993.
  8. – Strategically important town whose occupation marked a turning point in the war.

15 Clues: – 1994 document that formalized the ceasefire starting on 12 May 1994.– Azerbaijani town where a massacre of civilians took place during the conflict.– Strategically important town whose occupation marked a turning point in the war.– Autonomous region that became the main subject of the Armenia–Azerbaijan conflict....

DEFINITIONS - Working within the private security industry 2015-03-14

DEFINITIONS - Working within the private security industry crossword puzzle
Across
  1. Hostile attitude towards someone who belongs to a certain group.
  2. The security industry authority.
  3. Immediate assistance given to an injured person.
  4. Approved contractor scheme.
  5. Those who commit a sexual crime against the vulnerable.
  6. The sending and receiving of signals.
  7. Staff members responsible for an area of fire safety.
  8. Any serious unplanned incident
  9. The use of violence, threats and intimidation in pursuit of political aims.
  10. Anything hat makes communication difficult.
Down
  1. A state of feeling safe and secure.
  2. Identification of hazards and risks.
  3. Rules that prevent people from committing a serious offence
  4. Lumping certain groups of people together.
  5. Reporting of injuries diseases and dangerous occurrences regulations.
  6. Anyone who may be at risk of harm.
  7. When someone is treated less favourably than another person.
  8. Rules that help govern our daily lives.
  9. The likelihood of harm occurring.

19 Clues: Approved contractor scheme.Any serious unplanned incidentThe security industry authority.The likelihood of harm occurring.Anyone who may be at risk of harm.A state of feeling safe and secure.Identification of hazards and risks.The sending and receiving of signals.Rules that help govern our daily lives.Lumping certain groups of people together....

Roosevelt and the New Deal 2023-02-13

Roosevelt and the New Deal crossword puzzle
Across
  1. a debt security that the government sells in order to finance its spending
  2. the state of being successful and thriving, especially in financial terms
  3. security
  4. to define oneself
  5. planting trees in areas where they had been cut down
  6. lucky
  7. a campaign to support a political, social, or religious cause
  8. projects that are financed by government through tax revenues for the benefit of the people
  9. land not good for farming
Down
  1. lack of trees that can be cut down and used
  2. a strong invitation to participate in an important project
  3. giving out
  4. the ability to anticipate future events or needs
  5. to increase
  6. things that are not necessary for survival or basic comfort
  7. a long and severe economic downturn
  8. land where trees have been cut down
  9. someone who tells about the future
  10. wearing away of the top, fertile layer of soil

19 Clues: luckysecuritygiving outto increaseto define oneselfland not good for farmingsomeone who tells about the futurea long and severe economic downturnland where trees have been cut downlack of trees that can be cut down and usedwearing away of the top, fertile layer of soilthe ability to anticipate future events or needs...

Zero-Security Crossword 2013-08-11

Zero-Security Crossword crossword puzzle
Across
  1. term used for a white hat hacker is an ____ hacker
  2. someone who uses hacking to pursue ideological ends
  3. Adrian Lamo "the ___ hacker"
  4. 1983 hacker movie
  5. web sites use these to identify users who revisit their site
Down
  1. sequence of steps needed to solve logical or mathematical problems
  2. this prevents computers on a network from communicating directly with external computer systems.
  3. software used to record keystrokes
  4. Creator of the first worm (Robert Tappan ____)
  5. software program that monitors network traffic
  6. virus detection program that searches for viruses
  7. A flaw in a system that allows hackers to break in

12 Clues: 1983 hacker movieAdrian Lamo "the ___ hacker"software used to record keystrokesCreator of the first worm (Robert Tappan ____)software program that monitors network trafficvirus detection program that searches for virusesterm used for a white hat hacker is an ____ hackerA flaw in a system that allows hackers to break in...

computer security puzzle 2020-08-18

computer security puzzle crossword puzzle
Across
  1. stops your device from running properly
  2. something your computer can get
  3. to get into something
  4. a malware program
  5. a type of software
  6. operating information used by a computer
Down
  1. made to detect and destroy viruses
  2. causes harm to a computer system or network
  3. to pass from one thing to another
  4. having caution over something
  5. when a device has been harmed
  6. files that become inoperable or unusable

12 Clues: a malware programa type of softwareto get into somethinghaving caution over somethingwhen a device has been harmedsomething your computer can getto pass from one thing to anothermade to detect and destroy virusesstops your device from running properlyfiles that become inoperable or unusableoperating information used by a computer...

