cyber security Crossword Puzzles
RansomWare activity 2025-05-23
Across
- Plants malicious encryption software
- New Years ransomware attack
- Locksdevices and causing data across the network to be encrypted
- U.S. workforce management
- Attacked by the Darkside group
Down
- Receive an on-screen notification from the cyber criminal
- blocks access to a computer system until a sum of money is paid
7 Clues: U.S. workforce management • New Years ransomware attack • Attacked by the Darkside group • Plants malicious encryption software • Receive an on-screen notification from the cyber criminal • blocks access to a computer system until a sum of money is paid • Locksdevices and causing data across the network to be encrypted
ICT-Begrippen 2017-10-06
Across
- software foutje
- een reserve harde schijf waar data op bewaard kan worden
- camera in of aan de computer waarmee anderen je via internet, jou of je omgeving kunnen zien
- apparaat waarmee fysieke afdrukken van documenten kunnen worden gemaakt
- virus
- draadloze verbinding op korte afstand
- digitaal
- Acces Point(WAS): draadloos netwerk toegangspunt
- apparaat dat computer netwerken met elkaar kan verbinden
- (vaste) onderdelen van de computer
- apparaat waarmee fysieke documenten en/of afbeeldingen digitaal omgezet worden
- virtuele munteenheid
- schijf extern geheugen van de computer waar gegevens op bewaard kunnen worden
Down
- externe opslag
- het toetsenbord
- systeem dat beschermt tegen misbruik of inbraak van buitenaf
- computer en/of programma die diensten verleend
- systeembord of elektronische printplaat
- internet(pagina)
- computerprogramma's
- actualiseren
- apparaat waarmee je specifieke dingen op een computer kan aanwijzen of aanklikken
- online opslag
23 Clues: virus • digitaal • actualiseren • online opslag • externe opslag • software foutje • het toetsenbord • internet(pagina) • computerprogramma's • virtuele munteenheid • (vaste) onderdelen van de computer • draadloze verbinding op korte afstand • systeembord of elektronische printplaat • computer en/of programma die diensten verleend • Acces Point(WAS): draadloos netwerk toegangspunt • ...
Crossword of terms in class 2013-05-23
Across
- The secret word when you log in at Edmodo is your....
- Where music can be created
- This is where settings are placed
- Where all the files you delete end up
- The computers we are using in class
- Home page for all the students
- The place where music is organized and in several lists
- Our mouse for the computer
- Where presentations with several slides of pictures can be created
- Protect your computer from viruses
- Where apps can be downloaded
Down
- The newest apple phone
- Message when you have turned in an assignment on Edmodo
- Where is this crossword made?
- Free homepage we all created
- Where all the numbers can be created
- Cyber game
- This is the place where pictures can be edited
- Where your movies can be put together and edited
- For people who like to write many pages of words
20 Clues: Cyber game • The newest apple phone • Where music can be created • Our mouse for the computer • Free homepage we all created • Where apps can be downloaded • Where is this crossword made? • Home page for all the students • This is where settings are placed • Protect your computer from viruses • The computers we are using in class • Where all the numbers can be created • ...
Health and Christmas 2020-12-15
Across
- Stay away from others for 14 days
- This is an abbreviated form of a growing movement
- Speak to an ___________ if there is a problem
- You should never answer the door when you are
- Self care is good for personal _________
- There are __ food groups
- This is a drink enjoyed at Christmas
- There are ____ for making poor choices
- When in public we must wear a
- The idea of including everyone
- Christmas in French
Down
- Being aware of healthy choices for our body
- Our bodies depend on this to survive
- Call 911 if someone is ever ____
- ______ can become involved with serious bullying
- Cyber, verbal or physical
- It saves someone from an allergic reaction
- _____ should check in with their kids often
- If you're unsure of the water enter slow and _ first
- When a building can be easily entered it is__
20 Clues: Christmas in French • There are __ food groups • Cyber, verbal or physical • When in public we must wear a • The idea of including everyone • Call 911 if someone is ever ____ • Stay away from others for 14 days • Our bodies depend on this to survive • This is a drink enjoyed at Christmas • There are ____ for making poor choices • Self care is good for personal _________ • ...
Journalism Vocab Crossword 2020-12-20
Across
- Leading up to the end
- Publisher imprint
- Online
- Highschool, College, Middleschool
- to argue
- Trump vs. Biden
- The front
- How you live
- vertical sections
- Four colors
- used to seperate
- To persuade
- thin
- pays respects to someone whos past
- The beginning
- re-route
- The press
- What holds a book together
- biomes, outside
- First page in a book
- Used for climbing
- how you sign your name
- Whats in the book
Down
- detailed coverage
- Text with information
- A topic
- Biology, DNA, Biomes
- Double
- A sector
- Cameo
- Occupation, Profession
- Everybody's got one
- Detective
- Frontal
- Pictures
- A written account of events
- the last page
- Color generated by ink
- An overview
- An Alphabetical list
- Piece of writing
- Football
- To Uncover something
- Feedback
44 Clues: thin • Cameo • Online • Double • A topic • Frontal • to argue • A sector • Pictures • re-route • Football • Feedback • The front • Detective • The press • Four colors • To persuade • An overview • How you live • the last page • The beginning • Trump vs. Biden • biomes, outside • used to seperate • Piece of writing • detailed coverage • Publisher imprint • vertical sections • Used for climbing • Whats in the book • Everybody's got one • ...
Crossword Puzzle 2023-12-12
Across
- Coordinated anti-terrorism effort
- Diplomatic negotiation process
- Mutual defense pact
- Emotional response to stress or danger
- Country with aggressive territorial claims in the West Philippine Sea
- Protection against cyber threats
- Manipulation of information to influence opinions
- Policies aimed at reducing gender-based disparities
- Targeting of adversary's decision-making processes
- Island in the West Philippine Sea claimed by multiple countries
- Localized peace talks with insurgent groups
Down
- Common mental health condition characterized by persistent sadness
- Act of risking one's life to save others
- Joint military exercises
- Replacement of old weaponry with newer, more advanced systems
- Primary fighter aircraft used by the Air Force
- Country's plan for protecting itself from external threats
- Large warship equipped for open-sea combat
- Strategy to address the root causes of insurgency
- International court ruling on the West Philippine Sea dispute
- Declaration of the government to end insurgency
21 Clues: Mutual defense pact • Joint military exercises • Diplomatic negotiation process • Protection against cyber threats • Coordinated anti-terrorism effort • Emotional response to stress or danger • Act of risking one's life to save others • Large warship equipped for open-sea combat • Localized peace talks with insurgent groups • Primary fighter aircraft used by the Air Force • ...
HMH Crossword Puzzle 2023-04-20
Across
- starting point when call comes in
- attachment icon
- ticketing system for HMHN
- Not supported by CSD
- nine characters used in log in
- inquiry with insurance carrier
- HUMC\user id
- What field is PHI in?
- view only users that Do Not have Epic training
- Outpatient care
- call when Cyber Ark is locked
- Tool for self-service-password reset and unlock accounts
- place user's email in this field
- used to verify users
Down
- Self service area in Epic
- Inactive for more than 180 days or six months
- tool used for dictation
- Block that CSD can remove
- what unlock that does not require verification?
- Grand Central used for transfer, admissions etc.
- Service Access request
- what can CSD use to prepopulate tickets with certain information
- User calls to report something broken or needs repair
- the training environment transfer to TSD
- citrix shadowing tool
25 Clues: HUMC\user id • attachment icon • Outpatient care • Not supported by CSD • used to verify users • What field is PHI in? • citrix shadowing tool • Service Access request • tool used for dictation • Self service area in Epic • ticketing system for HMHN • Block that CSD can remove • call when Cyber Ark is locked • nine characters used in log in • inquiry with insurance carrier • ...
TTS PKK 2024-11-06
Across
- Tindakan untuk memperluas pasar dengan masuk ke daerah baru
- Produk yang ada dalam bentuk virtual atau digital
- Tahap siklus hidup dimana penjualan produk mnecapai puncak sebelum melambat
- Barang yang tak mudah habis
- Mewujudkan
- Proses hidup suatu produk dalam bisnis
- Proses pembuatan prototipe produk
- Dimensi yang menilai perkiraan masa hidup produk
- Proses berfikir kreatif untuk menghasilkan berbagai solusi unik
- Model dari suatu produk barang atau jasa yang akan dibuat
Down
- Nama atau simbol yabg digunakan untuk membedakan produk
- Orang yang merancang dam membuat prototipe produk
- Proses untuk mengenalkan produk ke distributor atau pengecer
- Dimensi yang memastikan prototipe sesuai dengan produk
- Metode untuk memecahkan masalah dalam waktu singkat
- Proses memahami apa yang konsumen rasakan dan butuhkan
- Yang menjadi pemimpin dalam proses design sprint
- Dimensi yang menggambarkan prototipe melalui visual atau tulisan
- Proses desain untuk mendefinisikan kebutuhan konsumen
- Konsumen dengan pengetahuan tentang produk
20 Clues: Mewujudkan • Barang yang tak mudah habis • Proses pembuatan prototipe produk • Proses hidup suatu produk dalam bisnis • Konsumen dengan pengetahuan tentang produk • Yang menjadi pemimpin dalam proses design sprint • Dimensi yang menilai perkiraan masa hidup produk • Orang yang merancang dam membuat prototipe produk • Produk yang ada dalam bentuk virtual atau digital • ...
