cyber security Crossword Puzzles
CYBER BULLYING 2024-07-25
7 Clues: the web we share • being safe online • a witness who ignores the bully • someone who control a certain thing • someone who stand up for the victim • a code you make to secure your information • when a hateful person does mean things online
Crossing Cyber 2023-07-27
Across
- It is a way of communicating amongst one another around the world along with expressing oneself through this
- It is a way of insulting or taking control of one's feelings and toying with them
- A type of advancement into society that helps to perform tasks for humans entertainment and/or convenience
Down
- The act of doing something illegal
- A word or phrase that has the ability of hurting a person mentally or emotionally
- A technological device that helps one to do work with a digital means
- The act of invading through one's software and leaking, invading or messing one's personal information
7 Clues: The act of doing something illegal • A technological device that helps one to do work with a digital means • A word or phrase that has the ability of hurting a person mentally or emotionally • It is a way of insulting or taking control of one's feelings and toying with them • ...
Cyber Wellness 2023-02-01
7 Clues: Think before you p_____ • respect peoples o________ • i_________ is needed to do work • we unlock your phone p___________ • info do not reveal your p________I____ • we cannot share our home a______ to others • our personal p____________ is not suppose to be share
Cyber attacks 2023-05-26
Across
- AI-enabled attacks occur when a threat actor uses AI to assist in an attack
- is a blanket term for any kind of computer software with malicious intent.
- is the act of intimidating, threatening, or coercing people online through the use of digital or electronic methods such as social media, email, text messages, or blog posts
Down
- The term vandalism describes the deliberate act of damaging or destroying another person or company's property without their permission.
- theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
- a data breach exposes confidential, sensitive, or protected information to an unauthorized person.
- is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM), or messages posted to a discussion group or forum.
7 Clues: is a blanket term for any kind of computer software with malicious intent. • AI-enabled attacks occur when a threat actor uses AI to assist in an attack • a data breach exposes confidential, sensitive, or protected information to an unauthorized person. • ...
cyber safety 2023-05-22
7 Clues: A disease. • Type of bulling. • Copying someone's work. • Online fights using electronic messages • Sending nasty, mean, and insulting messages. • When someone steals your personal information. • Talking someone into revealing their secrets and sharing them online.
Cyber techniques 2024-11-18
Across
- Examining server and network records to trace unauthorized access
- Working across borders to catch international cybercriminals.
- A phrase used to describe how investigators trace stolen money
- Collaborating with social media and telecom companies for metadata.
Down
- Identifying patterns of suspicious online behavior using Artificial Intelligence
- Recovering lost or hidden data from digital devices
- Analyzing the behavior and tactics of suspects
7 Clues: Analyzing the behavior and tactics of suspects • Recovering lost or hidden data from digital devices • Working across borders to catch international cybercriminals. • A phrase used to describe how investigators trace stolen money • Examining server and network records to trace unauthorized access • ...
cyber ethics 2025-05-21
Across
- it refers to an illegal intrusion into a computer
- it refers to being aware of the ethical practiceswhile using internet
- it is also known as digital dossier
- a licence or copyright is required to copy the genuine programs
Down
- it refers to unwanted bulk emails that come from unknown sources
- it refers to criminal activites that involves the use of internet
- it refers to using the language and thoughts of another person
7 Clues: it is also known as digital dossier • it refers to an illegal intrusion into a computer • it refers to using the language and thoughts of another person • a licence or copyright is required to copy the genuine programs • it refers to unwanted bulk emails that come from unknown sources • it refers to criminal activites that involves the use of internet • ...
Cyber Safety 2021-05-25
Across
- Protect your account by using a strong ______________.
- Someone who uses a computer to gain access to unauthorised access to other's details.
- A ______________ scam is used by online scammers to trick you into giving out your personal information by pretending to come from legitimate sources.
Down
- stop and think before you open attachments and click on ______________.
- Be ______________ when something is too good to be true!
- Do not accept friend requests from ______________.
- Do not give out ______________ information to strangers.
7 Clues: Do not accept friend requests from ______________. • Protect your account by using a strong ______________. • Be ______________ when something is too good to be true! • Do not give out ______________ information to strangers. • stop and think before you open attachments and click on ______________. • ...
Cyber Bulling 2013-09-09
Across
- Physically or emotionally injuring someone.
- A target of social cruelty.
- The most popular social networking system with over 100 million active users making profiles that give off too much personal information
- Intentionally excluding someone from an online group cruelly
Down
- A place where people like to talk on the internet.
- Talking someone into revealing secrets or embarrassing information about someone and then sharing it online
- An agressor or someone who is causing harm.
7 Clues: A target of social cruelty. • Physically or emotionally injuring someone. • An agressor or someone who is causing harm. • A place where people like to talk on the internet. • Intentionally excluding someone from an online group cruelly • Talking someone into revealing secrets or embarrassing information about someone and then sharing it online • ...
Cyber safety 2013-11-03
7 Clues: Copy others work • A person who sees bullying • A person who is being bullied • A form of communication using the internet • Websites that have places to chat and post things • Something that can be harmful to your laptop or computer • A person who uses the internet to intimidate another person
Cyber Burnout 2022-04-18
7 Clues: The online platform. • Addicted to online ___ life. • Feeling ___ from the real world. • Be ___, track your online usage. • Something active you can do offline. • Too much screen time may cause eye___. • Making sure your ___ are not suffering.
CYBER RUN 2024-10-18
Across
- Unauthorized access to data in a system
- A security system controlling network traffic
- A technique used to trick people into giving up sensitive information
Down
- Software designed to disrupt or gain unauthorized access to a system
- The process of converting information into a code to prevent access
- A secret word or phrase used to gain access to a system or account
- A type of malware that replicates and spreads to other computers
7 Clues: Unauthorized access to data in a system • A security system controlling network traffic • A type of malware that replicates and spreads to other computers • A secret word or phrase used to gain access to a system or account • The process of converting information into a code to prevent access • Software designed to disrupt or gain unauthorized access to a system • ...
CYBER BULLYING 2024-07-25
7 Clues: the web we share • being safe online • a witness who ignores the bully • someone who control a certain thing • someone who stand up for the victim • a code you make to secure your information • when a hateful person does mean things online
cyber bully? 2024-07-25
Across
- seek to harm,or intimidate
- person who speaks or acts in support
- person who habitually seeks to harm or intimidate
Down
- www is a system of interconnected public webpages accessible through the Internet.
- the use of technology to harass, threaten, embarrass, or target another person
- person who is present at an event or incidentbut doesnt participate
- Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person
7 Clues: seek to harm,or intimidate • person who speaks or acts in support • person who habitually seeks to harm or intimidate • person who is present at an event or incidentbut doesnt participate • the use of technology to harass, threaten, embarrass, or target another person • www is a system of interconnected public webpages accessible through the Internet. • ...
Cyber Crimes 2025-12-02
Across
- Unwanted or junk messages sent in large numbers, usually for advertising or scams
- theft Stealing someone’s personal information (like their name, ID number, or bank details) and pretending to be them to commit crimes.
- Tricking someone in order to steal their money, personal information, or valuables
Down
- Breaking into a computer system or network without permission to view, change, or steal information.
- Sending fake emails, messages, or websites that look real to trick people into giving away passwords, bank details, or personal information
- Illegally copying or sharing music, movies, software, or other digital content without permission.
- attack When a harmful program (virus) infects a computer, damages files, slows the system, or steals data.
7 Clues: Unwanted or junk messages sent in large numbers, usually for advertising or scams • Tricking someone in order to steal their money, personal information, or valuables • Illegally copying or sharing music, movies, software, or other digital content without permission. • ...
CYBER ETHICS 2025-05-28
Across
- using someone else's work or ideas without giving credit
- the correct and acceptable behaviour when using the internet
- a crime that happens in the internet
Down
- behaving responsibly and being kind and respectful to online communication
- copying digital content without permission
- a code to protect your online informations
- someone who hacks your personal informations
7 Clues: a crime that happens in the internet • copying digital content without permission • a code to protect your online informations • someone who hacks your personal informations • using someone else's work or ideas without giving credit • the correct and acceptable behaviour when using the internet • ...
Module 6 Puzzle 2021-09-29
Across
- Do this to all unneeded programs/software
- Hackers who hack only for legal/ethical purposes
- This should be done to large networks to break them up into more manageable networks.
- The six Ps of security are: ports, patch, _____, probe, policies, & physical
- The process to look for vulnerabilites on a network
- One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
- A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
- Using interpersonal skills to extract information about a computer system and its security
- preferred location for storing backups
- To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
Down
- one of the most prestigious certifications for networking professionals
- A numerical designation for a connection point on a computer
- Someone who attempts to compromise a system to assess its vulnerability
- A reference to how long a user has used a password
- Searching through trash looking for information that might be useful in hacking or identity theft
- checking a target machine to see what ports are open
- The minimum frequency for system probing and audits
- A hacker who hacks into systems to accomplish some goal that they feel is valid and legal
- Perform system patches, probe for flaws, check logs, and review policies
- The most basic rule of computer security is to install these as soon as they are available
20 Clues: preferred location for storing backups • Do this to all unneeded programs/software • Hackers who hack only for legal/ethical purposes • A reference to how long a user has used a password • The minimum frequency for system probing and audits • The process to look for vulnerabilites on a network • checking a target machine to see what ports are open • ...