Network Security Crossword 2022-07-21

Network Security Crossword crossword puzzle
Across
  1. any piece of software, malicious or not, that displays advertisements on a computer.
  2. malware that threatens to publish the victims personal data, block access to the computer, unless a ransom is paid.
  3. malicious software that aims to gather information about a person or organisation.
  4. a cyberattack that redirects a website’s traffic to another, fake site by installing malware on the computer.
  5. software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.
  6. A person who gains unauthorised access to computer files or networks in order to further social or political ends.
Down
  1. The practice of protecting system, networks and programs from digital attacks
  2. A person who uses computers to gain unauthorised access to data.
  3. malware that replicates itself in order to spread to other computers.
  4. logging what keys people have tapped on the keyboard
  5. programs which users are tricked into installing under the pretence that they are legitimate and useful.
  6. A computer program which is hidden within another program (the ‘host’ program). the virus code is only run when the host program is executed.

12 Clues: logging what keys people have tapped on the keyboardA person who uses computers to gain unauthorised access to data.malware that replicates itself in order to spread to other computers.The practice of protecting system, networks and programs from digital attacksmalicious software that aims to gather information about a person or organisation....

Terrorism Case Study - 9/11 2014-05-11

Terrorism Case Study - 9/11 crossword puzzle
Across
  1. The fourth plane crashed in an empty field in ______ due to heroic passengers
  2. Hijackers aboard Flight 77 crash the plane into the western front of the ______
  3. USA ______ Act was an anti-terrorism bill that strengthened the government's rights to detain foreigners suspected of terrorism
  4. The ________ and Transportation Security Act Law made airport security the responsibility of the federal government
Down
  1. Terrorist group responsible for September 11th attacks.
  2. The Department of _______ Security was created to coordinate national efforts against terrorism
  3. The use of force or threats to frighten people and the government
  4. Agents that move to a country, blend into a community
  5. The Federal Aviation Administration, _____, ordered airlines to install bars on cockpit doors
  6. _____ bin Laden was responsible for coordinating the attacks
  7. Letters containing bacteria that cause _____ were sent to members of Congress

11 Clues: Agents that move to a country, blend into a communityTerrorist group responsible for September 11th attacks._____ bin Laden was responsible for coordinating the attacksThe use of force or threats to frighten people and the governmentThe fourth plane crashed in an empty field in ______ due to heroic passengers...

Hasan Khan 2017-06-01

Hasan Khan crossword puzzle
Across
  1. a poor diet and lack of exercise leads to this
  2. not doing something
  3. food measured in heat units
  4. The eating disorder that is described by vomiting or swollen ruptured esophagus
  5. disease: a disease that cannot be be passed down from one person to another
  6. when you starve yourself
  7. someone who witnesses bullying
  8. disease: the number 1 killer of Americans
  9. What is passed down
Down
  1. the date rape drug
  2. something that changes the way you feel or think
  3. illness; when your brain is sick
  4. blood alcohol content
  5. your drunk
  6. a resistance to a drug
  7. disease: a disease that can be passed down from one person to another
  8. Iphigenia: the mental illness where you see or hear things
  9. the active ingredient in tobacco
  10. making fun of someone or physically hurting them
  11. bullying: bullying someone online
  12. a mind altering drug and active ingredient found in marijuana

21 Clues: your drunkthe date rape drugnot doing somethingWhat is passed downblood alcohol contenta resistance to a drugwhen you starve yourselffood measured in heat unitssomeone who witnesses bullyingillness; when your brain is sickthe active ingredient in tobaccobullying: bullying someone onlinedisease: the number 1 killer of Americans...

PDHPE content 2016-08-23

PDHPE content crossword puzzle
Across
  1. what you use to chew
  2. 1 in 5 people get it
  3. the organ you breath with
  4. an unwanted behaviour
  5. thin strands found on your scalp- if you don't have it you are called bald
  6. what you use to hear
  7. the organ used to pump blood to the rest of your body
  8. something that makes your life harder
  9. rough organism found in mouth used to taste
  10. dogs love to chew on them
Down
  1. a disease caused by you eating to many foods high in sugar or fat
  2. sheep meat
  3. what you get when you do strenuous exercise like lifting weights
  4. bullying online using social sites
  5. what you use to eat
  6. a sweet garial which is bad for your teeth
  7. another word for worried
  8. the organism you see with
  9. meat that comes from a cow
  10. what you use to smell

20 Clues: sheep meatwhat you use to eatwhat you use to chew1 in 5 people get itwhat you use to hearan unwanted behaviourwhat you use to smellanother word for worriedthe organ you breath withthe organism you see withdogs love to chew on themmeat that comes from a cowbullying online using social sitessomething that makes your life harder...