Extra Credit Crossword Puzzle 2024-12-06
Across
- Network that revolutionized global communication
- Means of mass communication central to the digital age
- The revolution marked by computers and the internet
- Key driver of globalism and communication advances
- A communication medium popular before the digital era
- A term reflecting contemporary ideas and practices
- Modernist medium that transformed storytelling and culture
- Modernist design school emphasizing function and form
- Modernist art style associated with Picasso
- An early movement influencing modernist ideas
- Reflecting worldwide scale and influence
Down
- A characteristic of modernist art and design
- Movement rejecting the ideas of modernism
- Long-established customs and ideas challenged by modernists
- Artistic movement that broke away from traditional forms
- An artistic movement celebrating technology and speed
- Prefix often used in terms related to digital technology
- A global communication tool from the digital revolution
- New form of media delivery enabled by the digital age
- The interconnectedness of the world through technology and trade
20 Clues: Reflecting worldwide scale and influence • Movement rejecting the ideas of modernism • Modernist art style associated with Picasso • A characteristic of modernist art and design • An early movement influencing modernist ideas • Network that revolutionized global communication • Key driver of globalism and communication advances • ...
Eagle 101 topics 2025-10-06
Across
- the ability to understand and share the feelings of another
- to achieve something successfully
- the action of organizing something
- working together
- the feeling that something good can happen and that you can help make it happen
- a strong feeling of annoyance and hostile behavior
- able to be relied on as honest to be treated
- the vaping lesson speaker
- a natural response to fear or stress
- saying I can do this
- bullying bullying online
Down
- the act of working together for a common purpose to achieve a mutual benefit
- a unstoppable habet
- standing up against behaviors that are mean and harmful happening over and over again
- an intense and irrational fear of something
- treating others how you want to be treated
- Drug, abuse, resistance and education
- believing in yourself
- the quality of being friendly, generous and considerate
- response to life's pressure
20 Clues: working together • a unstoppable habet • saying I can do this • believing in yourself • bullying bullying online • the vaping lesson speaker • response to life's pressure • to achieve something successfully • the action of organizing something • a natural response to fear or stress • Drug, abuse, resistance and education • treating others how you want to be treated • ...
Cryptic Hashword 2014-01-11
Across
- 3a52b599a21b2990b28930141016c5a71afa184e3ef94958d882f519e1ddf5f2fa8f9d653eb0dc0de2307087cee6f8f5
- 0a7b77e1bff2cdf175f16e6d7ba96ce707ec6d1f
- fd9de800564763ece59368d35b281690
- 7f5217333bb19cb9ac50829635cc398601d1e505
- bfd82eb21826f62d7a9bbbd3fd0311e6a273a1d8
Down
- 6f5251e4a9d0005b8d6d36bd7c6a7af04b5fab1abb33f3b040fc27af1d165ceed6cf2cd39edc78327b88d77554c97ff10ccb65a37b081da4885f4b02b866e7f3
- b9e14d9b2886bcff408b85aefa780419
- 5de71b2143c86cd2e0c801830ed729e7ef2f8f478b454d7d3e9dd5a86a92b255
- 782bf2d07aad4de9deeee61424ecb71581f2a44b183420e8b01fe5c8
- 05e5aaf0f4c97d227a5653c3187747ea93e31d7e
- 7e0dea93ce606f7b88f6af965d37e83a
11 Clues: b9e14d9b2886bcff408b85aefa780419 • fd9de800564763ece59368d35b281690 • 7e0dea93ce606f7b88f6af965d37e83a • 0a7b77e1bff2cdf175f16e6d7ba96ce707ec6d1f • 05e5aaf0f4c97d227a5653c3187747ea93e31d7e • 7f5217333bb19cb9ac50829635cc398601d1e505 • bfd82eb21826f62d7a9bbbd3fd0311e6a273a1d8 • 782bf2d07aad4de9deeee61424ecb71581f2a44b183420e8b01fe5c8 • ...
Bullying 2022-12-06
Across
- As a victim, bullying is never your...
- Often those who are bullied themselves become...
- Bullying is never by mistake by on...
- Keep this as evidence for when the bully gets caught
- The way for others to know what is happening to you
- A way for the bully to lose interest in you
Down
- A style of bullying is calling you ...
- Bullying can make you feel...
- When bullies spread false information about you
- The type of bullying that happens online
- Staying in these helps you to not face the bully alone
11 Clues: Bullying can make you feel... • Bullying is never by mistake by on... • A style of bullying is calling you ... • As a victim, bullying is never your... • The type of bullying that happens online • A way for the bully to lose interest in you • When bullies spread false information about you • Often those who are bullied themselves become... • ...
CSI Newsletter 2019-03-05
Across
- Who is the CSI agent in charge
- What are automated pre recorded phone messages
- Created to make life easier but are often hacked or monitored
- Device placed in gas pumps to steal consumer data
Down
- A cyber group well known for hacking and wearing masks
- Malicious software that denies access to data in return for payment
- Virtual currency which has an equivalent value in real currency
- Who won the last $50 quiz
- Automated tools used for simple and repetitive tasks
- What credit reporting bureau was hacked recently
- Electronics manufacturer sued for $2.2 million
11 Clues: Who won the last $50 quiz • Who is the CSI agent in charge • What are automated pre recorded phone messages • Electronics manufacturer sued for $2.2 million • What credit reporting bureau was hacked recently • Device placed in gas pumps to steal consumer data • Automated tools used for simple and repetitive tasks • A cyber group well known for hacking and wearing masks • ...
Gossip 2018-01-17
Across
- To say you’re sorry.
- Someone who bullies people online.
- Failure to recognise or to pretend something is not happening.
- Somebody who’s being picked on.
- Resist the urge to _______________ .
- Don’t _____________ anyone who is violent.
Down
- What you wrote about me was really m______ .
- All the gossip that has spread about me cheating in the final exam has ruined my _________ as school captain.
- A response that is more dramatic or greater than necessary.
- Sometimes it’s hard to ____________ the temptation to fight back.
- An attack made as a response to another attack.
11 Clues: To say you’re sorry. • Somebody who’s being picked on. • Someone who bullies people online. • Resist the urge to _______________ . • Don’t _____________ anyone who is violent. • What you wrote about me was really m______ . • An attack made as a response to another attack. • A response that is more dramatic or greater than necessary. • ...
Decode the Competencies Behind the Titles 2025-06-12
Across
- practice specialized in the design and development of features that Supports from L1 autonomous to L3 autonomous adhering to standard APSICE compliance.
- Designs and validates automotive-grade hardware like ECUs, sensor modules, and controller boards, supporting high-speed interfaces, thermal and EMI/EMC requirements, and production readiness.
- Supports OEMs in developing EV systems such as battery management systems (BMS), electric drivetrains, onboard chargers, and power electronics aligned with global electrification trends
- Delivers robust automotive cyber security solutions including secure boot, secure communication, ECU hardening, and compliance with standards like ISO/SAE 21434 to protect connected vehicle ecosystems
- involve developing standardized, scalable ECU software platforms and low-level firmware to power critical automotive functions
- Develops and integrates telematics control units (TCUs), cloud communication modules, and data analytics platforms enabling vehicle tracking, remote diagnostics, and V2X capabilities.
- Focuses on cloud-enabled connected car platforms, including over-the-air (OTA) updates, remote diagnostics, telematics backends, and fleet data analytics to enhance vehicle connectivity and user experience.
- Provides ISO 26262-compliant safety solutions including safety analysis, tool qualification, and software/hardware validation for safety-critical systems like ADAS, powertrain, and steering.
Down
- Encompasses end-to-end automotive engineering services at Tata Elxsi, including vehicle architecture, domain integration, and support across powertrain, ADAS, body, and infotainment systems
- Specializes in the design and development of advanced test automation solutions and test execution.
- Provides system-level engineering services including vehicle architecture definition, integration, and validation to ensure cross-domain functionality and performance in modern vehicle platforms.
- Utilizes tools like MATLAB/Simulink for algorithm development, rapid prototyping, and auto code generation to accelerate ECU development and validation for domains such as powertrain and chassis.
- practice specializes in the development virtual models of controller, system on chips, ECUs so that embedded software can be developed and validated much before the target hardware is available.
- Covers development of advanced digital cockpit solutions including infotainment, digital instrument clusters, voice assistants, and connected vehicle services using Android Automotive and embedded platforms.
14 Clues: Specializes in the design and development of advanced test automation solutions and test execution. • involve developing standardized, scalable ECU software platforms and low-level firmware to power critical automotive functions • ...
CRIME. WORDS IN BOLD 2018-09-06
14 Clues: kopėčios • saugumas • pavojuje • priminti • paslėptas • apiplėšti • patrauklus • prismeigti • gyvatvorė, tvora • nuosavybė, turtas • savininkas, valdytojas • laiptelis prie lauko durų • išdidus, besididžiuojantis • traukiantis įsilaužti ir apiplėšti
The Great Depression key terms 2023-10-16
Across
- production over producing of goods
- music type of music 1920s that was up beat
- a place where people stood to get food in the 1930s
- prices decreasing
- struggling and loss of confidence
- chat a series of speeches over the radio by fdr
- A way people all over the country communicated
- security From of program that helped elderly with their security
- failures one of the reasons that cause the Great Depression
Down
- Sand storms created by over farming
- a serious of programs intended to help the citizens
- Speeches FDR over the radio
- 1930s encampment for the homeless
- dam project started to provide jobs and water to the west
- Market Where people buy and sell and trade goods
15 Clues: prices decreasing • Speeches FDR over the radio • 1930s encampment for the homeless • struggling and loss of confidence • production over producing of goods • Sand storms created by over farming • music type of music 1920s that was up beat • A way people all over the country communicated • chat a series of speeches over the radio by fdr • ...
