cyber security Crossword Puzzles
Internet security 2022-11-03
Across
- Designed to obtain personal information without the user's permission
- Company uses .... techniques to decode (or decipher) secret data
- Malware that is used to pose as different software
Down
- Encoding data so that unauthorized users can't read it is known as ...
- Protects a company intranet from outside attacks.
- Can infect your files and corrupt your hard drive
- Users have to enter a ... to gain access to a network.
- Person who uses their computer skills to enter computers and/or networks illegally
8 Clues: Protects a company intranet from outside attacks. • Can infect your files and corrupt your hard drive • Malware that is used to pose as different software • Users have to enter a ... to gain access to a network. • Company uses .... techniques to decode (or decipher) secret data • Designed to obtain personal information without the user's permission • ...
Energy security 2022-09-11
Across
- the uninterrupted availability of energy sources at an affordable price
- measures that keep prices for consumers below market levels or for producers above market levels, or reduce costs for consumers and producers
- Fuel that was formed in the earth in prehistoric times from remains of living-cell organisms
- policy that encourages the development of energy technologies to diversify energy supply sources, thus reducing reliance on conventional fuels
Down
- are virtually inexhaustible in duration but limited in the amount of energy that is available per unit of time
- An arrangement whereby the same company owns all the different aspects of making, selling, and delivering a product or service
- lack of access to modern energy services
- energy made available for future disposition.
8 Clues: lack of access to modern energy services • energy made available for future disposition. • the uninterrupted availability of energy sources at an affordable price • Fuel that was formed in the earth in prehistoric times from remains of living-cell organisms • ...
Food Security 2024-11-28
Across
- A round green or red fruit with a thin skin and crunchy flesh
- A citrus fruit, often orange or green in color
- A fruit with a hard shell and water or white flesh inside
- A small, dark purple or green fruit that grows in bunches
Down
- A tropical fruit with spiky skin and sweet yellow flesh
- A yellow fruit that monkeys love
- A fruit with a hard shell and water or white flesh inside
- A juicy red fruit with tiny seeds on its surface
- A small red fruit often used in pies
9 Clues: A yellow fruit that monkeys love • A small red fruit often used in pies • A citrus fruit, often orange or green in color • A juicy red fruit with tiny seeds on its surface • A tropical fruit with spiky skin and sweet yellow flesh • A fruit with a hard shell and water or white flesh inside • A fruit with a hard shell and water or white flesh inside • ...
INFORMATION SECURITY 2025-04-06
Across
- To modernize
- An event that affects negatively
- … is used to restore the original in case of a data loss event
- Registration of all actions with information systems
- Physical … such as disks, flash drives, HDDs are used to store and transmit data
Down
- Security … allows access to sensitive information
- Cryptographic transformation of information
- A character string which helps to verify the user’s identity
8 Clues: To modernize • An event that affects negatively • Cryptographic transformation of information • Security … allows access to sensitive information • Registration of all actions with information systems • A character string which helps to verify the user’s identity • … is used to restore the original in case of a data loss event • ...
English IT Crossword 2020-05-09
Across
- - wprowadzenie
- - komunikacja
- - nadgarstkowy
- - roczny
- - projektant
- - dane
- - elektroniczny
- - projekt
- - efektywnie
- - analizuj
- - nośnik
- - współpracownik
- - dodatek
- - tło
- - konsultant
- - finanse
- - laboratorium
- - zatrudnić
- - dyskusja
- - utworzyć
- - analitycy
- - firma
- - funkcja
- - wdrożenie
- - szef
- - rozdział
- - programista
- - finansowe
- - przemęczenie oczu
- - baza danych
- - zaliczka
- - środowisko
- - certyfikacja
- - architekt
- - skoncentrować się
- - zaangażowany
- - wirtualne
- - rozwój
- - szczegółowy
- - umiejętność
Down
- - wiedza
- - administrator
- - opinia
- - znacznie
- - powstanie
- - inżynieria
- - inżynier
- - instytucja
- - sprzęt komputerowy
- - cel
- - sprawa
- - intranet
- - analiza
- - informatyka
- - konkurencyjny
- - przedsiębiorstwo
- - klient
- - powszechny
- - biznes
- - instalacja
- - spadek
- - żądanie
- - komputer
- - sprzęt
- - moc
- - konsulting
- - obszar
- - ubezpieczenie
- - klawiatura
- - komunikować się
- - księgowość
- - zastosowanie
- - określenia
- - odpowiednie
- - kod
- - ukończyć
- - zintegrować
- - współrzędna
- - wydajność
- - instrukcja
80 Clues: - cel • - tło • - moc • - kod • - dane • - szef • - firma • - wiedza • - opinia • - roczny • - nośnik • - sprawa • - klient • - biznes • - spadek • - sprzęt • - obszar • - rozwój • - projekt • - analiza • - dodatek • - finanse • - żądanie • - funkcja • - znacznie • - inżynier • - analizuj • - intranet • - dyskusja • - utworzyć • - komputer • - rozdział • - zaliczka • - ukończyć • - powstanie • - zatrudnić • - analitycy • - wdrożenie • - finansowe • - wydajność • ...
PDHPE Crossword 2016-08-23
Across
- The part of the body you taste with
- A example of the meat food group
- The muscle that pumps blood around your body
- Mental or emotional strain
- A type of bullying that happens online
- The part of the body you smell with
- The organ that does the most digesting
- A example of the dairy food group
- An example of the fruit food group
- The part of the body you see with
Down
- A feeling of unease, worry or nervousness
- The organ that oxygenates your blood
- The scaffolding of your body
- A example of the vegetable food group
- It can happen to anyone
- bullying Excluding someone or spreading rumours
- The biggest organ in the human body
- A example of the carbohydrates food groups
- The part of the body you hear with
- The part of your body that pumps blood to your organs
20 Clues: It can happen to anyone • Mental or emotional strain • The scaffolding of your body • A example of the meat food group • A example of the dairy food group • The part of the body you see with • An example of the fruit food group • The part of the body you hear with • The part of the body you taste with • The part of the body you smell with • The biggest organ in the human body • ...
11/23/2021 Crossword 2021-11-23
Across
- 50 Cent grew up here: Jamaica ___
- Moana's dad (2 words)
- "Infinity War" antagonist
- "Family Feud" host (2 words)
- Not Black Friday, but ___ Monday
- Movie "___ Evil: Welcome to Raccoon City"
- His death started WWI
- Edible soup bowl
- "The Lottery" author
- "sauce" put on turkey
- Thanksgiving dessert ___ pie
- Snoop Dogg's cousin "Moesha"
- He plays Joe on "You"
- Ship the Pilgrims took
Down
- Rafferty song "___ Street" used in "GTA V"
- Netflix animated series "Big ___"
- Card game for one
- Show her some R.E.S.P.E.C.T
- Turkey leg
- Thanksgiving side dish ___ yams
- White Stripes song "Seven ___ Army"
- Rihanna country of origin
- Cornucopia meaning "horn of ___"
- "Aladdin" song "___ Like Me"
- Prayer before dinner
- Bread mixture that goes in the bird
- Video game "___ 2K"
- "Levitating" singer (2 words)
- Cavs rookie ___ Mobley
- -ology means "the ___ of"
- Thanksgiving month
- Edible soup bowl
- "Vampire Diaries" spinoff
33 Clues: Turkey leg • Edible soup bowl • Edible soup bowl • Card game for one • Thanksgiving month • Video game "___ 2K" • Prayer before dinner • "The Lottery" author • Moana's dad (2 words) • His death started WWI • "sauce" put on turkey • He plays Joe on "You" • Cavs rookie ___ Mobley • Ship the Pilgrims took • "Infinity War" antagonist • Rihanna country of origin • -ology means "the ___ of" • ...
Crossword 2022-05-14
Across
- the adjective from innovation
- Portable computer
- to change in to stronger or more advanced from
- present ideas and method
- nort in use anymore, having been replaced by something better
- a device that operates
- To develop towards an improved or more advanced state
- behavior of something or someone
- to change something in order to make in better
- a person who know a lot about technology especially computer
- computers
Down
- the physical part of a computer or related device
- The effect of something
- something you could not manage without; absolutely necessary
- The power to have an effect on the character, development
- of the present time;
- complete or dramatic or improvement
- Involving or causing
- connected to the internet
- Relating to or involving technology
- electronic current passing through it
- The right to keep personal information secret
- Involving, using or relating to computers
23 Clues: computers • Portable computer • of the present time; • Involving or causing • a device that operates • The effect of something • present ideas and method • connected to the internet • the adjective from innovation • behavior of something or someone • complete or dramatic or improvement • Relating to or involving technology • electronic current passing through it • ...
Health Crossword 2023-11-06
Across
- feeling influenced to do something
- something you make and then actively try to reach
- a mean person
- online way of communication (2 words)
- someone who learn with their hands
- A hazardous situtation, syn.
- to stop something from happening
- psychological well-being (2 words)
- a connection between two people
- someone who learns best by seeing
Down
- a profession
- to joke around with someone
- strong body, strong mind
- forcing someone to do something under a threat
- unlike any other
- a type of bullying done online
- A group of people who intend to cause harm
- any action by a person/group that causes physical or emotional harm
- An "i'm not failing, i'm learning" attitude (2 words)
- someone who is of the same age or group as you
- when one is extremely poor
- someone who learns best by listening
22 Clues: a profession • a mean person • unlike any other • strong body, strong mind • when one is extremely poor • to joke around with someone • A hazardous situtation, syn. • a type of bullying done online • a connection between two people • to stop something from happening • someone who learns best by seeing • feeling influenced to do something • someone who learn with their hands • ...