Thankful for this Crossword 2023-10-28

Thankful for this Crossword crossword puzzle
Across
  1. Pilgrims' ship
  2. Dinner ____ (type of bread)
  3. Turkey noise
  4. Festival of lights, falls on November 12th
  5. Last course
  6. A symbol of plenty
  7. You pull and push these at a meal
  8. Moving displays in NYC
  9. Savory stew with a crust... common Flik dinner
  10. Supper
  11. _______ sauce
  12. What goes on potatoes
  13. When clocks fall back, with Savings
  14. Holiday on November 11th, with Day
  15. What happens the week before November break
  16. Ingredient made from bread cubes, herbs, etc.
  17. How we feel on on the fourth Thursday of November
  18. Black _____
Down
  1. Who comes over on the fourth Thursday
  2. _____ Monday
  3. Corn____
  4. Candied ____
  5. All ____ Day
  6. Event that only happens every four years, with Day
  7. Green bean ____
  8. Weeks between the two end-of-year breaks
  9. Bird eaten in November
  10. Orange root veg
  11. Macy's has one
  12. November holiday
  13. Style of spuds

31 Clues: SupperCorn____Last courseBlack __________ MondayTurkey noiseCandied ____All ____ Day_______ saucePilgrims' shipMacy's has oneStyle of spudsGreen bean ____Orange root vegNovember holidayA symbol of plentyWhat goes on potatoesBird eaten in NovemberMoving displays in NYCDinner ____ (type of bread)You pull and push these at a meal...

NORMA 2024-01-14

NORMA crossword puzzle
Across
  1. Tanggung jawab menjaga kelestarian lingkungan?
  2. Asas hukum yang menjunjung tinggi keadilan dan kebenaran?
  3. Norma etika dalam penggunaan teknologi informasi?
  4. Norma dalam mengelola konflik secara damai?
  5. Ketaatan terhadap norma keselamatan di tempat kerja?
  6. Kewajiban dan hak yang dimiliki oleh warga negara disebut?
  7. Tanggung jawab individu terhadap kepentingan bersama disebut?
  8. Nilai moral yang dijunjung tinggi dalam masyarakat disebut?
  9. Kesepakatan bersama mengenai perilaku yang dianggap benar disebut?
  10. Norma yang mengatur hubungan antarindividu dalam masyarakat?
Down
  1. Sikap saling menghargai dalam keberagaman budaya
  2. Tanggung jawab individu terhadap diri sendiri dan masyarakat?
  3. Hak asasi manusia yang perlu dijunjung tinggi?
  4. Apa istilah untuk aturan tertulis yang diatur oleh pemerintah?
  5. Kesetaraan hak dan peluang bagi semua warga negara disebut?
  6. Nilai yang diyakini dan dijunjung tinggi dalam suatu masyarakat?
  7. Norma yang menjamin kebebasan berserikat disebut?
  8. Larangan diskriminasi berdasarkan jenis kelamin disebut?
  9. Norma agama yang menjadi pedoman hidup?
  10. Norma yang melarang korupsi dan penyalahgunaan kekuasaan

20 Clues: Norma agama yang menjadi pedoman hidup?Norma dalam mengelola konflik secara damai?Hak asasi manusia yang perlu dijunjung tinggi?Tanggung jawab menjaga kelestarian lingkungan?Sikap saling menghargai dalam keberagaman budayaNorma etika dalam penggunaan teknologi informasi?Norma yang menjamin kebebasan berserikat disebut?...

