cyber security Crossword Puzzles
CSI Newsletter 2019-03-05
Across
- A cyber group well known for hacking and wearing masks
- Virtual currency which has an equivalent value in real currency
- Created to make life easier but are often hacked or monitored
- What credit reporting bureau was hacked recently
Down
- What are automated pre recorded phone messages
- Electronics manufacturer sued for $2.2 million
- Who won the last $50 quiz
- Malicious software that denies access to data in return for payment
- Automated tools used for simple and repetitive tasks
- Device placed in gas pumps to steal consumer data
- Who is the CSI agent in charge
11 Clues: Who won the last $50 quiz • Who is the CSI agent in charge • What are automated pre recorded phone messages • Electronics manufacturer sued for $2.2 million • What credit reporting bureau was hacked recently • Device placed in gas pumps to steal consumer data • Automated tools used for simple and repetitive tasks • A cyber group well known for hacking and wearing masks • ...
Crossword Puzzle 1 2025-11-21
Across
- Safe; protected from attack.
- Online storage where data is kept instead of on your hard drive.
- Prefix relating to computers, information technology, and the internet.
- A secret string of characters used to gain access.
Down
- Malicious code that spreads from computer to computer.
- The most common way attackers send phishing links.
- The written instructions that make software work.
- Information that AI needs to analyze to learn.
- To break into a computer system illegally.
- An AI tool that has been trained on data to make predictions
- Short for "robot," an automated program.
11 Clues: Safe; protected from attack. • Short for "robot," an automated program. • To break into a computer system illegally. • Information that AI needs to analyze to learn. • The written instructions that make software work. • The most common way attackers send phishing links. • A secret string of characters used to gain access. • ...
My Mind Boggling Puzzle 2016-04-11
20 Clues: fresh,new • joly,holy • quiet,cool • aviod,forget • insane,silly • sunny,radiant • acute,pointed • gently,calmly • scared,nervous • blast,blizzard • active,powerful • afraid,doubtful • interest,inquir • exchange,barter • lightly,smoothly • freedom,security • certified,proved • strenght,violence • equipment,property • adventure,migration
Investigations 2016-12-15
Human Rights 2017-11-22
29 Clues: Asyl • Mensch • Folter • leiden • Rechte • gleich • to laut • Pflicht • Bildung • grausam • Gewissen • Freiheit • schützen • behandeln • Regierung • beitreten • Erklärung • Krankheit • Missbrauch • nicht nett • Verfolgung • entwickeln • Sicherheit • ausdrucken • Behinderung • Versammlung • Gesellschaft • Nationalität • Arbeitslosigkeit
MINI TEST 1 2017-11-06
27 Clues: 제안 • 의무 • 구독 • 진술 • 전략 • 가치 • 장점 • 전문가 • 정치가 • 성실한 • 익명의 • 제시하다 • 상대적인 • 남용하다 • 구독하다 • 확인하다 • 논리적인 • 판단하다 • 꽤,매우 • 인용하다 • 조직,기관 • 걱정스러운 • 원천,출처 • 내부고발자 • 부패,타락 • 안전,안보 • 무시하다,소홀히하다
jobs 2018-11-02
23 Clues: model • pilot • kasjer • chemik • doktor • kelner • prawnik • strażak • fryzjer • dentysta • policiant • listonosz • progrmista • taksówkarz • ochroniarz • sprzedawca • szef kuchni • bibliotekarz • pielegniarka • pracownik banku • agent turystyczny • projektant modowy • czytelnik wiadomosci
A trip to the USA 2018-11-17
21 Clues: guide • argent • tablet • voyage • effrayé • demander • aéroport • passager • vêtements • adaptateur • dictionnaire • embarquement • appareil photo • mobile ( USA ) • décalage horaire • hôtesse de l'air • vérifier contrôler • serviette de toilette • bag trousse de toilette • prendre soin de s'occuper de • officer officier chargé de la sécurité
Vocab 2022-11-15
23 Clues: Feo • Taza • Reloj • Canal • Receta • Espejo • Maleta • Comedor • Cuchilla • Ciclismo • Un plato • La comida • El bigote • Seguridad • La salida • Fotografía • Deprimente • El desayuno • Los anuncios • Casa adosada • Vagón de tren • Montar al caballo • La barba de varios días
Bridge 2022-11-17
25 Clues: 행동 • 토론 • 안전 • 요인 • 선호 • 개념 • 하다 • 단체 • 분석 • 거대한 • 사생활 • 결혼의 • 합치다 • 실시하다 • 소매업자 • 예측하다 • 제공하다 • 끊임없이 • 널리 퍼져있는 • 가능하게 하다 • on ~에 근거하여 • 저지르다 / 범하다 • 예방하다 / 방지하다 • 신원을 확인하다 / 알아보다 • 개인이 원하는 대로 할 수 있는
Difficult words english 2020-10-08
25 Clues: kom • ziek • over • strip • agenda • anders • rooster • softbal • honkbal • leerling • afspraak • wiskunde • uitleggen • plotseling • hebben zin • doen alsof • voorstellen • heel slecht • beveiliging • aardrijkskunde • de schuld geven • de schuld geven • aan de overkant van • accident per ongeluk • and technology techniek
Traditionen Part 2 2020-03-27
23 Clues: to tip • inform • either • totally • efforts • to brake • consider • way back • downhill • at first • dentists • urgently • for ever • furniture • apparatus • use (noun) • beforehand • several times • for no reason • because of that • safety, security • capable of repair • stop (temporarily)
Vocabulary Unit 1 Bebo 2020-11-20
Across
- contract
- beschermen
- werkgever
- onderzoeken
- voorkomen
- afschrikken
- noodgeval
- verantwoordelijk
- voorbereiden
- carrière
- veiligheid/beveiliging
- efficiènt
- uitdaging
- salaris
Down
- schade
- diefstal
- oplettend
- bedrijf
- aanwezigheid
- ingang
- assisteren/helpen
- eigendom
- realistisch
- georganiseerd
- slot
- rapporteren
- ploegendienst
- gebouw
- behulpzaam
29 Clues: slot • schade • ingang • gebouw • bedrijf • salaris • contract • diefstal • eigendom • carrière • oplettend • werkgever • voorkomen • noodgeval • efficiènt • uitdaging • beschermen • behulpzaam • onderzoeken • afschrikken • realistisch • rapporteren • aanwezigheid • voorbereiden • georganiseerd • ploegendienst • verantwoordelijk • assisteren/helpen • veiligheid/beveiliging
Spanish 2-Review words 2020-12-09
24 Clues: Sea • Trip • City • Lake • Ticket • Luggage • Customs • Illness • Security • To board • Currency • Souvenir • Suitcase • To Travel • Waterfall • Foreigner • To choose • To take off • Appropriate • Return Trip • To be located • To land(Plane) • To check luggage • Flight Attendant
Vocabulary 2024-08-30
23 Clues: meja • kursi • kantin • seragam • menyapa • upacara • bendera • berdiri • pengaman • istirahat • penghapus • dewan guru • papan tulis • perpustakaan • moda jejaring • siswa - siswi • teman sekelas • Kepala sekolah • mata pelajaran • tanpa jejaring • lapangan sekolah • putih(bahasa inggris) • Indonesia Raya is our....song
seri28 2024-06-20
Across
- Martial arts
- Security expert
- WWII Marines
- Apocalyptic angels
- Mysterious children
- Corrupt cops
- Bounty hunter
- Family drama
- Friendly alien
Down
- Virus outbreak
- Legalized crime
- Workplace comedy
- Texas family saga
- Good vs Evil
- French heroes
- Amnesiac spy
- Israeli espionage
- Crime drama
- Magical university
- Multidimensional mystery
20 Clues: Crime drama • Martial arts • WWII Marines • Good vs Evil • Amnesiac spy • Corrupt cops • Family drama • French heroes • Bounty hunter • Virus outbreak • Friendly alien • Legalized crime • Security expert • Workplace comedy • Texas family saga • Israeli espionage • Apocalyptic angels • Magical university • Mysterious children • Multidimensional mystery
27 2023-04-26
28 Clues: gum • door • walk • boat • bomb • trick • hotel • train • candy • plane • image • energy • skiier • simple • turtle • to fly • to flip • baggage • airport • avocado • to fish • weather • security • suitcase • to board • PERCHANCE • waterbottle • clothing store
Viajeros 2025-02-07
31 Clues: boat • delay • pilot • today • seats • price • ontime • ticket • luggage • customs • landing • flights • takeoff • arrival • security • boarding • airplane • passport • travelers • available • departure • waitingroom • crewmembers • cancelation • reservation • luggageclaim • customagents • ticketwindow • boardingpass • onewayticket • flightattendant
Bright Sparks 2025-11-04
29 Clues: viha • vaara • maine • neuvot • päätös • energia • luottaa • nuoriso • esittää • varoitus • vähentää • tutkimus • järjestö • varmasti • kilpailu • masennus • järjestää • ratkaista • yksinäinen • riippuvuus • keskustelu • työskennellä • turvallisuus • itseluottamus • ahdistuneisuus • maahanmuuttaja • kehittää,parantaa • perustaa,muodostaa • kaupunginosa,naapurusto
Security Awareness Week 2023-12-12
Across
- Background ___ is a common process in government hiring
- Conducts the security assessment, and sends the results electronically to CSCP.
- Government department overseeing the management of human resources in Canada.
- Period of validation : Top Secret or Control of Secret Material in an International Command (COSMIC) Top Secret
- A personnel security clearance is required before an employee may access this kind of information.
Down
- LES require, at a minimum, this Status as a condition of employment.
- To be notified of any changes in personal circumstances that may affect your security status or security clearance you may have been granted, including any criminal charges or convictions, and changes in marital status.
- Spouses and dependants of this Canadian individual require this level of clearance.
- helps determine the general suitability and reliability of an individual for local employment by a Canadian mission, and to have access to information, assets and facilities not classified in the national interest.
- Period of validation : Secret or North Atlantic Treaty Organization (NATO) Secret clearance
10 Clues: Background ___ is a common process in government hiring • LES require, at a minimum, this Status as a condition of employment. • Government department overseeing the management of human resources in Canada. • Conducts the security assessment, and sends the results electronically to CSCP. • ...
Security Crossword Puzzle 2018-08-03
Across
- Security Service Provides oversight and annual security reviews to DRS.