Housing 2024-08-12
Across
- What kind of desk can be used by anyone?
- What month is Kelvin's birthday?
- How many halls we have available for hiring
- Who would be asked to put up some shelving?
- the number of people in the Property team
- What is the name of our security company?
- the type of card you use to enter a building
- What is the name of our asset management program?
- Queen of the team
Down
- What paperwork process requires three quotes?
- often found on a Monday
- Our favourite security guard
- what we hope not to find in the roof
- How often rentals on our Housing for Older Persons get reviewed
14 Clues: Queen of the team • often found on a Monday • Our favourite security guard • What month is Kelvin's birthday? • what we hope not to find in the roof • What kind of desk can be used by anyone? • the number of people in the Property team • What is the name of our security company? • How many halls we have available for hiring • Who would be asked to put up some shelving? • ...
CNN Student News 2/18 - 2/20 2014-02-20
Across
- latest retail company hacked by cyber criminals
- SAD: Symtoms include fatigue, lack of energy, oversleeping & food cravings
- Born on February 22, 1732
- European city where anti-government protests turned violent on Tuesday
Down
- Country leading in gold medals at the Olympics as of Tuesday
- __________ & togetherness; a cure for the winter blues
- South American country experiencing anti-government political protests
- US City that experienced it's snowiest winter on record this year
- Company using data from music choices to guess your political preference
- Cost of Lincoln Memorial in 1914
- Country's unemployment at 3%, hitting a 6 year low
- Capital city of Thailand
12 Clues: Capital city of Thailand • Born on February 22, 1732 • Cost of Lincoln Memorial in 1914 • latest retail company hacked by cyber criminals • Country's unemployment at 3%, hitting a 6 year low • __________ & togetherness; a cure for the winter blues • Country leading in gold medals at the Olympics as of Tuesday • ...
Unit 5 Key Words 2015-08-20
Across
- People who receive bad treatment from others.
- When a persons identity is unknown or hidden
- Someone who treats other people badly, harassing them and making them feel bad.
- instant messaging
- Writing about something that interests you on the internet
Down
- To annoy or repeatedly bother someone intentionally
- Meaning very, very old!
- To tell somebody that you will do something bad to them.
- The act of physically or mentally abusing somebody
- A verb and a noun meaning to talk about others without them knowing.
- Something which may or may not be true.
- a prefix meaning using the internet and technology
12 Clues: instant messaging • Meaning very, very old! • Something which may or may not be true. • When a persons identity is unknown or hidden • People who receive bad treatment from others. • The act of physically or mentally abusing somebody • a prefix meaning using the internet and technology • To annoy or repeatedly bother someone intentionally • ...
Learning Theories revision 2023-04-10
Across
- A type of economy used to exchange with rewards
- The psychologist who did the dog study
- When your results accurately measure what you intended to measure
- out humanity
- Learning through the consequences of another person’s behavior
- Psychologist who researched Cyber-dehumanization: Violent Video game play
Down
- Known for his work on classical conditioning
- the disappearance of behavior that was previously learnt through being associated with another stimulus
- where a person copies the behavior of a role model
- When a theory/study ignores free will
- The psychologist know for his pigeon study
- How many pigeons used in the superstitious pigeon study
12 Clues: out humanity • When a theory/study ignores free will • The psychologist who did the dog study • The psychologist know for his pigeon study • Known for his work on classical conditioning • A type of economy used to exchange with rewards • where a person copies the behavior of a role model • How many pigeons used in the superstitious pigeon study • ...
THE IT ACT, 2000 2022-05-26
Across
- key used to verify digital sign
- person in whose name the digital signature certificate is issued
- upon the death of the subscriber digital signature certificate shall be
- act of establishing a particular person as the creator of work
- means to verify genuiness of the record
- authentication of electronic record
Down
- issued by certifying authority to subscriber for digital signature certificate
- key used to create a digital sign
- criminal activities carried out by means of computer or internet
- example of certifying authority in India
- cyber crime includes
- The IT act shall not apply to a
12 Clues: cyber crime includes • key used to verify digital sign • The IT act shall not apply to a • key used to create a digital sign • authentication of electronic record • means to verify genuiness of the record • example of certifying authority in India • act of establishing a particular person as the creator of work • ...
Media and Law 2023-05-18
Across
- to show smith that was previously secret
- to force someone to leave somewhere
- a legal document ordering someone to appear in a law court
- looking cheap and of law quality
- an act of breaking a law
- the act of believing that something is true without having any proof
Down
- a piece if writing that contains bad or false things about a person
- not interesting and exciting (or not clear or shiny)
- statements given in a law court
- to try very hard to do something
- involving or relating to computers
- a change made in the text
12 Clues: an act of breaking a law • a change made in the text • statements given in a law court • to try very hard to do something • looking cheap and of law quality • involving or relating to computers • to force someone to leave somewhere • to show smith that was previously secret • not interesting and exciting (or not clear or shiny) • ...
Carbon and Energy Security 2023-11-16
Across
- Planting trees in places with recent tree cover, replacing lost primary forests.
- _____________ circulation.
- The route taken by any form of energy from its source to its point of consumption (6,7).
- _____________ turnover. The rate at which carbon enters and leaves a store.
- 1,000,000,000,000 kilograms.
- Any change from a natural ecosystem to an alternative use; it usually reduces carbon and water stores (4,10).
- Natural gas trapped in fine-grained sedimentary rocks.
- Organic matter used as a fuel.
- Country which pioneered the use of biofuels.
- The processes operating in oceans to circulate and store carbon.
Down
- A fuel derived from living matter.
- A new geological era beginning 8,000 years ago when humans began farming. Reflects the view that humans are the main driver of Earth's processes.
- Processes and actions associated with human activity.
- An abrupt change in an ecological state (8,9)
- The leading international organisation for the scientific assessment of climate change (acronym).
- Planting trees on land that has never had forest.
- Name of Dr Gleave's cat
- A mixture of clay, sand, water and bitumen (3,5).
18 Clues: Name of Dr Gleave's cat • _____________ circulation. • 1,000,000,000,000 kilograms. • Organic matter used as a fuel. • A fuel derived from living matter. • Country which pioneered the use of biofuels. • An abrupt change in an ecological state (8,9) • Planting trees on land that has never had forest. • A mixture of clay, sand, water and bitumen (3,5). • ...
The Second Amendment 2024-08-24
Scientific Management 2023-01-17
Handmaid's Tale Ch. 1-6 2025-01-27
Technology and social media 2021-09-17
Across
- The streaming platform created in 2005
- The online platform you use for maths homework
- Never disclose this
- An education version is now in schools
- The company that develops the xbox console
- The name given to online bullying
- The football game that is often played online
- If you post on Twitter you .....
- A platform that allows you to upload videos
- The company that develops the iPhone and iPad
Down
- The age you must be to have a WhatsApp account
- The BBC's online live tv and streaming service
- The age you must be to have a Facebook account
- A streaming service to listen to music
- What you sign into to access the chromebooks
- A streaming service to watch TV and films
- You should be thirteen to play this game
17 Clues: Never disclose this • If you post on Twitter you ..... • The name given to online bullying • The streaming platform created in 2005 • A streaming service to listen to music • An education version is now in schools • You should be thirteen to play this game • A streaming service to watch TV and films • The company that develops the xbox console • ...
Mod 5 2025-10-14
Across
- : Nonacademic online activities that reduce student focus
- : False or misleading information spread online
- : Related to computers or electronic technology
- : Layered security approach with multiple protections
- : Gaining access without permission
Down
- : Malware that encrypts files and demands payment
- : AI-generated fake media meant to deceive viewers
- : Fraudulent emails or websites that try to steal credentials or data
- : Teaching responsible, ethical behavior online
- : Harassing or intimidating someone online
- : Security model that assumes no implicit trust
11 Clues: : Gaining access without permission • : Harassing or intimidating someone online • : Teaching responsible, ethical behavior online • : False or misleading information spread online • : Related to computers or electronic technology • : Security model that assumes no implicit trust • : Malware that encrypts files and demands payment • ...
ITGS Security: Malware 2022-04-13
Across
- Spreads without user interaction
- Malicious software
- Documents user key inputs
- Unauthorized file encryption
- mimics a legitimate program
- Used to launch DDoS attacks
Down
- Malicious advertising
- Unauthorized monitoring of user activities
- Unwanted performance hindering software
- Damages files and spreads across devices
- Used to take remote control over a device
- The bypassing of a security system
12 Clues: Malicious software • Malicious advertising • Documents user key inputs • mimics a legitimate program • Used to launch DDoS attacks • Unauthorized file encryption • Spreads without user interaction • The bypassing of a security system • Unwanted performance hindering software • Damages files and spreads across devices • Used to take remote control over a device • ...
Security Information Crossword 2013-10-01
Across
- Interfere with computer operation
- Social networks targets business professionals
- Largest social network today
- Not a form of social media
- Real-time communication
- Not harmful to your computer
- Common form of authentication
Down
- Stealing a person’s bank account number
- Activity computer becoming infected by Malware
- Junk e-mail
- Responsible for managing LAN
- Computer viruses and Trojan Horses
12 Clues: Junk e-mail • Real-time communication • Not a form of social media • Largest social network today • Responsible for managing LAN • Not harmful to your computer • Common form of authentication • Interfere with computer operation • Computer viruses and Trojan Horses • Stealing a person’s bank account number • Activity computer becoming infected by Malware • ...