Cybersecurity 2025-06-29
Across
- Code used to take advantage of a vulnerability
- Isolated environment used to test software safely
- Hidden method to bypass normal authentication
- Malware that hides its presence and grants admin access
- Device that filters network traffic to enhance security
- Malicious software designed to harm or compromise systems
- Network of infected devices controlled remotely
- Deceptive technique to steal confidential information
- Manipulation technique to trick people into giving information
- Detection of unauthorized access or suspicious activity
- Unauthorized access to confidential data
- Process of verifying the identity of a user or device
- Attack that floods a network or server to disrupt service
- Deliberate attempt to damage or access a computer system
- Program that records every keystroke typed
- Impersonation technique to deceive systems or users
- Security method that requires two forms of identification
Down
- Rule-based barrier that blocks or allows network traffic
- Process of converting data into an unreadable format for protection
- Digital file used to prove the identity of a website or user
- Update to fix security vulnerabilities in software
- Malware that encrypts files and demands payment for access
- Software that detects and removes malicious programs
- Virtual private network that encrypts internet connections
- Weakness in a system that can be exploited by attackers
- Function that converts data into a fixed-size string
- Vulnerability unknown to developers and without a fix
- Decoy system used to lure and monitor attackers
- Malware disguised as legitimate software
- Software that secretly collects user information
30 Clues: Unauthorized access to confidential data • Malware disguised as legitimate software • Program that records every keystroke typed • Hidden method to bypass normal authentication • Code used to take advantage of a vulnerability • Network of infected devices controlled remotely • Decoy system used to lure and monitor attackers • ...
Chapter 2 Crossword 2025-11-14
Across
- order order where you want to buy or sell when the stock reaches a certain price
- Policy action taken to manage supply of money and interest rates
- ensures people's accounts up to $250,000
- financial investment issued by a corporation or the government
- Bill security that matures in a year or less
- Bank financial institution that provides services for businesses
- Company For profit buisness that sells insurance produces
- Firm institution involved in trading securities in fiancial markets
- bond security that pays interest over terms of 10-30 years
- Company Makes money by issuing loans
- document guaranteering payment of a specific amount of money (named on document)
- cards allow customers to pay for purchases and withdraw cash
- of value money is a common measure of the worth or price of a good or service
- someone who assists you with purchasing stocks and bonds
- System mechanism a nation uses to provide and manage money for itself
Down
- people who buy shares of stock in the company
- Note security that pays interest over 2 to 10 years
- Market Accounts has low risk/low return
- handles stock sales and purchases
- of value money can be saved and used at later date
- Banks largest category of deposit institutions
- Deposit money is directly deposited into a customers checking account
- Capitalization has intermediate risk in investment
- Accounts for sophisticated borrowers who borrow money to purchase securities
- financial institution that accepts money from customers and deposits it into their account
- Stocks has high risk investment
- Reserve central bank of the United States
- Union nonprofit financial institution that is privately owned and provides banking services for its members
- limited liability corporation
- Online Banking allows this
30 Clues: Online Banking allows this • limited liability corporation • handles stock sales and purchases • ensures people's accounts up to $250,000 • Market Accounts has low risk/low return • people who buy shares of stock in the company • Reserve central bank of the United States • Stocks has high risk investment • ...
week 1 be cyber smart 2021-09-21
Airport Crossword 2023-01-26
19 Clues: gate • flight • airport • monitor • to land • arrival • to board • bus stop • passenger • to take off • baggage claim • train station • tourist office • to get in line • to take a taxi • flight attendent • to chekc ones luggage • to go through customs • to go through security
Aviation 2024-06-08
20 Clues: ramp • cabin • agent • stairs • traffic • service • officer • operator • Aviation • explosive • organisation • passenger what • a sort of system • a sort of security • kind of operations • a kind of traveller • everyone has access • a kind of traveller • ministry of something • only travellers have access
Chapter 10.1 Vocabulary 2014-05-14
17 Clues: ID • there • wallet • arrival • customs • to wait • airport • to leave • airplane • to board • plane ticket • to take a trip • to wait in line • to begin a trip • to change money • travel bag, purse • security checkpoint
File 3A Air Travel 2 2020-11-29
17 Clues: багаж • проход • застегнуть • отправление • путь, дорога • приземляться • по расписанию • выход на посадку • стыковочный рейс • посадочный талон • забирать (багаж) • спасательный жилет • садиться в самолёт • место получения багажа • верхняя багажная полка • авиационная безопасность • синдром смены часовых поясов
ENA4 Topic 1 2023-08-13
Across
- saavutus
- abstrakti, käsitteen tasolla oleva
- kansallinen identiteetti
- yleinen; yleisesti
- varallisuus, toimeentulo
- terveys
- turvallisuudentunne
- yksilöllisyys
- konkreettinen, "käsin kosketeltava", varsinainen
Down
- ympäristö
- keskeinen arvo
- tämänhetkinen, nykyinen
- yhteiskunta
- etnisyys, etninen tausta, "kansallisuus"
- yhteisö
- itseilmaisu
- työllisyys
17 Clues: yhteisö • terveys • saavutus • ympäristö • työllisyys • yhteiskunta • itseilmaisu • yksilöllisyys • keskeinen arvo • yleinen; yleisesti • turvallisuudentunne • tämänhetkinen, nykyinen • kansallinen identiteetti • varallisuus, toimeentulo • abstrakti, käsitteen tasolla oleva • etnisyys, etninen tausta, "kansallisuus" • konkreettinen, "käsin kosketeltava", varsinainen
security 2022-05-19
Security 2024-01-30
Computer Professions and Cyber crimes 2022-03-28
Across
- - a technique of tricking a user into clicking on something different from what the user perceives. (deprecated attack)
- - A form of harassment or bullying inflicted through the use of electronic or communication devices such as computers, mobile phones, laptops, etc.
- - is a type of malware that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- - is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user.
- - is gaining unauthorized access to a computer system via another user's legitimate connection.
- - is an effort to gather information about a computer or its users for the purpose of gaining unauthorized access later.
- gap (networking) - It is a network security measure used on one or more computers to ensure the physical isolation of a secure computer network from unsecured networks, such as the public Internet or an unsecured local area network.
- - attack in which a person or a program successfully identifies as another by falsifying a data.
- (computing) - is a method of bypassing normal authentication procedures, usually through a network connection such as the Internet.
- - is the theft of money from the card to your card, account, account in the payment system, as well as the purchase of goods using someone else's credit card. Most often, carders use cash withdrawals, the purchase of branded clothing or electronics.
- – it refers to any video in which faces have been either swapped or digitally altered, with the help of AI.
- - is the area of development that refers to the server-side development. It focuses on databases, scripting, and website architecture.
- - is the area of development that refers to the client-side development. It is the development of the graphical user interface of a website.
- (horse) - is a harmful program that misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it.
Down
- - Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.
- - when a person builds an online relationship with a young person and tricks or pressures him/ her into doing a sexual act.
- request forgery (CSRF) - a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts. (also deprecated)
- slicing - attack in which cyber-criminals steal money or resources a bit at a time so that there’s no noticeable difference in overall size.
- - A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- - is a form of attack that causes fragmentation in the general sequence of Internet Protocol (IP) packets and sends these fragmented packets to the victim’s machine that is attacked.
- - type of fraud that uses mobile phone text messages to lure victims into calling back on a fraudulent phone number, visiting fraudulent websites or downloading malicious content via phone or web.
- - Cryptojacking is the unauthorized use of computing resources to mine cryptocurrencies.
- - is a cyberattack in which spam emails, or other forms of communication, are sent en masse, with the intention of tricking recipients into doing something that undermines their security or the security of the organization they work for.
- - is a set of computer programs, usually malicious, designed to provide access to a computer or an area of its software that is otherwise prohibited.
- (denial of service attack) - is a cyberattack in which a criminal wants to make a computer or network resource inaccessible to users by disrupting the services of a host connected to the network. Denial of service is usually achieved by filling a resource with redundant requests to overload systems and prevent legitimate requests from being executed.
- - is a form of attack that causes fragmentation in the general sequence of Internet Protocol (IP) packets and sends these fragmented packets to the victim’s machine that is attacked.
- - an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks.
27 Clues: - Cryptojacking is the unauthorized use of computing resources to mine cryptocurrencies. • - is gaining unauthorized access to a computer system via another user's legitimate connection. • - attack in which a person or a program successfully identifies as another by falsifying a data. • ...