- Communication Plan DRS policy that outlines compliance and validation for electronic communications.
- Training Required annually as a part of the mitigation agreement between DRS, Leonardo, and the US Government.
- Aguirre Facility Security Officer
- Information Must be protected at all times.
- Badge Foreign Visitors-Escort required.
Down
- Information Jeopardizes integrity/character of a cleared employee. The ability to safe guard classified information may be at risk.
- Control Plan Specifies how we ensure proper control and exchange of technical data-applies to all interaction with all foreign persons, not just Leonardo or its subsidiaries.
- Clearance level of our Facility.
- Contact Effort to gain illegal or unauthorized access to classified and or other sensitive technology.
- Unclassified Information Sensitive information that includes, but not limited to Export Control information.
- Foreign interest that has the power, direct or indirect, to affect the management or operations of a company (FOCI).
12 Clues: Clearance level of our Facility. • Aguirre Facility Security Officer • Badge Foreign Visitors-Escort required. • Information Must be protected at all times. • Security Service Provides oversight and annual security reviews to DRS. • Communication Plan DRS policy that outlines compliance and validation for electronic communications. • ...
Introduction to Cybersecurity 2024-02-22
Across
- is the act of skirting or breaking through security boundaries.
- a type of hacker that is generally ethical and law-abiding.
- focuses on keeping applications or programs secure throughout their lifecycle.
- certification validates the holders have met the baseline of understanding required by all cybersecurity job positions.
Down
- is based on the key concepts of information assurance.
- an attack in which the attacker is connectedto a network and monitors an authenticated session.
- a set of policies and procedures meant to improve and guide anorganization’s cybersecurity practices.
- Is the protection of digital devices and their connected networks from danger and threats.
- a process in which organizations determine the information about themselves which should be kept private versus what can be shared with the public.
- prevents and protects unauthorized intrusions into the network.
- which is a set of security controls designed to protect payment account security.
- includes threats such as viruses, worms, Trojan horses.
12 Clues: is based on the key concepts of information assurance. • includes threats such as viruses, worms, Trojan horses. • a type of hacker that is generally ethical and law-abiding. • is the act of skirting or breaking through security boundaries. • prevents and protects unauthorized intrusions into the network. • ...
DAOD's 2025-01-06
Across
- Allows investors an easy way to add cryptocurrency exposure to their portfolios
- This device doesn't rely on something as simple as a facial expression or tone of voice. Instead, it delves deep into the unseen
- This bridge is designed to facilitate cross border transactions by bridging fiat and CBDCs using the Stellar blockchain
- More security that involves fingerprints and retinal scans
- Bank that can be used ANYWHERE
Down
- A bridge created to connect the core and anchor ledgers of the Stellar blockchain in the future
- A quantum security update that is isolated from geopolitical instability, natural disasters, and even physical sabotage
- Connects to MINDSAFE ICO. Provides a secure and exclusive environment where Stellar transactions can take place seamlessly. Think Apple or Droid
- "Used to maintain anonymity, privacy and security for Stellar internal transactions"
- "1ST space currency being developed with CBridge technology
- The most secure wallet ever
- Upgrade for secure cross-chain bridges and improved dApps.
12 Clues: The most secure wallet ever • Bank that can be used ANYWHERE • Upgrade for secure cross-chain bridges and improved dApps. • More security that involves fingerprints and retinal scans • "1ST space currency being developed with CBridge technology • Allows investors an easy way to add cryptocurrency exposure to their portfolios • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
Current Events 2024-06-11
Across
- Place where Olympic rings have been mounted.
- Vehicle stolen by a 12-year-old.
- The kind of dinosaur that was recently found.
- City which hosts this year's Olympics.
- What has the UN Security Council adopted?
- Event where people were injured in the US.
- The month that Olympics will start.
- Kind of animal that jumped a fence.
- _____ and White terraces were destroyed by the eruption of Tarawera.
Down
- Location of a very expensive house.
- How a jet stream is being described.
- How old was the boy who stole the Ute?
- Name of the volcano that erupted in 1886.
- UN ________ Council.
- North and South _______ aren't mates.
- Number of million a mansion is expected to get.
- Bones of what animal were found in North Dakota.
- Things being sent between the two Koreas.
18 Clues: UN ________ Council. • Vehicle stolen by a 12-year-old. • Location of a very expensive house. • The month that Olympics will start. • Kind of animal that jumped a fence. • How a jet stream is being described. • North and South _______ aren't mates. • How old was the boy who stole the Ute? • City which hosts this year's Olympics. • Name of the volcano that erupted in 1886. • ...
Network Security Terminologies 2025-02-26
Across
- A principle ensuring data is accurate and unaltered.
- An attack that floods a network to disrupt service.
- A deceptive attack designed to steal sensitive information.
- A security method requiring more than just passwords.
Down
- A method to protect data by scrambling it.
- A tool that encrypts internet connections for privacy.
- A security approach that assumes no implicit trust.
- A security device that filters traffic between networks.
8 Clues: A method to protect data by scrambling it. • A security approach that assumes no implicit trust. • An attack that floods a network to disrupt service. • A principle ensuring data is accurate and unaltered. • A security method requiring more than just passwords. • A tool that encrypts internet connections for privacy. • ...
aMAYzing Mayfield 2021-03-25
PROMISE - Data Security Puzzle! 2016-09-25
Across
- Main aim of Allianz Safe Campaign is to highlight the threats faced by whom all.
- These areas can pose a threat through tailgating
- A type of Sensitive Data dealing with special needs that indicate disabilities or doctor bills.
- A type of Security Control of Tracing Processing, e.g. by logging and check sums
- A type of Security Control of IDM processes, authentication, e.g. with user ID + password, certificate.
- The alteration of the substance of stored personal data.
Down
- The entry recording or preservation of personal data on a storage medium.
- Any information relating to an individual directly or indirectly, whether it relates to his or her private, professional or public life.
- A type of Sensitive Data dealing with Genome Profiles, fingerprints, DNA sequences or iris patterns.
- Required to Manage Risk and Enable Business Functionality.
- Balanced factor for both Privacy and Security.
- Labelling stored personal data so as to restrict their further processing or use.
- Technical and Organizational Measures.
13 Clues: Technical and Organizational Measures. • Balanced factor for both Privacy and Security. • These areas can pose a threat through tailgating • The alteration of the substance of stored personal data. • Required to Manage Risk and Enable Business Functionality. • The entry recording or preservation of personal data on a storage medium. • ...
BIL Processes 2024-06-12
Across
- Standard forms in the insurance industry
- An intermediary between you and the insured
- The company providing the insurance
- The person making a judgment about the amount of risk on a policy
Down
- The type of coverage to help a company recover losses from a data breach
- Proof of Insurance
- Our main Program sells _________ Liability
- A change to an in-force policy
- Pearl belongs to this part of One80
9 Clues: Proof of Insurance • A change to an in-force policy • The company providing the insurance • Pearl belongs to this part of One80 • Standard forms in the insurance industry • Our main Program sells _________ Liability • An intermediary between you and the insured • The person making a judgment about the amount of risk on a policy • ...
Anti-bullying 2023-05-05
Across
- unwanted touching, hitting, spittng, tripping, shoving, pushing, being agrresive
- name calling, teasing, racial comments, sarcasm, rumors, mean spirited comments
- similar to verbal bullying but is done online or thorugh texting
- bullying that involves a group
- a witness to bullying that does nothing or joins in
Down
- a witness to bullying that helps to stop the bullying behavior
- a repeated, negative unwanted action toward another individual
- on purpose
- intentionally leaving someone out
9 Clues: on purpose • bullying that involves a group • intentionally leaving someone out • a witness to bullying that does nothing or joins in • a witness to bullying that helps to stop the bullying behavior • a repeated, negative unwanted action toward another individual • similar to verbal bullying but is done online or thorugh texting • ...
Death Star Security Matrix 2022-08-06
Across
- Desert Planet with 2 Suns
- The oldest Forest Path Cabin
- Luke _________
- A Jedi's Weapon
- A water specialty at camp
- A Hot Place on the Island
- The last period of the day
- When we do cabin offerings
- The oldest Lake path cabin
Down
- When the twinkies go to sleep early
- A Revolt or Uprising
- The main field at camp
- The character trait of being able to wait
- A specialty program at camp
- Darth _____
- A stormtrooper's weapon
- What today is called
- ___ Solo
18 Clues: ___ Solo • Darth _____ • Luke _________ • A Jedi's Weapon • A Revolt or Uprising • What today is called • The main field at camp • A stormtrooper's weapon • Desert Planet with 2 Suns • A water specialty at camp • A Hot Place on the Island • The last period of the day • When we do cabin offerings • The oldest Lake path cabin • A specialty program at camp • The oldest Forest Path Cabin • ...
Chapter 5: Crime & Security 2022-10-19
Across
- A virus that encrypts data on a device and demanding a ransom in order to unlock said data
- emails convincing victims to use a fake website that appears to be well known
- Manipulating people to voilate security protocols
- creating fake website to lure uninformed victems in order to steal personal data
- malware that attaches or spreads itself to infect other software
- process of converting data files into an unreadable code to prevent unauthorized access and viewership
- (CFAA)
- software that does not attach itself ,created to exploit software/system flaws
- Illegal malware that monitors and steals data without the knowledge or consent of an individual
- (CERT)developed standards for coding and software development
Down
- Illegally breaking into devices and releasing viruses
- hacking in order to display support or promote a political cause.
- A US&Isreal government collaboration project used to successfully destroy irans nuclear weapons production
- (OS),controls access to hardware/software avaible to users
- malware that appear to be harmless software
- Biological markers of an individual used for identification
- Crashing servers by overwhelming data traffic with packets and frames
- legally breaking into computer systems/software to test security/software integrity
18 Clues: (CFAA) • malware that appear to be harmless software • Manipulating people to voilate security protocols • Illegally breaking into devices and releasing viruses • (OS),controls access to hardware/software avaible to users • Biological markers of an individual used for identification • (CERT)developed standards for coding and software development • ...
data security and integrity 2025-10-07
Across
- check – method to check data has been transferred correctly even or odd
- software that seeks to damage
- method used to ensure entered data is reasonable and meets certain input criteria.
- software that detects and removes spyware programs installed
- digit additional digit appended to a number to check if entered data is error free.