ADSI-Jaider Camilo Benavides Villamil 2022-05-05

ADSI-Jaider Camilo Benavides Villamil crossword puzzle
Across
  1. keyword to make the content of the page in html
  2. javascript cross platform library
  3. programming language for graphic design
  4. object oriented programming language
  5. Set of basic pc programs
  6. They are the physicals parts of a pc
  7. term used to call an object by its id
  8. keyword to make an action when the mouse press
  9. term given to the cyber attack that denies access to the legitimate user
  10. keyword to make titles in html
Down
  1. term used for the science that studies online safety
  2. software package used by mysql
  3. Action to develop an application or web page
  4. keyword to hide a content
  5. keyword to show a content
  6. conversion of data to a graphic section
  7. keyword to make line breaks in html
  8. abbreviation for technology that is being developed
  9. programming language for web development
  10. database management system
  11. keyword to develop functions in html

21 Clues: Set of basic pc programskeyword to hide a contentkeyword to show a contentdatabase management systemsoftware package used by mysqlkeyword to make titles in htmljavascript cross platform librarykeyword to make line breaks in htmlobject oriented programming languageThey are the physicals parts of a pckeyword to develop functions in html...

Julia Zorrilla, block 6 2024-05-09

Julia Zorrilla, block 6 crossword puzzle
Across
  1. Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
  2. Is a security that pays interest over terms ranging from 2-10 years.
  3. Means that money is the common measure of worth or price of a good.
  4. Is the process of transferring from one individual/organization to another.
  5. Is money used in exchange for goods and services needed by individuals and governments.
  6. Allows customers to pay for a purchase directly from their checking account.
  7. Is a security that matures in a year or less.
Down
  1. Is a transfer of money from one bank account to another one.
  2. Means money can also be save and stored for later.
  3. Is the mechanism a nation uses to provide and manage money for itself.
  4. Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
  5. Is the name of currency in the U.S
  6. Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
  7. Is the state of being or feeling secure; freedom from fear, anxiety, and danger.

14 Clues: Is the name of currency in the U.SIs a security that matures in a year or less.Means money can also be save and stored for later.Is a transfer of money from one bank account to another one.Means that money is the common measure of worth or price of a good.Is a security that pays interest over terms ranging from 2-10 years....

Administrative Principles 2023-01-17

Administrative Principles crossword puzzle
Across
  1. centralization
  2. commanding
  3. discipline
  4. Responsibility
  5. activities
  6. contemporary
Down
  1. Individual Interest General Interest
  2. personnel
  3. Equity
  4. subordination
  5. security
  6. initiative

12 Clues: EquitysecuritypersonnelcommandingdisciplineinitiativeactivitiescontemporarysubordinationcentralizationResponsibilityIndividual Interest General Interest

Stay-at-home_IT-Security 2016-05-18

Stay-at-home_IT-Security crossword puzzle
Across
  1. Programm, das Dritten erlaubt einen PC fernzusteuern.
  2. Programme, die im Hintergrund laufen und Viren aufspüren.
  3. Missbräuchliche Verwendung personenbezogener Daten
  4. Erfolgt durch Passwort, PIN oder Fingerabdruck
  5. Das sind kleine Textdateien, die Informationen über besuchte Webseiten beinhalten.
  6. Datensicherung
  7. Sollen mindestens 8 Buchstaben,Zahlen und Sonderzeichen enthalten
  8. Ausspionieren von vertraulichen Informationen durch Freundlichkeit, Hilfsbereitschaft, Autoritätshörigkeit...
  9. Informationsbeschaffung durch Beobachtung bei der Eingabe von Daten wie PINs oder Passwörter.
Down
  1. Versteckt Viren im Betriebssystem, dass sie von Antivirenprogrammen nicht entdeckt werden.
  2. E-Mail-Anhänge
  3. Zur Authentifizierung des Benutzers
  4. Das sind Programme, die dem Benutzer Werbung zeigen und weitere Software installieren.
  5. Programme, die Tastatureingaben mitprotokollieren, so gelangen Hacker an Passwörter.
  6. Automatisierte Computerprogramme für den Versand von Spam- oder Phishingmails
  7. Kartenlesegerät wird bei Geldautomaten montiert.
  8. Entwendung von Daten, die unachtsam weggeworfen wurden.
  9. Der Versuch, über gefälschte Webseiten und E-Mails an persönliche Daten zu gelangen.

18 Clues: E-Mail-AnhängeDatensicherungZur Authentifizierung des BenutzersErfolgt durch Passwort, PIN oder FingerabdruckKartenlesegerät wird bei Geldautomaten montiert.Missbräuchliche Verwendung personenbezogener DatenProgramm, das Dritten erlaubt einen PC fernzusteuern.Entwendung von Daten, die unachtsam weggeworfen wurden....