JUMPING THE LIGHTS 2023-12-05
15 Clues: ZBS • zugeben • wohnhaft • übersehen • Fahrverbot • abstreiten • Haltelinie • beobachten • Ampelanlage • Betroffener • Rotlichtverstoß • Anzeigenformular • Sicherheitsleistung • Zustellungsbevollmächtigter • bei Rot über die Ampel fahren
Safety Week 2021 2021-09-08
Across
- being aware of your surroundings
- A safe location in a high wind or tornado situation
- Who sends out safety messages on Pulse?
- Options in an active shooter situation
- what animal do you walk like on snow or ice?
- What is the name of the suicide project?
Down
- What is the name of DMU's emergency text system?
- Who do you contact with a COVID situation?
- who you call if you need a security escort
- Short for Floor Emergency Coordinators
- what you should have in your home to put out fires
- short for wireless emergency alerts
- Short for Automatic External Defibulator
13 Clues: being aware of your surroundings • short for wireless emergency alerts • Short for Floor Emergency Coordinators • Options in an active shooter situation • Who sends out safety messages on Pulse? • Short for Automatic External Defibulator • What is the name of the suicide project? • Who do you contact with a COVID situation? • who you call if you need a security escort • ...
PE&TS Q3 Team Meeting 2023-09-07
Across
- IT Control Management
- Information for Risk Assessor Dashboard
- Unauthorized Software Detection & Investigation
- I am the guardian of Privileged Access Management
- System Security General Practices
- I completed my COMPTIA certification with flying colors!
- You don't want to mess with me. I got a Purple belt in Jujitsu
Down
- I celebrated my national day on 7th September!
- Security, Privacy, Availability, Confidentiality, Process Integrity
- IT objects ownership data extraction by individual in scope
- I make sure the 'Big Red Button' is ready
- IT objects ownership data extraction by functional organization in scope
- IT System Information Request
13 Clues: IT Control Management • IT System Information Request • System Security General Practices • Information for Risk Assessor Dashboard • I make sure the 'Big Red Button' is ready • I celebrated my national day on 7th September! • Unauthorized Software Detection & Investigation • I am the guardian of Privileged Access Management • ...
Robotics 2017-02-09
Across
- A car company that makes robots?
- A dishwasher is this type of machinery?
- A film that includes robots?
- A metal used to make robots?
- You need to do this to make your robot carry out a command?
Down
- The Cyber men come from this T.V series?
- A repetitive task carried out by robots?
- A high precision task carried out by a robot?
8 Clues: A film that includes robots? • A metal used to make robots? • A car company that makes robots? • A dishwasher is this type of machinery? • The Cyber men come from this T.V series? • A repetitive task carried out by robots? • A high precision task carried out by a robot? • You need to do this to make your robot carry out a command?
NATO Nuggets Crossword Puzzle 2022-03-23
Across
- A NATO ______ ______ is a security manager or SSR designated to officially process and log classified NATO material.
- US-marked information _____ overrides NATO-marked information.
- A political-military alliance currently comprised of 30 member countries, including the United States.
- ATOMAL material must be filed ________ from non-ATOMAL material.
- When NATO was formed in 1949, how many member countries were there?
- Where are NATO read-ons stored?
- NATO HQ is located in _______.
Down
- Printing NATO classified is a last _____.
- The NATO ______ is a permission-restricted library of shared classified NATO documents.
- EUCOM's NATO Sub-Registry Office/INFOSEC encourages the sharing of NATO classified information in the _____ format.
- How is NATO SECRET information residing inside a U.S. document marked?
- The principle that an attack against one or several NATO members is considered an attack against all is called the principle of ________ defense.
- The governing document for the implementation of NATO security requirements.
- How often does EUCOM's NATO Sub-Registry Manager have to report printed CTS and ATOMAL material to the Central US Registry (CUSR)?
- The physical security requirements for NATO CONFIDENTIAL and above are the ____ as for US material of the same level of classification.
- HQ USEUCOM's commander concurrently serves as NATO's _______ Allied Commander (SACEUR).
16 Clues: NATO HQ is located in _______. • Where are NATO read-ons stored? • Printing NATO classified is a last _____. • US-marked information _____ overrides NATO-marked information. • ATOMAL material must be filed ________ from non-ATOMAL material. • When NATO was formed in 1949, how many member countries were there? • ...
Deborah Chen 8L : Social Engineering 2023-02-02
Across
- an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to tick them into providing valuable data.
- ( also known as shoulder surfing.)
- baiting attacks use a false promise to take advantage of a victim’s greed or curiosity.
- an attack that was designed from cyber criminals to make up fun quizzes or questions to find out more about their information.
Down
- a set of methods used by cyber criminals to deceive individuals into handing over info that they can use for fraudulent purposes.
- an attack in which the perpetrator invents a scenario in order to continue the victim to give them data or money.
6 Clues: ( also known as shoulder surfing.) • baiting attacks use a false promise to take advantage of a victim’s greed or curiosity. • an attack in which the perpetrator invents a scenario in order to continue the victim to give them data or money. • ...
week 1 be cyber smart 2021-09-21
KELAS 7.4 ARYO KURNIAWAN 2023-05-10
Across
- sebuah platform media sosial yang diciptakan pada tahun 2005
- aplikasi media sosial yang lahir pada tahun 2002 yang tumbuh pesat
- perlindungan mengekpresikan identitas diri atau kepribadian melalui pembicaraan atau kegiatan
- tahun 2004 diciptakan
Down
- tahun 1995 lahir situs
- sebuah pembelajaran yang dilakukan tanpa tatap muka langsung disebut
- pada tahun 2010 diciptakan apk sosial pertama
- BOLYING dampak negatif penggunaan tik
- aplikasi yang muncul pada tahun 2006 sebagi situs jejaring sosial yang lebih simpel
- salah satu apk yang digunakan untuk buat konten
10 Clues: tahun 2004 diciptakan • tahun 1995 lahir situs • BOLYING dampak negatif penggunaan tik • pada tahun 2010 diciptakan apk sosial pertama • salah satu apk yang digunakan untuk buat konten • sebuah platform media sosial yang diciptakan pada tahun 2005 • aplikasi media sosial yang lahir pada tahun 2002 yang tumbuh pesat • ...
Our digital lives 2024-06-02
Across
- - a person who lost interest to live.
- - an online journal that offers regularly updated content.
- - a currently popular and widely discussed
- Feeling a strong need to do something.
- - The application of scientific knowledge to the practical aims of human life.
Down
- bullying - Use of online apps to harm someone.
- - A software program that is designed to perform a specific function.
- - The action of sending something to someone.
- A person who is not identified by the name.
- - A verbal or written remark.
10 Clues: - A verbal or written remark. • - a person who lost interest to live. • Feeling a strong need to do something. • - a currently popular and widely discussed • A person who is not identified by the name. • - The action of sending something to someone. • bullying - Use of online apps to harm someone. • - an online journal that offers regularly updated content. • ...
Bully Free, That's ME 2024-10-22
Across
- It takes______ to stand up to bullies.
- The first thing we do when we see bullying.
- This type of bullying hurts your body.
- mean and repeated behaviors.
- It is possible to be bullied by my friends.
- The third thing we do when we see bullying.
Down
- This type of bullying involves words and hurts your heart.
- The second thing we do when we see bullying.
- You should tell this person if you feel you are being bullied.
- This type of bullying occurs virtually.
10 Clues: mean and repeated behaviors. • It takes______ to stand up to bullies. • This type of bullying hurts your body. • This type of bullying occurs virtually. • The first thing we do when we see bullying. • It is possible to be bullied by my friends. • The third thing we do when we see bullying. • The second thing we do when we see bullying. • ...
UX Word Wizard - 1 2024-11-19
Across
- Temporary storage for data
- A small window that appears suddenly to convey information
- A component to scroll through images or content horizontally
- A clickable element that performs an action
- An indication that something went wrong during an interaction
Down
- The arrangement of elements on a page
- Regular updates sent via email to subscribers
- A cyber attack aimed at stealing sensitive user information
- A tool to refine or narrow down search results
- An area on a webpage for users to enter information
10 Clues: Temporary storage for data • The arrangement of elements on a page • A clickable element that performs an action • Regular updates sent via email to subscribers • A tool to refine or narrow down search results • An area on a webpage for users to enter information • A small window that appears suddenly to convey information • ...
PIXEL PERFECT PUZZLE 2025-05-28
Across
- Refers to unwanted bulk emails that come from unknown sources
- The process of transforming data into an unreadable code
- Device that connects multiple networks
- It can be defined as the legal rules and restrictions imposed on online laws
Down
- Type of cyber attack that tricks users
- Wireless technology used to interconnect mobiles computers etc
- Network topology with a central hub
- Practice of protecting digital information
- It is a combination of two terms 'net' and 'etiquette'
- Refers to an illegal intrusion into a computer system or network
10 Clues: Network topology with a central hub • Type of cyber attack that tricks users • Device that connects multiple networks • Practice of protecting digital information • It is a combination of two terms 'net' and 'etiquette' • The process of transforming data into an unreadable code • Refers to unwanted bulk emails that come from unknown sources • ...