- Reverse process of decryption
- the accuracy, completeness and consistency of data.
- a way of proving somebody or something is who or what they claim to be.
- legitimate-looking emails designed to trick a recipient
- method used to calculate a check digit based on modulus division by 11.
Down
- software or hardware that is between a computer and externalnetwork that
- the privacy of personal information,
- verification method used to check if data transferred has been altered
- illegal access to a computer system without the owner’s permission.
- method used to ensure data is correct by using double entry or visual checks.
- use of unique human characteristics to identify a user
- methods taken to prevent unauthorised access to data
- redirecting a user to a fake website in order to illegally obtain personal data
18 Clues: software that seeks to damage • Reverse process of decryption • the privacy of personal information, • the accuracy, completeness and consistency of data. • methods taken to prevent unauthorised access to data • use of unique human characteristics to identify a user • legitimate-looking emails designed to trick a recipient • ...
Office roles and position vocabulary 2024-12-09
『명덕고등학교 2학년』Crossword (Practice) ④ 2025-12-02
Know your IOF? 2013-02-19
Across
- not sympathy, but we will show ____ towards our client
- making sure that we notate all accounts
- for security of your account... The reason why before doing something
- Probing. What agents will ask to find a solution.
- Thank you for calling Telus! Have a great day!
- no slang words, follow hold protocols
- Verified BAN and calling from about matched
- Actions that will need to be done by customer or agent after initial call
Down
- Sales Transition, avoid the risk of churn
- Show ownership
- going above and beyond
- Email verification, process order correctly, notes in Order Entry
- interaction will not generate unnecessary callback
- Dead air,paraphrasing
- promoting Telus.com, make payments on the IVR, check your balance
- summary of accepted or not accepted offer
- Extending yourself, summary of completed actions
17 Clues: Show ownership • Dead air,paraphrasing • going above and beyond • no slang words, follow hold protocols • making sure that we notate all accounts • Sales Transition, avoid the risk of churn • summary of accepted or not accepted offer • Verified BAN and calling from about matched • Thank you for calling Telus! Have a great day! • ...
vocab 2022-02-16
Across
- bank you make money off of accounts
- form of currency
- people that manage credit
- you write money out to people on it
- used if you want to pay later
- manage accounts of loans and savings
- put money in a bank account
- protection of something
- guarantee from bank that you will pay the money back on time
Down
- to move money somewhere else
- bank account if you plan to spend
- lets you borrow money when you need it
- institute you can't deposity money into
- where security is
- bank account if you plan to save
- a unit of value
- let you buy without carrying cash
17 Clues: a unit of value • form of currency • where security is • protection of something • people that manage credit • put money in a bank account • to move money somewhere else • used if you want to pay later • bank account if you plan to save • bank account if you plan to spend • let you buy without carrying cash • bank you make money off of accounts • you write money out to people on it • ...
Antivirus and Firewalls 2024-10-04
Across
- A unique string of data or code that identifies a specific virus. Antivirus software uses these signatures to recognize and eliminate known malware by scanning files.
- A program designed to detect, prevent, and remove malware (including viruses, worms, and trojans) from computers and networks.
- The process of inspecting data packets during transmission and allowing or blocking them based on security rules. Firewalls use this to prevent unauthorized access and protect against threats.
- A security application that monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between trusted and untrusted networks.
- The practices and technologies used to protect networks from unauthorized access, misuse, or attacks, significantly enhanced by antivirus and firewall software.
Down
- A network security technology that monitors network traffic for suspicious activity and potential threats, alerting administrators to possible security breaches.
- A method employed by antivirus software to detect unknown viruses by analyzing the behavior and characteristics of suspicious files, aiding in identifying new or modified malware.
- Malicious software designed to harm, exploit, or otherwise compromise computer systems and networks, including viruses, worms, trojans, and spyware.
- Data packets leaving a network; rules can allow or block traffic based on destination addresses.
- Data packets entering a network; rules can restrict access based on specific ports or IP addresses.
10 Clues: Data packets leaving a network; rules can allow or block traffic based on destination addresses. • Data packets entering a network; rules can restrict access based on specific ports or IP addresses. • A program designed to detect, prevent, and remove malware (including viruses, worms, and trojans) from computers and networks. • ...
Julia Zorrilla, block 6 2024-05-09
Across
- Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
- Is a security that pays interest over terms ranging from 2-10 years.
- Means that money is the common measure of worth or price of a good.
- Is the process of transferring from one individual/organization to another.
- Is money used in exchange for goods and services needed by individuals and governments.
- Allows customers to pay for a purchase directly from their checking account.
- Is a security that matures in a year or less.
Down
- Is a transfer of money from one bank account to another one.
- Means money can also be save and stored for later.
- Is the mechanism a nation uses to provide and manage money for itself.
- Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
- Is the name of currency in the U.S
- Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
- Is the state of being or feeling secure; freedom from fear, anxiety, and danger.
14 Clues: Is the name of currency in the U.S • Is a security that matures in a year or less. • Means money can also be save and stored for later. • Is a transfer of money from one bank account to another one. • Means that money is the common measure of worth or price of a good. • Is a security that pays interest over terms ranging from 2-10 years. • ...
Julia Zorrilla, block 6 2024-05-09
Across
- Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
- Is a security that pays interest over terms ranging from 2-10 years.
- Means that money is the common measure of worth or price of a good.
- Is the process of transferring from one individual/organization to another.
- Is money used in exchange for goods and services needed by individuals and governments.
- Allows customers to pay for a purchase directly from their checking account.
- Is a security that matures in a year or less.
Down
- Is a transfer of money from one bank account to another one.
- Means money can also be save and stored for later.
- Is the mechanism a nation uses to provide and manage money for itself.
- Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
- Is the name of currency in the U.S
- Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
- Is the state of being or feeling secure; freedom from fear, anxiety, and danger.
14 Clues: Is the name of currency in the U.S • Is a security that matures in a year or less. • Means money can also be save and stored for later. • Is a transfer of money from one bank account to another one. • Means that money is the common measure of worth or price of a good. • Is a security that pays interest over terms ranging from 2-10 years. • ...
Julia Zorrilla, block 6 2024-05-09
Across
- Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
- Is a security that pays interest over terms ranging from 2-10 years.
- Means that money is the common measure of worth or price of a good.
- Is the process of transferring from one individual/organization to another.
- Is money used in exchange for goods and services needed by individuals and governments.
- Allows customers to pay for a purchase directly from their checking account.
- Is a security that matures in a year or less.
Down
- Is a transfer of money from one bank account to another one.
- Means money can also be save and stored for later.
- Is the mechanism a nation uses to provide and manage money for itself.
- Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
- Is the name of currency in the U.S
- Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
- Is the state of being or feeling secure; freedom from fear, anxiety, and danger.
14 Clues: Is the name of currency in the U.S • Is a security that matures in a year or less. • Means money can also be save and stored for later. • Is a transfer of money from one bank account to another one. • Means that money is the common measure of worth or price of a good. • Is a security that pays interest over terms ranging from 2-10 years. • ...
Alex- bullying 2022-03-08
Across
- Rider got mad and yelled at everyone for the first time
- Jake was leaving Hayden out of the friend group chat
- of power mike and Josiah are the same height so its a fair fight
- Alex and Austin were roasting each other an laughing
- Mike and Dustin always gets in fights
- Alex was calling rider names
- Kevin told max that he's stupid
- mike told everyone but Kyle about his birthday
Down
- someone was trying to pretend to be Obama
- jimmy pushed mike down the stairs
- mike was saying rumors about Dustin
- Eli made Ale tell a very big secret
- Alex trips Hunter in the hall everyday
13 Clues: Alex was calling rider names • Kevin told max that he's stupid • jimmy pushed mike down the stairs • mike was saying rumors about Dustin • Eli made Ale tell a very big secret • Mike and Dustin always gets in fights • Alex trips Hunter in the hall everyday • someone was trying to pretend to be Obama • mike told everyone but Kyle about his birthday • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
11.5 Vocab 2023-03-30
Across
- Allows devices to connect in a PAN
- The user might be prompted to agree to the terms and conditions of using the network or even asked to pay a fee before being granted internet access
- combines two, non-overlapping 20 MHz channels into a single 40 MHz channel
- used with the WPA and WPA2 wireless security standards
- a network that uses a PSK and an appropriate encryption protocol, such as Wi-Fi Protected Access 2 (WPA2) or Wi-Fi Protected Access 3 (WPA3)
- increases bandwidth by using multiple antennas for both the transmitter and receiver
- developed by Cisco to address security concerns in RADIUS
- a key component of windows active directory
- a standard for local area networks created by IEEE-SA
Down
- a network that requires no authentication to connect to and is used in public
- introducd in 2018, and update to WPA2
- an open standard protocol used to authenticate users onto a network
- A communication method used on cards with a range of 2 inches
- the most commonly used access method
- introduced in 2004, a wireless security service
- an enhancement to MIMO that allows multiple users to use the same channel
- Data encryption protocol that uses 128,192,256 bits and encrypts in 128bit chunks
- uses radio waves to transmit data from small circuit boards called RFID tags to special scanners
18 Clues: Allows devices to connect in a PAN • the most commonly used access method • introducd in 2018, and update to WPA2 • a key component of windows active directory • introduced in 2004, a wireless security service • a standard for local area networks created by IEEE-SA • used with the WPA and WPA2 wireless security standards • ...
test 2023-09-12
Across
- Equivalent ot EU Data Protection Bill in India
- These attacks target vulnerabilities in software or hardware that are not yet known to the developer.
- A digital form of social engineering to deceive individuals into providing sensitive information
- The process of transforming plaintext into ciphertext
- Old way of breaking phone
- Computer Malicious Program
- attack that fools users into thinking they are clicking on one thing when they are actually clicking on anothe
- in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source Vulnerablity
Down
- Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system
- secure online service that allows users to connect remotely to another network
- spyware software that records every keystroke made on a computer’s keyboard
- security framework that controls access to computer resources, enforces policies, and audits usage
- algorithms to create convincing fake videos or audio recordings
- Attackers leave infected USB drives in public places, hoping that curious individuals will plug them into their computers
- type of spear phishing that targets high-profile individuals within an organization, typically CEOs or other top executives
- type of attack which uses a fraudulent server with a relay address
- model that forms the basis for the development of security systems
- A capability to limit network traffic between networks and/or information systems
18 Clues: Old way of breaking phone • Computer Malicious Program • Equivalent ot EU Data Protection Bill in India • The process of transforming plaintext into ciphertext • algorithms to create convincing fake videos or audio recordings • type of attack which uses a fraudulent server with a relay address • model that forms the basis for the development of security systems • ...