Social Security Administration 2016-04-27
Across
- when someone disagrees with a decision
- a scheduled date and time for an event
- type of agency for SSA
- how we inform recipients of changes to their benefits
- recipents get this every month
Down
- how we communicate with the public
- when SSA employees gather as a group to receive information
- how SSA workers stay informed of updated policies
- a condition/illness that allows SSA to pay an individual
- health insurance SSA offers the public at age 65
- SSA assigns this unique set to each individual
- SSA videos
12 Clues: SSA videos • type of agency for SSA • recipents get this every month • how we communicate with the public • when someone disagrees with a decision • a scheduled date and time for an event • SSA assigns this unique set to each individual • health insurance SSA offers the public at age 65 • how SSA workers stay informed of updated policies • ...
Unit 4 Crossword lab 2023-02-06
CITTADINANZA DIGITALE:IACU 2022-01-12
Across
- capacità di un individuo di partecipare alla società anche online
- “pirata digitale”
- atto disonesto e aggressivo, può portare a gravi conseguenze
- specifico simbolo che identifica una specifica marca pubblicizzandola
- rete che consente la funzione di internet
- spargere notizie private senza il consenso del diretto interessato
Down
- social dove condividere foto e video
- attività diventata obbligatoria ormai per tutte le materie scolastiche
- deridere qualcuno per le sue condizioni fisiche
- foto scattata dal soggetto che può essere in compagnia di amici e postata sui social
- programma realizzato per essere installato su dispositivi portatili
11 Clues: “pirata digitale” • social dove condividere foto e video • rete che consente la funzione di internet • deridere qualcuno per le sue condizioni fisiche • atto disonesto e aggressivo, può portare a gravi conseguenze • capacità di un individuo di partecipare alla società anche online • programma realizzato per essere installato su dispositivi portatili • ...
Gossip 2018-01-17
Across
- An attack made as a response to another attack.
- Resist the urge to _______________ .
- Don’t _____________ anyone who is violent.
- What you wrote about me was really m______ .
Down
- Sometimes it’s hard to ____________ the temptation to fight back.
- All the gossip that has spread about me cheating in the final exam has ruined my _________ as school captain.
- A response that is more dramatic or greater than necessary.
- To say you’re sorry.
- Someone who bullies people online.
- Failure to recognise or to pretend something is not happening.
- Somebody who’s being picked on.
11 Clues: To say you’re sorry. • Somebody who’s being picked on. • Someone who bullies people online. • Resist the urge to _______________ . • Don’t _____________ anyone who is violent. • What you wrote about me was really m______ . • An attack made as a response to another attack. • A response that is more dramatic or greater than necessary. • ...
crossword puzzle 2025-11-27
Across
- The most common way attackers send phishing links.
- secret string of characters used to gain access.
- To break into a computer system illegally
- The written instructions that make software work.
Down
- Safe or protected from attack
- Malicious code that spreads from computer to computer.
- Online storage where data is kept instead ofon your hard drive
- Information that AI needs to analyze to learn.
- Short for "robot," an automated program.
- Prefix relating to computers, information technology and the internet.
- An AI tool that has been trained on data to make predictions
11 Clues: Safe or protected from attack • Short for "robot," an automated program. • To break into a computer system illegally • Information that AI needs to analyze to learn. • secret string of characters used to gain access. • The written instructions that make software work. • The most common way attackers send phishing links. • ...
Unit-1: Security Architecture and OS Security Fundamentals 2025-08-04
Across
- This component manages hardware and software resources on a computer(13 letters)
- A set of processes and technologies used to protect data in information systems(13 letters)
- A type of security that focuses on protecting communication via emails (5,8 letters)
- A structured collection of data or information that can be easily accessed, managed, and updated(8 letters)
- The high-level description of how an OS interacts with hardware and software (9,7 letters)
- These are categorized into tangible and intangible types, and have organizational value (5,5 letters)
- Refers to the weaknesses in an operating system that can be exploited (14 letters)
- A rule that enforces how passwords should be created and managed (8,8 letters)
- A method of security that often involves layers like hardware, software, and processes (8,7 letters)
Down
- The full form of DBMS (8,10 letters)
- An individual element in an information system that has value and requires protection(5 letters)
- A program that manages user permissions and roles in a system (4,13 letters)
- Refers to the protection of devices and users connected through the web (7,8 letters)
- The process of verifying the identity of a user(14 letters)
- The overall design and structure of security controls in an organization(11 letters)
15 Clues: The full form of DBMS (8,10 letters) • The process of verifying the identity of a user(14 letters) • A program that manages user permissions and roles in a system (4,13 letters) • A rule that enforces how passwords should be created and managed (8,8 letters) • This component manages hardware and software resources on a computer(13 letters) • ...
Unit 6 VA Studies 2022-03-03
Across
- this department provides programs to benefit Virginia's students
- The Virginia General assembly is this branch
- what Virginia citizen's pay for services such as schools and libraries
- a group of citizens who share many of the same ideas about goverment
- group of citizens chosen to hear facts in court
- chooses
Down
- state's court system
- the branch that makes sure laws are carried out
- the department that manages the national parks
- Headquarters of security, located near Washington DC
- number of presidents born in Virginia
- The first 10 amendments to our constitution
- number of years we have a presidential election
- the department that is in charge of national security
14 Clues: chooses • state's court system • number of presidents born in Virginia • The first 10 amendments to our constitution • The Virginia General assembly is this branch • the department that manages the national parks • the branch that makes sure laws are carried out • number of years we have a presidential election • group of citizens chosen to hear facts in court • ...
The Great Depression key terms 2023-10-16
Across
- production over producing of goods
- music type of music 1920s that was up beat
- a place where people stood to get food in the 1930s
- prices decreasing
- struggling and loss of confidence
- chat a series of speeches over the radio by fdr
- A way people all over the country communicated
- security From of program that helped elderly with their security
- failures one of the reasons that cause the Great Depression
Down
- Sand storms created by over farming
- a serious of programs intended to help the citizens
- Speeches FDR over the radio
- 1930s encampment for the homeless
- dam project started to provide jobs and water to the west
- Market Where people buy and sell and trade goods
15 Clues: prices decreasing • Speeches FDR over the radio • 1930s encampment for the homeless • struggling and loss of confidence • production over producing of goods • Sand storms created by over farming • music type of music 1920s that was up beat • A way people all over the country communicated • chat a series of speeches over the radio by fdr • ...
Bullying 2023-02-27
Bullying 2023-02-27
cyber warfare 2022-11-02
Cyber Crossword 2021-04-27
Across
- An action on social media platforms that allows you to limit someone else’s access to view or common on your account.(Starts with B)
- Someone who uses technology to harass, threaten, embarrass, or target another person
- Resource 3 acronym for stopping cyberbullying. (Starts with G)
- A feeling towards an individual that you firmly believe in and is reliable.(Starts with T)
Down
- A person between ages 13 to 19 are called this name, Similar to the name Adults.(Starts with T)
- When someone hits someone else but not on purpose. (Starts with A)
- An individual that repetitively causes harm or stress on another person.(Starts with B)
7 Clues: Resource 3 acronym for stopping cyberbullying. (Starts with G) • When someone hits someone else but not on purpose. (Starts with A) • Someone who uses technology to harass, threaten, embarrass, or target another person • An individual that repetitively causes harm or stress on another person.(Starts with B) • ...
Cyber Crossword 2021-06-28
Across
- Term used to prevent disclosure information to unauthorize individual or system ______
- Mark Zuckeberg founder of _______
- CCTV and Biometric are example of ______
Down
- Country that been attack by DDoS in 2007 and collapse the whole country _____
- Test the reach ability of host on an IP network _____
- Maxis,TM,Celcom are example of ____
- Computer worm that attack Iranian Nuclear Facilities _______
7 Clues: Mark Zuckeberg founder of _______ • Maxis,TM,Celcom are example of ____ • CCTV and Biometric are example of ______ • Test the reach ability of host on an IP network _____ • Computer worm that attack Iranian Nuclear Facilities _______ • Country that been attack by DDoS in 2007 and collapse the whole country _____ • ...
Cyber Responsibility 2020-08-10
7 Clues: mark zuckerberg • send out tweets • app logo is a ghost • telling people too much • acquired by Facebook in 2012 • formally known as Musical.ly • character judged by people in general
cyber safety 2019-09-30
Across
- get a pasword
- whasap
- a person that hacks your computer
Down
- it kills the computer
- not your friend and mean
- type of Internet fraud scam where the scammer sends email messages that appear to be from financial institutions or credit card companies that try to trick recipients into giving private information
- some thins that helps you pro tech the computer
7 Clues: whasap • get a pasword • it kills the computer • not your friend and mean • a person that hacks your computer • some thins that helps you pro tech the computer • type of Internet fraud scam where the scammer sends email messages that appear to be from financial institutions or credit card companies that try to trick recipients into giving private information
Cyber Safety 2019-09-26
Across
- bullying that takes place over digital devices like cell phones, computers, and tablets.
- software protecting the computer from danger
- criminals get sensitive information (like usernames or passwords).
Down
- the use of technologies to protect computers and data from stranger
- use of the Internet or other electronic means to stalk or harass individual
- extremely tiny parasite that can only reproduce if it is within a living being or anything that corrupts something else.
- something you shouldn't give online
7 Clues: something you shouldn't give online • software protecting the computer from danger • criminals get sensitive information (like usernames or passwords). • the use of technologies to protect computers and data from stranger • use of the Internet or other electronic means to stalk or harass individual • ...