Barkmans Crossword 2024-01-04
Across
- - How computers are wirelessly connected
- Firewall - protects your computer from viruses
- Compression Tool - shrinks the size of files
- device - what shows the user info
- computing - using less energy to compute
- - etiquette of the internet
- Extortionist - stop hacking in exchange currency
- Vision Syndrome - computer affected eyesight
- - an integrated interface within devices
- device - how you enter info
- - what gives your device info
Down
- - business online
- Device Convergence - technology that needs less computers
- Web Design - the resolution matches the screen
- - unaware of a virus
- System - made of 1s and 0s
- - your position whilst computing
- - accessing a device illegally
- - how clear the screen is
- social network - users alike can engage together
- - organized data
- - stores info on you computer
- Aggregation - a compilations of information
- Defragmenter - organizer of data on a disk
- Protector - protects electronics against power surges
25 Clues: - organized data • - business online • - unaware of a virus • - how clear the screen is • System - made of 1s and 0s • - etiquette of the internet • device - how you enter info • - stores info on you computer • - what gives your device info • - accessing a device illegally • - your position whilst computing • device - what shows the user info • ...
Project 2024-01-08
Across
- - collection of computers
- - a small text stored on the computer
- Protector - minimize chance of overcharge
- - radio frequency technology
- - collection of data to allow retrieval
- Extortionist - demands payment to stop their attack
- - an electrical disturbance
- - files waiting in the buffer
- Vision Syndrome - computer related eye health condition
- - accesses a computer illegally
- Aggregation - users collect and compile the data
- - number of horizontal and vertical pixels
Down
- - delivers webpages to your computer
- - unaware the device is compromised
- - mobile operating system
- - more expensive DVD format
- System - unique numbers 0 and 1
- - a display technology that uses liquid compound
- - aircraft controlled with a controller
- - programs for assistance
- - business transaction over the internet
- - applied science for comfort and efficiency
- - request of specific data from database
- - internet etiquette
- Aggregation - called a curation website
- Firewall - protects a personal computer from viruses
- Compression Tool - tool that compresses files
27 Clues: - internet etiquette • - collection of computers • - mobile operating system • - programs for assistance • - more expensive DVD format • - an electrical disturbance • - radio frequency technology • - files waiting in the buffer • System - unique numbers 0 and 1 • - accesses a computer illegally • - unaware the device is compromised • - delivers webpages to your computer • ...
Futurama 2024-05-14
Across
- Where did Fry meet Bender?
- President of Earth at the end of the fourth season
- "Bachelor Chow, now with ____!"
- Lrr rules
- Home of amy's parents
- ___ don't work that way! GOOD NIGHT!
- Leela's boyfriend in "The Cyber House Rules"
- What is Leela
- Fry's favorite drink
- fry and bender's apartment complex
- In "Parasites Lost" what does fry eat that had the parasites?
- two meals in one week
- What's strange about Zoidberg?
- If it wasn't torpedo three, what was it?
- Brother of Fry
- Original voice of Robot Santa
- Planet at the exact center of the universe
- Leela Surname
Down
- Reward for saving the earth from global warming
- Cutest pet in the universe
- Zoidberg and Calculon Movie
- Fry was named after a ____
- Voice of fry
- Zapp's ride
- What is Bender
- First Tagline
26 Clues: Lrr rules • Zapp's ride • Voice of fry • What is Leela • First Tagline • Leela Surname • What is Bender • Brother of Fry • Fry's favorite drink • Home of amy's parents • two meals in one week • Where did Fry meet Bender? • Cutest pet in the universe • Fry was named after a ____ • Zoidberg and Calculon Movie • Original voice of Robot Santa • What's strange about Zoidberg? • ...
M Jangki Dausad X-E 21 2025-04-15
Across
- Singkatan dari Hak atas Kekayaan Intelektual?
- Proses membuat isi digital?
- Proses memastikan data benar?
- Nama lain dari isi digital?
- Ahli dalam jaringan komputer?
- Pelanggaran HAKI disebut juga?
- Ahli keamanan sistem komputer?
- Kata yang diketik di mesin pencari?
- Tempat kita mengetik kata kunci untuk mencari informasi?
- Orang yang membuat aplikasi?
- Profesi yang membuat tampilan web menarik?
- Salah satu karya seni yang dilindungi HAKI?
- Aplikasi populer untuk konten video?
Down
- Proses membuat video untuk media sosial?
- Format email dicek dengan proses ini?
- Hasil yang muncul dari pencarian?
- Profesi yang bertugas mengelola jaringan komputer?
- Mesin pencari paling populer di dunia?
- Hak yang dimiliki pencipta atas karyanya?
- Profesi yang bekerja di bidang IT?
- Validasi mencegah terjadinya?
- Validasi menjamin data?
- Validasi dilakukan sebelum data?
- Tujuan utama membuat konten?
- engine Istilah lain dari mesin pencari?
- HAKI melindungi jenis karya ini?
- Orang yang membuat konten?
27 Clues: Validasi menjamin data? • Orang yang membuat konten? • Proses membuat isi digital? • Nama lain dari isi digital? • Tujuan utama membuat konten? • Orang yang membuat aplikasi? • Validasi mencegah terjadinya? • Proses memastikan data benar? • Ahli dalam jaringan komputer? • Pelanggaran HAKI disebut juga? • Ahli keamanan sistem komputer? • Validasi dilakukan sebelum data? • ...
tech 2024-10-09
Across
- design designing online
- a arrangement of horizontal and vertical lines
- docs online website for document
- funny meme
- place to find information
- a set of instructions for a program
- online currency
- programs used by a computer
- theory guidelines designers use to create visually appealing color combination
- something with the alphabet
- something people use to program robots
- something that will take over the world
- fonts fonts online
Down
- something that connects something to your phone wirelessly
- kanani best teacher in the world
- mapping system
- bullying bullying online
- something that people disconnect
- turn your device back on
- somebody that has influence
- something that's in star wars
- most bought thing from apple
- games online games
- something you can charge things with
- somthing websites give you
- media social platform
- something that projects something
- has every answer
- something that gives you internet
- remote something that controls a tv
30 Clues: funny meme • mapping system • online currency • has every answer • games online games • fonts fonts online • media social platform • design designing online • bullying bullying online • turn your device back on • place to find information • somthing websites give you • somebody that has influence • programs used by a computer • something with the alphabet • most bought thing from apple • ...
Crack the Cyber Code 2025-06-10
Across
- It is used to filter unwanted websites
- The act of watching someone's activity secretly online
- A fake software that harms devices
- The term for copying software without permission
- A harmful program that spread between computers
- The person who breaks into computer systems
- A online chatting tool
- A online chatting place
- A spying system
- A fake online identity
Down
- The set of rules for using the internet respectfully
- We call stealing someone's digital work or content
- A software protects you from your device from threats
- A secret code to protect accounts
- A common social media risk
- The act of sending rude or threatening messages online
16 Clues: A spying system • A online chatting tool • A fake online identity • A online chatting place • A common social media risk • A secret code to protect accounts • A fake software that harms devices • It is used to filter unwanted websites • The person who breaks into computer systems • A harmful program that spread between computers • ...
Language and Cyber Fun 2025-05-19
Across
- a online music platform
- translator for assembly language
- popular antivirus software
- inventor of Java Programming Language
- translate the whole program at a time
- process of writing specific instructions
- message for authentication
- translates language line by line
Down
- software helps in preventing unauthorised access
- is a language that uses for AI
- illegal intrusion into a computer system via network
- language consists 0 and 1
- a video conferencing application
- fourth-generation programming language
- first Internet framework
- misleads user as a trusted person or organization
16 Clues: a online music platform • first Internet framework • language consists 0 and 1 • popular antivirus software • message for authentication • is a language that uses for AI • translator for assembly language • a video conferencing application • translates language line by line • inventor of Java Programming Language • translate the whole program at a time • ...
Types of bullying 2023-12-05
7 Clues: When you bully someone online • When you bully someone verbally • When you bully someone due to race • When you bully someone due to religion • When you bully someone by spreading lies • When you bully someone based on stereotypes • When you bully someone due to a physical difference
RansomWare activity 2025-05-23
Across
- / Plants malicious encryption software
- / New Years ransomware attack
- / Locksdevices and causing data across the network to be encrypted
- / U.S. workforce management
- / Attacked by the Darkside group
Down
- / Receive an on-screen notification from the cyber criminal
- / blocks access to a computer system until a sum of money is paid
7 Clues: / Attacked by the Darkside group • / U.S. workforce management • / New Years ransomware attack • / Plants malicious encryption software • / Receive an on-screen notification from the cyber criminal • / blocks access to a computer system until a sum of money is paid • ...
vocab 2022-02-16
Across
- bank you make money off of accounts
- physical form of currency
- people that manage credit
- you write money out to people on it
- used if you want to pay later
- manage accounts of loans and savings
- put money in a bank account
- protection of something
- guarantee from bank that you will pay the money back on time
Down
- to move money somewhere else
- bank account if you plan to spend
- lets you borrow money when you need it
- institute you can't deposity money into
- where security is
- bank account if you plan to save
- a unit of value
- let you buy without carrying cash
17 Clues: a unit of value • where security is • protection of something • physical form of currency • people that manage credit • put money in a bank account • to move money somewhere else • used if you want to pay later • bank account if you plan to save • bank account if you plan to spend • let you buy without carrying cash • bank you make money off of accounts • ...
Crossword - Chapter 3 2024-08-12
Across
- health care services at discounted prices and controls to reduce costs
- before 1965 this type of insurance was available to working people
- govt policy with primary aim to expand health insurance to the uninsured
- quarantined people with contagious diseases
- provide coverage for physicians and outpatient services under medicare
- larger group practices including strategic partnerships and corporatization of health delivery
- various forms of cross border economic activities
- first hospital insurance network
- administers both medicare and medicaid
Down
- health care information and services over the internet
- title 18 of the Social Security Act of 1965
- voluntary health insurance
- obamacare
- title 19 of the Social Security Act of 1965
- provide coverage to hospitals under medicare
- served the destitute and known as the poorhouse
- first plan to cover for physician fees
17 Clues: obamacare • voluntary health insurance • first hospital insurance network • first plan to cover for physician fees • administers both medicare and medicaid • title 18 of the Social Security Act of 1965 • quarantined people with contagious diseases • title 19 of the Social Security Act of 1965 • provide coverage to hospitals under medicare • ...