Felicity's Crossword 2018-01-29
Across
- Check or prove the accuracy of something
- writer duplicates another writer's language
- full electronic participation in society
- used in information security and privacy laws
- the knowledge of maximizing the user's personal safety against security risks
- relating to understanding
- Correct way of communicating on the Internet
- a particular place or position.
Down
- a verbal, written, or recorded communication
- the electronic responsibility for actions
- the use of electronic communication to bully a person
- a trail of data you create while using the Internet
- websites and applications that enable users to create and share content
- Children's online privacy and protection act
- permission for something to happen
15 Clues: relating to understanding • a particular place or position. • permission for something to happen • Check or prove the accuracy of something • full electronic participation in society • the electronic responsibility for actions • writer duplicates another writer's language • a verbal, written, or recorded communication • Children's online privacy and protection act • ...
Problem solving 2024-02-08
Across
- a programming paradigm.
- defines a division or section in an HTML document.
- Extra hours worked beyond the standard working time.
- A numeric data type.
- ibrary for building user interfaces.
- A tool used to continuously inspect code quality and security.
- procedure or formula for solving a problem.
Down
- high-level programming language still used in legacy systems.
- A data type.
- the most basic version of a product
- operating system known for its stability and security.
- A methodology that combines software development with IT operations.
- A platform as a service (PaaS) product that uses OS-level virtualization.
- the process of restructuring existing code without changing its external behavior.
- identifying and fixing errors.
15 Clues: A data type. • A numeric data type. • a programming paradigm. • identifying and fixing errors. • the most basic version of a product • ibrary for building user interfaces. • procedure or formula for solving a problem. • defines a division or section in an HTML document. • Extra hours worked beyond the standard working time. • ...
Technical Crossword 2026-01-25
Across
- Malware that locks data until a ransom is paid
- Detecting and fixing errors in software
- Process of substituting sensitive data with non sensitive placeholder
- Process of converting data into coded form for security
- Converts high level code into machine readable format
- Transforming data into fixed length value for quick lookup
Down
- Step by step instructions for solving a computational problem
- Attack that exploits database query vulnerabilities
- Network of compromised computers used in attacks
- AI model inspired by human brain structure
- Intermediary server between a client and destination
- FIFO based data structure
- Network security system controlling incoming outgoing traffic
- LIFO based data structure
- Social engineering attack to steal sensitive information
15 Clues: FIFO based data structure • LIFO based data structure • Detecting and fixing errors in software • AI model inspired by human brain structure • Malware that locks data until a ransom is paid • Network of compromised computers used in attacks • Attack that exploits database query vulnerabilities • Intermediary server between a client and destination • ...
IT 2025-12-14
Across
- A set of instructions for solving a problem
- A security system that blocks unauthorized access
- The act of entering your username and password
- Converting information into a code for security
- A computer that provides data or services to others
- A secret word or phrase to access an account
- An organized collection of information
Down
- A program that can damage files or systems
- Software designed to harm a computer or network
- Programs that run on a computer
- A copy of data to prevent loss
- A device that directs data between networks
- A group of connected computers
- The physical parts of a computer
- Storing data online instead of on a local device
15 Clues: A copy of data to prevent loss • A group of connected computers • Programs that run on a computer • The physical parts of a computer • An organized collection of information • A program that can damage files or systems • A set of instructions for solving a problem • A device that directs data between networks • A secret word or phrase to access an account • ...
Ariel Cybersecurity Crossword 2026-04-03
Across
- Locks your files and asks for money.
- Malware that spreads by itself on networks.
- Security Keeping data safe from being stolen.
- Breach When private info gets stolen.
- Fake messages that try to steal your info.
- Watches what you do without you knowing.
Down
- Authentication Uses two steps to log in for extra safety.
- Blocks bad traffic from entering your computer.
- A secret word to log into accounts.
- Bad software that can hurt your computer.
- Hides in a computer so hackers can control it.
- A program that spreads and damages files.
- Turns data into a secret code.
- Citizenship Being safe and respectful online.
- Security Protecting a network from hackers.
15 Clues: Turns data into a secret code. • A secret word to log into accounts. • Locks your files and asks for money. • Watches what you do without you knowing. • Bad software that can hurt your computer. • A program that spreads and damages files. • Breach When private info gets stolen. • Fake messages that try to steal your info. • Malware that spreads by itself on networks. • ...
SAFETY AND SECURITY 2021-09-08
Across
- SYSTEM USED TO TRACK KEYS AND PATROLS
- A FABRIC LIKE ITEM IN THE FIRST AID KIT
- THIS IS USED FOR COMMUNICATING WITH OTHERS
- YOU USE THIS WHEN CARRYING HEAVY LOADS
- ABBREVIATED METHOD FOR USE OF A FIRE EXTINGUISHER
- HOW OFTEN DOES MARRIOTT REQUIRE A PATROL
- WHEN ONE PRACTICES HOW TO DO SOMETHING IN AN EMERGENCY
Down
- WHEN SOMETHING HAPPENS THAT IS A SAFETY AND SECURITY ISSUE
- WHAT IS CHECKED ON ARRIVAL OF AN ASSOCIATE
- PPE FOR YOUR EYES
- FAKE EMAILS YOU RECEIVE ASKING FOR INFORMATION
- THE PROCESS OF CHECKING AREAS FOR SAFETY AND SECURITY
12 Clues: PPE FOR YOUR EYES • SYSTEM USED TO TRACK KEYS AND PATROLS • YOU USE THIS WHEN CARRYING HEAVY LOADS • A FABRIC LIKE ITEM IN THE FIRST AID KIT • HOW OFTEN DOES MARRIOTT REQUIRE A PATROL • WHAT IS CHECKED ON ARRIVAL OF AN ASSOCIATE • THIS IS USED FOR COMMUNICATING WITH OTHERS • FAKE EMAILS YOU RECEIVE ASKING FOR INFORMATION • ABBREVIATED METHOD FOR USE OF A FIRE EXTINGUISHER • ...
Aug Security Crossword 2021-09-06
Across
- Hosts of this years Olympics & Paralympics
- The state of being legally responsible for something.
- Abbreviation of "involuntary celibate"
- (acronym)Operates independently of any government.
- The action or business of promoting & selling products or services.
- The holding of extreme political or religious views.
- An ex-member of the armed forces.
Down
- (4,6)Aerospace company that broke records last month.
- A formal meeting of people with a shared interest.
- A clash of interests or a prolonged armed struggle.
- City in Switzerland. Treatment of Prisoners of War 1929.
- An official inspection of an organization.
12 Clues: An ex-member of the armed forces. • Abbreviation of "involuntary celibate" • Hosts of this years Olympics & Paralympics • An official inspection of an organization. • A formal meeting of people with a shared interest. • (acronym)Operates independently of any government. • A clash of interests or a prolonged armed struggle. • ...
1.2.2 Security Aspects 2021-10-22
Across
- How would you stop the introduction of software that self-replicates and can cause data loss?
- True or False, cookies are only used for advertising
- True or False, cookies act in the same way as a virus
- Illegally gaining access to a persons files
- Editing the source code of a legitimate piece of software in order to use it without paying for it
- a piece of software that self replicates in order to fill your hard drive causing your computer to crash or perform slowly, it can also delete your files
- How would you stop software that logs or records all key presses on your computer without knowing?
- A piece of hardware or software which records keystrokes and can automatically send them to somebody who wants to steal your personal information
- How can you help prevent people hacking into files and changing or deleting them
Down
- How could you stop someone from reading illegally accessed documents?
- True or False, cookies are a form of spyware
- State what is meant by MAC
- How could you prevent data loss caused by a hard disk head crash?
- True or False, cookies track browser use
14 Clues: State what is meant by MAC • True or False, cookies track browser use • Illegally gaining access to a persons files • True or False, cookies are a form of spyware • True or False, cookies are only used for advertising • True or False, cookies act in the same way as a virus • How could you prevent data loss caused by a hard disk head crash? • ...
Security Testing Concepts 2021-05-05
Across
- An attack that use fraudulent emails that appear to be from trusted sources to try to trick victims into divulging sensitive data over email. (Hint: --a----)
- A mechanism of assigning the user account to an unknown user. (Hint: -----s-------)
- It is a malicious program triggered when a logical condition is met. (Hint: ----c----)
- Name the hacker who uses hacking to send social, religious, and political, etc messages. (Hint: ---k------)
- A program provides a means for ethical hackers to test an organization's website, mobile app, or software for security bugs. (Hint: ---b-----)
- It is a malware type in which security system is bypassed to access a system. (Hint: ---k----)
Down
- It is one of the common attacking techniques used by hackers to get critical data. (Hint: -----j------)
- It is an open source platform and most widely used SAST tool. (Hint: ----r----)
- It is a fake computer system that behaves like a real system and attracts hackers to attack it. (Hint: --n-----)
- A malicious software that allows an unauthorized user to have access to a computer and restricted areas of its software. (Hint: ---t---)
- An information security standard for organizations that handles branded credit cards from the major card schemes. (Hint: ---d--)
- A program that will serve pop up ads, can change browser's homepage and bombard your device with advertisements. (Hint: -d----)
12 Clues: It is an open source platform and most widely used SAST tool. (Hint: ----r----) • A mechanism of assigning the user account to an unknown user. (Hint: -----s-------) • It is a malicious program triggered when a logical condition is met. (Hint: ----c----) • It is a malware type in which security system is bypassed to access a system. (Hint: ---k----) • ...
Security Awareness Crossword 2021-04-20
Across
- What do hackers love to find? Weak _______
- Which one of these passwords is the strongest? P@55w0rd1, haaatePasswords!!, =Myf@v3P^sz!e, Easy2Remb3r
- A clean desk policy is important in order to protect ___________ information from being revealed
- Who is Target's Chief Information Security Officer?
- This is when you know you are speaking to the right person
- Target may _______ your internet usage
- When someone sends a link to a site you think is fine
Down
- 007 can really watch what you do on your computer with this app
- You are annoyed that someone else is on your computer too!