CYBER BULLYING 2024-07-25
7 Clues: the web we share • being safe online • a witness who ignores the bully • someone who control a certain thing • someone who stand up for the victim • a code you make to secure your information • when a hateful person does mean things online
Privacy Refresher Training - Test your knowledge! 2016-05-30
Across
- Another name for security methods used to protect personal information
- Email is the equivalent of a _______
- Privacy is an individual's right to _____ his or her own personal information
- Training is an example of this kind of security safeguard
Down
- We need this from an individual in order to collect, use and disclose personal information
- Who to send someone to if he or she has questions about our privacy practices
- Privacy and confidentiality work together with this to protect personal information
- The first step in responding to privacy breaches
- Make sure computer screens are positioned so that they can't be _____ by people who have no right to know
- Our privacy notice is posted here
10 Clues: Our privacy notice is posted here • Email is the equivalent of a _______ • The first step in responding to privacy breaches • Training is an example of this kind of security safeguard • Another name for security methods used to protect personal information • Who to send someone to if he or she has questions about our privacy practices • ...
Cloud Security Best Practices 2023-09-28
Across
- A security measure that requires multiple forms of authentication.
- Notifications of security incidents are often referred to as _____
- Cloud service model often used for sensitive data storage where the provider manages everything
- This authentication factor often involves something you have, like a fingerprint or smart card
- The practice of monitoring network traffic for unusual or suspicious activity.
- The principle of assigning different access levels to different users or groups
- Ensuring that data is kept confidential, intact, and available
Down
- Protecting data by converting it into a code
- A security measure that involves keeping software and systems up to date.
- The responsibility for securing cloud resources is often shared between the cloud provider and the___
10 Clues: Protecting data by converting it into a code • Ensuring that data is kept confidential, intact, and available • A security measure that requires multiple forms of authentication. • Notifications of security incidents are often referred to as _____ • A security measure that involves keeping software and systems up to date. • ...
Cyber attack crossword puzzle 2023-09-03
Across
- A secret word or phrase used to gain access to your accounts.
- Criminal activities carried out using computers or the internet.
- A security barrier that filters network traffic to prevent unauthorized access.
- A set of rules and practices for ensuring the security of computer systems and data.
- A fake email or website that tricks individuals into revealing sensitive information.
Down
- The unauthorized access, theft, or manipulation of data.
- Malicious software specifically designed to harm, infiltrate, or compromise computer systems.
- A malicious software that can encrypt files and demand a ransom for their release.
- An organization or individual responsible for securing computer systems and networks.
- A program designed to protect a computer from viruses and malware.
10 Clues: The unauthorized access, theft, or manipulation of data. • A secret word or phrase used to gain access to your accounts. • Criminal activities carried out using computers or the internet. • A program designed to protect a computer from viruses and malware. • A security barrier that filters network traffic to prevent unauthorized access. • ...
The Curious Case of Pretexting: When Tech Support Isn’t Really Tech Support! 2024-09-11
Across
- What attackers exploit to manipulate you in social engineering attacks.
- The act of checking or confirming the authenticity of a caller before sharing sensitive information.
- The system utility in Windows that allows users to view and adjust system settings.
- Department responsible for assisting users with IT issues, often impersonated in pretexting attacks.
- The location where Rachel's fake tech support character supposedly worked.
- Software designed to detect and destroy malware.
Down
- World-renowned security consultant and former hacker who helped popularize social engineering.
- Network security system that monitors and controls incoming and outgoing network traffic.
- A form of social engineering where the attacker lies to obtain restricted information.
- CEO of SocialProof Security and expert in social engineering.
10 Clues: Software designed to detect and destroy malware. • CEO of SocialProof Security and expert in social engineering. • What attackers exploit to manipulate you in social engineering attacks. • The location where Rachel's fake tech support character supposedly worked. • The system utility in Windows that allows users to view and adjust system settings. • ...
Factory Biome Markers 2023-02-16
17 Clues: Clock • Chaos • Smile • Worker • Forever • Weird Hat • Microscopic • Iron + Oxygen • Invisible Path • Marker For The • Roof In Factory • Factory Parkour • Least Used Color • Protects Factory • Corner Of Factory • Used For Deliveries • Comes Out Of Factories
Spanish 2018-10-16
17 Clues: gate • screen • to fly • flight • arrival • airport • to board • airplane • passenger • departure • stewardess • baggage claim • to get in line • go through customs • go through security • to check in baggage • can you tell me where ... is?
SHERATON 2022-02-08
13 Clues: - SAFE • - Parish • - Clothing • - Location • - Pharmacy • - Furniture • - Appliances • - Restaurants • - Gym & Workout • - Intel Building • - Shipping worldwide • - Visual Entertainment • - Have a drink and socialise
Bullying 2014-06-19
Across
- what site do people get bullied most
- What type of bulling is done over the internet
- what do you do if you are being bullied
- What is the victims reaction most of the time
- what is the person being mean called
- what type of bulling is done with hitting/punching
- how do bullys act
- what do you do If you see someone being bullied
Down
- what is the person getting bullied called
- what is the person watching called
- What type of bullying is done with name calling
- one way to not listen to a bully
- What is a good bully movie
- what is one place to call for help
- Where does bullying mostly happen
15 Clues: how do bullys act • What is a good bully movie • one way to not listen to a bully • Where does bullying mostly happen • what is the person watching called • what is one place to call for help • what site do people get bullied most • what is the person being mean called • what do you do if you are being bullied • what is the person getting bullied called • ...
bullying crossword 2014-06-05
Across
- hitting or hurting someone
- when you leave someone out of the group
- when you call someone names.
- : use of words that upset the victim
- threatening someone or making them scared enough to make them do what you want
- attacking the victim and contact with the victim
- when its done face to face
- when things are said that arnt true
Down
- is a crime
- making someone feel as they have to do what you tell them to do
- groups that hep you with bullying
- the person who is being mean to the victim
- a person who is watching but doesnt do anything about it
- when its done through social media
- the person who is getting bullied
15 Clues: is a crime • hitting or hurting someone • when its done face to face • when you call someone names. • groups that hep you with bullying • the person who is getting bullied • when its done through social media • when things are said that arnt true • : use of words that upset the victim • when you leave someone out of the group • the person who is being mean to the victim • ...
society and health care 2018-08-20
13 Clues: syrjintä • kuntoutus • tasa-arvo • vähemmistö • kansalainen • maahanmuutto • pysyvä vamma • tuki,avustus • kelakorvaukset • leave sairasloma • leave äitiysloma • security sosiaaliturva • insurance sairasvakuutus
Geography Volcabulary 2025-01-09
air travel 2022-09-12
14 Clues: Лифт • Выход • Таможня • Тележка • Прибытие • Высадить • Терминал • Подобрать • Регистрация • Отправление • Сдача багажа • Выдача багажа • Паспортный контроль • Проверка безопасности
Economic Goals 2022-03-28
Across
- efficient use of productive resources
- having as many people working as possible
- spending more than what you have collected
- rise in the general level of prices
- includes insurance and Social Security
Down
- sum of goods and services produced in a year
- period without inflation or deflation
- bring in more than what is going out
- a reduction of the general level of prices
- goal of using resources wisely
- making sure practices are fair in work related matters
- individuals making their own economic decisions
- improving material well-being or standard of living
13 Clues: goal of using resources wisely • rise in the general level of prices • bring in more than what is going out • period without inflation or deflation • efficient use of productive resources • includes insurance and Social Security • having as many people working as possible • a reduction of the general level of prices • spending more than what you have collected • ...
confidentiality 2025-02-06
Across
- of information
- work history, date of birth, social security number, criminal record,
- records of an employee’s performance on the job such as performance reports,
- information about an employee prior to employment such as a résumé,
- set of rules or promises which limits access or places restrictions on certain
- actions, supervisory notations
- insurance information
Down
- keeping employee, customer and client information private
- form of espionage conducted for commercial purposes rather than security;
- information
- religion, etc.
- involves individuals hired to steal trade secrets, new products or
- information which may arise from employment-related physicals, drug tests and
13 Clues: information • of information • religion, etc. • insurance information • actions, supervisory notations • keeping employee, customer and client information private • involves individuals hired to steal trade secrets, new products or • information about an employee prior to employment such as a résumé, • work history, date of birth, social security number, criminal record, • ...
vocab 2025-02-06
Across
- records of an employee’s performance on the job such as performance reports,
- religion, etc.
- set of rules or promises which limits access or places restrictions on certain
- information about an employee prior to employment such as a résumé,
- involves individuals hired to steal trade secrets, new products or
- of information
- information which may arise from employment-related physicals, drug tests and
Down
- keeping employee, customer and client information private
- work history, date of birth, social security number, criminal record,
- actions, supervisory notations
- insurance information
- form of espionage conducted for commercial purposes rather than security;
- information
13 Clues: information • religion, etc. • of information • insurance information • actions, supervisory notations • keeping employee, customer and client information private • involves individuals hired to steal trade secrets, new products or • information about an employee prior to employment such as a résumé, • work history, date of birth, social security number, criminal record, • ...
Cloud Computing Concepts 2021-09-10
Across
- Cloud security threat
- AAA security architecture
- is a general term for the delivery of hosted services over the Internet.
- is a high-performance computer used for large-scale computing purposes
- Types include horizontal and vertical.