Airport terminology 2018-11-12
Across
- Retail outlets which is exempt from the payment of certain local or national taxes and duties
- Where would you find security dogs?
- What does F&B stand for?
- The area where you go through security and hand over your passport and departure card for inspection.
Down
- An area of the airport on airside which has more comfortable seating than the terminal.
- What bridge allows passengers to leave the gate and board the aircraft?
- Where would you find the Muslim prayer room at AKL Airport INT Terminal?
- The first 30 minutes are FREE, then if you require more you may also pay to use the services
- The action of registering one's presence, typically as a passenger at an airport
- What is the name of the worlds foreign exchange specialist?
- Where would you find an aircraft parked?
- Rectangular area on a land aerodrome prepared for the landing and takeoff of aircraft
12 Clues: What does F&B stand for? • Where would you find security dogs? • Where would you find an aircraft parked? • What is the name of the worlds foreign exchange specialist? • What bridge allows passengers to leave the gate and board the aircraft? • Where would you find the Muslim prayer room at AKL Airport INT Terminal? • ...
Technology Engineering 2018-03-06
Across
- copy one computer information to another
- a global computer network providing a verity of information
- machines, wiring and other physical components of a computer
- a instruction connecting one part of a program to another
- relating to he culture of computers and information technology
Down
- controlled by or connected to another computer or network
- programs and other information used by computers
- a program used to view documents
- fix a computer program piecemeal until it works
- a symbolic arrangement of data in a computer program
10 Clues: a program used to view documents • copy one computer information to another • fix a computer program piecemeal until it works • programs and other information used by computers • a symbolic arrangement of data in a computer program • controlled by or connected to another computer or network • a instruction connecting one part of a program to another • ...
Bab 3 2025-09-08
Across
- Hak atas pembangunan ini pun dinyatakan kembali melalui deklarasi
- perilaku yang memperlakukan seseorang secara beda
- warga negara saling mengetahui hak dan kewajibannya secara tepat dan
- mempromosikan kampanye anti pelanggaran hak dan pengingkaran
- merupakan tindakan semena-mena berupa menyakiti, mempersulit atau melenyapkan seseorang
Down
- salah satu upaya yang dapat dilakukan oleh negara untuk mencegah kasus pelanggaran hak adalah
- BULLYING bentuk pelanggaran hak
- hak yang didapat setiap manusia
- ketentuan mengenai hal dan kewajiban warga negara bersifat
- UUD NRI tahun 1945 berperan sebagai hukum
10 Clues: BULLYING bentuk pelanggaran hak • hak yang didapat setiap manusia • UUD NRI tahun 1945 berperan sebagai hukum • perilaku yang memperlakukan seseorang secara beda • ketentuan mengenai hal dan kewajiban warga negara bersifat • mempromosikan kampanye anti pelanggaran hak dan pengingkaran • Hak atas pembangunan ini pun dinyatakan kembali melalui deklarasi • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
Social Security Principles 2013-12-05
Across
- a type of redistribution from rich to poor
- transferring money from one group to another
- feeling safe and secure is known as social "what"
- stopping someone from become poor is another key aspect of social security, what is it called
Down
- social security is also used to alter how people act thus changing their "what"
- a type of redistribution from childless families to families with children
- spreading income over your lifetime
- this refers to provision against injury or illness
- what is social security usually said to be relieving
9 Clues: spreading income over your lifetime • a type of redistribution from rich to poor • transferring money from one group to another • feeling safe and secure is known as social "what" • this refers to provision against injury or illness • what is social security usually said to be relieving • a type of redistribution from childless families to families with children • ...
UN Crossword Puzzle 2024-10-10
Across
- Last name of the current UN Secretary-General
- Asian country holding a permanent seat in the Security Council
- Principal judicial organ of the UN for resolving international disputes
- Group of five permanent members with veto power in the Security Council
Down
- Main deliberative organ of the UN where all member states participate
- Unique power allowing P5 members to block decisions in the UNSC
- UN body responsible for maintaining international peace and security
- International organization founded in 1945 to promote peace and cooperation
- Legal status of certain UNSC decisions that member states must follow
9 Clues: Last name of the current UN Secretary-General • Asian country holding a permanent seat in the Security Council • Unique power allowing P5 members to block decisions in the UNSC • UN body responsible for maintaining international peace and security • Main deliberative organ of the UN where all member states participate • ...
CyberHarassment 2016-02-23
6 Clues: A crime committed via Internet. • _____ Harm: The promotion of drug abuse. • ________ Addiction: A compulsive behavior. • _____ Speech: Speech against a certain race. • Are believed to be more addicted to internet. • stalking This includes threats and identity theft.
CyberSecurity 2024-10-10
8 Clues: malware lockouts • Dual Authentication • Router Security Protocol • Social engineering by text • security of non-public data • social engineering by phone • Action for infected computer • One part of user's credentials
Instagram 2018-06-04
Across
- Welcher Plattform ähnelt Instagram immer mehr?
- Was kann man machen um seine eigene Privatsphäre zu schützen?
- Bei welcher Altergruppe ist diese Plattform hoch im Gebrauch?
Down
- Ein Grund warum Instgaram Snap Chat immer mehr ähnelt.
- Was ist das Mindestalter um Instagram nutzen zu dürfen?
- Wie nennt man "Hass-Kommentare" noch?
- Was sollte man ändern wenn das Konto gehackt wurde?
- Was ist Instagram?
- Was ist das Symbol von Instgram?
9 Clues: Was ist Instagram? • Was ist das Symbol von Instgram? • Wie nennt man "Hass-Kommentare" noch? • Welcher Plattform ähnelt Instagram immer mehr? • Was sollte man ändern wenn das Konto gehackt wurde? • Ein Grund warum Instgaram Snap Chat immer mehr ähnelt. • Was ist das Mindestalter um Instagram nutzen zu dürfen? • ...
Storage of Electronic Data 2022-04-14
Across
- data,
- storage,
- incidents, Security incidents include but are not limited to the theft or loss of a computer device, the introduction of malicious software, or other misconfiguration that may lead to unauthorized access to confidential or sensitive information.
- commit data as retrievable records.
- may result in appropriate disciplinary action, up to and including termination, temporary or permanent restrictions on information access/networks, and criminal and/or civil action.
Down
- by the university and maintained by ITS for the purpose of electronically retaining university data.
- The university reserves the right to monitor network traffic, perform random audits and to take other steps to ensure the integrity of its information and compliance with this policy.
- security incident, Individuals granted access to university data or information systems must report any known security incident or any incident that is likely to cause a disclosure of sensitive information to unauthorized parties by contacting the university’s tech desk.
- and all data and records created, collected, stored and/or managed in connection with the operation and management of the university
- Office,
10 Clues: data, • Office, • storage, • commit data as retrievable records. • by the university and maintained by ITS for the purpose of electronically retaining university data. • and all data and records created, collected, stored and/or managed in connection with the operation and management of the university • ...
unit 6; 2014-04-13
Across
- a camera system used to maintain security
- a kitchen device that keeps food fresh and cold
- a card which resembles a debt to your bank
- somebody who steals things from pockets and purses
- somebody who is incredibly stupid
- a group of people who protect humans and things
- to force somebody to hand over things that aren't yours
- to have done something you shouldn't
- breaking things that aren't yours
Down
- a commited action which was illigal
- to be your own boss
- a very sharp blade you use to shave body hair
- to steel object from a shop
- somebody who investigates crimes
- a person who does or has done illigal things
- a short coat
- a card which shows your personal information
- a person who owns a shop
18 Clues: a short coat • to be your own boss • a person who owns a shop • to steel object from a shop • somebody who investigates crimes • somebody who is incredibly stupid • breaking things that aren't yours • a commited action which was illigal • to have done something you shouldn't • a camera system used to maintain security • a card which resembles a debt to your bank • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
Group Security Crossword Puzzle 2022-10-03
Across
- keep watch over by regularly walking or travelling around it
- another word for human beings
- close observation, especially of a suspected spy or criminal
- barrier or railing, or other upright structure made of any material enclosing an area of ground to control or prevent unauthorized access
- facts provided or learned about something or someone
- a thing or things belonging to someone
- long-term shifts in temperatures and weather patterns
- common type of scam that people fall prey to
- body measurements and calculations related to human characteristics
Down
- the action of protecting, or the state of being protected
- an unmanned aerial vehicle
- formal or systematic examination or research
- the action of functioning or the fact of being active or in effect
- zero tolerance
- the action or process of identifying someone or something
- a conference or meeting to discuss a particular subject
- the act of compelling observance of or compliance with a law, rule, or obligation
- a device for recording visual images in the form of photographs or films
18 Clues: zero tolerance • an unmanned aerial vehicle • another word for human beings • a thing or things belonging to someone • formal or systematic examination or research • common type of scam that people fall prey to • facts provided or learned about something or someone • long-term shifts in temperatures and weather patterns • ...
TTS: BULLYING 2025-08-05
Across
- Bullying bisa menyebabkan anak menjadi kurang...
- Sering jadi korban bullying karena minoritas
- Memfitnah,mengatakan hal buruk tentang orang lain dapat merusak...nya
- Orang tua harus memberikan...kepada anak
- pelaku tindakan bullying disebut...
- Pelaku merasa lebih... dari korban
- Memberikan komentar negatif terhadap postingan di Instagram teman termasuk bullying...
- Memukul, menendang, atau kekerasan tubuh lainnya termasuk bullying...
- Reaksi emosional korban bullying misalnya...