Security Operations Block 2 2023-03-30

Security Operations Block 2 crossword puzzle
Across
  1. ALCs 6 and 7 are assigned to material in "______" form that cannot be physically inventoried but must be electronically inventoried by KMI certified components
  2. refers to measures and controls taken to deny unauthorized persons information derived from information systems of the Unite States Government.
  3. all corners and openings must be sealed using "___-_____" tamper evident tape or serialized tamper seals
  4. automated inventory system providing all base retail activities with supply and property accounting
  5. briefs personnel requiring cryptographic access at temporary duty (TDY) locations before they leave their home station (or upon arrival at TDY location if there is a time constraint)
  6. Send requests for disposition instructions action to the _______
  7. The STE is releasable to Canada, United Kingdom, Australia, and New Zealand
Down
  1. appoints a qualified KOAM and at least one alternate KOAM for each COMSEC account
  2. A cryptoperiod is the length of time each individual key setting/segment/page/table is authorized for use.
  3. zeroize or remove the associated ECC for all terminals during this process
  4. is the transfer (to another account or return to a distribution agency) or destruction of COMSEC material
  5. Applies to personnel who have their security clearance eligibility revoked, have their special access denied, or are removed for cause
  6. ALCs 1, 2, and 4 are assigned to material that must be "______" inventoried by the KOAM
  7. material that assists in securing telecommunications and is required in the production, operation, or maintenance of COMSEC systems and their components
  8. The destruction official and a "_____"ing official must sign destruction reports, subject to the following rules
  9. add accountable COMSEC material to an inventory, block the entry up to (but not including) the day/shift the item will be added using a color pen/marker as designated in the KOAM's SOP
  10. must be an officer, warrant officer, or noncommissioned officer E-6 or higher or a civilian General Schedule (GS)-7 or higher
  11. Individual who manages the COMSEC resources of an organization.

18 Clues: Individual who manages the COMSEC resources of an organization.Send requests for disposition instructions action to the _______zeroize or remove the associated ECC for all terminals during this processThe STE is releasable to Canada, United Kingdom, Australia, and New Zealand...

Security Awareness Crossword Puzzle 2021-09-15

Security Awareness Crossword Puzzle crossword puzzle
Across
  1. when a person tags along with another person who is authorized to gain entry into restricted areas.
  2. The process of taking plain text and scrambling it into an unreadable format.
  3. Should be constructed of upper and lower case letters, numbers, and special characters.
  4. The "I" in the CIA Triad. Protection from unauthorized changes.
  5. The process or action of verifying the identity of a user or process.
  6. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drives.
  7. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  8. A flaw or weakness in a computer system that could be exploited to violate the systems security.
Down
  1. Facebook, Twitter, Instagram, etc. (two words)
  2. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  3. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  5. The address of a webpage.
  6. The "C" in the CIA Triad. Protection of information from unauthorized access.
  7. A fraudulent email purportedly from a reputable company attempting to get personal information.
  8. The "A" in the CIA Triad. It ensures authorized users have access.
  9. A sequence of words or text used to control access to a computer; similar to a password.
  10. the automated recognition of individuals by means of unique physical characteristics, typically for the purpose of security.

18 Clues: The address of a webpage.Facebook, Twitter, Instagram, etc. (two words)The "I" in the CIA Triad. Protection from unauthorized changes.The "A" in the CIA Triad. It ensures authorized users have access.The process or action of verifying the identity of a user or process.The "C" in the CIA Triad. Protection of information from unauthorized access....

data security and integrity 2025-10-07

data security and integrity crossword puzzle
Across
  1. check – method to check data has been transferred correctly even or odd
  2. software that seeks to damage
  3. method used to ensure entered data is reasonable and meets certain input criteria.
  4. software that detects and removes spyware programs installed
  5. digit additional digit appended to a number to check if entered data is error free.
  6. Reverse process of decryption
  7. the accuracy, completeness and consistency of data.
  8. a way of proving somebody or something is who or what they claim to be.
  9. legitimate-looking emails designed to trick a recipient
  10. method used to calculate a check digit based on modulus division by 11.
Down
  1. software or hardware that is between a computer and externalnetwork that
  2. the privacy of personal information,
  3. verification method used to check if data transferred has been altered
  4. illegal access to a computer system without the owner’s permission.
  5. method used to ensure data is correct by using double entry or visual checks.
  6. use of unique human characteristics to identify a user
  7. methods taken to prevent unauthorised access to data
  8. redirecting a user to a fake website in order to illegally obtain personal data