Down
- Risk Management Processes
- Second risk Management Processes
- means creating a virtual version of a device or
- also known as VMM
- Saas,Paas,Iaas
10 Clues: Saas,Paas,Iaas • also known as VMM • Cloud security threat • Risk Management Processes • AAA security architecture • Second risk Management Processes • Types include horizontal and vertical. • means creating a virtual version of a device or • is a high-performance computer used for large-scale computing purposes • ...
prison security crossword puzzle 2025-04-23
Across
- Type of camera used for surveillance
- A scheduled event for checking inmates
- A common method to restrict inmate movement
- Technology used to track movement
Down
- A high-security area within a prison
- a person imprisoned
- The highest level of prison security
- Guards use this to maintain order
- A unit used to isolate violent inmates
- The outermost barrier of a prison
10 Clues: a person imprisoned • Guards use this to maintain order • The outermost barrier of a prison • Technology used to track movement • Type of camera used for surveillance • A high-security area within a prison • The highest level of prison security • A scheduled event for checking inmates • A unit used to isolate violent inmates • A common method to restrict inmate movement
kin haalʼá áhání áhoot’éhígíí 2023-03-06
18 Clues: - IT • - Hogan • - Dorms • - Airport • - Library • - Kitchen • - White Tent • - Music Room • - Dining hall • - Weight room • - Nurse office • - Front office • - Security shack • - inside the dorms • - Outside Play Area • - Outside meeting area • - Safe Place for drills • - Eagles nest or Aux gym
Internet & Networks 2015-09-27
Across
- Internet Service Provider
- platforms for social interaction
- Fraudulent websites or "Malicious software" viruses, worms, spyware
- social applications and networking websites
- Transmission Control Protocol
- Closes all ports on a computer except ones used by services
- Wireless fidelity - wireless network technology
- main Internet pathways
- Device that uses P2P to connect thru a wireless connection
- Unique 32-bit identifier
- predecessor to the Internet
Down
- Powerful computers that accommodate many user requests
- Domain Name System tracks billions of addresses, names & servers
- Hacking technique that replaces IP address with fraud IP addresses
- Combines voice and data networks into a digital network
- technologists
- Immersive virtual environments over a network
- Network device that manages network traffic
- Video Phone Service uses P2P apps to communicate between clients
- is an address used by client/servers that associates specific service
- father of the Internet
- Research & development consortium
- cyber-criminals
23 Clues: technologists • cyber-criminals • father of the Internet • main Internet pathways • Unique 32-bit identifier • Internet Service Provider • predecessor to the Internet • Transmission Control Protocol • platforms for social interaction • Research & development consortium • Network device that manages network traffic • social applications and networking websites • ...
digital crossword 2016-02-03
Across
- something we play games on most of the time
- starts with an F many adults use it
- tattoo your permanent place online
- way you should be online
- use to everyone's advantages
- used to ruin people's life. __________ and chill
- something we use every day ________ it
- it has a bird for its symbol
Down
- chats something people use to send to many pictures
- number something we try to pick girls up with
- we use to buy useless things
- should be long and secret
- you use it every day to watch videos. MARKIPLIER PEWWWEEEEDIPIE
- something we play way to much
- something that is messed up and corrects your words
- don't send pictures you wouldn't send to grandma
- bullying something people do to hurt others
- something people need to use more often
- something people listen to music with
- it starts with a T and is used for pictures
20 Clues: way you should be online • should be long and secret • we use to buy useless things • use to everyone's advantages • it has a bird for its symbol • something we play way to much • tattoo your permanent place online • starts with an F many adults use it • something people listen to music with • something we use every day ________ it • something people need to use more often • ...
2017 Bring Your Child to Work Day! 2017-04-27
Across
- Bruce Banner
- Arthur Curry
- (Navy Core Value) “I will support and defend...”
- Diana Prince
- First U.S. manned space mission
- a permanent _____ _____ station was established on the Coronado Strand Military Reservation
- _____ of the Great White Fleet
- Reactivated January 29th, 2010 as US Fleet Cyber Command
- First U.S. two-person space mission
- Natasha Romanova
- (Navy Core Value) “I will bear true faith and allegiance...”
- First manned lunar landing mission
- Coined the phrase “Debugging”
Down
- (Navy Core Value) “I will obey the orders...”
- Clark Kent
- President of the SpongeBob Fan Club
- Don’t give up the ship!
- Bruce Wayne
- Established on July 27th, 2005 by merging FIWC Detachment San Diego with NSGA San Diego
- Old Ironsides
- Kara Danvers
- The march of the US Navy
- US Naval Academy’s mascot
- I’m _____ the Sailor Man
- America’s first submarine
- Barbara Gordon
- Operation Purple Dragon
27 Clues: Clark Kent • Bruce Wayne • Bruce Banner • Arthur Curry • Diana Prince • Kara Danvers • Old Ironsides • Barbara Gordon • Natasha Romanova • Don’t give up the ship! • Operation Purple Dragon • The march of the US Navy • I’m _____ the Sailor Man • US Naval Academy’s mascot • America’s first submarine • Coined the phrase “Debugging” • _____ of the Great White Fleet • First U.S. manned space mission • ...
Unit 7,8,10 Vocabulary Puzzle 2023-05-16
Across
- meeting
- repeat the main points of something
- help
- voice calm voice
- solve a problem
- Bring ______ scissors for child
- The parent-teacher meeting was __________.
- I _____ have a stomachache.
- cyber ________
- not ever
- at all time
- contact skinship
- Ask for __________ when you go to the toilet.
- permit, approve
- working together
- We have to eat _____ day.
- say Hello!
- a worry about something
- cleanliness
- _____ routine
Down
- level of learning
- objects knife, scissor, ax etc.
- to choose someting
- sometimes but not often
- compliment
- happens or exists of the time or in most cases
- to wash your hands
- a star rating
- action
- problem
- What you have to keep in the classroom.
- to touch, feel, hold with your hand
- it’s similar like conversation, talk
- I _________ have nightmares.
- ready
- not often
- weekday + weekend
37 Clues: help • ready • action • meeting • problem • not ever • not often • compliment • say Hello! • at all time • cleanliness • a star rating • _____ routine • cyber ________ • solve a problem • permit, approve • working together • level of learning • voice calm voice • contact skinship • weekday + weekend • to choose someting • to wash your hands • sometimes but not often • a worry about something • We have to eat _____ day. • ...
IIDPS personalities - How well you know your team? 2024-04-20
Across
- Turban & Beard
- Clock of CoreElec
- First 3 letters of 2 SM's make her name
- Celebrated Birthday yesterday
- Presenter of Innovation topic last Thursday
- She asks lot of questions in calls
- Recent to join the Dabba Gang
- Good singer, but not sumitav
- Telengana's Tiger
- Mysore Maharaj
- Last one to join the team
- National level athlete
- Polite, Salt & pepper hair style
Down
- One of the union territories is his native (Sometimes people go here for visa appointment)
- Cracks most of the jokes during team calls
- Not his first time to UK
- Cyber saviour
- Specs in the size of face mask
- Head at the height of troposphere
- Nawab, Ruler, Monarch
- Indian❌ Japanese✅
- The leanest
- From CE, but ain't travelling
- Meetings on, Camera On
- Getting married next year
- Always has Lunch @4PM
- The Saber in the North (Yes, it's a GOT reference)
27 Clues: The leanest • Cyber saviour • Turban & Beard • Mysore Maharaj • Clock of CoreElec • Indian❌ Japanese✅ • Telengana's Tiger • Nawab, Ruler, Monarch • Always has Lunch @4PM • Meetings on, Camera On • National level athlete • Not his first time to UK • Getting married next year • Last one to join the team • Good singer, but not sumitav • Celebrated Birthday yesterday • Recent to join the Dabba Gang • ...
1-6-25 2025-01-08
Across
- Territory president elect Trump wants to buy
- number of people killed in New Orleans terrorist attack
- New Orleans street name where terrorist attack happened
- car with self driving features
- the age Jimmy Carter died at
- state where most of the sea food in America comes from
- the prime minister of what country recently stepped down?
- Olympian arrested in Miami beach
- type of crab becoming rare in Alaska
Down
- ai website used to plane Cyber truck attack
- city that faced terrorist attack on New Years
- actress who won Golden Globe award for her movie "The Substance"
- prime minister of Canada
- president serving Jimmy Carter's eulogy
- flu disease that killed one person in Louisiana
- 39th president, died at 100
- name of recent award ceremony
- Ceo of Facebook and Instagram
- state experiencing brush fire everywhere
- state adding congestion toll prices
20 Clues: prime minister of Canada • 39th president, died at 100 • the age Jimmy Carter died at • name of recent award ceremony • Ceo of Facebook and Instagram • car with self driving features • Olympian arrested in Miami beach • state adding congestion toll prices • type of crab becoming rare in Alaska • president serving Jimmy Carter's eulogy • state experiencing brush fire everywhere • ...
Informatika 2025-05-10
Across
- Kata kunci untuk mencari informasi di internet
- Sebuah situs web yang digunakan untuk berbagi informasi
- Media sosial yang berbasis teks dan percakapan
- privasi Memposting foto atau video seseorang tanpa izin
- online Sebuah bentuk cyberbullying yang melibatkan pengucilan
- online Sebuah bentuk cyberbullying yang melibatkan intimidasi
- online Sebuah bentuk cyberbullying yang melibatkan penghinaan
- Media sosial yang menghubungkan pengguna dengan teman dan keluarga
- Tindakan menyebarkan informasi palsu secara online
Down
- online Mengganggu atau melecehkan seseorang secara online
- identitas Meniru identitas seseorang secara online
- Online menghina atau mempermalukan seseorang secara online
- palsu Akun palsu yang digunakan untuk tujuan jahat
- Aplikasi pesan instan yang populer
- Online menyebarkan gosip atau rumor tentang seseorang
- online Sebuah bentuk cyberbullying yang melibatkan ancaman
- Salah satu klasifikasi media sosial berupa blog
- palsu Menyampaikan informasi yang tidak benar
- Platform media sosial yang terkenal dengan foto dan video singkat
- bullying Perilaku menyakiti orang lain secara online
20 Clues: Aplikasi pesan instan yang populer • Kata kunci untuk mencari informasi di internet • Media sosial yang berbasis teks dan percakapan • palsu Menyampaikan informasi yang tidak benar • Salah satu klasifikasi media sosial berupa blog • Tindakan menyebarkan informasi palsu secara online • identitas Meniru identitas seseorang secara online • ...