Executive Branch, Presidency 2022-12-06
14 Clues: Order • Policy • System • System • College • Security • Agencies • Agreement • Appointees • Bureaucracy • Sanctioning • Corporations • Service System • Service Workers
Executive Branch 2022-12-15
14 Clues: Order • Policy • System • System • College • Agencies • Security • Agreement • Appointees • Sanctioning • Bureaucracy • Corporations • Service System • Service Workers
Computer Systems crossword 2014-09-09
occupation 2022-09-29
Science Project 2020-11-17
CRUCIBOZZA 2022-10-20
Across
- E' il tuo noleggiatore di Ebike preferito
- Il tuo chef di risotti preferito
- Dove passa il Po'?
- Dove hai compiuto atti osceni in luogo pubblico (con la Cri)?
- ...Specializzazione medica più adatta per te
- Dall'alto della tua preparazione in Ortopedia: qual'è l'osso più grande del carpo?
Down
- Altezza della Mole Antonelliana
- Il tuo Cyber partner
- ...Non è il tuo forte
- Per verificare il tuo 30L in Neuro: come si chiama la via della sensibilità?
- Dov'eri quando sei diventata uno "scoglio"?
- La maneggerà Riccardo nei prossimi anni
- Dov'eri quando ti è stato offerto un pezzo di legno per dormire?
- Dov'eri quando un gruppo di uomini ti hanno soccorsa?
- Recentemente ne hai preso uno MOLTO grosso
- Stefano ed Alfo ne hanno mangiate 2kg a testa un giorno
16 Clues: Dove passa il Po'? • Il tuo Cyber partner • ...Non è il tuo forte • Altezza della Mole Antonelliana • Il tuo chef di risotti preferito • La maneggerà Riccardo nei prossimi anni • E' il tuo noleggiatore di Ebike preferito • Recentemente ne hai preso uno MOLTO grosso • Dov'eri quando sei diventata uno "scoglio"? • ...Specializzazione medica più adatta per te • ...
Test Your Cyber Vocabulary 2023-09-29
Across
- Also called malicious software
- Buzz@IS has prescribed how many simple steps to stay safe online? (HINT: Answer in this edition itself)
- A copy of the information held on a device (such as photos and documents) that is stored somewhere else.
- This can slow down your computer and watch everywhere you go on the internet
- When somebody sends an e-mail with a link to a bogus website it is called
- Name of the attack that does not require any action from the victim.(HINT: An article on this attack was also published in a recent HP news edition.)
- Harmful computer program
- Encryption is a commonly used tool to achieve _________________
Down
- Weakness in an information system
- Full form of "T" in OTP
- Will stand like a wall to keep intruders out
- I have a short life; your mobile buzzes with me every time you do any financial transaction online
- I lock the victim's computer system files and demand payment to decrypt. Who Am I?
- Getting into someone else’s computer or device without their permission.
- Phishing over voice call is called as _____
15 Clues: Full form of "T" in OTP • Harmful computer program • Also called malicious software • Weakness in an information system • Phishing over voice call is called as _____ • Will stand like a wall to keep intruders out • Encryption is a commonly used tool to achieve _________________ • Getting into someone else’s computer or device without their permission. • ...
Cyber Cross Word (Phishing) 2025-09-18
Across
- One way to tell if an email is a Phishing attempt is use of ______ or threatening language.
- If you suspect a Phishing attempt, you can ______ it.
- To report a Phishing attempt, email ______________ or use the "report spam" button.
- A form of Phishing that uses texting platforms.
- When a cybercriminal gets information from various sources to make a phishing attempt for one specific person, this is called _____________.
- Cybercriminals may get your information from ________ available sources.
- Phishing attempts can be spotted via bad grammar, awkward phrasing or other ______ written content.
Down
- Once have reported and blocked the sender, what should you do with the email?
- Phishing attempts via direct message on social media or a phone call is called _______.
- Occurs when criminals try to get you to open harmful links, emails or attachments.
- This form of contact is the usual form of Phishing.
- Communications trying to trick you commonly look like they are from someone _______.
- In some cases, a Phishing attempt can be ________ to your information.
- To handle Phishing attempts properly, its best to think before you _____.
- After reporting, you should _____ the sender.
15 Clues: After reporting, you should _____ the sender. • A form of Phishing that uses texting platforms. • This form of contact is the usual form of Phishing. • If you suspect a Phishing attempt, you can ______ it. • In some cases, a Phishing attempt can be ________ to your information. • Cybercriminals may get your information from ________ available sources. • ...
Financial Scams & Cyber Safety 2025-10-01
Across
- A type of malware disguised as legitimate software.
- Theft, Stealing someone's personal information for fraud.
- Criminal activities carried out using computers.
- A dishonest scheme or fraud.
- Malware that locks data and demands payment to unlock it.
- A secret word or phrase used to gain access.
Down
- Faking an identity to deceive someone online.
- Software that detects and removes malicious programs.
- A security method requiring two forms of identification.
- Software designed to damage or gain unauthorized access.
- Fraudulent emails pretending to be from trusted sources.
- The process of converting data into a secure code.
- Someone who gains unauthorized access to systems.
- security system that monitors and controls network traffic.
- Software that secretly gathers user information.
15 Clues: A dishonest scheme or fraud. • A secret word or phrase used to gain access. • Faking an identity to deceive someone online. • Criminal activities carried out using computers. • Software that secretly gathers user information. • Someone who gains unauthorized access to systems. • The process of converting data into a secure code. • ...
Social Security Benefits 2021-03-31
Across
- Used to determine social security eligibility. Can earn a maximum of 4 per year.
- Benefits that help the old, survivors, and disabled
- Provided by Social Security administration that is a record of money earned every year
- an asset that is purchased with the hope that it will generate income or appreciate in value at some point in the future.
Down
- Medical insurance for the old, survivors, and disabled that has a reduce price or is free
- The age in which you collect full retirement benefits
- Social security and Medicare taxes
- 67 for those born after 1960.
- The time when a person stops working
9 Clues: 67 for those born after 1960. • Social security and Medicare taxes • The time when a person stops working • Benefits that help the old, survivors, and disabled • The age in which you collect full retirement benefits • Used to determine social security eligibility. Can earn a maximum of 4 per year. • ...
Foreign Travel Crossword Puzzle 2024-03-20
Across
- Government organization that oversees collateral activity with Boeing Defense.
- Who with a clearance is required to report foreign travel.
- The Facility Security Officer for the Boeing Puget Sound Site?
- Locations considered outside the United States of America
Down
- Days you must report your foreign travel prior to your trip.
- Northern country you can do a day trip to without 30 day notice.
- Southern country you can do a day trip to without 30 day notice.
- Boeing security system where foreign travel is reported.
- Job title of the individual who has overall security responsibility for the entire site.
9 Clues: Boeing security system where foreign travel is reported. • Locations considered outside the United States of America • Who with a clearance is required to report foreign travel. • Days you must report your foreign travel prior to your trip. • The Facility Security Officer for the Boeing Puget Sound Site? • ...
CGE653 PUZZLE CHAPTER 1 2025-03-24
Across
- A measure of human injury, environmental damage, or economic loss in terms of both the
- Department of Environment
- Social Security Organisation is a government agency that implements and administer the social security schemes under the Employees' Social Security Act.
- The absence of: (i) injury and harm on human and (ii) damage on property and the environment
- A state of physical and mental well-being – including the absence of disease or
- likelihood and the magnitude of the loss or injury
- National Institute of Occupational Safety and Health - The centre for training, consultancy, information dissemination and research in occupational safety and health in Malaysia
Down
- Persistent, prolonged and repeated
- Department of Occupational Safety and Health
- Immediate, short term
- A sequence of events that produce unintended injury, damage to property or the environment, production losses, or increased liabilities
11 Clues: Department of Environment • Immediate, short term • Persistent, prolonged and repeated • Department of Occupational Safety and Health • likelihood and the magnitude of the loss or injury • A state of physical and mental well-being – including the absence of disease or • A measure of human injury, environmental damage, or economic loss in terms of both the • ...
Crossword 2015-02-18
Ch3 Actividades y Personas en la escuela 2022-03-08
19 Clues: to help • to work • to walk • to study • to dance • to visit • to teach • the coach • the nurse • to practice • to eat lunch • the custodian • the counselor • the secretary • the principal • to participate • to take the bus • the security guard • to play an instrument
My AUs uwu 2019-07-21
Across
- Smol little peeps uwu
- Child support means nothing.
- Let's put a pin in this one and come back later.
- The eldest of the Spooks but not the creepiest
- If you hit him 5 times he will spill soda on your laptop. Very sad.
- His name is pretty much a cruel joke to his condition
- Uni of multiple things
- Has a kid he didn't want in the first place but refuses to share custody with the parent who wanted the kid in the first place...?
- F*cked Cupid before literally anyone else. That's his only accomplishment.