- Personal data sent by email must always be __________
- Beware of Greeks bearing gifts and horsing around
- Always _______ your computer screen while away from your desk
12 Clues: Target may _______ your internet usage • What do hackers love to find? Weak _______ • Beware of Greeks bearing gifts and horsing around • Who is Target's Chief Information Security Officer? • Personal data sent by email must always be __________ • When someone sends a link to a site you think is fine • You are annoyed that someone else is on your computer too! • ...
Security in Jesus 2024-02-19
Across
- Where is our inheritance kept? (1 Peter 1:4)
- Jesus came to _____ the world. (John 3:17)
- There is no condemnation when we _____ to Jesus.(Romans 8:1)
- Who does god command to guard us? (Psalm 91: 9-11)
- Believers will never ______ (John 10: 28-29)
- How are we saved? (Ephesians 2:8)
- Eternal life is a free ______. (Romans 6:23)
Down
- What does the Holy Spirit guarantee? (Ephesians 1:14)
- Believers will never be ____ for their sins. (John 5:24)
- What can separate us from God's love? (Romans 8:39)
- We are ________ God's children.(1 John 3:2)
- What is a believer's seal? (Ephesians 1:13)
12 Clues: How are we saved? (Ephesians 2:8) • Jesus came to _____ the world. (John 3:17) • We are ________ God's children.(1 John 3:2) • What is a believer's seal? (Ephesians 1:13) • Where is our inheritance kept? (1 Peter 1:4) • Believers will never ______ (John 10: 28-29) • Eternal life is a free ______. (Romans 6:23) • Who does god command to guard us? (Psalm 91: 9-11) • ...
Food Security nuggets 2024-12-17
Across
- These crops usually consist of Rice and Taro grown in feilds
- The type of farming that uses machinery and technology to perform agricultural tasks
- These crops are gaining importance in Food-security due to their significantly lesser water consumption
- A condition that develops when your body doesn't get the right amount of vitamins, minerals, and other nutrients required for healthy function.
- India is largest exporter of this crop
- Ragi, a popular crop is called a _____ millet
Down
- The biggest employment sector in India
- The second largest staple crop cultivated in India
- A situation where people lack basic food intake for a long time
- The largest cropping season in India
- India remains a net importer of these categories of crops
- This is where plants grow, made of rock and organic matter
12 Clues: The largest cropping season in India • The biggest employment sector in India • India is largest exporter of this crop • Ragi, a popular crop is called a _____ millet • The second largest staple crop cultivated in India • India remains a net importer of these categories of crops • This is where plants grow, made of rock and organic matter • ...
CLA Environ 2017-09-30
Across
- Most commonly used type of dock
- Straight line material flow through docks at both ends
- Limit access to certain areas
- First global supply chain security initiative
- Requires both importers and exporters to send AMRs
- A company must register as a hazmat transporter to carry this
- Focus is on developing more secure containers
- Substance posing a risk to health
Down
- Most basic form of security
- Agency responsible for developing HAZMAT rules
- Major deterrent to would-be thieves
- These docks provide most protection from theft and weather
- Volume of goods expected to move through a warehouse
- Occur more often in dock areas than other areas of warehouse
- Pays for remediation of toxic waste sites
- Process for turning old products into new products
- One guard monitors this
- Between US, Canada and Mexico
18 Clues: One guard monitors this • Most basic form of security • Limit access to certain areas • Between US, Canada and Mexico • Most commonly used type of dock • Substance posing a risk to health • Major deterrent to would-be thieves • Pays for remediation of toxic waste sites • First global supply chain security initiative • Focus is on developing more secure containers • ...
Words for computer class. 2021-10-06
Across
- is a central processing unit.
- use The right way to use things. To make it fair to everyone.
- COMPARES CAPACITY AND COSTS.
- A part of something
- Device storage.
- is a wide area network.
- Drive is a small device that can restore memory.
- SOlid state drive. They store things.
- The right way of using the internet.
- A informational site.
Down
- Copying something and stealing its creations.
- It's when you rapidly send the same message.
- A security app that sees what's going in and out of the computer.
- Doing something bad or illegal to someone else online.
- Copying someone's work without crediting them.
- is a local area network.
- Security How secure all your networks are. It makes it so it secules what goes by.
- is a device for transferring data from one device to another.
18 Clues: Device storage. • A part of something • A informational site. • is a wide area network. • is a local area network. • COMPARES CAPACITY AND COSTS. • is a central processing unit. • The right way of using the internet. • SOlid state drive. They store things. • It's when you rapidly send the same message. • Copying something and stealing its creations. • ...
Unit#4 Vocab 1 2023-12-13
Across
- Work, Progress, act
- The election between Herbert hoover and FDR
- This event kicked off the great depression and happened on oct 29 1929
- Civilian, Concentration, corp
- Makeshift towns of homeless and jobless
- Social, security, Administration
- Security, exchange, commission
- A combination of poor farmers and a natural drought
- The president that served for 4 terms
- this man was deemed the worst president in american history
- Spending more than you make in income
Down
- A way to help feed the needy set up by the social gospel group
- A time of global economic struggle
- This plan was also called Alphabet soup because of FDR's love for acronyms
- when FDR would talk to the country through the radio
- buying and selling stock quick
- Agricultural, adjustment, act
- Federal, Deposit, insurance, corporation
18 Clues: Work, Progress, act • Civilian, Concentration, corp • Agricultural, adjustment, act • Security, exchange, commission • buying and selling stock quick • Social, security, Administration • A time of global economic struggle • The president that served for 4 terms • Spending more than you make in income • Makeshift towns of homeless and jobless • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
unit 3 2022-04-21
18 Clues: vám • kapu • talán • késik • jóslat • utasok • rémálom • tetőterasz • konferencia • érkezési kapuk • indulási kapuk • átvesz, befogad • csomagkiadó (2 szó) • beszáll a repülőgépbe • biztonsági ellenörzés • csatlakozó járat (2 szó) • megbeszél egy nappot (3 szó) • agresszív közúti magatartás (2 szó)
BIT&BYTE CROSSWORD 2023-12-14
Across
- Unwanted emails sent in bulk to promote a product
- Short for "virtual private network"
- A way to protect data by scrambling it
- A backup copy of data in case of loss
- Hacking into a system without permission.
- Keeping data safe from unauthorized access, modification, and deletion
- Attack that encrypts files and demands payment
- Impersonating a trusted entity to steal information
Down
- Short for "denial-of-service" attack
- The process of identifying and fixing security vulnerabilities
- Software that protects against viruses and malware
- A sequence of characters used to gain access to a system
- Weak point in a system that can be exploited
- Malicious software disguised as a legitimate program
- Network filtering system to control traffic
- Two-factor authentication often uses this
- A device that blocks unauthorized access to a network
- Social engineering technique using deception to gain information
- Strong passwords should include these
19 Clues: Short for "virtual private network" • Short for "denial-of-service" attack • A backup copy of data in case of loss • Strong passwords should include these • A way to protect data by scrambling it • Two-factor authentication often uses this • Hacking into a system without permission. • Network filtering system to control traffic • ...
SJC Kid's Crossword 2024-06-23
Across
- When you put money in the basket
- Our bass player
- He preaches sometimes and his first name is David
- The color of the carpet in the sanctuary
- The street our church is on
- Our lead a/v tech, or the guy runs sound!
- Our Deacon of Outreach and Discipleship
- Our second security guard and a Freedom Arts Youth Leader
- Our pastor and main preacher
Down
- She sings every week and is your substitute kids class teacher
- Our Head of Security / Deacon of Defense
- Your kids class teacher!
- Our lead piano player
- The name of our neighborhood
- Our drummer and music coordinator
- Minister and Ms. Toni's mom!
- Our Minister of Administration, or the guy who puts out the snacks!
- The President of our church
- When we eat crackers and drink juice to remember Jesus' crucifixion
19 Clues: Our bass player • Our lead piano player • Your kids class teacher! • The street our church is on • The President of our church • The name of our neighborhood • Minister and Ms. Toni's mom! • Our pastor and main preacher • When you put money in the basket • Our drummer and music coordinator • Our Deacon of Outreach and Discipleship • Our Head of Security / Deacon of Defense • ...
Unit 4 Crossword 2022-03-16
Across
- meeting Conference between the highest-ranking officials of different nations
- A policy of nonparticipation in international economic and political relations
- Policy A nation's overall plan for dealing with other nations
- A large, complex organization composed of appointed officials
- A group of advisers to the president.
- The easing of hostility or strained relations, especially between countries.
- A position of not taking sides in a conflict
- agreements Agreements with other countries that do not need senate approval
- Veto or Line Item Veto Constitutional power available to more than forty of America's governors, under which they may disapprove some provisions of a bill while approving the others.
- Security Council An office created in 1947 to coordinate the president's foreign and military policy advisers. Its formal members are the president, vice president, secretary of state, and secretary of defense, and it is managed by the president's national security assistant.
Down
- Policy Plans for dealing with national problems
- Negotiation Between nations
- American policy of resisting further expansion of communism around the world
- theories massive retaliation and mutually assured destruction
- aid Money, food, or other resources given or lent by one country to another.
- a formally concluded and ratified agreement between countries.
- privilege An implied presidential power that allows the president to refuse to disclose information regarding confidential conversations or national security to Congress or the judiciary.
- Governor an elected official serving as deputy to the governor of a state of the United States
- Branch (President) Carries out the laws
- Restrictions intended to enforce international law
- Highest-ranking officials representing a government in a foreign country.
21 Clues: Negotiation Between nations • A group of advisers to the president. • Branch (President) Carries out the laws • A position of not taking sides in a conflict • Policy Plans for dealing with national problems • Restrictions intended to enforce international law • theories massive retaliation and mutually assured destruction • ...
spanish vocab thingy 2023-04-20
Security Issues 2015-11-18
Across
- false website to ascertain you personal details which can lead to other criminal activities
- graffiti on a website
- finding signals or to gain entry on the advantage of others (e.g. WIFI)
Down
- goods sold on the black market
- mistakes made while development systems
- sending messages to a server until it "falls over"
- you details (credit card etc )stolen and used
- unauthorised access of this person either by using code or other means
8 Clues: graffiti on a website • goods sold on the black market • mistakes made while development systems • you details (credit card etc )stolen and used • sending messages to a server until it "falls over" • unauthorised access of this person either by using code or other means • finding signals or to gain entry on the advantage of others (e.g. WIFI) • ...