18 Clues: software that seeks to damageReverse process of decryptionthe privacy of personal information,the accuracy, completeness and consistency of data.methods taken to prevent unauthorised access to datause of unique human characteristics to identify a userlegitimate-looking emails designed to trick a recipient...

online security 2022-10-25

online security crossword puzzle
Across
  1. A very fast rate of change
  2. According to what is claimed or believed
  3. Based on fraud or deceit
Down
  1. open to attack
  2. To steal, usually small amounts
  3. Weakened or damaged
  4. sexually transmitted diseases
  5. In an accurate way

8 Clues: open to attackIn an accurate wayWeakened or damagedBased on fraud or deceitA very fast rate of changesexually transmitted diseasesTo steal, usually small amountsAccording to what is claimed or believed

Ciber Security 2020-08-20

Ciber Security crossword puzzle
Across
  1. son subrepticios que trabajan activamente en contra de la persona atacada.
  2. evita el acceso no autorizado a una red privada.
  3. es un programa informático que detecta y elimina virus otros programas perjudiciales.
  4. tiene como objetivo obtener información de cuentas privadas, especialmente para acceder a sus cuentas bancarias.
Down
  1. contiene información que no es cierta.
  2. es el correo no solicitado que recibe una persona.
  3. son programas informáticos que alteran el funcionamiento del computador.
  4. es un software que saca información de tu computador sin tu consentimiento.

8 Clues: contiene información que no es cierta.evita el acceso no autorizado a una red privada.es el correo no solicitado que recibe una persona.son programas informáticos que alteran el funcionamiento del computador.son subrepticios que trabajan activamente en contra de la persona atacada....

Security Guide 2023-07-19

Security Guide crossword puzzle
Across
  1. a container filled with explosive, incendiary material, smoke, gas, or other destructive substance, designed to explode on impact
  2. a person or thing likely to cause damage or danger
  3. the action of evacuating a person or a place
  4. the practice of obtaining something, especially money, through force or threats
Down
  1. a person employed for wages or salary
  2. a person who uses a gun either regularly or on a particular occasion
  3. put or keep out of sight; conceal from the view or notice of other
  4. the civil force of a national or local government, responsible for the prevention and detection of crime and the maintenance of public order

8 Clues: a person employed for wages or salarythe action of evacuating a person or a placea person or thing likely to cause damage or dangerput or keep out of sight; conceal from the view or notice of othera person who uses a gun either regularly or on a particular occasionthe practice of obtaining something, especially money, through force or threats...

Network Security 2024-01-30

Network Security crossword puzzle
Across
  1. A logic bomb lies dormant until a specific piece of program code is activated.
  2. Usually attached to a document or spreadsheet and uses the macro functions or scripting language of the application.
  3. Applies to program files and gives the user the right to run the program.
  4. Malicious Programs which replicate themselves from system to system without the use of a host file.
Down
  1. A computer program that is self replicating and can affect a computer.
  2. User is prohibited from accessing the file in any way.
  3. Assigned to each user to ensure that they may only access particular files or records according to their information needs.
  4. Should be made so that lost data can be recovered easily.

8 Clues: User is prohibited from accessing the file in any way.Should be made so that lost data can be recovered easily.A computer program that is self replicating and can affect a computer.Applies to program files and gives the user the right to run the program.A logic bomb lies dormant until a specific piece of program code is activated....

Food Security 2024-03-19

Food Security crossword puzzle
Across
  1. Having enough food that meets nutritional needs for good health.
  2. Term referring to the state or condition of obtaining the bare necessities for survival, such as food, shelter, and clothing.
  3. Term referring to the food, nourishment, and resources essential for maintaining life and well-being.
  4. The act of providing essential nutrients for growth and health through the consumption of food.
Down
  1. The ability to meet current needs without compromising the ability of future generations to meet their own needs.
  2. The feeling of fullness and satisfaction after eating, indicating that one's hunger has been sufficiently satisfied.
  3. The ability of individuals and communities to bounce back and adapt to challenges or disruptions.
  4. The quality and availability of food that meets the dietary needs of individuals and communities, ensuring they have access to sufficient nutrients.

8 Clues: Having enough food that meets nutritional needs for good health.The act of providing essential nutrients for growth and health through the consumption of food.The ability of individuals and communities to bounce back and adapt to challenges or disruptions....