- Penyelesaian masalah tanpa kekerasan
- Dampak psikologis dari bullying yang sering muncul
- Bullying bisa menyebabkan anak menjadi kurang...
- Tempat di sekolah yang sering terjadi lokasi bullying
- Tindakan bullying bisa menimbulkan...dalam jangka waktu lama
- Lawan dari egois penting dalam pencegahan bullying
- Cyber Bullying merupakan bentuk bullying yang dilakukan melalui...
- Orang yang melakukan bullying karena pernah di bully
- Sikap yang dibutuhkan untuk melawan bullying adalah...
- Pelaku bullying sering merasa punya kekuasaan
- Aksi menunjukkan dukungan kepada korban
- Sikap tidak peduli terhadap bullying
- Korban merasa tidak...oleh orang lain
- Bullying secara diam - diam dan mengucilkan
- Bentuk penghinaan dalam tulisan di medsos
- Sikap diam terhadap bullying disebut budaya...
Down
- Kata lain dari ejekan fisik terhadap bentuk tubuh
- Salah satu peran penting guru adalah sebagai
- Lawan dari kata penindas adalah
- Tindakan untuk menghentikan bullying
- Tindakan menyakiti orang lain secara sengaja dan berulang
- Siswa yang menjadi korban bullying di sekolah bisa melapor kepada...
- bullying melalui Medsos atau Internet
- Program di sekolahnuntuk mencegah bullying
- Raut muka pelaku saat mengejek
- Orang yang menyaksikan bullying tanpa bertindak
- Proses belajar mencegah bullying
- Kata lain dari kerja sama dalam mencegah bullying
- Nilai pelajaran bisa turun karena bullying yaitu menurunnya...
- Jenis bullying yang menyebarkan gosip jahat adalah...
- Teman yang mendukung dan membela saat bullying
- Kata lunci dari stop bullying:"Stop, Speak,..."
- Kata lain dari pelecehan atau hinaan
- Tempat yang sering terjadi cyber bullying
- Organisasi atau lembaga yang bisa bantu korban bullying
- Kata lain dari kekerasan terus menerus
- Lembaga tempat bullying sering terjadi
- bentuk bantuan dari psikolog untuk korban
- Korban bullying sering merasa... dari lingkungan
- Menjelekkan teman dengan memanggil nama orang tuanya termasuk bullying...
- Teman sebaya bisa berpotensi sebagai pelaku bullying di lingkungan...
- Lawan dari kekerasan adalah...
- Bentuk kampanye singkat untuk ajakan anti bullying
52 Clues: Raut muka pelaku saat mengejek • Lawan dari kekerasan adalah... • Lawan dari kata penindas adalah • Proses belajar mencegah bullying • Pelaku merasa lebih... dari korban • pelaku tindakan bullying disebut... • Tindakan untuk menghentikan bullying • Penyelesaian masalah tanpa kekerasan • Kata lain dari pelecehan atau hinaan • Sikap tidak peduli terhadap bullying • ...
Stay-at-home_IT-Security 2016-05-18
Across
- Programm, das Dritten erlaubt einen PC fernzusteuern.
- Programme, die im Hintergrund laufen und Viren aufspüren.
- Missbräuchliche Verwendung personenbezogener Daten
- Erfolgt durch Passwort, PIN oder Fingerabdruck
- Das sind kleine Textdateien, die Informationen über besuchte Webseiten beinhalten.
- Datensicherung
- Sollen mindestens 8 Buchstaben,Zahlen und Sonderzeichen enthalten
- Ausspionieren von vertraulichen Informationen durch Freundlichkeit, Hilfsbereitschaft, Autoritätshörigkeit...
- Informationsbeschaffung durch Beobachtung bei der Eingabe von Daten wie PINs oder Passwörter.
Down
- Versteckt Viren im Betriebssystem, dass sie von Antivirenprogrammen nicht entdeckt werden.
- E-Mail-Anhänge
- Zur Authentifizierung des Benutzers
- Das sind Programme, die dem Benutzer Werbung zeigen und weitere Software installieren.
- Programme, die Tastatureingaben mitprotokollieren, so gelangen Hacker an Passwörter.
- Automatisierte Computerprogramme für den Versand von Spam- oder Phishingmails
- Kartenlesegerät wird bei Geldautomaten montiert.
- Entwendung von Daten, die unachtsam weggeworfen wurden.
- Der Versuch, über gefälschte Webseiten und E-Mails an persönliche Daten zu gelangen.
18 Clues: E-Mail-Anhänge • Datensicherung • Zur Authentifizierung des Benutzers • Erfolgt durch Passwort, PIN oder Fingerabdruck • Kartenlesegerät wird bei Geldautomaten montiert. • Missbräuchliche Verwendung personenbezogener Daten • Programm, das Dritten erlaubt einen PC fernzusteuern. • Entwendung von Daten, die unachtsam weggeworfen wurden. • ...
Security Operations Block 2 2023-03-30
Across
- ALCs 6 and 7 are assigned to material in "______" form that cannot be physically inventoried but must be electronically inventoried by KMI certified components
- refers to measures and controls taken to deny unauthorized persons information derived from information systems of the Unite States Government.
- all corners and openings must be sealed using "___-_____" tamper evident tape or serialized tamper seals
- automated inventory system providing all base retail activities with supply and property accounting
- briefs personnel requiring cryptographic access at temporary duty (TDY) locations before they leave their home station (or upon arrival at TDY location if there is a time constraint)
- Send requests for disposition instructions action to the _______
- The STE is releasable to Canada, United Kingdom, Australia, and New Zealand
Down
- appoints a qualified KOAM and at least one alternate KOAM for each COMSEC account
- A cryptoperiod is the length of time each individual key setting/segment/page/table is authorized for use.
- zeroize or remove the associated ECC for all terminals during this process
- is the transfer (to another account or return to a distribution agency) or destruction of COMSEC material
- Applies to personnel who have their security clearance eligibility revoked, have their special access denied, or are removed for cause
- ALCs 1, 2, and 4 are assigned to material that must be "______" inventoried by the KOAM
- material that assists in securing telecommunications and is required in the production, operation, or maintenance of COMSEC systems and their components
- The destruction official and a "_____"ing official must sign destruction reports, subject to the following rules
- add accountable COMSEC material to an inventory, block the entry up to (but not including) the day/shift the item will be added using a color pen/marker as designated in the KOAM's SOP
- must be an officer, warrant officer, or noncommissioned officer E-6 or higher or a civilian General Schedule (GS)-7 or higher
- Individual who manages the COMSEC resources of an organization.
18 Clues: Individual who manages the COMSEC resources of an organization. • Send requests for disposition instructions action to the _______ • zeroize or remove the associated ECC for all terminals during this process • The STE is releasable to Canada, United Kingdom, Australia, and New Zealand • ...
Security Awareness Crossword Puzzle 2021-09-15
Across
- when a person tags along with another person who is authorized to gain entry into restricted areas.
- The process of taking plain text and scrambling it into an unreadable format.
- Should be constructed of upper and lower case letters, numbers, and special characters.
- The "I" in the CIA Triad. Protection from unauthorized changes.
- The process or action of verifying the identity of a user or process.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drives.
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- A flaw or weakness in a computer system that could be exploited to violate the systems security.
Down
- Facebook, Twitter, Instagram, etc. (two words)
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- The address of a webpage.
- The "C" in the CIA Triad. Protection of information from unauthorized access.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
- The "A" in the CIA Triad. It ensures authorized users have access.
- A sequence of words or text used to control access to a computer; similar to a password.
- the automated recognition of individuals by means of unique physical characteristics, typically for the purpose of security.
18 Clues: The address of a webpage. • Facebook, Twitter, Instagram, etc. (two words) • The "I" in the CIA Triad. Protection from unauthorized changes. • The "A" in the CIA Triad. It ensures authorized users have access. • The process or action of verifying the identity of a user or process. • The "C" in the CIA Triad. Protection of information from unauthorized access. • ...
data security and integrity 2025-10-07
Across
- check – method to check data has been transferred correctly even or odd
- software that seeks to damage
- method used to ensure entered data is reasonable and meets certain input criteria.
- software that detects and removes spyware programs installed
- digit additional digit appended to a number to check if entered data is error free.
- Reverse process of decryption
- the accuracy, completeness and consistency of data.
- a way of proving somebody or something is who or what they claim to be.
- legitimate-looking emails designed to trick a recipient
- method used to calculate a check digit based on modulus division by 11.
Down
- software or hardware that is between a computer and externalnetwork that
- the privacy of personal information,
- verification method used to check if data transferred has been altered
- illegal access to a computer system without the owner’s permission.
- method used to ensure data is correct by using double entry or visual checks.
- use of unique human characteristics to identify a user
- methods taken to prevent unauthorised access to data
- redirecting a user to a fake website in order to illegally obtain personal data
18 Clues: software that seeks to damage • Reverse process of decryption • the privacy of personal information, • the accuracy, completeness and consistency of data. • methods taken to prevent unauthorised access to data • use of unique human characteristics to identify a user • legitimate-looking emails designed to trick a recipient • ...
Global Security and Terrorism 2026-03-16
18 Clues: [flæɡ] • [əˈwɑːʃ] • [bɪˈweɪl] • [ləˈment] • [jihadist] • [pəˈtroʊl] • [flæʃ.pɔɪnt] • [ɪnˈkwaɪ.ri] • [heɪt spiːtʃ] • [ˈɪn.ʌn.deɪtid] • [ˈskruː.t̬ən.aɪz] • [ɪkˈstriː.mɪ.zəm] • [ɪnˈflæm.ə.tɔːr.i] • [ˈboʊ.ɡəs əˈkaʊnt] • [dɪs.ɪn.fɚˈmeɪ.ʃən] • [wait suːˈprem.ə.sɪst] • [ˌmɪt̬.əˈɡeɪ.ʃən ˈmɛʒərz] • [nuː.kliː. əˌnaɪ.əˈleɪ.ʃən]
FSB Crossword Puzzle 2020-06-17
Across
- Who is our Conway Market President/CEO?