- Pisses off so many people but Cyber still someone manages to be slightly nice to him
- Smol quiet bad with a birdy hate uwu
- A lonely bab with a heart of gold. No I'm serious his pinprick is a golden heart-
Down
- Named after a bush and his job
- Walks through walls but not over water; can't see through you but you can see through him
- I made her to be shipped with a bad guy so I would feel bad for killing him later-
- Was good, then bad, and now "good" and DEAD!
- Named after a soda that rhymes with a princess name
- Betrayed people in his AU but somehow gets trusted as a Misfit :/
- "Spaces" out a lot. Teased for being obsessed over a- *reads smudged writing* volcano??? :/ (*Smacks white board* LAUGH!)
- Not to be confused with the "representative" of a Sprite-
- If he didn't exist his wife would be getting shipped with Panther- because she is a cat- person- thing- not a furry-
- Still a better love story than Twilight. Still a better character than- what was his name- the vampire one not the dog- err- I never read Twilight help me out here
- Killed his brother and tried to kill other people. Claims it is due to mental illnesses but Mental isn't here- so-
- Legends has it she is hotter than the savannah
- Things go wrong for him and the worse part is he can't "voice" his opinion...
25 Clues: Smol little peeps uwu • Uni of multiple things • Child support means nothing. • Named after a bush and his job • Smol quiet bad with a birdy hate uwu • Was good, then bad, and now "good" and DEAD! • The eldest of the Spooks but not the creepiest • Legends has it she is hotter than the savannah • Let's put a pin in this one and come back later. • ...
TOPIC 7: DEVELOPMENT OF COMPUTER INDUSTRY & LAW 2024-05-02
Across
- What are companies called that own or lease physical infrastructure for communication transmission?
- What company provides technology services for travel companies, including travel searches, booking, and processing?
- Which company offers the Adobe Creative Cloud Suite, Document Cloud, and Experience Cloud?
- What company specializes in personal and small business financial management in the U.S., offering products such as TurboTax, Quickbooks, and Mint?
- Which Japanese company is renowned for manufacturing laptops, notebooks, computer desktops, and other computer-related products and services?
- What industry does the Malaysian Communications and Multimedia Commission (MCMC) regulate, focusing on networked IT industry services and the operational and administrative aspects of the regulatory framework?
- What company generates revenue from four main sources, including cloud services and license support, cloud license and on-premise license, hardware, and services?
- What company is known for producing products such as iPods, iTunes, Mac laptops and desktop computers, the OS X operating system, and innovative devices like the iPhone and iPad?
- Personal Protection Act 2010 act focuses on protecting personal data in Malaysia?
Down
- What company specializes in corporate virtualization and workstation optimization, offering cloud software and enterprise platforms compatible with Windows and Mac?
- What term is commonly used to describe the infrastructure of information utilized across multiple disciplines, as defined by Chan et al. (2008) and Uddin et al. (2003)?
- What does cyber law provide to individuals using the internet?
- What are the fundamental electronic building blocks of information-age products?
- Computer Act 1997 is the Malaysian legislation that addresses crimes involving computers?
- In the semiconductor industry, what process is highly capital-intensive, indicating significant investment in equipment and facilities?
- Which entities manufacture and sell telecommunications equipment?
- What trend within cyber law involves the regulation and legal considerations surrounding the use of remote data storage and processing services?
- Signature Act 1997 act in Malaysia governs the legality of digital signatures?
- What term encompasses any law that is applicable to the internet and internet-related technologies?
- What company provides internet services, broadband networks, and enterprise business solutions?
20 Clues: What does cyber law provide to individuals using the internet? • Which entities manufacture and sell telecommunications equipment? • Signature Act 1997 act in Malaysia governs the legality of digital signatures? • What are the fundamental electronic building blocks of information-age products? • ...
Investment Course Lesson 24 2023-03-22
Across
- A measurement of effectiveness regarding the company’s ability to make a profit for shareholders
- shows how two moving averages in a particular security are related
- control in order to lower risk
- When a stock is first introduced to a market the banks offer it at a price per share that they have determined to be based on its intrinsic worth
- also known as a hedge ratio
- when the price of a security moves contrary to other data.
Down
- an intangible asset
- patterns during different business environments or situations
- having a number of assets that are different enough from each other that sudden changes in one asset will have little effect on the others.
- A type of security based on the ownership of real estate
- net profit divided by the number of outstanding common shares
11 Clues: an intangible asset • also known as a hedge ratio • control in order to lower risk • A type of security based on the ownership of real estate • when the price of a security moves contrary to other data. • patterns during different business environments or situations • net profit divided by the number of outstanding common shares • ...
Final Vocab 2022-05-26
20 Clues: Time. • Large. • Hidden. • Choice. • Fierce. • To buy. • obvious. • Used to. • Homework. • To plant. • Equal to. • Eats meat. • Dinosaurs. • To remove. • Forerunner. • Want to eat. • To understand • Think: Hello, my name is… • To ship to another country. • Security system when a robber is in the house.
ENA5 revision 2023-01-17
33 Clues: huhu • elin • paine • nivel • hermo • liite • turva • neste • rohkea • vapaus • kysely • taapero • epäilys • elvytys • sisäinen • tutkimus • taulukko • muuttuja • arviolta • aikakausi • kustantaja • tajuissaan • selkäranka • vaikuttaja • puolueeton • osallistuja • vanhentunut • jälkeläinen • johtopäätös • hyvin pieni • helpottunut • keinotekoinen • epäluotettava
Henry V Act V Vocabulary 2023-02-27
Across
- leaving no opportunity for denial
- restricting
- certainty
- common people from ancient Rome
- harvest; cultivation
- consistency
- uncultivated
- damaged
- approve
Down
- obstacle; hindrance
- call to mind
- make greater
- majestic
- wedding
- attempt; strive
- security certainty
- surrounded
- general sense or meaning
- obscurities; uncertainties
- from one side to the other
20 Clues: wedding • damaged • approve • majestic • certainty • surrounded • restricting • consistency • call to mind • make greater • uncultivated • attempt; strive • security certainty • obstacle; hindrance • harvest; cultivation • general sense or meaning • obscurities; uncertainties • from one side to the other • common people from ancient Rome • leaving no opportunity for denial
Unit 15 and 16 2023-03-13
Across
- kohver
- õpipoiss
- loeng
- sadam
- trahv
- tegelik
- sihtkond
- padi
- deklareerima, kuulutama
- turvalisus, julgeolek
- pagas
- vahekäik
- käsipagas
- ilmnema
- aksessuaar, tarvik, lisavarustus
- ülemere
Down
- pardapääse
- meditsiiniline
- reisiterminal
- ürgne loodus
- mehaanik
- rabav, jahmatav
- sissekäik
- lomp,loik
- kirurg
- noortehotell
- toll
- kellegile kallale norima
- kandik
29 Clues: padi • toll • loeng • sadam • trahv • pagas • kohver • kirurg • kandik • tegelik • ilmnema • ülemere • õpipoiss • mehaanik • sihtkond • vahekäik • sissekäik • lomp,loik • käsipagas • pardapääse • ürgne loodus • noortehotell • reisiterminal • meditsiiniline • rabav, jahmatav • turvalisus, julgeolek • deklareerima, kuulutama • kellegile kallale norima • aksessuaar, tarvik, lisavarustus
Hackers, Scams and Online Safety 2023-04-21
20 Clues: boss • secret • trading • be aware • positive • bullseye • ___ gaurd • shape math • line of ___ • to fish with • to give back • virtual mail • male cow - y • where you see • to instill fear • to prevent entry • opposite of light • chocolate chip ___ • wood, opposite of out • something that explodes
Selfie Horror Story 2023-03-31
30 Clues: lugn • anta • brev • scen • spår • konto • störa • radera • trösta • försök • direkt • kränkt • orolig • anonym • reklam • livlina • nyligen • svarade • formulär • liknande • tillgång • lösenord • säkerhet • databrott • ladda upp • omedelbart • förbryllad • allvarligt • slutade tänka på • out with umgås med
ON THIS PAGE 2016-02-14
Across
- ........ Page
- Levin ....... School
- Safe And Secure .........
- ....... 40 Units
- Security ....... Entry
- ......Your Imagination
- ........ With Me
- Paper ......
- Open 24 .......
- ........ Chronicle
- Georgies Wigs & Hair ......
- Great read
Down
- Secure Self .........
- ....... $50 Paper Plus
- Old Kimberley ........ Grounds
- Some ....... Apply
- Shape ......
- WINZ Subsidies ........
- 20 ........ Avenue
- Early ....... Education
- 0800 00 .......
- ...... Just Love It
22 Clues: Great read • Shape ...... • Paper ...... • ........ Page • Open 24 ....... • 0800 00 ....... • ....... 40 Units • ........ With Me • Some ....... Apply • 20 ........ Avenue • ........ Chronicle • ...... Just Love It • Levin ....... School • Secure Self ......... • ....... $50 Paper Plus • Security ....... Entry • ......Your Imagination • WINZ Subsidies ........ • Early ....... Education • ...