FOOD SECURITY 2024-08-14

FOOD SECURITY crossword puzzle
Across
  1. A serving size of food
  2. Purchasing more than needed
  3. Organizing tasks and schedules ahead of time
  4. Food remaining after a meal
Down
  1. Excessive use or intake of resources
  2. Where items are kept for future use
  3. End of a product's shelf life
  4. Giving something for free to help others

8 Clues: A serving size of foodPurchasing more than neededFood remaining after a mealEnd of a product's shelf lifeWhere items are kept for future useExcessive use or intake of resourcesGiving something for free to help othersOrganizing tasks and schedules ahead of time

Information Security 2024-09-05

Information Security crossword puzzle
Across
  1. mindfulness
  2. virtue
  3. safeguard
Down
  1. login
  2. repair
  3. cryptography
  4. characteristic
  5. obstruct

8 Clues: loginrepairvirtueobstructsafeguardmindfulnesscryptographycharacteristic

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. A plant grown for food, such as wheat or maize (4 letters)
  2. A period when food is scarce, leading to widespread hunger (6 letters)
  3. A type of farming that grows crops without chemicals (7 letters)
  4. The opposite of surplus, often a sign of food insecurity (7 letters)
Down
  1. A food production system without soil (9 letters)
  2. Yellow tropical fruit often eaten in slices
  3. Staple grain consumed globally, especially in Asia (4 letters)
  4. This nutrient is vital for plant growth, often added as fertilizer (8 letters)

8 Clues: Yellow tropical fruit often eaten in slicesA food production system without soil (9 letters)A plant grown for food, such as wheat or maize (4 letters)Staple grain consumed globally, especially in Asia (4 letters)A type of farming that grows crops without chemicals (7 letters)The opposite of surplus, often a sign of food insecurity (7 letters)...

Food security 2024-11-28

Food security crossword puzzle
Across
  1. we wash our hands with this to stay clean and safe
  2. This keeps food from getting too warm and helps it stay fresh
  3. you should always wash this before touching food
  4. Helping others who don't have enough food
Down
  1. This is the thing you use to kill germs on your hands and surfaces
  2. This can be grown at home, like fruits, vegetables
  3. you should always do this before eating or cooking
  4. Food that gives you energy and keeps you healthy

8 Clues: Helping others who don't have enough foodyou should always wash this before touching foodFood that gives you energy and keeps you healthyThis can be grown at home, like fruits, vegetableswe wash our hands with this to stay clean and safeyou should always do this before eating or cookingThis keeps food from getting too warm and helps it stay fresh...

Nutrition security 2024-07-17

Nutrition security crossword puzzle
Across
  1. The nutrients you use in the largest amount
  2. Vitamin found in citrus fruits, important for immune function
  3. Condition caused by inadequate dietary intake, leading to weakness and poor health
  4. the state of having reliable access to a sufficient quantity of affordable, nutritious food
  5. Eating a balanced diet to maintain health and prevent disease
Down
  1. Lack of sufficient food leading to hunger and malnutrition
  2. Government program aimed at providing food assistance to low income individuals
  3. Essential nutrient needed for strong bones and teeth

8 Clues: The nutrients you use in the largest amountEssential nutrient needed for strong bones and teethLack of sufficient food leading to hunger and malnutritionVitamin found in citrus fruits, important for immune functionEating a balanced diet to maintain health and prevent disease...

Nutrition security 2024-07-17

Nutrition security crossword puzzle
Across
  1. Vitamin found in citrus fruits, important for immune function
  2. The state of having reliable access to a sufficient quantity of affordable, nutritious food
  3. Eating a balnaced diet to maintain health and prevent disease
Down
  1. The nutrients you use in the largest amount
  2. Lack of sufficient food leading to hunger and malnutrition
  3. Lack of this can lead to anemia
  4. essential nutrient needed for strong bones and teeth
  5. food produced without synthetic chemicals

8 Clues: Lack of this can lead to anemiafood produced without synthetic chemicalsThe nutrients you use in the largest amountessential nutrient needed for strong bones and teethLack of sufficient food leading to hunger and malnutritionVitamin found in citrus fruits, important for immune functionEating a balnaced diet to maintain health and prevent disease...