- How may locations are in the Conway Market?
- When did FSB expand into Clinton and Vilonia?
- When did we launch Only in Ark.com?
- How many employees does FSB have?
- When did FSB acquire Crew's and Associates?
- What was FSB Conway's name before we merged with Searcy?
- How many locations does FSB have?
- How many sons does Reynie Rutledge have?
- Who is our Kids Club Mascot
Down
- When did the Rutledge Family purchase First Security Bank?
- what location is our newest in the state?
- Who is our Gold Club Director?
- When did we expand into Mayflower?
- How many employees does FSB have?
- billion, What is the banks asset size?
- When was the Teal Grill introduced?
- When did First Security Bank get its charter?
18 Clues: Who is our Kids Club Mascot • Who is our Gold Club Director? • How many employees does FSB have? • How many employees does FSB have? • How many locations does FSB have? • When did we expand into Mayflower? • When did we launch Only in Ark.com? • When was the Teal Grill introduced? • billion, What is the banks asset size? • Who is our Conway Market President/CEO? • ...
Travel 2023-05-09
18 Clues: padi • pagas • sadam • sadam • kohver • karistus • vahekäik • käsipagas • pardapääse • tolliametnik • reisiterminal • trahv, trahvima • välis-, ülemere- • sihtkohta jõudma • turvakontrolli läbima • deklareerima, kuulutama • võõrastemaja, noortehotell • registreerima, lennujaamas/ hotellis
food and animals 2017-10-31
9 Clues: i love chicken • lab we are there • it is a cold time • lion are very big • we are using chrome • love to other people • we buy food at the shop • we have security gaurds • i go and wash my hands at the bathroom
CRIMINOLOGY 2 2022-05-20
EC- SP 4 Voc 6.1-6.4 2024-04-24
13 Clues: delay • infer • belief • coexist • equality • punctual • ideology • treatment • punishment • safety,security • to treat people • career opportunity • education or training
chapter 8 2015-04-06
Across
- / The Trust Services Framework reliability principle that states personal information should be protected from unauthorized disclosure is known as____
- / A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system, is known as a(n) _________
- / If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack, then security is________
- /_______ specifies the structure of packets sent over the internet and the route to get them to the proper destination.(2words)
- / ________ is/are an example of a preventive control.
- / Restricting access of users to specific portions of the system as well as specific tasks, is an example of _________
- / The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as ______
- / The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as_________
Down
- / the primary means of protecting data stored in a cloud from unauthorized access.
- / Virtualization refers to the ability of running _____ systems simultaneously on one physical computer.
- / process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as _________filtering (2words)
- / _________authentication involves the use of two or more basic authentication methods.(2words)
- / Information security procedures protect information integrity by _________ fictitious transactions.
- / ________ is/are an example of a detective control.(2words)
- / _______ teams is an example of a corrective control? (2words)
- / The Trust Services Framework reliability principle that states that users must be able to enter, update, and retrieve data during agreed-upon times is known as _________
- / awareness _______is one of preventive controls that is necessary to provide adequate security for social engineering threats?
17 Clues: / ________ is/are an example of a preventive control. • / ________ is/are an example of a detective control.(2words) • / _______ teams is an example of a corrective control? (2words) • / the primary means of protecting data stored in a cloud from unauthorized access. • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
FICO Scores 2025-03-05
Across
- transunion, experian, equifax
- when an asset loses value over time
- lowest score on the FICO scale
- money you pay back for the use of borrowing money
- something used as security for a loan
- when an asset goes up in value over time
Down
- when you fail to repay a loan on time
- when you have to put down a security deposit
- a number between 300-850
- making fixed payments on a loan
- highest score on the FICO scale
- the amount of time you have to pay back a loan
- Fair Isaac and Company
- the amount of the loan including taxes and fees
- student loans through FAFSA
- when an item is worth less than what you owe
16 Clues: Fair Isaac and Company • a number between 300-850 • student loans through FAFSA • transunion, experian, equifax • lowest score on the FICO scale • making fixed payments on a loan • highest score on the FICO scale • when an asset loses value over time • when you fail to repay a loan on time • something used as security for a loan • when an asset goes up in value over time • ...
Hasan Khan 2017-06-01
Across
- a poor diet and lack of exercise leads to this
- not doing something
- food measured in heat units
- The eating disorder that is described by vomiting or swollen ruptured esophagus
- disease: a disease that cannot be be passed down from one person to another
- when you starve yourself
- someone who witnesses bullying
- disease: the number 1 killer of Americans
- What is passed down
Down
- the date rape drug
- something that changes the way you feel or think
- illness; when your brain is sick
- blood alcohol content
- your drunk
- a resistance to a drug
- disease: a disease that can be passed down from one person to another
- Iphigenia: the mental illness where you see or hear things
- the active ingredient in tobacco
- making fun of someone or physically hurting them
- bullying: bullying someone online
- a mind altering drug and active ingredient found in marijuana
21 Clues: your drunk • the date rape drug • not doing something • What is passed down • blood alcohol content • a resistance to a drug • when you starve yourself • food measured in heat units • someone who witnesses bullying • illness; when your brain is sick • the active ingredient in tobacco • bullying: bullying someone online • disease: the number 1 killer of Americans • ...
PDHPE content 2016-08-23
Across
- what you use to chew
- 1 in 5 people get it
- the organ you breath with
- an unwanted behaviour
- thin strands found on your scalp- if you don't have it you are called bald
- what you use to hear
- the organ used to pump blood to the rest of your body
- something that makes your life harder
- rough organism found in mouth used to taste
- dogs love to chew on them
Down
- a disease caused by you eating to many foods high in sugar or fat
- sheep meat
- what you get when you do strenuous exercise like lifting weights
- bullying online using social sites
- what you use to eat
- a sweet garial which is bad for your teeth
- another word for worried
- the organism you see with
- meat that comes from a cow
- what you use to smell
20 Clues: sheep meat • what you use to eat • what you use to chew • 1 in 5 people get it • what you use to hear • an unwanted behaviour • what you use to smell • another word for worried • the organ you breath with • the organism you see with • dogs love to chew on them • meat that comes from a cow • bullying online using social sites • something that makes your life harder • ...
Thankful for this Crossword 2023-10-28
Across
- Pilgrims' ship
- Dinner ____ (type of bread)
- Turkey noise
- Festival of lights, falls on November 12th
- Last course
- A symbol of plenty
- You pull and push these at a meal
- Moving displays in NYC
- Savory stew with a crust... common Flik dinner
- Supper
- _______ sauce
- What goes on potatoes
- When clocks fall back, with Savings
- Holiday on November 11th, with Day
- What happens the week before November break
- Ingredient made from bread cubes, herbs, etc.
- How we feel on on the fourth Thursday of November
- Black _____
Down
- Who comes over on the fourth Thursday
- _____ Monday
- Corn____
- Candied ____
- All ____ Day
- Event that only happens every four years, with Day
- Green bean ____
- Weeks between the two end-of-year breaks
- Bird eaten in November
- Orange root veg
- Macy's has one
- November holiday
- Style of spuds
31 Clues: Supper • Corn____ • Last course • Black _____ • _____ Monday • Turkey noise • Candied ____ • All ____ Day • _______ sauce • Pilgrims' ship • Macy's has one • Style of spuds • Green bean ____ • Orange root veg • November holiday • A symbol of plenty • What goes on potatoes • Bird eaten in November • Moving displays in NYC • Dinner ____ (type of bread) • You pull and push these at a meal • ...
NORMA 2024-01-14
Across
- Tanggung jawab menjaga kelestarian lingkungan?
- Asas hukum yang menjunjung tinggi keadilan dan kebenaran?
- Norma etika dalam penggunaan teknologi informasi?
- Norma dalam mengelola konflik secara damai?
- Ketaatan terhadap norma keselamatan di tempat kerja?
- Kewajiban dan hak yang dimiliki oleh warga negara disebut?
- Tanggung jawab individu terhadap kepentingan bersama disebut?
- Nilai moral yang dijunjung tinggi dalam masyarakat disebut?
- Kesepakatan bersama mengenai perilaku yang dianggap benar disebut?
- Norma yang mengatur hubungan antarindividu dalam masyarakat?
Down
- Sikap saling menghargai dalam keberagaman budaya
- Tanggung jawab individu terhadap diri sendiri dan masyarakat?
- Hak asasi manusia yang perlu dijunjung tinggi?
- Apa istilah untuk aturan tertulis yang diatur oleh pemerintah?
- Kesetaraan hak dan peluang bagi semua warga negara disebut?
- Nilai yang diyakini dan dijunjung tinggi dalam suatu masyarakat?
- Norma yang menjamin kebebasan berserikat disebut?
- Larangan diskriminasi berdasarkan jenis kelamin disebut?
- Norma agama yang menjadi pedoman hidup?
- Norma yang melarang korupsi dan penyalahgunaan kekuasaan
20 Clues: Norma agama yang menjadi pedoman hidup? • Norma dalam mengelola konflik secara damai? • Hak asasi manusia yang perlu dijunjung tinggi? • Tanggung jawab menjaga kelestarian lingkungan? • Sikap saling menghargai dalam keberagaman budaya • Norma etika dalam penggunaan teknologi informasi? • Norma yang menjamin kebebasan berserikat disebut? • ...