Leccion 5 Deck 1 2018-02-28
23 Clues: Island • Welcome • Lodging • Expired • Tourist • To sail • Traveler • Regresar • Passport • Accident • Itinerary • La ruinas • Peligroso • To be full • Campground • To take off • To take a trip • El adventurero • Excursion; tour • Safety; security • De (buena) catergoría • El cinturón de seguridad • El servicio de habitación
basketball 2023-08-29
Across
- Opponent analysis
- Captures moments
- Technical aspects
- Venue management
- PR interactions
- Logistics planning
- Gear organization
- Online presence
- Venue assistance
- Team transportation
- Ball management
Down
- Game commentary
- AV equipment
- Spiritual support
- Data analysis
- Public address
- Safety enforcement
- Team promotion
- Ticket and merch
- Game officiating
- Physical conditioning
21 Clues: AV equipment • Data analysis • Public address • Team promotion • Game commentary • PR interactions • Online presence • Ball management • Captures moments • Venue management • Ticket and merch • Game officiating • Venue assistance • Opponent analysis • Spiritual support • Technical aspects • Gear organization • Safety enforcement • Logistics planning • Team transportation • Physical conditioning
zz 2024-04-10
Across
- - Stock symbol
- - Noise-making toy
- - Blood specialist
- - Motor City
- - Variant of element
- - Stuffed dough
- - Multiplicative factor
- - Heart partition
- - Mythical creature
Down
- - Measurement unit
- - Small, agile dinosaur
- - Early recording device
- - Hovering raptor
- - Tectonic segment
- - Southern staple
- - Image unit
- - Loan security
- - Polearm
- - Indigenous Arctic people
- - Idle sketching
20 Clues: - Polearm • - Motor City • - Image unit • - Stock symbol • - Loan security • - Stuffed dough • - Idle sketching • - Hovering raptor • - Southern staple • - Heart partition • - Measurement unit • - Tectonic segment • - Noise-making toy • - Blood specialist • - Mythical creature • - Variant of element • - Small, agile dinosaur • - Multiplicative factor • - Early recording device • ...
nieprzewidywalny szczegół 4 2024-08-18
20 Clues: silently • he added • undecided • go ahead! • otherwise • she smiled • addressing • comfortable • she continued • to add (perf) • to try (impf) • to add (impf) • to try (perf) • security guard • they were trying • to address (impf) • to address (perf) • to persuade (perf) • to persuade (impf) • taking off clothes
Those Secret Coders, man 2024-10-16
28 Clues: runa • neyð • hrós • mjög • kynna • ætlun • villa • leysa • slétta • öryggi • blekkja • framlag • gljúfur • kynning • senda út • eyðimörk • dulkóðað • hugrekki • rannsókn • áríðandi • hæfileiki • verðskulda • bandalags- • ganga í her • dulmálafræði • í auknum mæli • samanstanda af • endast lengur en…
Peanuts 2024-02-07
15 Clues: bird • D-minus • gambler • pianoman • dirty one • loud talker • spiky haired • ben FRANKLIN • smarty pants • bossy person • blanket thief • charlie brown • sally's best friend • naturally curly hair • mr. security blanket
RU ITEC411 - Crime and Security (Ch 5) 2022-10-11
Across
- A false website that convinces people to enter personal information
- The act of changing data to make it unreadable to others to protect the privacy of the information
- An act by criminals to gain access to computers illegally
- Malicious software that will lock computers and/or lock/encrypt files and require payment to have them unlocked
- An attack that hackers use to overload websites with repetitively request for information
- Sending scam emails to trick people into giving away person information
- An in-person use of hacking involving manipulation someone into giving away personal information or private information about a company
- Websites that lure hackers to observe their actions
- Nickname for hackers who attempt to purposefully do damage
- Characteristics involving DNA such as fingerprints, voice, and face structures
Down
- A blanket term for all different types of malicious software and viruses
- Software that allows a person to gain access to software by passing the normal security measures
- Malicious software installed on a computer to observe user’s actions
- A law to protect computers under federal government jurisdiction (ABBR)
- The use of hacking with political motivations
- Nickname for hackers who only do so to help improve security
- The act of gathering personal details to impersonate someone else
- A public written statement attacking a person’s character
- A person or team of people who take the role of a hacker and try to get through security measures
- A malicious computer program that attaches itself to software and can spread itself
20 Clues: The use of hacking with political motivations • Websites that lure hackers to observe their actions • An act by criminals to gain access to computers illegally • A public written statement attacking a person’s character • Nickname for hackers who attempt to purposefully do damage • Nickname for hackers who only do so to help improve security • ...
Stanley's The (Avigilon) Office Crossword 2023-08-16
Across
- Ability to scan a QR code to see a list of users for the video intercom.
- When looking to better understand the path of people or vehicles in a space, it may be beneficial to use this feature
- Wireless Camera that is manually adjustable and includes temperature and humidity sensors
- How many routing profiles come with the VIP without charge?
- Gym membership management integration that enables simple and automated user management.
- What the Aware platform detects after a couple weeks of learning.
- Ability to add layers of security to unlock doors
- These are a great option when you want to add a failsafe or additional security for strict security spaces.
- This feature requires an additional license and can be great for parking garages or slow streets.
- Hardware Warranty period for the majority of our alta access control hardware
- This is free to users and allows them to integrate Avigilon Alta with other software solutions.
- How many Outbound ports are required to be open for Alta Access?
Down
- Ability to look for specific events based on time, appearance, etc. without needing to scrub through hours of footage.
- Patented Technology to allow for seamless and reliable unlocks with Alta Access.
- Technology used to analyze video footage for insights
- Destination Dispatch Technology that integrates with Alta Access
- Typically used in apartments, executive offices, and classrooms.
- Technology that helps reduce bandwidth for Alta Cameras.
- These cameras have a long cylindrical shell and are meant to be seen.
- Alta Access is OSDP Compliant (T/F)
20 Clues: Alta Access is OSDP Compliant (T/F) • Ability to add layers of security to unlock doors • Technology used to analyze video footage for insights • Technology that helps reduce bandwidth for Alta Cameras. • How many routing profiles come with the VIP without charge? • Destination Dispatch Technology that integrates with Alta Access • ...
Financial Fundamentals 2025-05-27
Across
- Regulates business activities within own boundaries; intrastate commerce
- Studies the transfer of money(any item that serves as a method of payment) between individuals, businesses, and governments
- Federal, state, and local agencies collect taxes and borrow money to pay for public goods and services
- Form of debt security, essentially a loan made by an investor to a borrower
- Where the tax rate increases along with the amount
- Certificate or other financial instrument that has monetary value and can be traded; bonds, debt securities, stocks
- The debts or financial obligations that a person or company owes to others
- Tax where everyone pays the same amount
- A rise in the general level of prices (consumer price index)
- Tax based on purchases
Down
- The cost of borrowing money
- Businesses and other organizations which sell items, pay expenses, and borrow to finance business operations
- Play an important role in many communities by providing with easy, fast way to borrow small amounts of money
- _____ are consumers and households who make purchases, save, innvest, and pay taxes
- Employment taxes such as Social Security
- Taxed based on land and buildings
- Oversees the activities that involve two or more states; regulates foreign trade; regulates interstate commerce
- Ability to convert an investment to cash for full value; includes items like demand doposits, CDs, Treasury bills, and money market funds
- Regulates banks
- Regulates stock markets
- County boards; city or town councils; services for an orderly society
- Insures bank deposits
- Potential of a investment; Default
23 Clues: Regulates banks • Insures bank deposits • Tax based on purchases • Regulates stock markets • The cost of borrowing money • Taxed based on land and buildings • Potential of a investment; Default • Tax where everyone pays the same amount • Employment taxes such as Social Security • Where the tax rate increases along with the amount • ...
The Bad Guys 1 2022-12-09
Across
- The dogs were all locked up in maximum __________.
- It is one of Mr. Wolf's aliases.
- They all have a __________ rap sheet.
- What animal was the security guard?
- The gang wants to _________ the cat in the tree.
- Who is the leader of The Good Guys Club?
Down
- Where is Mr. Piranha from?
- Everyone keeps mistaking Mr. Piranha for this
- The gang all have a bad __________
- Mr. Wolf throws Mr. Piranha through what?
- What do the gang want to be?
- Mr. Snake ate all of these at Mr. Ho's Pet Store.
12 Clues: Where is Mr. Piranha from? • What do the gang want to be? • It is one of Mr. Wolf's aliases. • The gang all have a bad __________ • What animal was the security guard? • They all have a __________ rap sheet. • Who is the leader of The Good Guys Club? • Mr. Wolf throws Mr. Piranha through what? • Everyone keeps mistaking Mr. Piranha for this • ...