Industralisation 2019-02-13
Across
- Who invented the telephone?
- What's the fourth step of revolution based on?
- Which religion favored the industrial Revolution?
- Who sent the America's first telegram across 3 kilometres of wire?
- Where was the Krupp Works factory situated?
- Who built the Eiffel Tower?
Down
- Where did Industralisation start?
- What was the most important invention during th second wave of the Industrial Revolution?
- What was mostly produced in Switzerland during the industralisation?
- How were rich US-American men with economic empires called?
- How were artisans organised in at the end of the 17th century?
11 Clues: Who invented the telephone? • Who built the Eiffel Tower? • Where did Industralisation start? • Where was the Krupp Works factory situated? • What's the fourth step of revolution based on? • Which religion favored the industrial Revolution? • How were rich US-American men with economic empires called? • How were artisans organised in at the end of the 17th century? • ...
Security XMas Crossword 2020-11-24
Across
- A 4in1 keretében többek között ezt is átvehetted.
- A csengettyű ilyen hangot ad.
- Ez lapul a karácsonyfa alatt.
- Finom illatú karácsonyi sütemény.
- Adathalászat, idegen szóval.
Down
- Sérülékenység, idegen szóval.
- ...koszorú.
- Kártékony szoftver, röviden.
- A Mikulás leghíresebb rénszarvasa.
- Így hívják a mézeskalácsot a Shrek-ben.
- Édesség, amit a karácsonyfára teszünk.
- Deutsche Telekom ... Solutions Kft.
12 Clues: ...koszorú. • Kártékony szoftver, röviden. • Adathalászat, idegen szóval. • Sérülékenység, idegen szóval. • A csengettyű ilyen hangot ad. • Ez lapul a karácsonyfa alatt. • Finom illatú karácsonyi sütemény. • A Mikulás leghíresebb rénszarvasa. • Deutsche Telekom ... Solutions Kft. • Édesség, amit a karácsonyfára teszünk. • Így hívják a mézeskalácsot a Shrek-ben. • ...
Program Security Crossword 2024-04-23
Across
- Form that is completed and submitted annual or as new "yes" answers are added
- Either affections or associated that need to be reported to PERSEC
- Is another name for following someone through the mantrap without swiping/scanning your own badge
- Prohibited from entering SAPFs without prior approval from the PSO
- Hotline: 202-433-9111
Down
- A handling caveat used within SAP control channels
- Indicators include unexplained affluence, financial hardship, attempts to circumvent security procedures, and drastic changes in behavior/work habits
- Must be reported at least 30 days before departing the US
- Transmitting classified material on an unauthorized network
- SAPs are extremely sensitive programs containing...
- Required to be worn inside all SAPFs
- Legally binding documents that is signed prior to SAP indoctrination
12 Clues: Hotline: 202-433-9111 • Required to be worn inside all SAPFs • A handling caveat used within SAP control channels • SAPs are extremely sensitive programs containing... • Must be reported at least 30 days before departing the US • Transmitting classified material on an unauthorized network • Either affections or associated that need to be reported to PERSEC • ...
Alex- bullying 2022-03-08
Across
- Rider got mad and yelled at everyone for the first time
- Jake was leaving Hayden out of the friend group chat
- of power mike and Josiah are the same height so its a fair fight
- Alex and Austin were roasting each other an laughing
- Mike and Dustin always gets in fights
- Alex was calling rider names
- Kevin told max that he's stupid
- mike told everyone but Kyle about his birthday
Down
- someone was trying to pretend to be Obama
- jimmy pushed mike down the stairs
- mike was saying rumors about Dustin
- Eli made Ale tell a very big secret
- Alex trips Hunter in the hall everyday
13 Clues: Alex was calling rider names • Kevin told max that he's stupid • jimmy pushed mike down the stairs • mike was saying rumors about Dustin • Eli made Ale tell a very big secret • Mike and Dustin always gets in fights • Alex trips Hunter in the hall everyday • someone was trying to pretend to be Obama • mike told everyone but Kyle about his birthday • ...
Alex- bullying 2022-03-08
Across
- Rider got mad and yelled at everyone for the first time
- Jake was leaving Hayden out of the friend group chat
- of power mike and Josiah are the same height so its a fair fight
- Alex and Austin were roasting each other an laughing
- Mike and Dustin always gets in fights
- Alex was calling rider names
- Kevin told max that he's stupid
- mike told everyone but Kyle about his birthday
Down
- someone was trying to pretend to be Obama
- jimmy pushed mike down the stairs
- mike was saying rumors about Dustin
- Eli made Ale tell a very big secret
- Alex trips Hunter in the hall everyday
13 Clues: Alex was calling rider names • Kevin told max that he's stupid • jimmy pushed mike down the stairs • mike was saying rumors about Dustin • Eli made Ale tell a very big secret • Mike and Dustin always gets in fights • Alex trips Hunter in the hall everyday • someone was trying to pretend to be Obama • mike told everyone but Kyle about his birthday • ...
Madelyn Shaw-Bullying 2022-03-04
Across
- aggressive balance of power consistent and deliberate.
- what type of bullying is online?
- what is the a of The ABCD of bullying?
- what type of bullying is in a group?
- verbal
- attacked physically or emotionally with and unequal balance of power.
Down
- no one is having fun and a equal balance of power.
- what is the c of the ABCD of bullying?
- someone is getting hurt on purpose?
- when everyone is having fun and no one is getting hurt.
- What type of bullying is hitting kicking slapping etc?
- name calling and threatening
- what is the d of the ABCD of bullying?
13 Clues: verbal • name calling and threatening • what type of bullying is online? • someone is getting hurt on purpose? • what type of bullying is in a group? • what is the c of the ABCD of bullying? • what is the a of The ABCD of bullying? • what is the d of the ABCD of bullying? • no one is having fun and a equal balance of power. • ...
Executive Branch 2022-12-07
14 Clues: Order • Policy • System • System • College • Agencies • Security • Agreement • Appointees • Sanctioning • Bureaucracy • Corporations • Service System • Service Workers
You and your data 2024-01-30
The Health Effects of Screen Time 2025-10-29
Across
- Physical inactivity or lack of movement
- Body part often strained by poor posture
- Type of light that can disturb sleep
- Eye discomfort caused by staring at screens too long
- Bullying. Online behavior that can harm others emotionally
Down
- Taking a break every 20 minutes to rest your eyes
- Feeling of worry or nervousness often linked to too much screen time
- Hormone that helps regulate sleep
- Time Time spent using phones, TVs, and computers,
9 Clues: Hormone that helps regulate sleep • Type of light that can disturb sleep • Physical inactivity or lack of movement • Body part often strained by poor posture • Taking a break every 20 minutes to rest your eyes • Eye discomfort caused by staring at screens too long • Time Time spent using phones, TVs, and computers, • ...
Data Privacy 2023-09-11
Across
- The study and application of techniques to secure communication in the presence of adversaries.
- A security process where a user provides personal identifiers to gain access to a system or application.
- The practice of protecting systems, networks, and programs from digital attacks.
- The automated processing of personal data to evaluate or predict aspects concerning that individual.
- A regulation in the EU law on data protection and privacy for all individual citizens of the European Union and the European Economic Area.
- The process of removing all personally identifiable information where identification of data can no longer occur.
- The process of processing personal data in such a manner that it can no longer be attributed to a specific data subject without the use of additional information.
Down
- The process of editing or preparing a document, especially to obscure or remove confidential information.
- The process of converting data into a code to prevent unauthorized access.
- Small files that are stored on a user's device when they visit a website, often used to remember user preferences or track user behaviour.
- An incident where unauthorized individuals gain access to confidential data.
- The principle that individuals should be informed about the collection and use of their personal data.
- A cybercrime where targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- A network security system that monitors and controls incoming and outgoing network traffic based on security policies.
- The process of replacing sensitive data with unique identification symbols that retain all the essential data about the data without compromising its security.
15 Clues: The process of converting data into a code to prevent unauthorized access. • An incident where unauthorized individuals gain access to confidential data. • The practice of protecting systems, networks, and programs from digital attacks. • The study and application of techniques to secure communication in the presence of adversaries. • ...
ECC CROSSWORD 2024-09-21
Across
- Who you call for RMH Code blues and traumas
- Knowing where an officer is on Omnigo
- Resource you use when needing to know a downtime procedure
- Our CAD
- Where you find the mass casualty procedure
- New process emailed out on 9/21
- Call type for a security standby
- Where you send out emergencies
Down
- An email shared throughout the department
- An area where you send out informacast notifications that are not tiles
- Where you communicate with security
- You're made aware of these in your emails when you read and respond to them
- A pop up for reminders in Omnigo
13 Clues: Our CAD • Where you send out emergencies • New process emailed out on 9/21 • A pop up for reminders in Omnigo • Call type for a security standby • Where you communicate with security • Knowing where an officer is on Omnigo • An email shared throughout the department • Where you find the mass casualty procedure • Who you call for RMH Code blues and traumas • ...