ADSI-Jaider Camilo Benavides Villamil 2022-05-05
Across
- keyword to make the content of the page in html
- javascript cross platform library
- programming language for graphic design
- object oriented programming language
- Set of basic pc programs
- They are the physicals parts of a pc
- term used to call an object by its id
- keyword to make an action when the mouse press
- term given to the cyber attack that denies access to the legitimate user
- keyword to make titles in html
Down
- term used for the science that studies online safety
- software package used by mysql
- Action to develop an application or web page
- keyword to hide a content
- keyword to show a content
- conversion of data to a graphic section
- keyword to make line breaks in html
- abbreviation for technology that is being developed
- programming language for web development
- database management system
- keyword to develop functions in html
21 Clues: Set of basic pc programs • keyword to hide a content • keyword to show a content • database management system • software package used by mysql • keyword to make titles in html • javascript cross platform library • keyword to make line breaks in html • object oriented programming language • They are the physicals parts of a pc • keyword to develop functions in html • ...
fundmentals of thecnolocey 2023-08-28
Across
- or data which can be accessed when needed
- sure a person is who they say they are
- used to determine user privileges or access levels to the system
- to or damage sensitive information on a computer
- ransomware and the numerous other programs used by hackers to gain
- information is protected
- or weakness which undermines an organization’s security efforts
- an individual or organization has over information and how it is used
- of being private or secret
Down
- of being complete or uncorrupted
- rules
- of doing harm
- which have been programmed to carry out malicious intent
- assessment of potential threats to an organization’s security
- for "malicious software" and covers threats such as viruses, worms, Trojan
- of computers and devices managed as a unit with the same procedures
- Virus
17 Clues: rules • Virus • of doing harm • information is protected • of being private or secret • of being complete or uncorrupted • sure a person is who they say they are • or data which can be accessed when needed • to or damage sensitive information on a computer • which have been programmed to carry out malicious intent • assessment of potential threats to an organization’s security • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
The Positive Work Conditions 2025-11-17
Across
- Long-term growth direction and advancement opportunities
- Medical, allowances, perks, incentives, and non-cash rewards
- Monthly financial compensation and perceived fairness
- Leadership behavior, decisions, and culture setting
- Role clarity, workload, autonomy, challenge, and meaning
Down
- Physical and psychological workspace conditions
- Job security, safety, stability, and risk protection
- Processes, clarity, structure, workflows, and policies
- Direct supervisor relationship and support
- Equity, consistency, justice, and transparent decisions
- Skill-building, learning, and capability improvement
11 Clues: Direct supervisor relationship and support • Physical and psychological workspace conditions • Leadership behavior, decisions, and culture setting • Job security, safety, stability, and risk protection • Skill-building, learning, and capability improvement • Monthly financial compensation and perceived fairness • ...
Organelles 2017-12-06
18 Clues: grass • city hall • factories • city wall • powerplant • garbage men • Traffic cops • FedEx trucks • cellular FedEx • Security guards • railroad tracks • city limit sign • street sweepers • cellular highway • cellular highway • solar power plant • “Recycling center” • water storage facility
Col's 80th Birthday 2022-12-16
Across
- Middle Child
- Labourer, What did I do while working for Frank Tydd (8,9)
- Where did I repair mowers
- Easy one. Wife's name
- Name of security company
- Drink, What did the factory I worked at produce? (4,5)
- Officer, What did I hold as an honorary position before holding a qualified position? (9,7)
- Another place I repaired mowers at
Down
- Where was the Preston Mine Sit-In held?
- Youngest Child
- Oldest Child
- Guard, What job had a tell tail blue shirt? (8,5)
- Five, How many days underground did I spend at the Preston Sit-In? (5,4)
- Day, Day of the year I was born (6,3)
14 Clues: Middle Child • Oldest Child • Youngest Child • Easy one. Wife's name • Name of security company • Where did I repair mowers • Another place I repaired mowers at • Day, Day of the year I was born (6,3) • Where was the Preston Mine Sit-In held? • Guard, What job had a tell tail blue shirt? (8,5) • Drink, What did the factory I worked at produce? (4,5) • ...
test 2021-08-16
Across
- One of our IPS Platforms
- Technology architecture that scale as per demand
- Find vulnerabilities in applications while they are running in production (Abbr)
- Cloud TCO Savings tool
- Elastic and Flexible Assets
- Mechanism that makes blockchain very resistant to tampering
- One of the CIA Triad
Down
- iPaaS Platform and Accenture Alliance
- One of the 5 R’s in Cloud Migration Strategy
- In Depth Concept of multiple layers of failsafes (3 Words)
- Appraoch that Integrate security into the rapid-release cycles that are typical of modern application development and deployment
- Smallest unit of a bitcoin
- Outermost security layer in Defence in Depth Approach
- One of the MAAG
14 Clues: One of the MAAG • One of the CIA Triad • Cloud TCO Savings tool • One of our IPS Platforms • Smallest unit of a bitcoin • Elastic and Flexible Assets • iPaaS Platform and Accenture Alliance • One of the 5 R’s in Cloud Migration Strategy • Technology architecture that scale as per demand • Outermost security layer in Defence in Depth Approach • ...
JOBS 2024-08-28
Across
- Sells food or different products in a small shop
- Can sell different items in a shop
- Works for the security of citizens, makes law being respected
- Likes making plants and vegetables grow
- Must precisely know what justice is about
- Makes bread or pastries
- Works outside, surrounded by trees, flowers
- Works in schools, learns to pupils
Down
- Operates on people in hospitals
- Makes sure nobody causes troubles in a bank, a supermarket
- Looks after animals, walks them and feeds them
- Takes care of people at home, or in hospitals
- Must always check he's got the right numbers
- Cuts fabric and sews to make clothes
14 Clues: Makes bread or pastries • Operates on people in hospitals • Can sell different items in a shop • Works in schools, learns to pupils • Cuts fabric and sews to make clothes • Likes making plants and vegetables grow • Must precisely know what justice is about • Works outside, surrounded by trees, flowers • Must always check he's got the right numbers • ...
Not All MFA Is Equal 2025-06-12
Across
- Abbreviation for Time-based One-Time Password
- Text-based codes sent to your phone
- Two-____Verification
- Not all MFA is _________ (title of the newsletter)
- Answers to ________ questions are easy to look up on social media or social engineer.
- A password or PIN is something you _______
- A device frequently used for MFA
Down
- Unique personal trait like your face or fingerprint
- A secret word or phrase you must know to log in
- A kind of security token
- Abbreviation for Multi-Factor Authentication
- A convenient MFA method used by TaxHawk
- A physical MFA device, like a Google Titan Key
- A hardware token is something you _________
14 Clues: Two-____Verification • A kind of security token • A device frequently used for MFA • Text-based codes sent to your phone • A convenient MFA method used by TaxHawk • A password or PIN is something you _______ • A hardware token is something you _________ • Abbreviation for Multi-Factor Authentication • Abbreviation for Time-based One-Time Password • ...
The WSJ Daily Crossword 2024-06-02
14 Clues: Journal • Treasure • Children • The artic • Terrorism • Star wars • Asian flue • Gen Therapy • Infrestructure • Breacking News • Money managment • The black market • security policies • Underrepresentation
Profession 2024-10-09
14 Clues: Gym • Store • Stage • Garage • Vehicle • Building • Meat shop • Art studio • Restaurant • Barber shop • Business place • Tourist place • Office or Field • Malls or office
Profession 2024-10-09
14 Clues: Gym • Store • Stage • Garage • Vehicle • Building • Meat shop • Art studio • Restaurant • Barber shop • Business place • Tourist place • Office or Field • Malls or office
Aeropuerto y Viajes 2025-05-01
15 Clues: Time • Fasten • Screen • Airline • Customs • Check-in • Passport • Air Ticket • To check in • Local Flight • Security Check • Security Check • National Flight • Prohibited Items • International Flight
Julia Zorrilla, block 6 2024-05-09
Across
- Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
- Is a security that pays interest over terms ranging from 2-10 years.
- Means that money is the common measure of worth or price of a good.
- Is the process of transferring from one individual/organization to another.
- Is money used in exchange for goods and services needed by individuals and governments.
- Allows customers to pay for a purchase directly from their checking account.
- Is a security that matures in a year or less.
Down
- Is a transfer of money from one bank account to another one.
- Means money can also be save and stored for later.
- Is the mechanism a nation uses to provide and manage money for itself.
- Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
- Is the name of currency in the U.S
- Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
- Is the state of being or feeling secure; freedom from fear, anxiety, and danger.
14 Clues: Is the name of currency in the U.S • Is a security that matures in a year or less. • Means money can also be save and stored for later. • Is a transfer of money from one bank account to another one. • Means that money is the common measure of worth or price of a good. • Is a security that pays interest over terms ranging from 2-10 years. • ...
SN33003FP Chapter 2 Crossword 2024-07-03
Across
- Prevents disclosure of information to unauthorized people, also known as privacy
- Defines security objectives, behavioral rules, and system requirements to secure assets
- Provides technical direction for implementing and configuring technology to fulfill policy directives
- Relates to organization's cybersecurity policies, procedures, and guidelines set by upper management
- Focuses on protecting all states of data: at rest or in storage, in transit, or in process
- The goals to protect cyberspace, including confidentiality, integrity, and availability (CIA Triad)
- Data being sent from one device to another
Down
- Making security awareness part of employee onboarding and ongoing training
- Software, hardware, network, and cloud-based tools used to safeguard an organization's assets
- Accuracy, consistency, and trustworthiness of data throughout its lifecycle
- Ensures access to information systems and services at all times
- Data during input, modification, computation, or output stages
- Identifies expertise required for protection, including technology, policies/procedures/guidelines, and people
- Stored data retained on storage devices when not actively used
14 Clues: Data being sent from one device to another • Data during input, modification, computation, or output stages • Stored data retained on storage devices when not actively used • Ensures access to information systems and services at all times • Making security awareness part of employee onboarding and ongoing training • ...