Sectors of the Indian Economy 2021-09-21
Across
- Health care centre come under which sector
- In which sector workers do not produce goods
- A large proportion of labourers in India are working in which sector
- DAV group of schools come under which sector
- In which sector workers enjoy job security
- Which sector is also called manufacturing sector
Down
- The activities in Primary, Secondary and Tertiary sector are ____________
- Cotton is a _________ product
- Sustainable development takes care of present and ________
- Which sector is also called agricultural sector
- Job assurance in rural areas
- unorganised sector does not has _____ security
12 Clues: Job assurance in rural areas • Cotton is a _________ product • Health care centre come under which sector • In which sector workers enjoy job security • In which sector workers do not produce goods • DAV group of schools come under which sector • unorganised sector does not has _____ security • Which sector is also called agricultural sector • ...
confidentiality 2025-02-06
Across
- Espionage form of espionage conducted for commercial purposes rather than security;
- information
- set of rules or promises which limits access or places restrictions on certain
- work history, date of birth, social security number, criminal record,
- involves individuals hired to steal trade secrets, new products or
- actions, supervisory notations
- or Sensitive Data information about an employee prior to employment such as a résumé,
Down
- etc.
- Data records of an employee’s performance on the job such as performance reports,
- insurance information
- in the Workplace keeping employee, customer and client information private
- Data information which may arise from employment-related physicals, drug tests and
- of information
13 Clues: etc. • information • of information • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • work history, date of birth, social security number, criminal record, • in the Workplace keeping employee, customer and client information private • ...
Crossword Puzzle 2022-09-21
Across
- Managed ? solutions detects and mitigates cyber-attacks and data loss.
- The Name of Huawei Smartboard
- Up to ?% PSG subsidy
- Eemont can help businesses ? Office Networks
Down
- When you move offices, data and networks need to be ? over.
- The Name of your one-stop solution provider
- Is CloudEngine S5731-S48P4X PoE+ Supported?
7 Clues: Up to ?% PSG subsidy • The Name of Huawei Smartboard • The Name of your one-stop solution provider • Is CloudEngine S5731-S48P4X PoE+ Supported? • Eemont can help businesses ? Office Networks • When you move offices, data and networks need to be ? over. • Managed ? solutions detects and mitigates cyber-attacks and data loss.
Religion 2022-06-01
Across
- type de violence morale, physique et/ou psychologique.
- souci, sujet qui inquiète une personne
- période pendant laquelle notre corps change sans qu'on le comprenne
Down
- personne qui est harcelée
- réseau social sur lequel on constate souvent du harcèlement
- animal auquel on compare un jeune
- lieu où le cyber-harcèlement se passe
7 Clues: personne qui est harcelée • animal auquel on compare un jeune • lieu où le cyber-harcèlement se passe • souci, sujet qui inquiète une personne • type de violence morale, physique et/ou psychologique. • réseau social sur lequel on constate souvent du harcèlement • période pendant laquelle notre corps change sans qu'on le comprenne
Cyber-Mobbing 2019-05-07
7 Clues: Derjenige der die Tat ausübt • Worauf soll man im Netz achten? • ein anderes Wort für World Wide Web • Wo soll man sich als Opfer Hilfe holen? • Was sollst du tun wenn du ein Mobbingopfer siehst? • Internetseite zur Entfernung von peinlichen Bildern • Wozu kann Cyber-Mobbing im schlimmsten Fall führen?
Tantangan Kecil 2023-08-08
Across
- mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying
- bentuk perundungan melalui media elektronik
- Perilaku penindasan atau kekerasan yang dilakukan dengan tujuan menyakiti fisik dan mental
- perangkat elektronik seperti hp, laptop, dan tablet disebut juga...
Down
- sisi negatif gawaihcfcbc
- manfaat gawai adalah sebagai alat...
- salah satu dampak negatif bully
7 Clues: sisi negatif gawaihcfcbc • salah satu dampak negatif bully • manfaat gawai adalah sebagai alat... • bentuk perundungan melalui media elektronik • perangkat elektronik seperti hp, laptop, dan tablet disebut juga... • mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying • ...
Tantangan Kecil 2023-08-08
Across
- sisi negatif gawai
- mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying
- manfaat gawai adalah sebagai alat...
Down
- bentuk perundungan melalui media elektronik
- perangkat elektronik seperti hp, laptop, dan tablet disebut juga...
- Perilaku penindasan atau kekerasan yang dilakukan dengan tujuan menyakiti fisik dan mental
- salah satu dampak negatif bully
7 Clues: sisi negatif gawai • salah satu dampak negatif bully • manfaat gawai adalah sebagai alat... • bentuk perundungan melalui media elektronik • perangkat elektronik seperti hp, laptop, dan tablet disebut juga... • mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying • ...
TH CROSSWORD #1 2022-08-18
Across
- Condition of market when economy is receding and most stocks are declining in value
- Asset must be greater than ...... ?
- Where does wuquf take place?
- The month of Eid al-Adha
Down
- The framework that upholds Maqasid Shariah principle
- Commitment to safeguard ESG
- Cyber attack that attempts to steal your money or identity and personal information
- The first protection in Maqasid Shariah
8 Clues: The month of Eid al-Adha • Commitment to safeguard ESG • Where does wuquf take place? • Asset must be greater than ...... ? • The first protection in Maqasid Shariah • The framework that upholds Maqasid Shariah principle • Cyber attack that attempts to steal your money or identity and personal information • ...
E-Safety Extravagance 2020-05-07
Across
- A video game that is multiplayer.
- a physical/mental/verbal or cyber offences repeated.
- something that is secret to only you
- A fear of missing out. Usually online.
Down
- Fake emails people send.
- a fraud who makes a new identity to fit in
- news news posted on social media that is made up.
- a long sequence of symbols that protects info
8 Clues: Fake emails people send. • A video game that is multiplayer. • something that is secret to only you • A fear of missing out. Usually online. • a fraud who makes a new identity to fit in • a long sequence of symbols that protects info • news news posted on social media that is made up. • a physical/mental/verbal or cyber offences repeated.
Topaz Driller Crossword #6 2017-12-09
Across
- Hands off the _ _ _ _!?
- During well testing we use the _ _ _ _ _ system when we go on the deck.
- What device separates the solids and cuttings from the drilling mud?
- Hands on the Correct _ _ _ _ for the task!
- Australian Toolpushers first name?
- How many pedestal cranes are there on the Topaz?
- It is a workplace hazard on the VOC card?
Down
- Who is the 'cyber cementer'???
- What does SWL stand for?
- What do we ALWAYS wear to protect our eyes at work?
- Indonesian for 'Aware' is?
- If you think the job is unsafe what do YOU do?
- What MUST we do with our rubbish to help the environment?
- First name of the Rig Manager?
14 Clues: Hands off the _ _ _ _!? • What does SWL stand for? • Indonesian for 'Aware' is? • Who is the 'cyber cementer'??? • First name of the Rig Manager? • Australian Toolpushers first name? • It is a workplace hazard on the VOC card? • Hands on the Correct _ _ _ _ for the task! • If you think the job is unsafe what do YOU do? • How many pedestal cranes are there on the Topaz? • ...