IT-Security 2016-01-29
8 Clues: Betrugsmethode • Messaging chatten • Datenverarbeitungsregisternummer • Beobachtung bei der Eingabe von Daten • schützt den Computer von Zugriff fremder • Programme, die Tastatureingaben mitprotokolieren • Überbegriff für unerwünschte, schädliche Software • Personen die illegal in Computersysteme eindringen
IT-Security 2016-01-29
8 Clues: chatten • Betrugsmethode • Datenverarbeitungsregisternummer • Beobachtung bei der Eingabe von Daten • schützt den Computer von Zugriff fremder Nutzer • Programme, die Tastatureingaben mitprotokolieren • Überbegriff für unerwünschte, schädliche Software • Personen die illegal in Computersysteme eindringen
Platform security 2020-11-27
Across
- asynchronous event that can occur at any time, irrespective of what processor is doing
- , processes running in the background, started by the kernel itself.
- synchronous condition that results from a particularly undesirable situation.
- , separate low-level system software running on the host machine to perform visualization.
Down
- , the process responsible for secure logon.
- , a real-time operating system used in mission-critical applications
- , linux uses this technique to define the priority of processes
- , one method to block buffer overflow attacks
8 Clues: , the process responsible for secure logon. • , one method to block buffer overflow attacks • , linux uses this technique to define the priority of processes • , a real-time operating system used in mission-critical applications • , processes running in the background, started by the kernel itself. • ...
Security Awareness 2019-05-09
Across
- a network of private computers infected with malicious software and controlled as a group without the owners' knowledge,
- the fraudulent practice of sending emails to be from reputable companies in order to get individuals to reveal personal information, such as passwords and credit card numbers.
- an attack or entry into computer or network of computers, usually by hackers or malicious software that compromises sensitive data or causes damage to computers or network function.
- convert (information or data) into a cipher or code, especially to prevent unauthorized access.
Down
- violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices."
- a string of words that must be used to gain access to a computer system or service.
- a person who uses computers to gain unauthorized access to data.
- a string of characters that allows access to a computer system or service.
8 Clues: a person who uses computers to gain unauthorized access to data. • a string of characters that allows access to a computer system or service. • a string of words that must be used to gain access to a computer system or service. • convert (information or data) into a cipher or code, especially to prevent unauthorized access. • ...
Work Security 2020-10-25
Across
- to convert (information or data) into a code, especially to prevent unauthorized access
- making you feel that something illegal is happening or that something is wrong
- (of access)gaining logical or physical access without permission to a network, system, etc.
Down
- (verb+preposition)to do things that you hope will stop something unpleasant from happening
- (verb+preposition) to stop from
- (of information)data that must be guarded from unauthorized access, protected
- wrongful or criminal deception intended to result in financial or personal gain
- a person who uses computers to gain unauthorized access to data
8 Clues: (verb+preposition) to stop from • a person who uses computers to gain unauthorized access to data • (of information)data that must be guarded from unauthorized access, protected • making you feel that something illegal is happening or that something is wrong • wrongful or criminal deception intended to result in financial or personal gain • ...
Security Crossword 2021-07-26
Across
- This team will lock doors and post a 'Temporarily Closed' sign at all entrances and the drive-thru window
- How often must we review security procedures used at financial centers with all employees
- These packs are wrapped with $50 bills
- This team will protect the areas where the robber/bandit was known to have been with chairs, ropes, tables or other objects
Down
- This team will obtain the Financial Center's list of bait money and make a copy of the serial numbers of the bait money of the teller(s) who was robbed to give to the police
- How many response teams are there
- All cash drawers must be kept ____ when the teller is not at his/her station
- This team will distribute the Bandit Description Forms and pencils or pens
8 Clues: How many response teams are there • These packs are wrapped with $50 bills • This team will distribute the Bandit Description Forms and pencils or pens • All cash drawers must be kept ____ when the teller is not at his/her station • How often must we review security procedures used at financial centers with all employees • ...
Security - Easy 2023-11-28
Across
- computer's favourite snack
- What is the term for a secret combination of letters, numbers, and symbols used to access a system?
- term for a security mechanism that restricts access based on the user's identity
- Security measure tracking and recording system activities
- type of software protects a computer from malicious programs by scanning and removing them
Down
- practice of converting readable data into unreadable characters to prevent unauthorized access
- acronym VPN stands for
- practice of controlling access by permitting only approved programs.
8 Clues: acronym VPN stands for • computer's favourite snack • Security measure tracking and recording system activities • practice of controlling access by permitting only approved programs. • term for a security mechanism that restricts access based on the user's identity • type of software protects a computer from malicious programs by scanning and removing them • ...
Computer security 2023-04-11
Across
- of using multiple methods to authenticate a user's identity before granting access to a computer system.
- of analyzing and identifying potential vulnerabilities in computer systems.
- of computer systems and data from damage or destruction caused by natural disasters, accidents, or deliberate attacks.
- of rules or protocols that dictate how data is transmitted and received over a network.
- method that uses a single secret key to both encrypt and decrypt data.
- software that is designed to harm or exploit computer systems.
Down
- of keeping software up-to-date with the latest security patches and updates to protect against known vulnerabilities.
- of encoding messages or information in such a way that only authorized parties can read it.
- of computer systems from unauthorized access and theft of data (two words).
- designed to prevent unauthorized access to a computer or network.
10 Clues: software that is designed to harm or exploit computer systems. • designed to prevent unauthorized access to a computer or network. • method that uses a single secret key to both encrypt and decrypt data. • of analyzing and identifying potential vulnerabilities in computer systems. • of computer systems from unauthorized access and theft of data (two words). • ...
TTS security 2023-06-05
Across
- Tim yang terlatih dan siap memberikan bantuan pertama dalam situasi kecelakaan atau kejadian medis yang terjadi di dalam Mall
- Ketika kerugian atau kehilangan terjadi dari tenant, pihak .......... berperan sebagai mediator dan membantu dalam proses investigasi, namun keputusan akhir tetap berada di tangan tenant itu sendiri
- kondisi kejadian yang melibatkan para pengunjung dan tenant Mall, mencakup situasi seperti tabrakan kendaraan atau perselisihan antara pengunjung dan karyawan tenant
- Tanggung jawab pihak manajemen Mall dalam menangani situasi kecelakaan atau kejadian medis yang terjadi di dalam Mall, termasuk pengaturan pertolongan pertama dan pemindahan korban ke fasilitas medis yang sesuai disebut
- Dokumen yang terdiri dari pengakuan pelaku, pengakuan kerusakan atau kehilangan barang dari korban, serta kesaksian dari saksi yang melihat kejadian tersebut
- Tempat yang menjadi magnet bagi para pengunjung, di mana mereka dapat berbelanja, bersantai, dan menikmati berbagai aktivitas
Down
- Orang-orang yang memasuki Mall dengan berbagai tujuan, termasuk para pelanggan, karyawan tenant, karyawan vendor, dan tamu lainnya
- Kejadian yang mengganggu kelancaran dan keselamatan operasional Mall, serta berpotensi merusak aset berharga disebut
8 Clues: Kejadian yang mengganggu kelancaran dan keselamatan operasional Mall, serta berpotensi merusak aset berharga disebut • Tim yang terlatih dan siap memberikan bantuan pertama dalam situasi kecelakaan atau kejadian medis yang terjadi di dalam Mall • ...
data security 2025-01-15
Across
- The potential for loss or damage.
- Adhering to data protection regulations.
- Maintaining the accuracy and completeness of data.
Down
- Ensuring that information is accessible only to those authorized to have access.
- A weakness that can be exploited.
- An event that compromises data security.
- Data Loss Prevention, strategies to prevent data breaches.
- The technique of obscuring specific data within a database to protect sensitive information.
8 Clues: A weakness that can be exploited. • The potential for loss or damage. • An event that compromises data security. • Adhering to data protection regulations. • Maintaining the accuracy and completeness of data. • Data Loss Prevention, strategies to prevent data breaches. • Ensuring that information is accessible only to those authorized to have access. • ...
Data Security 2024-10-14
Across
- A program that filters the information coming through your computer
- The unauthorised access and use of networked
- This involves the use of websites and email messages that try to trick you into entering your personal information.
- This is the use of electronic devices to monitor electronic communications between two or more groups without the permission of any of the communicating parties.
- A special type of software used to remove viruses from a computer's hard disk
Down
- The illegal use, sharing, selling or distribution of copies of software or music.
- Criminals use computerised systems to steal people's credit card information
- A program that uses computer network and weakness to repeatedly copy itself into computer's memory
8 Clues: The unauthorised access and use of networked • A program that filters the information coming through your computer • Criminals use computerised systems to steal people's credit card information • A special type of software used to remove viruses from a computer's hard disk • The illegal use, sharing, selling or distribution of copies of software or music. • ...
Security Awareness 2024-04-16
Across
- Testing environment.
- Protect sensitive information from being leaked by users.
- "M" Computer security company.
- Most common six-letter word that is used for passwords that doesn't require numbers. or punctuation
- Most common cyberattack on internet.
Down
- Social __ when actors trick others into revealing sensitive info.
- An attack where a person allows themselves to be identified as someone else.
- As cybersecurity threats grow, sites include this increased security feature.
8 Clues: Testing environment. • "M" Computer security company. • Most common cyberattack on internet. • Protect sensitive information from being leaked by users. • Social __ when actors trick others into revealing sensitive info. • An attack where a person allows themselves to be identified as someone else. • ...
Airport security 2022-10-20
8 Clues: official rules • someone who travels with you • baggage that no one is watching • a machine that looks through things • a place where they inspect your luggage • a machine that sets off where it detects metal • a machine that records what’s happening around • to use something to key people going into a space
Computer security 2025-11-18
Across
- A small moving arrow on the screen. cursor
- A small button you press on a keyboard. key
- Another word for a small button on a keyboard. key
- A screen you use to see information. monitor
- To press the mouse button. click
Down
- A bar at the bottom of the screen with icons and open programs.taskbar
- A place on your computer where you can store files. folder
- The name you use to log in to a computer or website. username
- A device you use to type letters on a computer. keyboard
9 Clues: To press the mouse button. click • A small moving arrow on the screen. cursor • A small button you press on a keyboard. key • A screen you use to see information. monitor • Another word for a small button on a keyboard. key • A device you use to type letters on a computer. keyboard • A place on your computer where you can store files. folder • ...