Crossword Puzzle 2023-02-16
unit 3 2022-04-21
18 Clues: vám • kapu • talán • késik • jóslat • utasok • rémálom • tetőterasz • konferencia • érkezési kapuk • indulási kapuk • átvesz, befogad • csomagkiadó (2 szó) • beszáll a repülőgépbe • biztonsági ellenörzés • csatlakozó járat (2 szó) • megbeszél egy nappot (3 szó) • agresszív közúti magatartás (2 szó)
People Connection Center 2020-03-17
Across
- Where would you find FAQ about Paychecks?
- is a Team Member of HR.
- _____is a Field Operations Manager.
- _____is a common type of cyber-attack.
- For a current list of Policies, what page do you visit?
- ___is a Account Service Coordinator
- The Associate Referral Program can be found on what page?
- What page did you find this puzzle?
Down
- Does your driver license have a ____ on it?
- Interested in Pet Insurance? Where do you find the link?
- What is the last name of a new team member for February?
- ____is a Call Administrator
- What PCC Page can you find the 2020 Holiday Calendar?
- The "C" in CREW represents?
14 Clues: is a Team Member of HR. • ____is a Call Administrator • The "C" in CREW represents? • _____is a Field Operations Manager. • ___is a Account Service Coordinator • What page did you find this puzzle? • _____is a common type of cyber-attack. • Where would you find FAQ about Paychecks? • Does your driver license have a ____ on it? • ...
M&L_DRAFT_1 2016-02-02
Across
- Entry on the left side of an account
- The date on which a debt becomes due or the termination date on which an installment loan must be repaid in full
- Business contract in which a borrower agrees to pay interest for the use of the lenders funds
- Money paid by the borrower for the use of the lender's funds
- It is a kind of security which one offers for taking an advance or loan from someone
- Code help uniquely identifies a specific securities issue
- A financial institution that holds customers' securities for safekeeping
- The difference between prices at which a market maker can buy and sell a security
- A slang term used by mortgage-backed securities (MBS) traders and investors to refer to an MBS that is seasoned over some time period
Down
- It is an independent, unaffiliated research company that rates fixed income securities
- A person licensed to sell or lease real property, acting as an agent for others
- Federal National Mortgage Association
- When a customer refuses to pay the rest of amount due on a loan
- Arrangement of characters representing a particular security listed on an exchange
- Distribution of a portion of a company's earnings
15 Clues: Entry on the left side of an account • Federal National Mortgage Association • Distribution of a portion of a company's earnings • Code help uniquely identifies a specific securities issue • Money paid by the borrower for the use of the lender's funds • When a customer refuses to pay the rest of amount due on a loan • ...
Robotics 2017-02-09
Across
- You need to do this to make your robot carry out a command?
- A film that includes robots?
- A repetitive task carried out by robots?
- A high precision task carried out by a robot?
- A dishwasher is this type of machinery?
- The Cyber men come from this T.V series?
Down
- A sensor to help your robot to move?
- A car company that makes robots?
- Your robot needs this to navigate?
- A film that included a small boy as a robot?
- The name given to a metal when it is mixed with another?
- A metal used to make robots?
12 Clues: A film that includes robots? • A metal used to make robots? • A car company that makes robots? • Your robot needs this to navigate? • A sensor to help your robot to move? • A dishwasher is this type of machinery? • A repetitive task carried out by robots? • The Cyber men come from this T.V series? • A film that included a small boy as a robot? • ...
Hope crossword 2021-12-09
Across
- the ability to cover a distance in a short time
- a brain injury that occurs when blows to the head causes the brain to crash into the bones of the skull
- type of stretching the military use
- amount of force put in periods without tiring
- the greatest component of health
- the usage of eye, hand and foot movements
Down
- a type of stretching with movements
- a behavior that involves firm verbal statements
- bullying with technology
- the test of cardio respiratory endurance
- the first letter of SMART
- doing this before exercise prevents injury
12 Clues: bullying with technology • the first letter of SMART • the greatest component of health • a type of stretching with movements • type of stretching the military use • the test of cardio respiratory endurance • the usage of eye, hand and foot movements • doing this before exercise prevents injury • amount of force put in periods without tiring • ...
Database User Administration & Security Crossword 2025-08-26
Across
- Users connecting from outside the local server
- Database object used to enforce user restrictions and resources
- Connection between two databases to share data
- Management task: Updating details of existing users
- SQL statement used to give user permissions
- Removing access of a user permanently
- Collection of permissions grouped for assignment
Down
- Process of verifying identity of a user before access
- Predefined accounts available in DBMS
- SQL statement used to take back permissions
- Recommended practice: separating duties for better security
- Feature in SQL Server for connecting external servers
- Security measure that enforces rules for account credentials
- A connection configuration for servers to communicate
- SQL command used to give a user a role
15 Clues: Predefined accounts available in DBMS • Removing access of a user permanently • SQL command used to give a user a role • SQL statement used to take back permissions • SQL statement used to give user permissions • Users connecting from outside the local server • Connection between two databases to share data • Collection of permissions grouped for assignment • ...
Test 2025-09-30
Across
- — Secondary copy to restore data after loss or attack
- — Tool that detects and removes malicious code
- — Encrypted tunnel that protects traffic over untrusted networks
- — Install latest software versions for security/features
- — Filters network traffic by rules to block threats
- — Tricking users into revealing info via fake messages
- — Malicious software (virus, worm, trojan, ransomware)
- — Information that needs protection from loss/theft
Down
- — Scrambles data so only authorized parties can read it
- — Common attack vector for scams and payloads
- — Any endpoint (laptop/phone) connecting to a network
- — Unsolicited/bulk messages often carrying scams
- — Software fix that closes security holes
- — Secret used to verify identity; should be strong/unique
- — Person who exploits systems (ethical or malicious)
15 Clues: — Software fix that closes security holes • — Common attack vector for scams and payloads • — Tool that detects and removes malicious code • — Unsolicited/bulk messages often carrying scams • — Filters network traffic by rules to block threats • — Information that needs protection from loss/theft • — Person who exploits systems (ethical or malicious) • ...
Duolingo Stories -124 : The Exhibition 2022-10-15
15 Clues: warm • line • after • famous • leather • outside • to go in • for hours • to let in • it's cold • to the end • exhibition • a long time • security guard • you're kidding
Hotel crossword puzzle 2024-05-01
15 Clues: Taman • Koper • Masuk • Keluar • Pelayan • Keamanan • Pemesanan • Ruang santai • Kasur tambahan • Biaya Tambahan • Kamar tipe VIP • Kamar mandi uap • Ruang pertemuan • Meja resepsionis • Paket yang ditawarkan hotel
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
about computers 2022-11-22
Across
- local area network
- the brain of the computer
- allow users to collaborate
- a device use to put and get out information out of a computer
- dealing with strangers on the interact
- wide area network
- when someone uses your account to see your private information
- junk message that sent in bulk
- a data storage device
Down
- drive to keep your own information in it
- a network security that keeps what goes in and what goes out
- Security network use to protect the computer from the outside
- use copyright law permitted by a limited use
- a hardware unit use to connect and function as a part of a larger system
- short term memory storage
- kind of like copyright but it's not illegal
- thing that plugs into the usb fort of a computer
- like plagiarism but it's illegal
- storage device
19 Clues: storage device • wide area network • local area network • a data storage device • the brain of the computer • short term memory storage • allow users to collaborate • junk message that sent in bulk • like plagiarism but it's illegal • dealing with strangers on the interact • drive to keep your own information in it • kind of like copyright but it's not illegal • ...
Crossword Puzzle - Managed Edition 2024-09-27
Across
- Available for MFAP but not other Managed Accounts
- The one trading on the account's best interest
- Process of replacing a security in an asset allocation
- Soft closed product
- Realigns asset weightings
- Consists of series of checkpoints before account can be released for trading
- Where advisors create and maintain models
- Can be entered as security or sectors
- Consists of client's financial profile and investment experience and objectives
- A party role for Joint Account
- Customizable asset allocation and flexible model
- Offers access to Taxable and municipal bond portfolios
Down
- Change in Account ownership an / or strategy for CSP
- A Party Role for UTMA
- Designed to be short term account and no BUYS are permitted.
- Must be met when funding managed accounts
- Good for 60 days
- Used to copy all existing holdings and % to a new model
- Min program10K, 250K and 750K
19 Clues: Good for 60 days • Soft closed product • A Party Role for UTMA • Realigns asset weightings • Min program10K, 250K and 750K • A party role for Joint Account • Can be entered as security or sectors • Must be met when funding managed accounts • Where advisors create and maintain models • The one trading on the account's best interest • ...
ITS OLYMPICS 2025-09-18
Across
- Measures to protect computers, networks, and data
- Being responsible for one’s actions
- Assigning tasks to others effectively
- Software installed on a computer to perform tasks
- Working from a distance using technology
- Transferring data from your device to the internet or server
- A storage container for documents or data
- Understanding and sharing the feelings of others
- Ability to see and plan for the future
- Online meeting platform
- A web link that directs you to another page or file
Down
- Ensuring only authorized users can access a system
- The ability to use technology regardless of ability or disability
- Programming language used to make web pages interactive
- Security process requiring two steps to verify identity
- Ability to recover from setbacks or challenges
- Working together toward a common goal
- A program designed to harm or steal data
- Information given to improve performance
19 Clues: Online meeting platform • Being responsible for one’s actions • Assigning tasks to others effectively • Working together toward a common goal • Ability to see and plan for the future • Working from a distance using technology • A program designed to harm or steal data • Information given to improve performance • A storage container for documents or data • ...
Roberson Chapter 3 2013-06-09
Across
- ___________ warning
- Court order
- Rodney _______
- Diplomatic ___________ (plural)
- recording an arrest
- Tennessee v. ____________
- __________ v. Bedinger
- _________ level stop
Down
- Federal Bureau of Investigation
- ________________ suspicion
- stop and _________
- Department of _________ Security
- ______________ detention
- Searches and __________
- __________ v. Municipal Court of
- A seizure
- Tom __________
- ________ pursuit
18 Clues: A seizure • Court order • Rodney _______ • Tom __________ • ________ pursuit • stop and _________ • ___________ warning • recording an arrest • _________ level stop • __________ v. Bedinger • Searches and __________ • ______________ detention • Tennessee v. ____________ • ________________ suspicion • Federal Bureau of Investigation • Diplomatic ___________ (plural) • ...