transword 103 2018-07-18
23 Clues: beep • days • take • voice • costs • answer • shelter • between • day-care • part-time • coherence • to follow • full-time • responsible • kindergarten • nursing home • nephew, cousin • administrative • duration, length • security, safeguard • field trips, excursions • during the day, daytime • and last but not the least, finally(two words)
transword 103 2018-07-18
23 Clues: days • take • beep • costs • voice • answer • between • shelter • day-care • part-time • to follow • full-time • coherence • responsible • kindergarten • nursing home • administrative • nephew, cousin • duration, length • security, safeguard • during the day, daytime • field trips, excursions • and last but not the least, finally(two words)
Puzzle hoofdstuk 5 2013-04-04
32 Clues: per • kop • hek • kaas • fles • pond • minst • kunst • pakje • leren • Duits • Frans • boete • tonijn • koekje • meestal • cijfers • straffen • bijwonen • wiskunde • techniek • boterham • toegeven • biologie • verdienen • volwassene • spijbelaar • beschrijven • beveiliging • geschiedenis • vegetarische • aardrijkskunde
vocabulary 1 2014-10-12
22 Clues: visa • thing • street • ticket • by car • arrival • by foot • suitcase • departure • buy plane • immigration • travel agent • train station • direct flight • boarding pass • to take a taxi • flight attendant • stopover;layover • recreation center • to land;to touch down • to go through security • currency exchange office
Driver Licensing 2024-01-11
Across
- qmatic
- yellow highlighter
- 90 days
- MVA 148.1
- dangerous action
- security feature
- truck manual
- number of DLKT languages
- violation
- L245
Down
- MV2076
- image capture workstation
- intersection safety camera
- 24 passenger school bus
- reciprocal licence
- MV2075
- account services
- 5/7 roadtest sheet
- no show roadtest sheet
- counter 11 & 12
20 Clues: L245 • MV2076 • qmatic • MV2075 • 90 days • MVA 148.1 • violation • truck manual • counter 11 & 12 • account services • dangerous action • security feature • yellow highlighter • reciprocal licence • 5/7 roadtest sheet • no show roadtest sheet • 24 passenger school bus • number of DLKT languages • image capture workstation • intersection safety camera
On the Go 2 Unit 4 Start 2024-01-09
Across
- sisäänkirjautuminen
- lähteä(esim.lento)
- asemalaituri
- itsepalvelu
- matkustaja
- lento
- istuinpaikka
- satama
- vaunu
- kone
- matkatavarat
- lähtevät
- kolikkoautomaatti
- juna
- matkatavarat
- tulli
Down
- kuulutus
- tarkastus
- saapuvat
- tullata
- turvallisuus
- lautta
- kyltti
- junavirkailija
- matkustamohenkilökunta
- matkalippu
- maihinnousukortti
- portti
- valmis
- matkalaukku
30 Clues: kone • juna • lento • vaunu • tulli • lautta • kyltti • satama • portti • valmis • tullata • kuulutus • saapuvat • lähtevät • tarkastus • matkustaja • matkalippu • itsepalvelu • matkalaukku • asemalaituri • turvallisuus • istuinpaikka • matkatavarat • matkatavarat • junavirkailija • maihinnousukortti • kolikkoautomaatti • lähteä(esim.lento) • sisäänkirjautuminen • matkustamohenkilökunta
Billy Elliot-Crossword 2023-02-28
26 Clues: far • mot • sorg • lønn • dans • bror • kull • jobb • lojal • støtte • ansvar • ulojal • styrke • streik • kollega • grenser • ballett • familie • industri • utdanning • stereotypi • arbeidsledig • konfrontasjon • en som jobber i gruve • trygghet(ordet kan ha flere betydninger) • samfunn/ fellesskap(ordet kan ha flere betydninger)
Kinds of Job 2024-09-03
30 Clues: Guru • Supir • Aktor • Pilot • Hakim • Polisi • Ilmuan • Petani • Dokter • Pelaut • Montir • Pelayan • Tentara • Arsitek • Perawat • Seniman • Pelatih • Penyanyi • Insinyur • Pedagang • Penjahit • Astronot • Pengacara • Carpenter • Juru masak • Fotografer • Tukang roti • Tukang kebun • Petugas keamanan • Pemadam kebakaran
Crossword for Seniors 2023-01-30
24 Clues: Faith • Funds • Worry • Injury • A trip • Concern • Assured • Solitude • Sheltered • relatives • Friendship • Compassion • Assistance • Coxa joint • Well-being • Self-reliant • Keeping level • Accommodation • Buddy or mate • Social security • Medical Personal • Paying attention • The windows to the soul • Hinge between the femur, tibia, patella
OCUPATIONS AND PROFESSIONS 2023-10-09
27 Clues: Guru • Koki • Pilot • Kasir • Penari • Dokter • Polisi • Musisi • Petani • Tentara • Perawat • Arsitek • Nelayan • Insinyur • Karyawan • Pedagang • Astronot • Dokter gigi • Tukang kayu • Tukang roti • Dokter hewan • Tukang kebun • Petugas keamanan • Pekerja kantoran • Pemadam kebakaran • Petugas Kebersihan • guide Pemandu wisata
UNIT 11 2023-02-23
investment strats 2022-11-21
Across
- money for real estate, equipment, and so on
- bank account used by depositors to accumulate money for future use
- for profit businesses that sell insurance products
- allow customers to pay for purchases and withdraw cash
- a document guaranteeing payment of a specific amount of money
- financial institution that is involved in trading securities in financial markets
- prearranged amount of credit that is available for business to use as needed
- people who do the work
- bank account that allows bank owners to make deposits, write checks, withdraw money
- a financial investment issues by cooperation, government, or other organization
- long term business
- equals one vote
- security that pays interest over terms of ten to thirty years
- largest category of deposit institution
- deposit insurance in case of bank failure
- financial institution that provides services for businesses
- nation uses to provide and manage money for itself
- customers are required to apply for this
Down
- people who buy shares of stock
- financial institution that makes money by using loans
- central bank of USA
- online banks allow
- nonprofit financial institutions that privately owned and provides banking services
- financial institution that accepts money from customers
- lend money to the business in return of rate of interest
- banking regulations must comply with
- security that matures in a year or less
- financial institution that offers savings and loan services
- established in 1913
- regular payment made from a customers bank account to a vendor or supplier
30 Clues: equals one vote • online banks allow • long term business • central bank of USA • established in 1913 • people who do the work • people who buy shares of stock • banking regulations must comply with • security that matures in a year or less • largest category of deposit institution • customers are required to apply for this • deposit insurance in case of bank failure • ...
English Crossword Puzzle 2025-09-26
Across
- the activity of a person or group of people who travel outside their place of residence temporarily for recreational, business, educational, cultural, or other purposes, and utilize the facilities available at the destination.
- antonyms of departed.
- travel activity list.
- the synonyms of booking/registration.
- profession that arranges tickets and hotels.
- the passenger had checked ___ two heavy suitcases at the counter.
- documents required to enter another country.
- tourism with the aim of learning.
- historical buildings which are generally places of worship or religious relics from the Hindu-Buddhist period.
- tourism that emphasizes nature conservation.
- a unified system consisting of the use of airspace, aircraft, airports, air transportation, flight navigation, safety and security, the environment, and supporting facilities.
- they passed ___ security check.
- connecting bridge from the airport terminal to the aircraft door.
Down
- the synonyms of lead.
- a person who travels to a place outside his/her place of residence for the purpose of vacation, recreation, business or other temporary purposes is called ___
- what kind of tourism is included in the zoo?
- the stage in air travel where passengers begin to board the aircraft to occupy their reserved seats.
- the tourist took photos ___ the performance.
- document used as proof of payment for credit transactions.
- the tourist had all documents ready like ID, visa, and ___
- the antonym of "international" in tourist.
- they completed the ___ at the counter before going to security.
- the synonyms of baggage/suitcase/bag.
- she booked the seat and received the ___ for the trip.
- the synonyms of lodging.
25 Clues: the synonyms of lead. • antonyms of departed. • travel activity list. • the synonyms of lodging. • they passed ___ security check. • tourism with the aim of learning. • the synonyms of booking/registration. • the synonyms of baggage/suitcase/bag. • the antonym of "international" in tourist. • what kind of tourism is included in the zoo? • ...
Trend Micro Mobile Security 2024-05-06
Across
- Trend Micro Mobile Security provides ____ by including anti-theft tools to locate, lock, and wipe lost or stolen devices. (Starts with s)
- Trend Micro Mobile Security provides ____ controls to manage children's device usage and restrict access to inappropriate content
- Trend Micro Mobile Security provides web browsing protection to block ____ websites and phishing attempts (Starts with m)
Down
- Trend Micro Mobile Security provides malware scanning and detection to find ____ (Starts with v)
- Trend Micro Mobile Security provides privacy scanning to identify apps that my be accessing ____ information without permission
- Trend Micro Mobile Security provides safe ____ features to protect users from online threats while browsing the internet. (Starts with s)
6 Clues: Trend Micro Mobile Security provides malware scanning and detection to find ____ (Starts with v) • Trend Micro Mobile Security provides web browsing protection to block ____ websites and phishing attempts (Starts with m) • Trend Micro Mobile Security provides privacy scanning to identify apps that my be accessing ____ information without permission • ...
Sectors of the Indian Economy 2021-09-21
Across
- Sustainable development takes care of present and ________
- Which sector is also called agricultural sector
- Cotton is a _________ product
- A large proportion of labourers in India are working in which sector
- Which sector is also called manufacturing sector
- The activities in Primary, Secondary and Tertiary sector are ____________
Down
- Job assurance in rural areas
- DAV group of schools come under which sector
- Health care centre come under which sector
- In which sector workers enjoy job security
- In which sector workers do not produce goods
- unorganised sector does not has _____ security
12 Clues: Job assurance in rural areas • Cotton is a _________ product • Health care centre come under which sector • In which sector workers enjoy job security • DAV group of schools come under which sector • In which sector workers do not produce goods • unorganised sector does not has _____ security • Which sector is also called agricultural sector • ...
Confidentiality test 2025-02-06
Across
- religion, etc.
- work history, date of birth, social security number, criminal record,
- involves individuals hired to steal trade secrets, new products or
- or Sensitive Data information about an employee prior to employment such as a résumé,
- of information
- information
- Data records of an employee’s performance on the job such as performance reports,
- Data information which may arise from employment-related physicals, drug tests and
- insurance information
Down
- actions, supervisory notations
- in the Workplace keeping employee, customer and client information private
- set of rules or promises which limits access or places restrictions on certain
- Espionage form of espionage conducted for commercial purposes rather than security;
13 Clues: information • religion, etc. • of information • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • work history, date of birth, social security number, criminal record, • in the Workplace keeping employee, customer and client information private • ...