Food security 2024-12-17

Food security crossword puzzle
Across
  1. A vegetable that can be boiled, smashed and make chips
  2. Name of this food is also color name
  3. A vegetable which builds immunity
Down
  1. A green food which keeps your body hydrated
  2. A vegetable which makes you cry
  3. Food that keeps a doctor away
  4. A vegetable that can be enjoyed by rabbits
  5. Food that is a source of vitamin C

8 Clues: Food that keeps a doctor awayA vegetable which makes you cryA vegetable which builds immunityFood that is a source of vitamin CName of this food is also color nameA vegetable that can be enjoyed by rabbitsA green food which keeps your body hydratedA vegetable that can be boiled, smashed and make chips

Learning Through Gaming 2014-09-15

Learning Through Gaming crossword puzzle
Across
  1. HIPPA applies to all _____ organizations
  2. Does not require written patient permission
  3. Type of law
  4. How many years could a person face for releasing protected health information
  5. Must furnish the patient a privacy ______
  6. Steps organizations take to protect electronic information
  7. Health records can only be requested by the _____
Down
  1. You may refuse to release information that may be ______
  2. All employees that handle protected health information must go through _____
  3. After a patient dies who gets control of the patient information
  4. Computer Security
  5. HIPPA regulations are managed by the ______
  6. Health records cannot be requested by the _____
  7. Health records include the following format paper, electronic, and _____
  8. Health Insurance Portability and Accountability Act

15 Clues: Type of lawComputer SecurityHIPPA applies to all _____ organizationsMust furnish the patient a privacy ______HIPPA regulations are managed by the ______Does not require written patient permissionHealth records cannot be requested by the _____Health records can only be requested by the _____Health Insurance Portability and Accountability Act...

SMUN' 24 UN Trivia 2024-10-26

SMUN' 24 UN Trivia crossword puzzle
Across
  1. UN specialized agency providing food assistance
  2. The UN Headquarters are in this city
  3. Name of the UN's Paris-based cultural organization
  4. UN's agency for child welfare
  5. Last and best MUN Conference of 2024 in Bangladesh
  6. Official title for the UN’s top diplomat
  7. Organization replaced by the UN in 1945
Down
  1. number of permanent members in the Security Council
  2. agency dealing with labor rights and standards
  3. UN agency focusing on international health issues
  4. UN's organization that works for gender equality
  5. The founding document of UN
  6. UN body responsible for maintaining international peace and security
  7. Document that outlines fundamental human rights, adopted in 1948
  8. second most common language in UN after English

15 Clues: The founding document of UNUN's agency for child welfareOrganization replaced by the UN in 1945The UN Headquarters are in this cityagency dealing with labor rights and standardssecond most common language in UN after EnglishOfficial title for the UN’s top diplomatLast and best MUN Conference of 2024 in Bangladesh...

Robotics 2017-02-09

Robotics crossword puzzle
Across
  1. You need to do this to make your robot carry out a command?
  2. A film that includes robots?
  3. A repetitive task carried out by robots?
  4. A high precision task carried out by a robot?
  5. A dishwasher is this type of machinery?
  6. The Cyber men come from this T.V series?
Down
  1. A sensor to help your robot to move?
  2. A car company that makes robots?
  3. Your robot needs this to navigate?
  4. A film that included a small boy as a robot?
  5. The name given to a metal when it is mixed with another?
  6. A metal used to make robots?

12 Clues: A film that includes robots?A metal used to make robots?A car company that makes robots?Your robot needs this to navigate?A sensor to help your robot to move?A dishwasher is this type of machinery?A repetitive task carried out by robots?The Cyber men come from this T.V series?A film that included a small boy as a robot?...

Hope crossword 2021-12-09

Hope crossword crossword puzzle
Across
  1. the ability to cover a distance in a short time
  2. a brain injury that occurs when blows to the head causes the brain to crash into the bones of the skull
  3. type of stretching the military use
  4. amount of force put in periods without tiring
  5. the greatest component of health
  6. the usage of eye, hand and foot movements
Down
  1. a type of stretching with movements
  2. a behavior that involves firm verbal statements
  3. bullying with technology
  4. the test of cardio respiratory endurance
  5. the first letter of SMART
  6. doing this before exercise prevents injury

12 Clues: bullying with technologythe first letter of SMARTthe greatest component of healtha type of stretching with movementstype of stretching the military usethe test of cardio respiratory endurancethe usage of eye, hand and foot movementsdoing this before exercise prevents injuryamount of force put in periods without tiring...