Cruciverba - Puntata 19 2025-12-02
Across
- La copia di sicurezza dei vostri dati
- La combinazione che usi come prima linea di difesa
- L'antivirus che protegge i nostri dispositivi
Down
- Vi sembra un video reale? Attenti a non cascarci!
- Vi blocca, vi ricatta e minaccia di pubblicare i vostri dati
- L'esca digitale creata per farvi abboccare
- Il nostro cyber gufo
7 Clues: Il nostro cyber gufo • La copia di sicurezza dei vostri dati • L'esca digitale creata per farvi abboccare • L'antivirus che protegge i nostri dispositivi • Vi sembra un video reale? Attenti a non cascarci! • La combinazione che usi come prima linea di difesa • Vi blocca, vi ricatta e minaccia di pubblicare i vostri dati
Zero-Security Crossword 2013-08-11
Across
- term used for a white hat hacker is an ____ hacker
- someone who uses hacking to pursue ideological ends
- Adrian Lamo "the ___ hacker"
- 1983 hacker movie
- web sites use these to identify users who revisit their site
Down
- sequence of steps needed to solve logical or mathematical problems
- this prevents computers on a network from communicating directly with external computer systems.
- software used to record keystrokes
- Creator of the first worm (Robert Tappan ____)
- software program that monitors network traffic
- virus detection program that searches for viruses
- A flaw in a system that allows hackers to break in
12 Clues: 1983 hacker movie • Adrian Lamo "the ___ hacker" • software used to record keystrokes • Creator of the first worm (Robert Tappan ____) • software program that monitors network traffic • virus detection program that searches for viruses • term used for a white hat hacker is an ____ hacker • A flaw in a system that allows hackers to break in • ...
computer security puzzle 2020-08-18
Across
- stops your device from running properly
- something your computer can get
- to get into something
- a malware program
- a type of software
- operating information used by a computer
Down
- made to detect and destroy viruses
- causes harm to a computer system or network
- to pass from one thing to another
- having caution over something
- when a device has been harmed
- files that become inoperable or unusable
12 Clues: a malware program • a type of software • to get into something • having caution over something • when a device has been harmed • something your computer can get • to pass from one thing to another • made to detect and destroy viruses • stops your device from running properly • files that become inoperable or unusable • operating information used by a computer • ...
Network Security Crossword 2022-07-21
Across
- any piece of software, malicious or not, that displays advertisements on a computer.
- malware that threatens to publish the victims personal data, block access to the computer, unless a ransom is paid.
- malicious software that aims to gather information about a person or organisation.
- a cyberattack that redirects a website’s traffic to another, fake site by installing malware on the computer.
- software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.
- A person who gains unauthorised access to computer files or networks in order to further social or political ends.
Down
- The practice of protecting system, networks and programs from digital attacks
- A person who uses computers to gain unauthorised access to data.
- malware that replicates itself in order to spread to other computers.
- logging what keys people have tapped on the keyboard
- programs which users are tricked into installing under the pretence that they are legitimate and useful.
- A computer program which is hidden within another program (the ‘host’ program). the virus code is only run when the host program is executed.
12 Clues: logging what keys people have tapped on the keyboard • A person who uses computers to gain unauthorised access to data. • malware that replicates itself in order to spread to other computers. • The practice of protecting system, networks and programs from digital attacks • malicious software that aims to gather information about a person or organisation. • ...
Bullying 2022-12-06
Across
- As a victim, bullying is never your...
- Often those who are bullied themselves become...
- Bullying is never by mistake by on...
- Keep this as evidence for when the bully gets caught
- The way for others to know what is happening to you
- A way for the bully to lose interest in you
Down
- A style of bullying is calling you ...
- Bullying can make you feel...
- When bullies spread false information about you
- The type of bullying that happens online
- Staying in these helps you to not face the bully alone
11 Clues: Bullying can make you feel... • Bullying is never by mistake by on... • A style of bullying is calling you ... • As a victim, bullying is never your... • The type of bullying that happens online • A way for the bully to lose interest in you • When bullies spread false information about you • Often those who are bullied themselves become... • ...
CSI Newsletter 2019-03-05
Across
- Who is the CSI agent in charge
- What are automated pre recorded phone messages
- Created to make life easier but are often hacked or monitored
- Device placed in gas pumps to steal consumer data
Down
- A cyber group well known for hacking and wearing masks
- Malicious software that denies access to data in return for payment
- Virtual currency which has an equivalent value in real currency
- Who won the last $50 quiz
- Automated tools used for simple and repetitive tasks
- What credit reporting bureau was hacked recently
- Electronics manufacturer sued for $2.2 million
11 Clues: Who won the last $50 quiz • Who is the CSI agent in charge • What are automated pre recorded phone messages • Electronics manufacturer sued for $2.2 million • What credit reporting bureau was hacked recently • Device placed in gas pumps to steal consumer data • Automated tools used for simple and repetitive tasks • A cyber group well known for hacking and wearing masks • ...
Gossip 2018-01-17
Across
- To say you’re sorry.
- Someone who bullies people online.
- Failure to recognise or to pretend something is not happening.
- Somebody who’s being picked on.
- Resist the urge to _______________ .
- Don’t _____________ anyone who is violent.
Down
- What you wrote about me was really m______ .
- All the gossip that has spread about me cheating in the final exam has ruined my _________ as school captain.
- A response that is more dramatic or greater than necessary.
- Sometimes it’s hard to ____________ the temptation to fight back.
- An attack made as a response to another attack.
11 Clues: To say you’re sorry. • Somebody who’s being picked on. • Someone who bullies people online. • Resist the urge to _______________ . • Don’t _____________ anyone who is violent. • What you wrote about me was really m______ . • An attack made as a response to another attack. • A response that is more dramatic or greater than necessary. • ...
Talk To Me in Cybersecurity 2021-09-16
Across
- Three aspects of management that, when well-coordinated, ensure a company and its people behave ethically, run the business effectively, mitigate risks appropriately and comply with internal policies and external regulations
- A formal and approved list of users who have defined access rights to an asset
- Attempts to disrupt normal traffic of a targeted server, service or network to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources
- Software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
- A technology and business process designed to detect and prevent violations to corporate policies regarding the use, storage, and transmission of sensitive data
- Surveillance software that can record every keystroke made on a computer’s keyboard
- The practice of testing a computer system or network to find vulnerabilities that cybercriminals could exploit
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- Represents a rapidly growing class of non-traditional computing devices that are connected to the internet to drive some sort of intelligent operation
- The psychological manipulation of people into performing actions or divulging confidential information
- Computer program used to prevent, detect, and remove malware
Down
- The U.S. federal agency responsible for developing and maintaining the “Framework for Improving Critical Infrastructure Cybersecurity,” a collection of voluntary guidelines to help organizations manage their information security risks
- Software used to monitor, log, provide alerts and analyze security events to support threat detection and incident response
- Refers to a company security policy that allows for employees’ personal devices to be used in business
- Devices or software designed to find and prevent malicious activity on corporate networks
- Actions a company takes to manage the aftermath of a security breach or cyberattack
- A type of authentication method where the proof of a user’s identity is gained by different independent sources
17 Clues: Computer program used to prevent, detect, and remove malware • A formal and approved list of users who have defined access rights to an asset • Surveillance software that can record every keystroke made on a computer’s keyboard • Actions a company takes to manage the aftermath of a security breach or cyberattack • ...
Human Services Crossword By: Lindsay 2021-12-02
Across
- A _____ guide is under Hospitality and tourism and they hand out pamphlets and schedule group activities.
- This common four year degree is called a _______’s degree and is needed for many jobs.
- Tax examiners explain ___ information to people and companies.
- This job is under law, public safety, corrections, and security and is sometimes called an attorney.
- _______ trainers tech creatures like dogs to do tricks and help them to stop mis-behaving.
- These kind of clerks interview people for things like dog and marriage licenses.
- Coroners investigate the cause of death so the must have a high school ______ along with other schooling.
- Animal control workers enforce the ____ of animal control. Hint: this job is under Law, public safety, corrections and security.
Down
- Teacher aides work with ______ and students in the classroom.
- people under Education and Training guide and _____ young people.
- Tailors use ______ to make articles of clothing
- Crossing _______ direct people and cars at intersection and work zones.
- Law, public _______, corrections, and security.
- People under human services deal with ______ and families to meet their needs.
14 Clues: Tailors use ______ to make articles of clothing • Law, public _______, corrections, and security. • Teacher aides work with ______ and students in the classroom. • Tax examiners explain ___ information to people and companies. • people under Education and Training guide and _____ young people. • ...
Julia Zorrilla, block 6 2024-05-09
Across
- Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
- Is a security that pays interest over terms ranging from 2-10 years.
- Means that money is the common measure of worth or price of a good.
- Is the process of transferring from one individual/organization to another.
- Is money used in exchange for goods and services needed by individuals and governments.
- Allows customers to pay for a purchase directly from their checking account.
- Is a security that matures in a year or less.
Down
- Is a transfer of money from one bank account to another one.
- Means money can also be save and stored for later.
- Is the mechanism a nation uses to provide and manage money for itself.
- Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
- Is the name of currency in the U.S
- Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
- Is the state of being or feeling secure; freedom from fear, anxiety, and danger.
14 Clues: Is the name of currency in the U.S • Is a security that matures in a year or less. • Means money can also be save and stored for later. • Is a transfer of money from one bank account to another one. • Means that money is the common measure of worth or price of a good. • Is a security that pays interest over terms ranging from 2-10 years. • ...