Security Elements 2025-09-25
Across
- A sequence of numbers or letters used to open a lock
- Access to areas where there is cannabis, security elements, confidential information, is BLANK to persons whose presence in those areas is required by their work responsibilities
- system in the areas to be accessed.
Down
- The first BLANK employee to enter the building enters his/her code to disarm the intrusion
- Employees are required to present a valid BLANK to gain access to the facility.
- Stands for Head Of Security
- A word, phrase, or string of characters intended to differentiate an authorized user or process, for the purpose of permitting access
- BLANK using the designated security phone in order to have your designated security element enabled for further access.
8 Clues: Stands for Head Of Security • system in the areas to be accessed. • A sequence of numbers or letters used to open a lock • Employees are required to present a valid BLANK to gain access to the facility. • The first BLANK employee to enter the building enters his/her code to disarm the intrusion • ...
Mobile Security 2024-05-06
Across
- Trend Micro Mobile Security provides ______ by including anti-theft tools to locate, lock, and wipe lost or stolen devices
- Trend Micro Mobile Security provides privacy scanning to identify apps that may be accessing ______ information without permission
- Trend Micro Mobile Security provides Web browsing protection to block ______ websites and phishing attempts
Down
- Trend Micro Mobile Security provides ______ controls to manage children's device usage and restrict access to inappropriate content
- Trend Micro Mobile Security provides safe _____ features to protect users from online threats while browsing the internet
- Trend Micro Mobile Security provides malware scanning and detection to find _____
6 Clues: Trend Micro Mobile Security provides malware scanning and detection to find _____ • Trend Micro Mobile Security provides Web browsing protection to block ______ websites and phishing attempts • Trend Micro Mobile Security provides safe _____ features to protect users from online threats while browsing the internet • ...
Computer Security Risk 2020-10-18
Across
- A malicious program which replicates by making copies of itself and filling up RAM and secondary storage sometimes propagating across a network
- A malicious program which replicates by injecting its own code into other files
- Passing text thorough a maths algorithm to scramble text
- a malicious program which masquerades as a legitimate program but causes harmful execution when run
- A malicious program which encrypts all of the data on a computer system and demands payment in order to decrypt the data
- a characteristic of information security
- fake emails or websites that look like real emails and websites and try to steal your data.
- Software that protects your device from viruses and malware
Down
- Manipulating people through voice or text into sharing private information
- Software which is designed to cause damage to a system or systems
- A way of concealing text
- Unsolicited emails sent to many email addresses that try to get you buy something or share private information
12 Clues: A way of concealing text • a characteristic of information security • Passing text thorough a maths algorithm to scramble text • Software that protects your device from viruses and malware • Software which is designed to cause damage to a system or systems • Manipulating people through voice or text into sharing private information • ...
April Security Crossword 2021-05-28
Across
- the inkblot test psychologists use to test a subject’s perceptions & mental health.
- (5,3) immediate assistance given to any person suffering from injury it illness
- ... is another man's freedom fighter
- a short, thick stick carried as a weapon by a police officer
- Website where you can purchase tickets to our training courses or the IAASF event
- (•••••, ••••-)dots and dashes
Down
- make sure someone leaves or arrives safely
- malicious software designed to exploit any device, service or network
- Alert state used by US Armed Forces
- (3,7) needed to work within the private security industry
- make (something bad) less severe, serious, or painful
- to steal something from a place or person.
12 Clues: (•••••, ••••-)dots and dashes • Alert state used by US Armed Forces • ... is another man's freedom fighter • make sure someone leaves or arrives safely • to steal something from a place or person. • make (something bad) less severe, serious, or painful • (3,7) needed to work within the private security industry • ...
Security Crossword Puzzle 2018-08-03
Across
- Clearance level of our facility.
- Badge Foreign Visitors - Escort Required.
- Unclassified Information Sensitive information that includes, but not limited to, Export Control Information.
- Information Must be protected at all times.
- Aguirre Facility Security Officer.
Down
- Contact Effort to gain illegal or unauthorized access to classified and/or other sensitive technology.
- A foreign interest that has the power, direct or indirect, to affect the management or operations of a company. (FOCI)
- Control Plan Specifies how we endure proper control and exchange of technical data-applies to all interaction with all foreign persons, not just Leonardo or its subsidiaries.
- Control Plan DRS policy that outlines compliance and validation for electronic communications.
- Security Service Provides oversight and annual security reviews to DRS.
- Information Jeopardizes integrity/character of a cleared employee. The ability to safeguard classified information may be at risk.
- Training Required annually as a part of the mitigation between DRS, Leonardo, and the US Government.
12 Clues: Clearance level of our facility. • Aguirre Facility Security Officer. • Badge Foreign Visitors - Escort Required. • Information Must be protected at all times. • Security Service Provides oversight and annual security reviews to DRS. • Control Plan DRS policy that outlines compliance and validation for electronic communications. • ...
Information Security 3 2019-04-11
Across
- what forms on a website should do to prevent SQL injection
- to change in a bad way
- hackers who help companies
- not fake; genuine; real
- to be leading the progress in an industry (idiom)
- ssl that protects the whole website (not just one page)
- to cancel a project (idiom)
Down
- about; not exact
- BIOS
- a weakness a hacker can use to infect a device
- a medical device which helps people with weak hearts
- not found
12 Clues: BIOS • not found • about; not exact • to change in a bad way • not fake; genuine; real • hackers who help companies • to cancel a project (idiom) • a weakness a hacker can use to infect a device • to be leading the progress in an industry (idiom) • a medical device which helps people with weak hearts • ssl that protects the whole website (not just one page) • ...
Unit 4: Security 2022-07-06
Across
- ___________ are people who purposely try to steal your private information.
- You should stick to __________ websites.
- Phishing emails or pop-ups may try to trick you by saying you have won a ________.
- Your password should combine letters, numbers, and _________.
- Before visiting a new place online, be sure to ask your _________.
- _________ is when hackers try to trick you into giving away your private information.
Down
- An adult can help you ________ websites to decide if they are safe.
- Use a __________ password for each account.
- Many websites and apps keep your private information safe by asking you to create a ____________.
- The links in phishing emails or pop-ups may give your computer a _________.
- If a student borrows your Chromebook and damages it, who pays for the repairs?
- To keep your information safe, your password should be __________.
12 Clues: You should stick to __________ websites. • Use a __________ password for each account. • Your password should combine letters, numbers, and _________. • To keep your information safe, your password should be __________. • Before visiting a new place online, be sure to ask your _________. • An adult can help you ________ websites to decide if they are safe. • ...
Lead Star Security 2022-11-15
12 Clues: , The Time? • , Company Name • , The outcome? • , How or ____? • , The Location? • , Personal Conduct. • , Time keeping record. • , Personal Data, Benefits. • , Persons Involved • , Improper conduct towards others. • , When should workplace issues be reported? • , Security must maintain visibility and ____ on site.
Online Data Security 2025-02-13
Across
- To break into a computer or network without permission.
- Information that defines a person, like name or ID number.
- To trick someone into revealing personal information online.
- To pretend to be someone else to deceive others.
- To threaten someone with harm unless they do something or give information.
- The process of converting data into a secret code for security.
- To secretly watch or gather information about someone.
Down
- A secret word or code used to protect an account or device.
- A potential danger or risk to online security.
- To take something without permission, often referring to data or information.
- Software designed to harm or disrupt computers and networks.
- To secretly watch or gather information about someone.
- Malicious software designed to damage or disrupt computers.
13 Clues: A potential danger or risk to online security. • To pretend to be someone else to deceive others. • To secretly watch or gather information about someone. • To secretly watch or gather information about someone. • To break into a computer or network without permission. • Information that defines a person, like name or ID number. • ...
privacy and security 2025-12-09
Across
- Digital code used to prove identity
- Using body measurements for ID
- Secret string for user authentication
- Person who exploits system weaknesses
- Software designed to damage computers
- Converting data into secret code
- Malware that demands payment to unlock files
Down
- Files that track website activity
- Software recording user actions secretly
- Fraudulent emails to steal sensitive data
- Security system monitoring network traffic
- Secure tunnel for internet connection
12 Clues: Using body measurements for ID • Converting data into secret code • Files that track website activity • Digital code used to prove identity • Secret string for user authentication • Person who exploits system weaknesses • Software designed to damage computers • Secure tunnel for internet connection • Software recording user actions secretly • ...
English IT Crossword 2020-05-09
Across
- - wprowadzenie
- - komunikacja
- - nadgarstkowy
- - roczny
- - projektant
- - dane
- - elektroniczny
- - projekt
- - efektywnie
- - analizuj
- - nośnik
- - współpracownik
- - dodatek
- - tło
- - konsultant
- - finanse
- - laboratorium
- - zatrudnić
- - dyskusja
- - utworzyć
- - analitycy
- - firma
- - funkcja
- - wdrożenie
- - szef
- - rozdział
- - programista
- - finansowe
- - przemęczenie oczu
- - baza danych
- - zaliczka
- - środowisko
- - certyfikacja
- - architekt
- - skoncentrować się
- - zaangażowany
- - wirtualne
- - rozwój
- - szczegółowy
- - umiejętność
Down
- - wiedza
- - administrator
- - opinia
- - znacznie
- - powstanie
- - inżynieria
- - inżynier
- - instytucja
- - sprzęt komputerowy
- - cel
- - sprawa
- - intranet
- - analiza
- - informatyka
- - konkurencyjny
- - przedsiębiorstwo
- - klient
- - powszechny
- - biznes
- - instalacja
- - spadek
- - żądanie
- - komputer
- - sprzęt
- - moc
- - konsulting
- - obszar
- - ubezpieczenie
- - klawiatura
- - komunikować się
- - księgowość
- - zastosowanie
- - określenia
- - odpowiednie
- - kod
- - ukończyć
- - zintegrować
- - współrzędna
- - wydajność
- - instrukcja
80 Clues: - cel • - tło • - moc • - kod • - dane • - szef • - firma • - wiedza • - opinia • - roczny • - nośnik • - sprawa • - klient • - biznes • - spadek • - sprzęt • - obszar • - rozwój • - projekt • - analiza • - dodatek • - finanse • - żądanie • - funkcja • - znacznie • - inżynier • - analizuj • - intranet • - dyskusja • - utworzyć • - komputer • - rozdział • - zaliczka • - ukończyć • - powstanie • - zatrudnić • - analitycy • - wdrożenie • - finansowe • - wydajność • ...