Unit 2 crossword puzzle 2022-02-04
14 Clues: 2+2=4 • Photo • atklāt • potions • izgudrot • Einstine • bioloģija • pele(dators) • Solar sistem • lietotājvārds • stars and moon's • gudrais telefons • *******(security) • jumping(not on the moon)
III L - crossword 2 M. Zastawnik; J. Leśniak 2015-04-27
Goverment 2022-12-18
14 Clues: Order • Policy • System • System • College • Agencies • Security • Agreement • Appointees • Sanctioning • Bureaucracy • Corporations • Service System • Service Workers
Hannah Gacutan 2022-12-07
14 Clues: Order • Policy • System • System • College • Agencies • Security • Agreement • Appointees • Sanctioning • Bureaucracy • Corporations • Service System • Service Workers
Sophia Madison American Government Sub Crossword Puzzle 2022-12-07
14 Clues: Order • Policy • System • System • College • Security • Agencies • Agreement • Appointees • Bureaucracy • Sanctioning • Corporations • Service System • Service Workers
Executive Branch, Presidency 2022-12-06
14 Clues: Order • Policy • System • System • College • Security • Agencies • Agreement • Appointees • Bureaucracy • Sanctioning • Corporations • Service System • Service Workers
Σταυρόλεξο-Αθηνά 2022-11-29
Across
- Το StumbleUpon είναι παράδειγμα δικτύου κοινωνικών....
- Το wiki είναι μια διαδικτυακή εφαρμογή που επιτρέπει τη.... πολλών χρηστών
- Σημαντικό θέμα που πρέπει να έχουμε υπόψη είναι η προστασία... δεδομένων
- Κακόβουλο πρόγραμμα που δημιουργεί προβλήματα στην ομαλή λειτουργία του υπολογιστή μας
Down
- Cyber-Bulling λέγεται αλλιώς ηλεκτρονικός.....
- Το Pinterest είναι κυρίως για....
- Η μετάδοση ιών γίνεται και μέσω... συνημμένων αρχείων
- Η ιστοσελίδα ResearchGate προσφέρεται για....και ερευνητική δικτύωση
- Το antivirus λέγεται αλλιώς λογισμικό...
- Ασύγχρονη επικοινωνία λέγεται όταν οι χρήστες δεν χρειάζεται να αλληλεπιδρούν την.... χρονική στιγμή
10 Clues: Το Pinterest είναι κυρίως για.... • Το antivirus λέγεται αλλιώς λογισμικό... • Cyber-Bulling λέγεται αλλιώς ηλεκτρονικός..... • Η μετάδοση ιών γίνεται και μέσω... συνημμένων αρχείων • Το StumbleUpon είναι παράδειγμα δικτύου κοινωνικών.... • Η ιστοσελίδα ResearchGate προσφέρεται για....και ερευνητική δικτύωση • ...
Anti-Bullying Crossword 2019-11-12
Across
- To avoid bullying, everyone should be __________ towards each other
- If you are affected by bullying, you are a ______
- Having _______ allows you to put yourself in others' shoes
- You can ______ bullying to friends, family and/or a member of staff
Down
- Bullying is not the same as ________, as bullying is one-sided
- The word to describe spoken bullying/abuse
- A person who does nothing when bullying happens
- Bullying is not __________ anywhere
- It is never too late to do the _______ thing
- 52% of students have experienced _____bullying
10 Clues: Bullying is not __________ anywhere • The word to describe spoken bullying/abuse • It is never too late to do the _______ thing • 52% of students have experienced _____bullying • A person who does nothing when bullying happens • If you are affected by bullying, you are a ______ • Having _______ allows you to put yourself in others' shoes • ...
GAYE Crossword Puzzle 2020-10-16
Across
- Strategy for 2019/2021
- UK fundraising event?
- Who is the surname of chair of CAF's Trustees?
- What is the digital currency known as?
Down
- In what sector did the contact centre come first in the top 50?
- What is the name of our new CEO?
- What is the name of the IT threat where you have to pay to get your systems released?
- What fund performed the best in 2020?
- Name a CAF investment products charities can use?
- What is the new cyber threat?
10 Clues: UK fundraising event? • Strategy for 2019/2021 • What is the new cyber threat? • What is the name of our new CEO? • What fund performed the best in 2020? • What is the digital currency known as? • Who is the surname of chair of CAF's Trustees? • Name a CAF investment products charities can use? • In what sector did the contact centre come first in the top 50? • ...
KELAS VII.4_RIDHO ILAHI 2023-05-10
Across
- keinginan untuk tidak mengungkap diri terlalu mencolok pada orang lain
- NEIGHBORING keinginan untuk tidak terlibat berinteraksi dengan orang sekitar
- aplikasi yang diciptakan pada tahun 2010
- keinginan untuk menjauh dari pandangan dan gangguan suara orang di sekitarnya dan kebisingan
- TOK salah satu app untuk membuat konten dan menonton vidio
- situs jaringansosial yang berfokus pada pertukaran pesan yang muncul pada tahun 2011
Down
- keinginan untuk merahasiakan jati diri
- keinginan untuk menyendiri
- BULYING dampak negatif penggunaan tik
- keinginan untuk dekat dengan keluarga dan orang tertentu'tapi jauh dari orang lain
10 Clues: keinginan untuk menyendiri • BULYING dampak negatif penggunaan tik • keinginan untuk merahasiakan jati diri • aplikasi yang diciptakan pada tahun 2010 • TOK salah satu app untuk membuat konten dan menonton vidio • keinginan untuk tidak mengungkap diri terlalu mencolok pada orang lain • NEIGHBORING keinginan untuk tidak terlibat berinteraksi dengan orang sekitar • ...
Personal Safety 2021-12-16
Across
- You need to keep your hands and feet to ________ (p.17)
- Healthy relationships are this (p.18)
- Use this to call 911 (p.15)
- Wear one of these when riding your bike (p.23)
- You should know this in case of an emergency (p.16)
Down
- People with these carry an epipen (p.20)
- Ms. Rudow's number one rule
- When you give permission (p.19)
- Cyber-bullying happens here (p.26)
- Stay _______ in case of an emergency (p.17)
10 Clues: Ms. Rudow's number one rule • Use this to call 911 (p.15) • When you give permission (p.19) • Cyber-bullying happens here (p.26) • Healthy relationships are this (p.18) • People with these carry an epipen (p.20) • Stay _______ in case of an emergency (p.17) • Wear one of these when riding your bike (p.23) • You should know this in case of an emergency (p.16) • ...
computer class v 2022-02-24
Across
- blocks are green in color .
- button is used to perform addition of a range in a cell.
- This package is used for data analysis and calculation
- is used to remove viruses from computer.
- bar shows the data and formula in an active cell.
Down
- is used as a tool or target in cyber crimes.
- disturb the normal functioning of computer.
- includes Viruses, worms, Trojan viruses, adware etc.
- block control the movement of sprite .
- block is used to change appearance of sprite .
10 Clues: blocks are green in color . • block control the movement of sprite . • is used to remove viruses from computer. • disturb the normal functioning of computer. • is used as a tool or target in cyber crimes. • block is used to change appearance of sprite . • bar shows the data and formula in an active cell. • includes Viruses, worms, Trojan viruses, adware etc. • ...
CROSSWORD PUZZLE 2023-12-01
Across
- Scam that acts like a banker
- A scammer’s goal
- How much was the scammer about to scam the old lady in the video
- Scam that acts like an employer
Down
- A person who steals information and money
- A scam that involves sellers
- name of the only male speaker
- Name of the daughter in the short video
- Name of the brother in the short video
- A type of cyber-attack that uses fraudulent emails or websites to trick users into revealing their personal or financial information
10 Clues: A scammer’s goal • A scam that involves sellers • Scam that acts like a banker • name of the only male speaker • Scam that acts like an employer • Name of the brother in the short video • Name of the daughter in the short video • A person who steals information and money • How much was the scammer about to scam the old lady in the video • ...
health crossword 2025-04-14
Across
- you should be getting this amount of sleep a night
- place where someone walks
- a brain injury caused in the brain
- What do you put on when you enter a car?
- Injury caused by a spine injury.
Down
- bullying conducted by someone being rude consistently online
- What do you put on when you go for a ride on a bike?
- what Doctors tell you to take it easy?
- light red light where you stop and wait
- Occupational safety and health Administration
10 Clues: place where someone walks • Injury caused by a spine injury. • a brain injury caused in the brain • what Doctors tell you to take it easy? • light red light where you stop and wait • What do you put on when you enter a car? • Occupational safety and health Administration • you should be getting this amount of sleep a night • ...
Robot friends 2024-06-21
Across
- - Artificial intelligence, the brain of a robot.
- - A robot designed to move across the surface of a planet.
- - A robot with a human appearance.
- - A small motor that moves parts of a robot.
- - A self-operating machine, often an early form of a robot.
Down
- - A device that detects changes in the environment.
- - Relating to robots and computers.
- - A robot that looks and acts like a human.
- - A path for electrical signals in a robot.
- - A flying robot often used for surveillance.
10 Clues: - A robot with a human appearance. • - Relating to robots and computers. • - A robot that looks and acts like a human. • - A path for electrical signals in a robot. • - A small motor that moves parts of a robot. • - A flying robot often used for surveillance. • - Artificial intelligence, the brain of a robot. • - A device that detects changes in the environment. • ...
different ways people bully 2025-06-19
Across
- something that uses technology
- when you see abuse and you take action and tell someone who can stop it
- when you start to get agressive
- this can be racist type of bullying
Down
- you threten them in a way they dont like
- theres people fighting and all you do is watch and dont do anything
- when you use your words to hurt someone
- touching someone
- something that can be done repetedly and they dont like it
- you bully someone for something they can control
10 Clues: touching someone • something that uses technology • when you start to get agressive • this can be racist type of bullying • when you use your words to hurt someone • you threten them in a way they dont like • you bully someone for something they can control • something that can be done repetedly and they dont like it • ...