PDHPE Crossword 2016-08-23
Across
- The part of the body you taste with
- A example of the meat food group
- The muscle that pumps blood around your body
- Mental or emotional strain
- A type of bullying that happens online
- The part of the body you smell with
- The organ that does the most digesting
- A example of the dairy food group
- An example of the fruit food group
- The part of the body you see with
Down
- A feeling of unease, worry or nervousness
- The organ that oxygenates your blood
- The scaffolding of your body
- A example of the vegetable food group
- It can happen to anyone
- bullying Excluding someone or spreading rumours
- The biggest organ in the human body
- A example of the carbohydrates food groups
- The part of the body you hear with
- The part of your body that pumps blood to your organs
20 Clues: It can happen to anyone • Mental or emotional strain • The scaffolding of your body • A example of the meat food group • A example of the dairy food group • The part of the body you see with • An example of the fruit food group • The part of the body you hear with • The part of the body you taste with • The part of the body you smell with • The biggest organ in the human body • ...
11/23/2021 Crossword 2021-11-23
Across
- 50 Cent grew up here: Jamaica ___
- Moana's dad (2 words)
- "Infinity War" antagonist
- "Family Feud" host (2 words)
- Not Black Friday, but ___ Monday
- Movie "___ Evil: Welcome to Raccoon City"
- His death started WWI
- Edible soup bowl
- "The Lottery" author
- "sauce" put on turkey
- Thanksgiving dessert ___ pie
- Snoop Dogg's cousin "Moesha"
- He plays Joe on "You"
- Ship the Pilgrims took
Down
- Rafferty song "___ Street" used in "GTA V"
- Netflix animated series "Big ___"
- Card game for one
- Show her some R.E.S.P.E.C.T
- Turkey leg
- Thanksgiving side dish ___ yams
- White Stripes song "Seven ___ Army"
- Rihanna country of origin
- Cornucopia meaning "horn of ___"
- "Aladdin" song "___ Like Me"
- Prayer before dinner
- Bread mixture that goes in the bird
- Video game "___ 2K"
- "Levitating" singer (2 words)
- Cavs rookie ___ Mobley
- -ology means "the ___ of"
- Thanksgiving month
- Edible soup bowl
- "Vampire Diaries" spinoff
33 Clues: Turkey leg • Edible soup bowl • Edible soup bowl • Card game for one • Thanksgiving month • Video game "___ 2K" • Prayer before dinner • "The Lottery" author • Moana's dad (2 words) • His death started WWI • "sauce" put on turkey • He plays Joe on "You" • Cavs rookie ___ Mobley • Ship the Pilgrims took • "Infinity War" antagonist • Rihanna country of origin • -ology means "the ___ of" • ...
Crossword 2022-05-14
Across
- the adjective from innovation
- Portable computer
- to change in to stronger or more advanced from
- present ideas and method
- nort in use anymore, having been replaced by something better
- a device that operates
- To develop towards an improved or more advanced state
- behavior of something or someone
- to change something in order to make in better
- a person who know a lot about technology especially computer
- computers
Down
- the physical part of a computer or related device
- The effect of something
- something you could not manage without; absolutely necessary
- The power to have an effect on the character, development
- of the present time;
- complete or dramatic or improvement
- Involving or causing
- connected to the internet
- Relating to or involving technology
- electronic current passing through it
- The right to keep personal information secret
- Involving, using or relating to computers
23 Clues: computers • Portable computer • of the present time; • Involving or causing • a device that operates • The effect of something • present ideas and method • connected to the internet • the adjective from innovation • behavior of something or someone • complete or dramatic or improvement • Relating to or involving technology • electronic current passing through it • ...
Health Crossword 2023-11-06
Across
- feeling influenced to do something
- something you make and then actively try to reach
- a mean person
- online way of communication (2 words)
- someone who learn with their hands
- A hazardous situtation, syn.
- to stop something from happening
- psychological well-being (2 words)
- a connection between two people
- someone who learns best by seeing
Down
- a profession
- to joke around with someone
- strong body, strong mind
- forcing someone to do something under a threat
- unlike any other
- a type of bullying done online
- A group of people who intend to cause harm
- any action by a person/group that causes physical or emotional harm
- An "i'm not failing, i'm learning" attitude (2 words)
- someone who is of the same age or group as you
- when one is extremely poor
- someone who learns best by listening
22 Clues: a profession • a mean person • unlike any other • strong body, strong mind • when one is extremely poor • to joke around with someone • A hazardous situtation, syn. • a type of bullying done online • a connection between two people • to stop something from happening • someone who learns best by seeing • feeling influenced to do something • someone who learn with their hands • ...
Barkmans Crossword 2024-01-04
Across
- - How computers are wirelessly connected
- Firewall - protects your computer from viruses
- Compression Tool - shrinks the size of files
- device - what shows the user info
- computing - using less energy to compute
- - etiquette of the internet
- Extortionist - stop hacking in exchange currency
- Vision Syndrome - computer affected eyesight
- - an integrated interface within devices
- device - how you enter info
- - what gives your device info
Down
- - business online
- Device Convergence - technology that needs less computers
- Web Design - the resolution matches the screen
- - unaware of a virus
- System - made of 1s and 0s
- - your position whilst computing
- - accessing a device illegally
- - how clear the screen is
- social network - users alike can engage together
- - organized data
- - stores info on you computer
- Aggregation - a compilations of information
- Defragmenter - organizer of data on a disk
- Protector - protects electronics against power surges
25 Clues: - organized data • - business online • - unaware of a virus • - how clear the screen is • System - made of 1s and 0s • - etiquette of the internet • device - how you enter info • - stores info on you computer • - what gives your device info • - accessing a device illegally • - your position whilst computing • device - what shows the user info • ...
Project 2024-01-08
Across
- - collection of computers
- - a small text stored on the computer
- Protector - minimize chance of overcharge
- - radio frequency technology
- - collection of data to allow retrieval
- Extortionist - demands payment to stop their attack
- - an electrical disturbance
- - files waiting in the buffer
- Vision Syndrome - computer related eye health condition
- - accesses a computer illegally
- Aggregation - users collect and compile the data
- - number of horizontal and vertical pixels
Down
- - delivers webpages to your computer
- - unaware the device is compromised
- - mobile operating system
- - more expensive DVD format
- System - unique numbers 0 and 1
- - a display technology that uses liquid compound
- - aircraft controlled with a controller
- - programs for assistance
- - business transaction over the internet
- - applied science for comfort and efficiency
- - request of specific data from database
- - internet etiquette
- Aggregation - called a curation website
- Firewall - protects a personal computer from viruses
- Compression Tool - tool that compresses files
27 Clues: - internet etiquette • - collection of computers • - mobile operating system • - programs for assistance • - more expensive DVD format • - an electrical disturbance • - radio frequency technology • - files waiting in the buffer • System - unique numbers 0 and 1 • - accesses a computer illegally • - unaware the device is compromised • - delivers webpages to your computer • ...
Futurama 2024-05-14
Across
- Where did Fry meet Bender?
- President of Earth at the end of the fourth season
- "Bachelor Chow, now with ____!"
- Lrr rules
- Home of amy's parents
- ___ don't work that way! GOOD NIGHT!
- Leela's boyfriend in "The Cyber House Rules"
- What is Leela
- Fry's favorite drink
- fry and bender's apartment complex
- In "Parasites Lost" what does fry eat that had the parasites?
- two meals in one week
- What's strange about Zoidberg?
- If it wasn't torpedo three, what was it?
- Brother of Fry
- Original voice of Robot Santa
- Planet at the exact center of the universe
- Leela Surname
Down
- Reward for saving the earth from global warming
- Cutest pet in the universe
- Zoidberg and Calculon Movie
- Fry was named after a ____
- Voice of fry
- Zapp's ride
- What is Bender
- First Tagline
26 Clues: Lrr rules • Zapp's ride • Voice of fry • What is Leela • First Tagline • Leela Surname • What is Bender • Brother of Fry • Fry's favorite drink • Home of amy's parents • two meals in one week • Where did Fry meet Bender? • Cutest pet in the universe • Fry was named after a ____ • Zoidberg and Calculon Movie • Original voice of Robot Santa • What's strange about Zoidberg? • ...
M Jangki Dausad X-E 21 2025-04-15
Across
- Singkatan dari Hak atas Kekayaan Intelektual?
- Proses membuat isi digital?
- Proses memastikan data benar?
- Nama lain dari isi digital?
- Ahli dalam jaringan komputer?
- Pelanggaran HAKI disebut juga?
- Ahli keamanan sistem komputer?
- Kata yang diketik di mesin pencari?
- Tempat kita mengetik kata kunci untuk mencari informasi?
- Orang yang membuat aplikasi?
- Profesi yang membuat tampilan web menarik?
- Salah satu karya seni yang dilindungi HAKI?
- Aplikasi populer untuk konten video?
Down
- Proses membuat video untuk media sosial?
- Format email dicek dengan proses ini?
- Hasil yang muncul dari pencarian?
- Profesi yang bertugas mengelola jaringan komputer?
- Mesin pencari paling populer di dunia?
- Hak yang dimiliki pencipta atas karyanya?
- Profesi yang bekerja di bidang IT?
- Validasi mencegah terjadinya?
- Validasi menjamin data?
- Validasi dilakukan sebelum data?
- Tujuan utama membuat konten?
- engine Istilah lain dari mesin pencari?
- HAKI melindungi jenis karya ini?
- Orang yang membuat konten?
27 Clues: Validasi menjamin data? • Orang yang membuat konten? • Proses membuat isi digital? • Nama lain dari isi digital? • Tujuan utama membuat konten? • Orang yang membuat aplikasi? • Validasi mencegah terjadinya? • Proses memastikan data benar? • Ahli dalam jaringan komputer? • Pelanggaran HAKI disebut juga? • Ahli keamanan sistem komputer? • Validasi dilakukan sebelum data? • ...
